What must they monitor to have visibility on the potential performance impact due to the constantly increasing number of spoke sites?
Company XYZ has a hub-and-spoke topology over an SP-managed infrastructure. To measure traffic performance metrics, they implemented IP SLA senders on all spoke CE routers and an IP SLA responder on the hub CE router. What must they monitor to have visibility on the potential performance impact due to the...
Drag and drop the design characteristics from the left onto the correct network filter techniques on the right. Not all options are used
DRAG DROP Drag and drop the design characteristics from the left onto the correct network filter techniques on the right. Not all options are used. View AnswerAnswer:
Which two features are advantages of SD-WAN compared to MPLS-based connectivity? (Choose two.)
Which two features are advantages of SD-WAN compared to MPLS-based connectivity? (Choose two.)A . uses FEC constructs for traffic forwarding, thereby improving efficiency B. separates infrastructure and policy C. uses policy-based forwarding of real-time traffic with less complexity D. unifies the WAN backbone E. manages failures through backup linksView AnswerAnswer:...
Which two options combined meet the requirements?
You have been asked to design a remote access VPN solution to support up to 2000 devices. You must ensure that only corporate assets are allowed to connect to the VPN, and users must authenticate to gain access of their based on their user role. Users must use a password...
Which two technologies allow for FCoE via lossless Ethernet or data center bridging?
You have been tasked with designing a data center interconnect as part of business continuity. You want to use FCoE over this DCI to support synchronous replication. Which two technologies allow for FCoE via lossless Ethernet or data center bridging? (Choose two.)A . DWDM B. EoMPLS C. SONET/SDH D. Multichassis...
Which protocol must be enabled?
A healthcare customer requested that SNMP traps must be sent over the MPLS Layer 3 VPN service. Which protocol must be enabled?A . SNMPv3 B. Syslog C. Syslog TLS D. SNMPv2 E. SSHView AnswerAnswer: A
Which two principles would you apply in order to maximize the wireless network capacity?
You have been asked to design a high-density wireless network for a university campus. Which two principles would you apply in order to maximize the wireless network capacity? (Choose two.)A . Implement a four-channel design on 2.4 GHz to increase the number of availablechannels B. Choose a high minimum data...
Which DCI technology utilizes a “flood and learn” technique to populate the Layer2 forwarding table?
Which DCI technology utilizes a “flood and learn” technique to populate the Layer2 forwarding table?A . LISP B. OTV C. VPLS D. EVPNView AnswerAnswer: B
How can this implementation be achieved?
Company XYZ runs OSPF in their network. A design engineer decides to implement hot-potato routing architecture. How can this implementation be achieved?A . Enable iBGP and apply prepend to ensure all prefixes will have the same length of the AS path attribute value. B. Redistribute the external prefixes onto OSPF...
Which replication method and datacenter technology should be used?
An architect receives a business requirement from a CTO that states the RTO and RPO for a new system should be as close as possible to zero. Which replication method and datacenter technology should be used?A . asynchronous replication over dual data centers via DWDM B. synchronous replication over geographically...