Singles 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

SDN emerged as a technology trend that attracted many industries to move from

complex and distributed management flow

An architect designs a multi-controller network

control path reliability

Which parameters is the most important

data confidentiality rules

A network architect must redesign a service provider edge

fate sharing

Which purpose of a dynamically created tunnel interface

first-hop router registration to the RP

What is a disadvantage of traditional three-tier

high latency

Your network operations team is deploying Access

inside local

A network security team uses a purpose-built

integration with an incident response plan

You are tasked to design a QoS policy for a service provider

map DSCP bits into the EXP field

Company XYZ is running OSPF in their network

multipoint route-redistribution with route filtering using route tags

A network engineering team is in the process of designing

next-next-hop (NNHop) tunnel

IPFIX data collection via standalone IPFIX

observation of critical links

According to the CIA triad principles for network security design

requirement for data-at-rest encryption for user identification within the VPN termination hardware

A European national bank considers migrating its own-premises systems

security

An architect recieves a business requirement from a CTO

synchronous replication over dual data centers via Metro Ethernet

A healthcare provider discovers that protected health

technical integrity and transmission security

A customer migrates from a traditional Layer 2

the migrated VLAN should be pruned from the Layer 2 interconnects

A green data center is being deployed and a design requirement is to be able to

transparent Interconnection of Lots of Links

You are a network designer and you must ensure that the network

unicast RPF strict mode

You are designing an Out of Band Cisco Network Admission Control

untrusted VLAN

Which two possible drawbacks should you

- An SDN orchestration layer is required to support NFV - High-end routers are required to support NFV

Which three Cisco products are used

- Cisco UCS - Cisco Nexus switches - Cisco Virtual Network Function

You are tasked with the design of a high available network

- EIGRP - RPVST+

A network design includes a long signaling delay in notifying the Layer 2 control

- Enable lower data link layer recovery systems to have an opportunity to restore the interface - Reduce the time for the network to reconverge

You have been tasked with designing a data center interconnect to provide business

- EoMPLS - KVPLS

Company XYZ is designing the network for IPv6 security

- IPv6 Destination Guard - IPv6 Prefix Guard

You are designing a network for a branch office

- IS-IS - static - BGP - EIGRP

An existing wireless network was designed to support data traffic only

- Install additional access points in monitor mode where the co-channel interference would otherwise be affected - Add access points along the perimeter of the converge area

Which two statements describe the usage of the IS-IS

- It can be set in intermediate system (IS-IS routers) to attract transit traffic from other intermediate systems - it can be set in intermediate systems (IS-IS routers) to avoid traffic black holes until routing protocols are fully converged after a reload operation

Which two impacts of adding the IP event

- It reduces the utilization of system processing resources - It improves overall network stability

Which two foundational aspects of IoT are still evolving and being worked on by

- Low energy Bluetooth sensors - WiFi protocols

Which two design solutions ensure sub 50 msec of the convergence time

- MPLS-FRR - Ti-LFA

Which two characteristics apply to firewall transparent mode operations

- Multicast traffic can traverse the firewall - OSPF adjacencies can be established through the firewall

Company ABC wants to minimize the risk of users plugging unauthorized

- PortFast - BPDU Guard

The Layer 3 control plane is the intelligence over network

- QoS policy propagation with BGP - remote black-holding trigger

As part of a new network design documentation

- RPF check - TTL header

which actions are performed at the distribution layer

- Redundancy and load balancing - Fault isolation

An enterprise campus is adopting a network virtualization design

- Services virtualization - Path isolation

Which two pain points are the most common for container technology

- Skilled staff - Container deployment

SD-WAN can be used to provide secure connectivity

- Solutions include centralized orchestration, control, and zero-touch provisioning - Improved operational efficiencies result in cost savings

You are designing a new Ethernet-based metro-area network for an enterprise

- Use P2P links between routers in a hub-and-spoke design - Use a mulitpoint Metro-E service for router connections

Company XYZ wants design recommendations for Layer 2 redundancy

- Use switch clustering at the distribution layer where possible - Avoid stretching VLANs across switches

Refer to the Exhibit. A service provider has a requirement to use Ethernet

- Use upward maintenance endpoints on the SP switches - Enable Connectivity Fault Management on the SP switches

Which two design option are available to

- embedded RP - BSR

Customer XYZ networks consists of an MPLS core

- it can be set on a router during the startup process for a fixed period of time - it can be set on a router until other interacting protocols have signaled convergence

what are two descriptions of network optimization ?

