Which design benefit of bridge assurance is true?
Which design benefit of bridge assurance is true?A . It supposes a spanning-tee topology change upon connecting and disconnecting a station on a port B. It prevents switched traffic from traversing suboptimal paths on the network. C. It allows small, unmanaged switches to be plugged into ports of access switches...
Drag and drop the FCAPS network management reference models from the left onto the correct definitions on the right
DRAG DROP Drag and drop the FCAPS network management reference models from the left onto the correct definitions on the right. View AnswerAnswer:
Which two features can be used on the LAN access ports to support this design requirement?
Company ABC wants to minimize the risk of users plugging unauthorized switches and hubs into the network. Which two features can be used on the LAN access ports to support this design requirement? (Choose two.)A . Loop Guard B. PortFast C. DTF D. Root Guard E. BPDU GuardView AnswerAnswer: B,E
Which mechanism do you use along with UDLD?
You want to mitigate failures that are caused by STP loops that occur before UDLD detects the failure or that are caused by a device that is no longer sending BPDUs. Which mechanism do you use along with UDLD?A . Root guard B. BPDU guard C. Loop guard D. BPDU...
Which best practice should organizations follow to ensure data security in the private cloud?
Hybrid cloud computing allows organizations to like advantage of public and private cloud models. Which best practice should organizations follow to ensure data security in the private cloud?A . Use standard protocols for data transmission over the network. B. Encrypt data when it is at rest and in motion C....
Which two features provide fail closed environments?
You are tasked with the design of a high available network. Which two features provide fail closed environments? (Choose two.)A . EIGRP B. RPVST+ C. MST D. L2MPView AnswerAnswer: A,B
Which tunneling technology do you recommend?
A service provider hires you to design its new managed CE offering to meet these requirements • The CEs cannot run a routing protocol with the PE • Provide the ability for equal or unequal ingress load balancing in dual-homed CE scenarios. • Provide support for IPv6 customer routes •...
Which two characteristics apply to firewall transparent mode operations in a firewall solution design? (Choose two.)
Which two characteristics apply to firewall transparent mode operations in a firewall solution design? (Choose two.)A . Changes in the existing IP addressing and subnets are required B. The firewall can participate actively on spanning tree. C. Multicast traffic can traverse the firewall. D. OSPF adjacencies can be established through...
Which is the most scalable solution to provide this type of VRF Selection process on the CE edge device?
A Service Provider is designing a solution for a managed CE service to a number of local customers using a single CE platform and wants to have logical separation on the CE platform using Virtual Routing and Forwarding (VRF) based on IP address ranges or packet length. Which is the...
As network designer, which option is your main concern with regards to virtualizing multiple network zones into a single hardware device?
As network designer, which option is your main concern with regards to virtualizing multiple network zones into a single hardware device?A . Fate sharing B. CPU resource allocation C. Congestion control D. Security E. Bandwidth allocationView AnswerAnswer: A