Which packets should the IPS forward for BFD to work under all circumstances?
A company plans to use BFD between its routers to detect a connectivity problem inside the switched network. An IPS is transparently installed between the switches. Which packets should the IPS forward for BFD to work under all circumstances?A . Fragmented packet with the do-not-fragment bit set B. IP packets...
What should be used in the multicast routing design?
Company XYZ connects its sites over a private WAN. Their overlay network is running a DMVPN setup where the headquarters site is the hub. The company is planning on implementing multicast routing on the network. What should be used in the multicast routing design?A . PIM dense mode with RP...
Which two conditions must be met for EIGRP to maintain an alternate loop-free path to a remote network? (Choose two.)
Which two conditions must be met for EIGRP to maintain an alternate loop-free path to a remote network? (Choose two.)A . The Reported Distance from a successor is lower than the local Feasible Distance. B. The Reported Distance from a successor is higher than the local Feasible Distance. C. The...
Which protocol minimizes unicast flooding during a Topology Change Notification in a Layer 2 switched network with many VLANs?
While reviewing an existing network design, you are discussing the characteristics of different STP versions. Which protocol minimizes unicast flooding during a Topology Change Notification in a Layer 2 switched network with many VLANs?A . PVRSTP B. MST C. STP D. PVSTP+View AnswerAnswer: A
How must the queue sizes be designed to ensure that an application functions correctly?
How must the queue sizes be designed to ensure that an application functions correctly?A . Each individual device queuing delay in the chain must be less than or equal to the application required delay. B. The queuing delay on every device in the chain must be exactly the same to...
Which two principles would you apply in order to maximize the wireless network capacity?
You have been asked to design a high-density wireless network for a university campus. Which two principles would you apply in order to maximize the wireless network capacity? (Choose two.)A . Implement a four-channel design on 2.4 GHz to increase the number of available channels B. Choose a high minimum...
What advantage of placing the IS-IS layer 2 flooding domain boundary at the core Layer in a three-layer hierarchical network is true?
What advantage of placing the IS-IS layer 2 flooding domain boundary at the core Layer in a three-layer hierarchical network is true?A . The Layer 1 and Layer 2 domains can easily overlap B. It reduces the complexity of the Layer 1 domains C. It can be applied to any...
Which routing technique can the network administrator use so that the rest of the network is not affected by the flapping issue?
Refer to the exhibit. Company XYZ BGP topology is as shown in the diagram. The interface on the LA router connected toward the 10 1.5.0/24 network is faulty and is going up and down, which affects the entire routing domain. Which routing technique can the network administrator use so that...
How must the redistribution strategy be designed for this network?
Company XYZ has two routing domains in their network, EIGRP and OSPF. The company wants to provide full reachability between the two domains by implementing redistribution on a router running both protocols. They need to design the redistribution in a way that the OSPF routers will see link costs added...
Which effect of using ingress filtering to prevent spoofed addresses on a network design is true?
Which effect of using ingress filtering to prevent spoofed addresses on a network design is true?A . It reduces the effectiveness of DDoS attacks when associated with DSCP remarking to Scavenger. B. It protects the network Infrastructure against spoofed DDoS attacks. C. It Classifies bogon traffic and remarks it with...