Which technology can be used to prevent these types of attacks?
Company XYZ wants to improve the security design of their network to include protection from reconnaissance and DoS attacks on their sub interfaces destined toward next hop routers. Which technology can be used to prevent these types of attacks?A . MPP B. CPPr C. CoPP D. DPPView AnswerAnswer: B Explanation:...
Which two technologies allow for FCoE via lossless Ethernet or data center bridging?
You have been tasked with designing a data center interconnect as part of business continuity. You want to use FCoE over this DCI to support synchronous replication. Which two technologies allow for FCoE via lossless Ethernet or data center bridging? (Choose two.)A . DWDM B. EoMPLS C. SONET/SDH D. Multichassis...
Which replication method and data center technology should be used?
An architect receives a business requirement from a CTO that states the RTO and RPO for a new system should be as close as possible to zero. Which replication method and data center technology should be used?A . asynchronous replication over dual data centers via DWDM B. synchronous replication over...
Which two actions must merchants do to be compliant with the Payment Card Industry Data Security Standard? (Choose two.)
Which two actions must merchants do to be compliant with the Payment Card Industry Data Security Standard? (Choose two.)A . conduct risk analyses B. install firewalls C. use antivirus software D. establish monitoring policies E. establish risk management policiesView AnswerAnswer: B,C
Which QoS strategy can be used to fulfill the requirement?
Company XYZ is redesigning their QoS policy. Some of the applications used by the company are real-time applications. The QoS design must give these applications preference in terms of transmission. Which QoS strategy can be used to fulfill the requirement?A . weighted fair queuing B. weighted random early detection C....
Which IPsec tunneling feature can they enable to optimize the data flow while ensuring that the headers contain no duplicate IP addresses?
Company XYZ has designed their network to run GRE over IPsec on their Internet-based VPN to connect two sites. Which IPsec tunneling feature can they enable to optimize the data flow while ensuring that the headers contain no duplicate IP addresses?A . Transport Mode in IPsec Phase I B. Transport...
Which two techniques can be used in service provider-style networks to offer a more dynamic, flexible, controlled, and secure control plane design?
The Layer 3 control plane is the intelligence over the network that steers traffic toward its intended destination. Which two techniques can be used in service provider-style networks to offer a more dynamic, flexible, controlled, and secure control plane design? (Choose two.)A . access control lists B. firewalls C. QoS...
Which technology is the best fit for this purpose?
Company XYZ has a multicast domain that spans across multiple autonomous systems. The company wants to choose a technology that provides simplified and controlled approach to interconnecting the multicast domains. Which technology is the best fit for this purpose?A . MSDP B. PIM SSM C. MPLS D. PIM sparse modeView...
Which hosting data center pair can host the new application?
Refer to the exhibit. ACME Mining has four data centers in Santiago. Cape Town. Mumbai, and Beijing, full-mesh connected via a 400 Mb/s EVP-LAN. They want to deploy a new mission-critical application with these requirements: ✑ cluster heartbeat 2 Mb/s continuous (250 KB/s) ✑ cluster heartbeat one-way maximum latency 100...
Which requirement addresses this ability on a multicontroller platform?
An enterprise solution team is performing an analysis of multilayer architecture and multicontroller SDN solutions for multisite deployments. The analysis focuses on the ability to run tasks on any controller via a standardized interface. Which requirement addresses this ability on a multicontroller platform?A . Deploy a root controller to gather...