Singles 2
SDN emerged as a technology trend that attracted many industries to move from
complex and distributed management flow
An architect designs a multi-controller network
control path reliability
Which parameters is the most important
data confidentiality rules
A network architect must redesign a service provider edge
fate sharing
Which purpose of a dynamically created tunnel interface
first-hop router registration to the RP
What is a disadvantage of traditional three-tier
high latency
Your network operations team is deploying Access
inside local
A network security team uses a purpose-built
integration with an incident response plan
You are tasked to design a QoS policy for a service provider
map DSCP bits into the EXP field
Company XYZ is running OSPF in their network
multipoint route-redistribution with route filtering using route tags
A network engineering team is in the process of designing
next-next-hop (NNHop) tunnel
IPFIX data collection via standalone IPFIX
observation of critical links
According to the CIA triad principles for network security design
requirement for data-at-rest encryption for user identification within the VPN termination hardware
A European national bank considers migrating its own-premises systems
security
An architect recieves a business requirement from a CTO
synchronous replication over dual data centers via Metro Ethernet
A healthcare provider discovers that protected health
technical integrity and transmission security
A customer migrates from a traditional Layer 2
the migrated VLAN should be pruned from the Layer 2 interconnects
A green data center is being deployed and a design requirement is to be able to
transparent Interconnection of Lots of Links
You are a network designer and you must ensure that the network
unicast RPF strict mode
You are designing an Out of Band Cisco Network Admission Control
untrusted VLAN
Which two possible drawbacks should you
- An SDN orchestration layer is required to support NFV - High-end routers are required to support NFV
Which three Cisco products are used
- Cisco UCS - Cisco Nexus switches - Cisco Virtual Network Function
You are tasked with the design of a high available network
- EIGRP - RPVST+
A network design includes a long signaling delay in notifying the Layer 2 control
- Enable lower data link layer recovery systems to have an opportunity to restore the interface - Reduce the time for the network to reconverge
You have been tasked with designing a data center interconnect to provide business
- EoMPLS - KVPLS
Company XYZ is designing the network for IPv6 security
- IPv6 Destination Guard - IPv6 Prefix Guard
You are designing a network for a branch office
- IS-IS - static - BGP - EIGRP
An existing wireless network was designed to support data traffic only
- Install additional access points in monitor mode where the co-channel interference would otherwise be affected - Add access points along the perimeter of the converge area
Which two statements describe the usage of the IS-IS
- It can be set in intermediate system (IS-IS routers) to attract transit traffic from other intermediate systems - it can be set in intermediate systems (IS-IS routers) to avoid traffic black holes until routing protocols are fully converged after a reload operation
Which two impacts of adding the IP event
- It reduces the utilization of system processing resources - It improves overall network stability
Which two foundational aspects of IoT are still evolving and being worked on by
- Low energy Bluetooth sensors - WiFi protocols
Which two design solutions ensure sub 50 msec of the convergence time
- MPLS-FRR - Ti-LFA
Which two characteristics apply to firewall transparent mode operations
- Multicast traffic can traverse the firewall - OSPF adjacencies can be established through the firewall
Company ABC wants to minimize the risk of users plugging unauthorized
- PortFast - BPDU Guard
The Layer 3 control plane is the intelligence over network
- QoS policy propagation with BGP - remote black-holding trigger
As part of a new network design documentation
- RPF check - TTL header
which actions are performed at the distribution layer
- Redundancy and load balancing - Fault isolation
An enterprise campus is adopting a network virtualization design
- Services virtualization - Path isolation
Which two pain points are the most common for container technology
- Skilled staff - Container deployment
SD-WAN can be used to provide secure connectivity
- Solutions include centralized orchestration, control, and zero-touch provisioning - Improved operational efficiencies result in cost savings
You are designing a new Ethernet-based metro-area network for an enterprise
- Use P2P links between routers in a hub-and-spoke design - Use a mulitpoint Metro-E service for router connections
Company XYZ wants design recommendations for Layer 2 redundancy
- Use switch clustering at the distribution layer where possible - Avoid stretching VLANs across switches
Refer to the Exhibit. A service provider has a requirement to use Ethernet
- Use upward maintenance endpoints on the SP switches - Enable Connectivity Fault Management on the SP switches
Which two design option are available to
- embedded RP - BSR
Customer XYZ networks consists of an MPLS core
- it can be set on a router during the startup process for a fixed period of time - it can be set on a router until other interacting protocols have signaled convergence
what are two descriptions of network optimization ?
