Which operational metric to measure the health of the incident management process is critical?

Which operational metric to measure the health of the incident management process is critical?A . A number of successful changesB . Number of incidents per severity levelC . Mean time to restore serviceD . Mean time to resolve incidentsView AnswerAnswer: A

January 13, 2019 No Comments READ MORE +

Which statement is correct?

Refer to the exhibit. Which statement is correct?A . If the labeled packet arrives with the bottom label of 27, the label is replaced with label 38 and the packet is sent out on the Gigabitethernet 0/0B . If the labeled packet arrives with the bottom label of 27, all...

January 13, 2019 No Comments READ MORE +

In an end-to-end layer 2 service, Which technology provides the capability to detect verify isolate and report faults across a provider network?

In an end-to-end layer 2 service, Which technology provides the capability to detect verify isolate and report faults across a provider network?A . CFMB . Carrier detectC . UDLDD . BFDView AnswerAnswer: A

January 13, 2019 No Comments READ MORE +

Which statement about the cisco intercloud fabric is true?

Which statement about the cisco intercloud fabric is true?A . It facilitates encrypted communications between VMs inside of private cloudB . It provides a virtual storage space for VMs inside of public cloudC . It dynamically establishes adjacencies between Cisco Intercloud Switch VMsD . It provides a Layer 2 extension...

January 10, 2019 No Comments READ MORE +

Which three services chaining’s can be recommended?

A service provider is considering investing in a services chaining solution. Which three services chaining’s can be recommended? (Choose two)A . FirewallB . Authoritative DNSC . ACGNATD . WAASE . VXLAF . EmailView AnswerAnswer: A, C

January 7, 2019 No Comments READ MORE +

Which three security mechanisms are used to mitigate or protect against DoS attacks that are targeted at a router? (Choose three)

Which three security mechanisms are used to mitigate or protect against DoS attacks that are targeted at a router? (Choose three)A . NSRB . GSTMC . uRPFD . BFDE . FRRF . CoPPView AnswerAnswer: B, C, F

January 6, 2019 No Comments READ MORE +

Which solution meet this requirement?

Refer to the exhibit. A service provider uses RSVP-TE instead of LDP to exchange labels in the MPLS network. Different path must be defined per type of traffic. Which solution meet this requirement?A . RDMB . PBTSC . MAMD . CBTSE . MPLS TE affinity attributesView AnswerAnswer: C

January 4, 2019 No Comments READ MORE +

Which technology provides fast forwarding path failure detection times for all media types, encapsulations, technologies, and routing protocols?

Which technology provides fast forwarding path failure detection times for all media types, encapsulations, technologies, and routing protocols?A . BFDB . MPLS TEC . NSFD . UDLDE . IP DampeningView AnswerAnswer: A

January 3, 2019 No Comments READ MORE +

What is the label stack of the packets leaving R6 going toward R5 for traffic flowing from CE1 to CE2?

Refer to the exhibit. A service provider is providing Layer 2 VPN between CE1 and CE2 via a pseudowire created between R1 and R5. What is the label stack of the packets leaving R6 going toward R5 for traffic flowing from CE1 to CE2?A . Single label of 17B ....

January 2, 2019 No Comments READ MORE +

Which three options reflect the minimum configuration to enable the SSHv2 services on Cisco routers?

An engineer is deploying SShv2-only in-band access. Which three options reflect the minimum configuration to enable the SSHv2 services on Cisco routers? (Choose three)A . Define a domain name for the deviceB . Create crypto keys by using the crypto key generate dsa commandC . Configure a key modules in...

January 1, 2019 No Comments READ MORE +