Which two statements are true regarding greenfield projects? (Choose two.)

Which two statements are true regarding greenfield projects? (Choose two.)
A . The amount of floor space and cooling are not defined as part of a greenfield project.
B . In greenfield projects, the existing floor space and cooling may need to be considered.
C . Greenfield projects are typically new networks with few or no restraints to consider.
D . Greenfield projects typically consist of existing network components with extensive integration required.

Answer: AC

What are two requirements that every RFP response should include? (Choose two.)

What are two requirements that every RFP response should include? (Choose two.)
A . a support plan that includes details about servicing the components once operational
B . a detailed competitor comparison document that indicates the proposed design is the least expensive
option
C . a detailed forecast of exception handling after the design has been implemented and is operational
D . an implementation plan that includes a description of how the design will be implemented

Answer: AD

What should you do to accomplish this task?

Click the Exhibit button.

Referring to the exhibit, you are designing a Layer 2 data center and you want to make sure that all the links between the access tier and the aggregation tier are used.

What should you do to accomplish this task?
A . Use VRRP on Agg-1 and Agg-2.
B . Place Agg-1 and Agg-2 in a Virtual Chassis.
C . Use RSTP on all devices.
D . Use BGP load balancing on all devices.

Answer: B

You are designing a data center network that will require the rapid deployment and removal of security features between virtual machines based on triggered traffic flows. The data center will require the ability to scale up and down rapidly according to traffic load, and then release resources when security services are not needed. In this scenario, which type of security design would fulfill this requirement?

You are designing a data center network that will require the rapid deployment and removal of security features between virtual machines based on triggered traffic flows. The data center will require the ability to scale up and down rapidly according to traffic load, and then release resources when security services are not needed. In this scenario, which type of security design would fulfill this requirement?
A . a centralized security appliance
B . a container-based security deployment
C . a physical security device connected to each host
D . an all-in-one virtual security device in each host

Answer: B