- network redesign - proactive network management
Which two aspect are considered when
- recommended for high availability - will only work with single-tier headed architecture
A senior network designer suggests that you should improve network convergence
- service provider agreement to support tuned timers - number of routes on the CE router
Which two features are advantages of SD-WAN
- uses FEC constructs for traffic forwarding, thereby improving efficiency - uses policy-based forwarding of real-time traffic with less complexity
While designing a switched topology, in which two options
- when switches of different spanning-tree types are connected (for example 802.1d connected to 802.1w - on access layer switches
Software-defined networking architecture is used for cost-effective
- wide area network - mobile network
Which option is a fate-sharing characteristic
A failure of a single element causes the entire service to fail
Which design principal improves network resiliency
Added redundancy
A service provider recently migrated to an SD-WAN solution for delivering WAN
Adopt a well-structured SD-WAN service management lifecycle model
A security architect receives reports of these incidents
Apply a context-based network access control policy
A business customer deploys workloads in the public
Apply workload policies that dictate the security requirements to the workloads that are placed in the cloud
What best describes the difference between
Automation refers to an automatic process for completing a single task and Orchestration refers to assembling and coordinating a set of tasks and conditions
Your company wants to deploy a new data center infrastructure
BPDU Guard should be enabled on all VTEP access ports
Which mechanism enables small, unmanaged switches to plug
BPDU guard
An enterprise has identified these causes for inefficient CAPEX spending
Build a financial control function that delivers high -quality reports on operational expenses for business insight and financial reporting
An engineer is designing the QoS strategy for Company XYZ
CBWFQ
An enterprise solution team is performing an analysis of
Deploy a root controller to gather a complete network-level view
you were tasked to enhance the security of a network
Deploy uRPF loose mode
An MPLS service provider is offering a standard EoMPLS-based VPLS service
Enable snooping mechanisms on the provider PE routers
A network attacker exploits application flaws to compromise critical
Enforce policies and microsegmentation
which action must be taken before new VoIP systems
Evaluate bandwidth utilization and connection quality
Which design consideration is valid when
FabricPath permits active active FHRP and TRILL support anycast gateway
As network designer, which option is your main concern with regards to virtualizing
Fate sharing
You are designing the routing design for two merging companies
Global to local NAT translation is done before routing
the network designer needs to use GLOP IP addresses in order to make them unique
H233.0.0.0 to 233.255.255.255
Which statement about hot-potato routing architecture
Hot-potato routing is the preferred architecture when content to content providers
Which design solution reduces the amount of IGMP state in the network
IGMPv3 with PIM-SSM
A company plans to use BFD between its routes to detect a connectivity problem
IP packets with identical source and destination IP addresses
You ar designing a network running both IPv4 and IPv6 to
IPv6 and IPv4 traffic can use a single QoS policy to match both protocols
A customer asks you to perform a high level review
IS-IS
Refer to the exhibit. A customer runs OSPF
Implement LSA filtering on the AB, allowing summary routes and preventing more specific routes into Area 5
Refer to the exhibit. As part of the redesign project
It is switched due to a successful RPF check against the routing table
Which design benefit of bridge assurance is true ?
It prevents switch loops caused by unidirectional point-to-point link condition on Rapid PVST + and MST
How can EIGRP topologies be designed to converge as fast as possible
Limit the query domain by the use of summarization
You want to mitigate failures that are caused by STP loops
Loop guard
Which mechanism provides Layer 2 fault isolation between data centers ?
OTV
Which main IoT migration aspect should be reviewed
Sensors
VPLS is implemented in a Layer 2 network with 2000 VLANs
PE scalability
Company XYZ connects its sites over a private WAN
PIM sparse mode with RP located at the hub
An enterprise wants to provide low-cost delivery of network
PaaS within a public cloud
Which design benefit of PortFast is true ?
PortFast does not generate a spanning tree change when a station on a port is connected or disconnected
Company ABC uses IPv4-only
Router Advertisement Guard
Various teams in different organizations
Significant effort and time are required
Refer to the exhibit. AJI links are P2P layer 3
Static routes
Company XYZ wants to redesign the Layer 2 part of their network and wants to use
TRILL
Refer to the exhibit. Company XYZ BGP topology is as shown
The LA administrator should use route aggregation to summarize the 10.1.4.0/24, 10.1.5.0/24, 10.1.6.0/24, and 10.1.7.0/24 networks toward Chicago
What advantage of placing the IS-IS layer 2 flooding domain
The layer 2 domain is contained and more stable
Which undesired effect of increasing the jitter compensation buffer is true
The overall transport delay increases and quality issues can occur
You are using iSCSI to transfer files
change the protocol to CIFS
Two enterprise networks must be connected toegether
Two different NAT pools must be used for
Company XYZ wants to deploy OSPF
Use route maps on ASBRs to filter routes with tags so they are not redistributed
You want to split an Ethernet domain in two.
VLAN ID
Which DCI technology utilization a 'flood and learn"
VPLS
Which protocol does an SD-Access wireless
VXLAN
As part of workspace digitization, a large enterprise has
WRED