Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which mechanism enables small, unmanaged switches to plug into ports of access switches without risking switch loops?

A.

PortFast

B.

UDLD

C.

Root guard

D.

BPDU guard

Which two statements describe the hierarchical LAN design model? (Choose two)

A.

It is a well-understood architecture that provides scalability

B.

It is the best design for modern data centers

C.

It is the most optimal design but is highly complex

D.

It provides a simplified design

E.

Changes, upgrades, and new services can be introduced in a controlled and staged manner

Your company wants to deploy a new data center infrastructure. Based on the requirements you have chosen VXLAN as encapsulation technology. The customer is concerned about misconfiguration of Layer 2 devices and DC-wide outages caused by Layer 2 loops. What do you answer?

A.

VXLAN offers native loop avoidance mechanism

B.

Storm Control should be enabled on all ports

C.

VPC+ could prevent L2 loop on access ports

D.

BPDU Guard should be enabled on all VTEP access ports

You have been asked to design a remote access VPN solution to support up to 2000 devices. You must ensure that only corporate assets are allowed to connect to the VPN, and users must authenticate to gain access based on their user role. Users must use a password that they are already using to access existing applications. A user may not always use the same device to access the VPN. Which two options combined meet the requirements? (Choose two)

A.

Use local usernames and passwords on the VPN device

B.

Deploy a central authentication directory that users can be authenticated and authorized against

C.

Deploy certificates that are unique to each user

D.

Deploy an IPsec VPN solution

E.

Deploy certificates that are unique to each device

F.

Deploy a SSL VPN solution

How must the queue sizes be designed to ensure that an application functions correctly?

A.

Each individual device queuing delay in the chain must be less than or equal to the application required delay.

B.

The queuing delay on every device in the chain must be exactly the same to the application required delay.

C.

The default queue sizes are good for any deployment as it compensates the serialization delay.

D.

The sum of the queuing delay of all devices plus serialization delay in the chain must be less than or equal to the application required delay.

SDWAN networks capitalize the usage of broadband Internet links over traditional MPLS links to offer more cost benefits to enterprise customers. However, due to the insecure nature of the public Internet, it is mandatory to use encryption of traffic between any two SDWAN edge devices installed behind NAT gateways. Which overlay method can provide optimal transport over unreliable underlay networks that are behind NAT gateways?

A.

TLS

B.

DTLS

C.

IPsec

D.

GRE

Which aspect of BGP-LS makes it scalable in large networks when multiarea topology information must be gathered?

A.

Transmit flow control

B.

Open-loop flow control

C.

Hardware flow control

D.

TCP-based flow control

A network engineering team is in the process of designing a lab network for a customer demonstration. The design engineer wants to show that the resiliency of the MPLS Traffic Engineering Fast Reroute solution has the same failover/failback times as a traditional SONET/SDH network (around 50 msec). In order to address both link failure and node failure within the lab topology network, which type of the MPLS TE tunnels must be considered for this demonstration?

A.

TE backup tunnel

B.

Next-hop (NHop) tunnel

C.

FRR Backup tunnel

D.

Next-next-hop (NNHop) tunnel

Which tool automates network implementation activities and shortens the implementation lifecycle?

A.

LISP

B.

Java

C.

Conclusion

D.

Python

Which mechanism provides Layer 2 fault isolation between data centers?

A.

FabricPath

B.

OTV

C.

Advanced VPLS

D.

LISP

E.

TRILL