Which three elements help network designers to construct secure systems that protect information and resources (such as devices, communication, and data) from unauthorized access, modification, inspection, or destruction? (Choose three.)

Which three elements help network designers to construct secure systems that protect information and resources (such as devices, communication, and data) from unauthorized access, modification, inspection, or destruction? (Choose three.)A . confidentialB . serviceabilityC . reliabilityD . availabilityE . integrityF . scalabilityView AnswerAnswer: A,D,E

December 13, 2023 No Comments READ MORE +

Which enterprise WAN transport virtualization technique meets the requirements?

Refer to the exhibit. An architect must design an enterprise WAN that connects the headquarters with 22 branch offices. The number of remote sites is expected to triple in the next three years. The final solution must comply with these requirements: ✑ Only the loopback address of each of the...

December 13, 2023 No Comments READ MORE +

Which two actions must merchants do to be compliant with the Payment Card Industry Data Security Standard? (Choose two.)

Which two actions must merchants do to be compliant with the Payment Card Industry Data Security Standard? (Choose two.)A . conduct risk analysesB . install firewallsC . use antivirus softwareD . establish monitoring policiesE . establish risk management policiesView AnswerAnswer: B,C

December 12, 2023 No Comments READ MORE +

In an OSPF network with routers connected together with Ethernet cabling, which topology typically takes the longest to converge?

In an OSPF network with routers connected together with Ethernet cabling, which topology typically takes the longest to converge?A . partial meshB . full meshC . ringD . squaredE . triangulatedView AnswerAnswer: C

December 12, 2023 No Comments READ MORE +

Which QoS strategy can be used to fulfill the requirement?

Company XYZ is redesigning their QoS policy. Some of the applications used by the company are real-time applications. The QoS design must give these applications preference in terms of transmission. Which QoS strategy can be used to fulfill the requirement?A . weighted fair queuingB . weighted random early detectionC ....

December 12, 2023 No Comments READ MORE +

Which two principles would you apply in order to maximize the wireless network capacity?

You have been asked to design a high-density wireless network for a university campus. Which two principles would you apply in order to maximize the wireless network capacity? (Choose two.)A . Implement a four-channel design on 2.4 GHz to increase the number of available channelsB . Choose a high minimum...

December 12, 2023 No Comments READ MORE +

As network designer, which option is your main concern with regards to virtualizing multiple network zones into a single hardware device?

As network designer, which option is your main concern with regards to virtualizing multiple network zones into a single hardware device?A . Fate sharingB . CPU resource allocationC . Congestion controlD . SecurityE . Bandwidth allocationView AnswerAnswer: A

December 12, 2023 No Comments READ MORE +

Drag and drop the multicast protocols from the left onto the current design situation on the right

DRAG DROP Drag and drop the multicast protocols from the left onto the current design situation on the right. View AnswerAnswer: Explanation: A picture containing table Description automatically generated

December 12, 2023 No Comments READ MORE +

Drag and drop the design characteristics from the left onto the correct network filter techniques on the right. Not all options are used

DRAG DROP Drag and drop the design characteristics from the left onto the correct network filter techniques on the right. Not all options are used. View AnswerAnswer:

December 12, 2023 No Comments READ MORE +

Which IPsec tunneling feature can they enable to optimize the data flow while ensuring that the headers contain no duplicate IP addresses?

Company XYZ has designed their network to run GRE over IPsec on their Internet-based VPN to connect two sites. Which IPsec tunneling feature can they enable to optimize the data flow while ensuring that the headers contain no duplicate IP addresses?A . Transport Mode in IPsec Phase IB . Transport...

December 12, 2023 No Comments READ MORE +