- network redesign - proactive network management

Which two aspect are considered when

- recommended for high availability - will only work with single-tier headed architecture

A senior network designer suggests that you should improve network convergence

- service provider agreement to support tuned timers - number of routes on the CE router

Which two features are advantages of SD-WAN

- uses FEC constructs for traffic forwarding, thereby improving efficiency - uses policy-based forwarding of real-time traffic with less complexity

While designing a switched topology, in which two options

- when switches of different spanning-tree types are connected (for example 802.1d connected to 802.1w - on access layer switches

Software-defined networking architecture is used for cost-effective

- wide area network - mobile network

Which option is a fate-sharing characteristic

A failure of a single element causes the entire service to fail

Which design principal improves network resiliency

Added redundancy

A service provider recently migrated to an SD-WAN solution for delivering WAN

Adopt a well-structured SD-WAN service management lifecycle model

A security architect receives reports of these incidents

Apply a context-based network access control policy

A business customer deploys workloads in the public

Apply workload policies that dictate the security requirements to the workloads that are placed in the cloud

What best describes the difference between

Automation refers to an automatic process for completing a single task and Orchestration refers to assembling and coordinating a set of tasks and conditions

Your company wants to deploy a new data center infrastructure

BPDU Guard should be enabled on all VTEP access ports

Which mechanism enables small, unmanaged switches to plug

BPDU guard

An enterprise has identified these causes for inefficient CAPEX spending

Build a financial control function that delivers high -quality reports on operational expenses for business insight and financial reporting

An engineer is designing the QoS strategy for Company XYZ

CBWFQ

An enterprise solution team is performing an analysis of

Deploy a root controller to gather a complete network-level view

you were tasked to enhance the security of a network

Deploy uRPF loose mode

An MPLS service provider is offering a standard EoMPLS-based VPLS service

Enable snooping mechanisms on the provider PE routers

A network attacker exploits application flaws to compromise critical

Enforce policies and microsegmentation

which action must be taken before new VoIP systems

Evaluate bandwidth utilization and connection quality

Which design consideration is valid when

FabricPath permits active active FHRP and TRILL support anycast gateway

As network designer, which option is your main concern with regards to virtualizing

Fate sharing

You are designing the routing design for two merging companies

Global to local NAT translation is done before routing

the network designer needs to use GLOP IP addresses in order to make them unique

H233.0.0.0 to 233.255.255.255

Which statement about hot-potato routing architecture

Hot-potato routing is the preferred architecture when content to content providers

Which design solution reduces the amount of IGMP state in the network

IGMPv3 with PIM-SSM

A company plans to use BFD between its routes to detect a connectivity problem

IP packets with identical source and destination IP addresses

You ar designing a network running both IPv4 and IPv6 to

IPv6 and IPv4 traffic can use a single QoS policy to match both protocols

A customer asks you to perform a high level review

IS-IS

Refer to the exhibit. A customer runs OSPF

Implement LSA filtering on the AB, allowing summary routes and preventing more specific routes into Area 5

Refer to the exhibit. As part of the redesign project

It is switched due to a successful RPF check against the routing table

Which design benefit of bridge assurance is true ?

It prevents switch loops caused by unidirectional point-to-point link condition on Rapid PVST + and MST

How can EIGRP topologies be designed to converge as fast as possible

Limit the query domain by the use of summarization

You want to mitigate failures that are caused by STP loops

Loop guard

Which mechanism provides Layer 2 fault isolation between data centers ?

OTV

Which main IoT migration aspect should be reviewed

Sensors

VPLS is implemented in a Layer 2 network with 2000 VLANs

PE scalability

Company XYZ connects its sites over a private WAN

PIM sparse mode with RP located at the hub

An enterprise wants to provide low-cost delivery of network

PaaS within a public cloud

Which design benefit of PortFast is true ?

PortFast does not generate a spanning tree change when a station on a port is connected or disconnected

Company ABC uses IPv4-only

Router Advertisement Guard

Various teams in different organizations

Significant effort and time are required

Refer to the exhibit. AJI links are P2P layer 3

Static routes

Company XYZ wants to redesign the Layer 2 part of their network and wants to use

TRILL

Refer to the exhibit. Company XYZ BGP topology is as shown

The LA administrator should use route aggregation to summarize the 10.1.4.0/24, 10.1.5.0/24, 10.1.6.0/24, and 10.1.7.0/24 networks toward Chicago

What advantage of placing the IS-IS layer 2 flooding domain

The layer 2 domain is contained and more stable

Which undesired effect of increasing the jitter compensation buffer is true

The overall transport delay increases and quality issues can occur

You are using iSCSI to transfer files

change the protocol to CIFS

Two enterprise networks must be connected toegether

Two different NAT pools must be used for

Company XYZ wants to deploy OSPF

Use route maps on ASBRs to filter routes with tags so they are not redistributed

You want to split an Ethernet domain in two.

VLAN ID

Which DCI technology utilization a 'flood and learn"

VPLS

Which protocol does an SD-Access wireless

VXLAN

As part of workspace digitization, a large enterprise has

WRED


संबंधित स्टडी सेट्स

Chapter 1 - Brief History of a Computer

View Set

CIS 325 - Intro to Programming - CH3

View Set

The Enlightenment & American Revolution

View Set

Communication Theory Exam 2: Study Guide

View Set

CPE109 Module 1: Evolution of Computer Network and Services

View Set

Professionalism and Ethics for RBTs

View Set