Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is an advantage of placing the IS-IS flooding domain boundary at the core Layer in a three-layer hierarchical network?

A.

The L1 and L2 domains can easily overlap

B.

The L2 domain is contained and more stable

C.

It can be applied to any kind of topology

D.

It reduces the complexity of the L1 domains

In a network with dynamic mutual redistribution between multiple OSPFv2 and EIGRP boundaries, which two mechanisms avoid suboptimal routing? (Choose two)

A.

Route filtering

B.

AD manipulation

C.

Matching EIGRP process ID

D.

Matching OSPF external routes

E.

Route tagging

Which two conditions are required for successful route aggregation? (Choose two)

A.

Contiguous prefix allocation

B.

Logical separation between zones or layers within networks

C.

Matching traffic aggregation with route aggregation locations

D.

Consistent prefix allocations per network

E.

Physical separation between zones or layers within networks

Which option lists the cloud service models?

A.

Internet as a Service, Platform as a Service, and Storage as a Service.

B.

Infrastructure as a Service, Platform as a Service, and Storage as a Service.

C.

Infrastructure as a Service, Platform as a Service, and Software as a Service.

D.

Internet as a Service, Product as a Service, and Storage as a Service.

E.

Internet as a Service, Platform as a Service, and Software as a Service.

Which two functions are performed at the core layer of the three-layer hierarchical network design model? (Choose two).

A.

Fault isolation

B.

Qos classification and marking boundary

C.

Fast transport

D.

Reliability

E.

Load balancing

A network has several routers running IS-IS L1L2 mode on the same Ethernet segment. Which action reduces to a minimum the number of IS-IS adjacencies in this segment?

A.

Define only the router on the segment to be DIS

B.

Change all routers connected to this segment to a single-level area

C.

Make the interface priority on the backup DIS lower than the primary DIS

D.

Change half the routers to be L1-only and other half to be L2-only on this segment

You are designing a new data center network. Drag and drop new data center requirements on the left into the appropriate design principle on the right.

An enterprise campus is adopting a network virtualization design solution with these requirements

 It must include the ability to virtualize the data plane and control plane by using VLANs and VRFs

 It must maintain end-to-end logical path transport separation across the network

 resources available grouped at the access edge

Which two primary models can this network virtualization design be categorized? (Choose two)

A.

Path isolation

B.

Session isolation

C.

Group virtualization

D.

Services virtualization

E.

Edge isolation

ACME Agricultural requires that access to all network devices is granted based on identify validation, and an authentication server was installed for this purpose. Currently the network team uses a list of passwords based on regions to access the internal corporate network devices. Which protocol do you recommend to ensure identify validation from the authentication server to the corporate directory?

A.

HTTPS

B.

TACACS+

C.

SSH

D.

LDAP

Refer to the exhibit.

This enterprise customer wants to stream one-way video from their head office to eight branch offices using multicast. Their current service provider provides a Layer 3VPN solution and manages the CE routers, but they do not currently multicast. Which solution quickly allows this multicast traffic to go through while allowing for future scalability?

A.

Enable a GRE tunnel between nodes C1 and C4

B.

Enable a GRE tunnel between nodes CE1 and CE2

C.

Enable a GRE tunnel between nodes C2 and C4

D.

Implement hub and spoke MPLS VPN over DMVPN(also known as 2547oDMVPN) between CE1 and CE2

E.

The service provider must provide a Draft Rosen Solution to enable a GRE tunnel node PE1 and PE2