Which design consideration is valid when you contrast fabricPath and trill?
Which design consideration is valid when you contrast fabricPath and trill?A . FabricPath uses IS-IS, but TRILL uses VxLAN B. FabricPath permits active-active FHRP and TRILL support anycast gateway. C. FabricPath Permits ECMP, but TRILL does not D. FabricPath permits active-active mode, but TRILL supports only active-standby mode.View AnswerAnswer: B
What is a characteristic of a secure cloud architecture model?
What is a characteristic of a secure cloud architecture model?A . limited access to job function B. dedicated and restricted workstations C. multi-factor authentication D. software-defined network segmentationView AnswerAnswer: D
What best describes the difference between Automation and Orchestration?
What best describes the difference between Automation and Orchestration?A . Automation refers to an automatic process for completing a single task and Orchestration refers to assembling and coordinating a set of tasks and conditions. B. Automation describes a hands-off configuration process while Orchestration refers to sets of automation tasks that...
Which type of IPv6 addresses can be used for these networks in the IPv6 addressing design?
Company XYZ has a new network based on IPv6. Some of the subnets that they are planning to use will be confidential and need an addressing scheme that confines them to the local campus network. Which type of IPv6 addresses can be used for these networks in the IPv6 addressing...
Which mechanism do you use along with UDLD?
You want to mitigate failures that are caused by STP loops that occur before UDLD detects the failure or that are caused by a device that is no longer sending BPDUs. Which mechanism do you use along with UDLD?A . Root guard B. BPDU guard C. Loop guard D. BPDU...
Which BGP feature provides fast convergence?
Which BGP feature provides fast convergence?A . BGP PIC | B. BGP-EVPN C. BGP FlowSpec D. BGP-LSView AnswerAnswer: A
Which protocol must be enabled?
A healthcare customer requested that SNMP traps must be sent over the MPLS Layer 3 VPN service. Which protocol must be enabled?A . SNMPv3 B. Syslog C. Syslog TLS D. SNMPv2 E. SSHView AnswerAnswer: A
How can you accomplish this task*?
Refer to the exhibit. A customer runs OSPF with Area 5 between its aggregation router and an internal router When a network change occurs in the backbone. Area 5 starts having connectivity issues due to the SPF algorithm recalculating an abnormal number of times in Area 5 You are tasked...
Which technology is an open-source infrastructure automation tool that automates repetitive tasks for users who work in networks such as cloud provisioning and intraservice orchestration?
Which technology is an open-source infrastructure automation tool that automates repetitive tasks for users who work in networks such as cloud provisioning and intraservice orchestration?A . Ansible B. Contrail C. Java D. Jinja2View AnswerAnswer: A
Which replication method and data center technology should be used?
An architect receives a business requirement from a CTO that states the RTO and RPO for a new system should be as close as possible to zero. Which replication method and data center technology should be used?A . asynchronous replication over dual data centers via DWDM B. synchronous replication over...