Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Refer to the exhibit.

The operations team has identified that some of the multi-tiered e-commerce application have slow performance, due to illegitimate inbound traffic form the internet. On which device do you place traffic filtering to improve performance?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Which major block is not included in the ETSI network Function Virtualization reference framework?

A.

Network Function Virtualization Infrastructure

B.

Network Function Virtualization Management and Orchestration

C.

Network Function Virtualization Policy Manager

D.

Virtualized Network Function/ Element Management Systems

A multisite data center network runs OSPF and DWDM point-to-point interfaces for site to-site connectivity. Which method to detect interfaces the fastest?

A.

interface event dampening

B.

LoS/AJS event faults

C.

UDLD

D.

fast-hello> timers

You are presented with requirements to design a development, testing and production environments. These environment should communicate with each other, yet they should be kept as separate failure domains. Which routing protocol should be configured on the links between the networks to support the design requirements?

A.

OSPF

B.

EIGRP

C.

IS-IS

D.

BGP

Which are two data plane hardening techniques? (Choose two)

A.

Infrastructure ACLs

B.

Control Plane Policing

C.

Redundant AAA servers

D.

Disable unused services

E.

Routing protocol authentication

F.

SNMPv3

G.

Warning banners

Which two items are required for data plane hardening of an infrastructure device? (Choose two)

A.

Disable unused services

B.

Routing protocol authentication

C.

SNMPv3

D.

Redundant AAA servers

E.

Infrastructure ACLs

F.

Warning banners

G.

Control Plane Policing

Which two application requirements are mandatory for traffic to receive proper treatment when placed in the priority queue? (Choose two)

A.

WRED drop treatment

B.

Small transactions (HTTP – like behavior)

C.

Tolerance to packet loss

D.

Intolerance to jitter

E.

TCP based application

Refer to the exhibit.

As part of your design to monitor reachable services, a route health injector has just been deployed on the network. The route health injector injects /32 host routes into BGP with the next hop of 192.18.0.2, but the /32 routes are not being installed into the RIB or FIB of Router A. Which BGP feature must be deployed to make be deployed to make the design to work?

A.

BGP community attributes

B.

MP-BGP

C.

BGP AS-Path prepending

D.

eBGP multihop attribute

Refer to the exhibit.

A new IPv4 multicast-based video-streaming service is being provisioned. During the design-validation tests, you realize that the link between the two buildings is carrying multicast traffic even when there are no receivers connected to the switch in Building B and despite IGMP snooping being enabled on both Layer 2 switches and IGMPv2 runs on the hosts. Which design change will prevent the multicast traffic from being unnecessarily flooded throughout the campus network?

A.

Enable PIM snooping on both Layer 2 switches.

B.

Enable multicast storm control on the link between Switch 1 and Switch 2.

C.

Use static Layer 2 MAC forwarding entries on Switch 1.

D.

Change the IPv4 multicast group address such that it excludes the usage of link-local MAC addresses.

E.

Ensure that Switch 1 is an IGMP querier.

Refer to the exhibit.

On this MPLS-based network ring, links have failed between router A and router E. These failures formed microloops while the network converged, when A forwarded traffic to B but B forwards it back to A. Which technology is the simplest solution to avoid microloops without enabling a new protocol in the network?

A.

TE Fast ReRoute

B.

IP Fast ReRoute

C.

Loop-Free Alternate

D.

Remote Loop-Free Alternate