Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

On a large enterprise security solution, which two options are IDS or IPS modes of operation? (Choose two)

A.

Transparent mode

B.

Routed mode

C.

Inline mode

D.

Traffic discovery mode

E.

Promiscuous mode

The enterprise customer ABC Corp will deploy a centralized unified communications application to provide voice, and instant messaging to their branch offices. Some of the branch offices are located in remote locations and are connected via a 1.5 Mb/s Layer 3 VPN connection. Which two ways are the most cost-effective to ensure that this new application is implemented properly? (Choose two)

A.

Use a low bitrate codec such as G 711

B.

Set voice activity detection to avoid sending packets when the conversations is silent

C.

Enable VRF-Lite on the CE router to create a separate voice VRF

D.

Set LFI on the WAN connections to interleave the small voice packets with the large data packets

E.

Set WAN optimization on the CE router to compress the voice packets for improved bandwidth utilization and performance

F.

Use a low bitrate codec such as G 729

Refer to the exhibit.

This layer 2 network is expected to add 150 VLANS over the next year, In addition to the existing 50 VLANs within the network which STP types will support this design requirement the least amount of CPU resource and achieving load balancing?

A.

PVST+

B.

CST

C.

MST

D.

RSTP

What is a correct design consideration of IPv6 MLD snooping?

A.

MLD snooping conserves bandwidth on switches.

B.

MLD snooping is used to filter all MLD queries.

C.

MLD snooping requires IGMP snooping to be implemented.

D.

MLD snooping conserves CPU by sharing IPv4 and IPv6 multicast topology.