Which three components are part of the foundational information security principles of the CIA triad? (Choose three.)

Which three components are part of the foundational information security principles of the CIA triad? (Choose three.)A . cryptography B. confidentiality C. C. authorization D. identification E. integrity F. availabilityView AnswerAnswer: B,E,F

February 8, 2023 No Comments READ MORE +

As a network designer you need to support an enterprise with hundreds of remote sites connected over a single WAN network that carries different types of traffic, including VoIP, video, and data applications which of following design considerations will not impact design decision?

As a network designer you need to support an enterprise with hundreds of remote sites connected over a single WAN network that carries different types of traffic, including VoIP, video, and data applications which of following design considerations will not impact design decision?A . Focus on the solution instead of...

February 8, 2023 No Comments READ MORE +

Which three items do you recommend for control plane hardening of an infrastructure device? (Choose three.)

Which three items do you recommend for control plane hardening of an infrastructure device? (Choose three.)A . redundant AAA servers B. Control Plane Policing C. warning banners D. to enable unused. services E. SNMPv3 F. routing protocol authenticationView AnswerAnswer: B,E,F

February 8, 2023 No Comments READ MORE +

Which technique accomplishes the requirement?

Retef to the exhibit. This network is running OSPF and EIGRP as the routing protocols Mutual redistribution of the routing protocols has been contoured on the appropriate ASBRs. The OSPF network must be designed so that flapping routes m EIGRP domains do not affect the SPF runs within OSPF. The...

February 8, 2023 No Comments READ MORE +

What is an architectural framework created by ETSI that defines standards to decouple network functions from proprietary hardware-based appliances and have them run in software on standard x86 servers?

What is an architectural framework created by ETSI that defines standards to decouple network functions from proprietary hardware-based appliances and have them run in software on standard x86 servers?A . NFVIS B. NFV C. VNFView AnswerAnswer: C

February 8, 2023 No Comments READ MORE +

Which OSPF design change allows OSPF to calculate the proper costs?

Refer to the exhibit. This network is running OSPF as the routing protocol. The internal networks are being advertised in OSPF London and Rome are using the direct link to reach each other although the transfer rates are better via Barcelona. Which OSPF design change allows OSPF to calculate the...

February 7, 2023 No Comments READ MORE +

If the design must support an MPLS network with six classes, and CEs will be managed by the service provider, which QoS policy should be recommended?

You are tasked to design a QoS policy for a service provider so they can include it in the design of their MPLS core network. If the design must support an MPLS network with six classes, and CEs will be managed by the service provider, which QoS policy should be...

February 6, 2023 No Comments READ MORE +

Which consideration is correct about the QoS for IPv4 and IPv6?

You are designing a network running both IPv4 and IPv6 to deploy QoS. Which consideration is correct about the QoS for IPv4 and IPv6?A . IPv4 and IPv6 traffic types can use use queuing mechanisms such as LLQ, PQ and CQ. B. IPv6 packet classification is only available with process...

February 6, 2023 No Comments READ MORE +

Which two factors should you consider to adjust the timer values?

A senior network designer suggests that you should improve network convergence times by reducing BGP timers between your CE router and the PE router of the service provider. Which two factors should you consider to adjust the timer values? (Choose two.)A . service provider agreement to support tuned timers B....

February 6, 2023 No Comments READ MORE +

Which three elements help network designers to construct secure systems that protect information and resources (such as devices, communication, and data) from unauthorized access, modification, inspection, or destruction? (Choose three.)

Which three elements help network designers to construct secure systems that protect information and resources (such as devices, communication, and data) from unauthorized access, modification, inspection, or destruction? (Choose three.)A . confidential B. serviceability C. reliability D. availability E. integrity F. scalabilityView AnswerAnswer: A,D,E

February 5, 2023 No Comments READ MORE +