In this scenario, which statement is true?
You are designing a network management strategy for a new network. The requirements for the management of network devices are shown below: - Administrator passwords must have an expiration date. - Administrators must be assigned role-specific privileges on each device. In this scenario, which statement is true?A . Local authentication...
Which two factors are important from an application-driven network impact perspective?
Your customer is experiencing problems with session drops and high response time. You are asked to provide redesign suggestions to minimize these problems. You examine the applications that are supported by your customer’s network to try to identify problem factors. Which two factors are important from an application-driven network impact...
Which two statements describe how you would meet the business managers’ objectives?
Your customer is deploying a new unified communications (UC) solution and business managers want to ensure that network users adopt and use the new solution. Which two statements describe how you would meet the business managers’ objectives? (Choose two.)A . Ensure that the solution is easy to manage for the...
Which three measurements do you need to satisfy the company's requirement?
A company asks you to develop a solution to provide secure access to the corporate network with a goal of providing a differentiated security policy per role and per device. Which three measurements do you need to satisfy the company's requirement? (Choose three.)A . the number of physical desktop portsB...
What are the first two steps of business continuity planning? (Choose two.)
What are the first two steps of business continuity planning? (Choose two.)A . know your networkB . test the planC . formulate the planD . assess the risksView AnswerAnswer: AD
Which two statements are true in regards to the Know Your Network step of business continuity planning? (Choose two.)
Which two statements are true in regards to the Know Your Network step of business continuity planning? (Choose two.)A . You should list all the functions and services in the network.B . You should perform a business impact analysis.C . You should perform a risk assessment.D . You should develop...
Which two solutions would meet these requirements?
You are asked to evaluate a WAN design for a corporation with a focus on cost, security, and the ability to have direct adjacencies between your remote sites. Which two solutions would meet these requirements? (Choose two.)A . IPsec tunnels over the InternetB . GRE tunnels over the InternetC ....
In a network design using the traditional tiered structure, which two tiers connect to untrusted domains? (Choose two.)
In a network design using the traditional tiered structure, which two tiers connect to untrusted domains? (Choose two.)A . WAN edgeB . aggregationC . coreD . accessView AnswerAnswer: AD
You are evaluating an existing network to determine requirements for a network upgrade. In this scenario, which statement is true?
You are evaluating an existing network to determine requirements for a network upgrade. In this scenario, which statement is true?A . A network baseline identifies devices that do not have redundant components.B . A network baseline identifies traffic growth patterns across network devices.C . A network baseline identifies how many...
What are two requirements that every RFP response should include? (Choose two.)
What are two requirements that every RFP response should include? (Choose two.)A . a support plan that includes details about servicing the components once operationalB . a detailed competitor comparison document that indicates the proposed design is the least expensive optionC . a detailed forecast of exception handling after the...