What are two top cloud-native security challenges faced by today's cloud-oriented organizations? (Choose two)
What are two top cloud-native security challenges faced by today's cloud-oriented organizations? (Choose two)A . establishing user roles B. polymorphism C. lack of visibility and tracking D. increased attack surface E. user credential validationView AnswerAnswer: C,D
What is a description of a control plane action?
What is a description of a control plane action?A . de-encapsulating and re-encapsulating a packet in a data-link frame B. matching the destination MAC address of an Ethernet frame to the MAC address table C. matching the destination IP address of an IP packet to the IP routing table D....
Drag and drop the multicast protocols from the left onto the current design situation on the right
DRAG DROP Drag and drop the multicast protocols from the left onto the current design situation on the right. View AnswerAnswer: Explanation: A picture containing table Description automatically generated
How many fully established neighbour relationships exist on an Ethernet with five routers running OSPF as network type broadcast?
How many fully established neighbour relationships exist on an Ethernet with five routers running OSPF as network type broadcast?A . 5 B. 6 C. 7 D. 10 E. 20View AnswerAnswer: C Explanation: Assuming routers R1-R5, R1 is elected DR, R2 BDR. Fully established neighborships only occur to DR and BDR,...
Which consideration is correct about the QoS for IPv4 and IPv6?
You are designing a network running both IPv4 and IPv6 to deploy QoS. Which consideration is correct about the QoS for IPv4 and IPv6?A . IPv4 and IPv6 traffic types can use use queuing mechanisms such as LLQ, PQ and CQ. B. IPv6 packet classification is only available with process...
Which DCI technology utilizes a “flood and learn” technique to populate the Layer2 forwarding table?
Which DCI technology utilizes a “flood and learn” technique to populate the Layer2 forwarding table?A . LISP B. OTV C. VPLS D. EVPNView AnswerAnswer: C
How can this implementation be achieved?
Company XYZ runs OSPF in their network. A design engineer decides to implement hot-potato routing architecture. How can this implementation be achieved?A . Enable iBGP and apply prepend to ensure all prefixes will have the same length of the AS path attribute value. B. Redistribute the external prefixes onto OSPF...
Which implementation plan can be used to accommodate this during the migration phase?
An enterprise plans to evolve from a traditional WAN network to a software-defined WAN network. The existing devices have limited capability when it comes to virtualization. As the migration is carried out, enterprise applications and services must not experience any traffic impact. Which implementation plan can be used to accommodate...
Which BGP attributes are best suited to control this inbound traffic coming from BGP AS 500 Into the 91.7.0.0/16 network?
Refer to the exhibit. An engineer has been asked to redesign the traffic flow toward AS 111 coming from AS 500.Traffic destined to AS 111 network 91 7 0.0/16 should come in via AS 100. while traffic destined to all other networks in AS 111 should continue to use the...
Which segmentation method is suitable and scalable for the customer?
A customer has a functional requirement that states HR systems within a data center should be segmented from other systems that reside in the same data center and same VLAN. The systems run legacy applications by using hard-coded IP addresses. Which segmentation method is suitable and scalable for the customer?A...