When implementing MPLS Layer 3 VPNs with customers running OSPF as the CE-PE routing protocol, the service provider MPLS backbone looks like what to the CE routers?

When implementing MPLS Layer 3 VPNs with customers running OSPF as the CE-PE routing protocol, the service provider MPLS backbone looks like what to the CE routers?A . the backbone (Area 0)B . an external routing domainC . a superbackbone that is transparent to the CE OSPF routersD . a...

August 3, 2018 No Comments READ MORE +

Which of the following best describes how TOGAF defines an enterprise?

Which of the following best describes how TOGAF defines an enterprise?A . Any collection of organizations that has a common set of goalsB . Any corporation with more than 10,000 employeesC . Any organization involved in commerceD . Any organization whose stock is tradedE . Any set of organizations based...

August 3, 2018 No Comments READ MORE +

Which three commands can you use to set a router boot image? (Choose three.)

Which three commands can you use to set a router boot image? (Choose three.)A . Router(config)# boot system flash c4500-p-mz.121-20.binB . Router(config)# boot system tftp c7300-js-mz.122-33.SB8a.binC . Router(config)#boot system rom c7301-advipservicesk9-mz.124-24.T4.binD . Router> boot flash:c180x-adventerprisek9-mz-124-6E . binF . Router(config)#boot flash:c180x-adventerprisek9-mz-124-6G . binH . Router(config)#boot bootldr bootflash:c4500-jk9s-mz.122-23f.binView AnswerAnswer: ABC

August 3, 2018 No Comments READ MORE +

Which command is causing the error?

When you attempt to add a phone to the Cisco Unified Communications Manager Express using the GUI interface, the error "No New Phone to Add" appears. Which command is causing the error?A . No auto-reg-ephoneB . No service ephone-regC . SIP-ua no auto-reg-ephoneD . stcapp ccm-group 1View AnswerAnswer: A

August 3, 2018 No Comments READ MORE +

Which three configuration steps are required to add Internet service to the VRF customers?

Refer to the exhibit. The Service Provider is deploying Internet service to its VRF customers by using vrf INTERNET. A dedicated firewall provides NAT functionally towards the Internet. Assume that IP address overlapping between VRFs is not an issue. Which three configuration steps are required to add Internet service to...

August 2, 2018 No Comments READ MORE +

Drag and Drop Question

Drag and Drop Question A security administrator is given the security and availability profiles for servers that are being deployed. 1) Match each RAID type with the correct configuration and MINIMUM number of drives. 2) Review the server profiles and match them with the appropriate RAID type based on integrity,...

August 2, 2018 No Comments READ MORE +

How does stub routing affect transit routes in EIGRP?

How does stub routing affect transit routes in EIGRP?A . Transit routes are passed from a stub network to a hub network.B . It is designed to prevent the distribution of external routes.C . It prevents the hub router from advertising networks learned from the spokes.D . Transit routes are...

August 2, 2018 2 Comments READ MORE +

Which two guidelines apply to private VLAN configuration when you are running FabricPath? (Choose two)

Which two guidelines apply to private VLAN configuration when you are running FabricPath? (Choose two)A . FabricPath ports can be put into a private VLANB . On the F-Series modules, user-configured static MAC addresses are programmed on all forwarding engines that have ports in that VLANC . All VLANs in...

August 2, 2018 No Comments READ MORE +

What should you do first?

Your network contains 20 iSCSI storage appliances that will provide storage for 50 Hyper-V hosts running Windows Server 2012 R2. You need to configure the storage for the Hyper-V hosts. The solution must minimize administrative effort. What should you do first?A . Install the iSCSI Target Server role service and...

August 2, 2018 No Comments READ MORE +

What combination of the following will give developers access to the AWS console?

A company is preparing to give AWS Management Console access to developers Company policy mandates identity federation and role-based access control. Roles are currently assigned using groups in the corporate Active Directory. What combination of the following will give developers access to the AWS console? {Select 2} Choose 2 answersA . AWS Directory Service AD ConnectorB...

August 2, 2018 No Comments READ MORE +