What are two common approaches to analyzing and designing networks? (Choose two.)

What are two common approaches to analyzing and designing networks? (Choose two.)A . bottom-up approach B. high-low security approach C. top-down approach D. left-right approach E. three-tier approachView AnswerAnswer: A,C

November 4, 2022 No Comments READ MORE +

Which BGP attributes are best suited to control outbound traffic?

Refer to the exhibit. An engineer is designing the traffic flow for AS 111. Traffic from AS 111 should be preferred via AS 100 for all external routes. A method must be used that only affects AS 111. Which BGP attributes are best suited to control outbound traffic?A . community...

November 4, 2022 No Comments READ MORE +

What advantage of placing the IS-IS layer 2 flooding domain boundary at the core Layer in a three-layer hierarchical network is true?

What advantage of placing the IS-IS layer 2 flooding domain boundary at the core Layer in a three-layer hierarchical network is true?A . The Layer 1 and Layer 2 domains can easily overlap B. It reduces the complexity of the Layer 1 domains C. It can be applied to any...

November 4, 2022 No Comments READ MORE +

Which two statements describe the hierarchical LAN design model? (Choose two)

Which two statements describe the hierarchical LAN design model? (Choose two)A . It is a well-understood architecture that provides scalability B. It is the best design for modern data centers C. It is the most optimal design but is highly complex D. It provides a simplified design E. Changes, upgrades,...

November 4, 2022 No Comments READ MORE +

Which management category is not part of FCAPS framework?

Which management category is not part of FCAPS framework?A . Configuration B. Security C. Performance D. Authentication E. Fault-managementView AnswerAnswer: D

November 4, 2022 No Comments READ MORE +

Which technology can be used to prevent these types of attacks?

Company XYZ wants to improve the security design of their network to include protection from reconnaissance and DoS attacks on their sub interfaces destined toward next hop routers. Which technology can be used to prevent these types of attacks?A . MPP B. CPPr C. CoPP D. DPPView AnswerAnswer: B

November 4, 2022 No Comments READ MORE +

Which architecture does not require an explicit multicast signaling protocol, such as PIM or P2MP, to signal the multicast state hop-by-hop, but instead uses a link state protocol to advertise the multicast forwarding state?

Which architecture does not require an explicit multicast signaling protocol, such as PIM or P2MP, to signal the multicast state hop-by-hop, but instead uses a link state protocol to advertise the multicast forwarding state?A . Binary indexed explicit routing B. Binary intermediate enhanced routing C. Bit indexed explicit replication D....

November 3, 2022 No Comments READ MORE +

What must they monitor to have visibility on the potential performance impact due to the constantly increasing number of spoke sites?

Company XYZ has a hub-and-spoke topology over an SP-managed infrastructure. To measure traffic performance metrics, they implemented IP SLA senders on all spoke CE routers and an IP SLA responder on the hub CE router. What must they monitor to have visibility on the potential performance impact due to the...

November 3, 2022 No Comments READ MORE +

Which three elements help network designers to construct secure systems that protect information and resources (such as devices, communication, and data) from unauthorized access, modification, inspection, or destruction? (Choose three.)

Which three elements help network designers to construct secure systems that protect information and resources (such as devices, communication, and data) from unauthorized access, modification, inspection, or destruction? (Choose three.)A . confidential B. serviceability C. reliability D. availability E. integrity F. scalabilityView AnswerAnswer: A,D,E

November 3, 2022 No Comments READ MORE +

Which technology should you recommend to enhance security by limiting traffic that could originate from a hacker compromising a workstation and redirecting flows at the servers?

You were tasked to enhance the security of a network with these characteristics: • A pool of servers is accessed by numerous data centers and remote sites • The servers are accessed via a cluster of firewalls • The firewalls are configured properly and are not dropping traffic • The...

November 3, 2022 No Comments READ MORE +