Which element enables communication between guest VMs within a virtualized environment?
Which element enables communication between guest VMs within a virtualized environment?A . vSwitchB . virtual routerC . hypervisorD . pNICView AnswerAnswer: A
Which two facts apply to traffic policing?
An engineer is describing QoS to a client. Which two facts apply to traffic policing? (Choose two.)A . Policing adapts to network congestion by queuing excess trafficB . Policing should be performed as close to the destination as possibleC . Policing drops traffic that exceeds the defined rateD . Policing...
Which configuration establishes EBGP neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP?
Refer to the exhibit. Which configuration establishes EBGP neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP?A . R1(config)#router bgp 1 R1(config-router)#neighbor 192.168.10.2 remote-as 2 R1(config-router)#network 10.1.1.0 mask 255.255.255.0 R2(config)#router bgp 2 R2(config-router)#neighbor 192.168.10.1 remote-as 1 R2(config-router)#network 10.2.2.0 mask 255.255.255.0B ....
Which statement explains why Type 1 hypervisor is considered more efficient than Type2 hypervisor?
Which statement explains why Type 1 hypervisor is considered more efficient than Type2 hypervisor?A . Type 1 hypervisor runs directly on the physical hardware of the host machine without relying on the underlying OSB . Type 1 hypervisor enables other operating systems to run on itC . Type 1 hypervisor...
Which two entities are Type 1 hypervisors? (Choose two.)
Which two entities are Type 1 hypervisors? (Choose two.)A . Oracle VM Virtual BoxB . Microsoft Hyper-VC . VMware serverD . VMware ESXE . Microsoft Virtual PCView AnswerAnswer: BD
Which two namespaces does the LISP network architecture and protocol use? (Choose two.)
Which two namespaces does the LISP network architecture and protocol use? (Choose two.)A . TLOCB . RLOCC . DNSD . VTEPE . EIDView AnswerAnswer: B E
What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared?
Refer to the exhibit. MTU has been configured on the underlying physical topology, and no MTU command has been configured on the tunnel interfaces. What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared?A . The packet...
Which function does a fabric edge node perform in an SD-Access deployment?
Which function does a fabric edge node perform in an SD-Access deployment?A . Connects the SD-Access fabric to another fabric or external Layer 3 networksB . Connects endpoints to the fabric and forwards their trafficC . Provides reachability border nodes in the fabric underlayD . Encapsulates end-user data traffic into...
What function does VXLAN perform in a Cisco SD-Access deployment?
What function does VXLAN perform in a Cisco SD-Access deployment?A . policy plane forwardingB . control plane forwardingC . data plane forwardingD . systems management and orchestrationView AnswerAnswer: C
Based on this interface configuration, what is the expected state of OSPF adjacency?
Based on this interface configuration, what is the expected state of OSPF adjacency? A . Full on both routersB . not establishedC . 2WAY/DROTHER on both routersD . FULL/BDR on R1 and FULL/BDR on R2View AnswerAnswer: B