What are two benefits of protecting the control plane of a network device? (Choose two.)
Answer : CD
Which tunneling mechanism provides confidentiality as well as tunneling capabilities?
Answer : B
Your network operations team is deploying Access Control Lists (ACLs) across your
Internet gateways. They wish to place an ACL inbound on the Internet gateway interface facing the core network (the "trusted" interface). Which one of these addresses would the
ACL need for traffic sourced from the inside interface, to match the source address of the traffic?
Answer : A
Refer to the exhibit.
Answer : C
What statement is true about designing a policy in which more than one class share a queue?
Answer : C
Your company plans to implement an Internet gateway router that is performing NAT. This same gateway will be terminating various IPsec tunnels to other remote sites. Which address type is appropriate for the ACL that will govern the sources of traffic entering the tunnel in the inside interface?
Answer : B
A company is planning to connect its 30 sites with a VPLS WAN backbone. A router at each site should establish neighborships with all other routers using the OSPF routing protocol. Which three points must be considered regarding DR and BDR when different router platforms are used? (Choose three.)
Answer : ABF
Network designers plan to interconnect two geographically separated data centers using an
Ethernet-over-MPLS pseudowire. Within that design, the link between the sites is stable, there are no apparent loops in the topology, and the root bridges for the respective VLANs are stable and unchanging. What additional aspect of the design should be adjusted to mitigate the chance of connectivity issues to the peer data center when the connection takes place?
Answer : B
You are designing a wireless LAN with the following components:
High-density indoor access point deployment
2.4-GHz and 5-GHz radios
802.11a, 802.11g, and 802.11n mode wireless LAN clients
Site survey results show negligible foreign WiFi and non-WiFi interference. What is the best method to decrease duty cycle (radio frequency utilization) and increase overall wireless
LAN client performance for this design?
Answer : A
Which IPv4 addressing and routing scheme can increase the availability of a network service during a DoS attack?
Answer : C
You are designing a network that will run EIGRP over a Metro Ethernet service that does not employ a link-loss technology. What will be the impact on convergence if there is a break in the end-to-end Layer 2 connectivity within the service provider network?
Answer : B
You are designing a network to support data, voice and video. Which two main factors will you address to improve network convergence? (Choose two.)
Answer : BD
A network designer has provisioned a router to use IPsec to encrypt the traffic over a GRE tunnel going to a web server at a remote location. From the router, the network designer can ping the web server, although the users in the office comment that they are unable to reach it. (Note: The DF bit is not set.) Which aspect should be changed in the design of the virtual connection?
Answer : C
Which two resources are propagated by the headend router for constrained based path computation with MPLS Traffic Engineering? (Choose two.)
Answer : CD
A new video multicast application is deployed in the network. The application team wants to use the 239.0.0.1 multicast group to stream the video to users. They want to know if this choice will impact the existing multicast design. What impact will their choice have on the existing multicast design?
Answer : D
Have any questions or issues ? Please dont hesitate to contact us