What is a characteristic of a secure cloud architecture model?
A. limited access to job function
B. dedicated and restricted workstations
C. multi-factor authentication
D. software-defined network segmentation
An engineer is designing the QoS strategy for Company XYZ. Based on initial analysis, a lot of scavenger type of traffic is traversing the network's 20Mb Internet link toward the service provider. The new design must use a QoS technique that limits scavenger traffic to 2 Mbps, which helps avoid oversubscription of the link during times of congestion. Which QoS technique can be used to facilitate this requirement?
A. class-based traffic policing
B. LLQ
C. CBWFQ
D. class-based traffic shaping
You have been tasked with designing a data center interconnect as part of business continuity You want to use FCoE over this DCI to support synchronous replication. Which two technologies allow for FCoE via lossless Ethernet or data center bridging? (Choose two.)
A. DWDM
B. EoMPLS
C. SONET/SDH
D. Multichassis EtherChannel over Pseudowire
E. VPLS
Which two types of planning approaches are used to develop business-driven network designs and to facilitate the design decisions? (Choose two)
A. cost optimization approach
B. strategic planning approach
C. modular approach
D. tactical planning approach
E. business optimization approach
Which two aspects are considered when designing a dual hub dual DMVPN cloud topology? (Choose two )
A. will only work with single-tier headend architecture
B. hub sites must connect to both DMVPN clouds
C. recommended for high availability
D. spoke-to-spoke traffic will transit the hub unless spokes exchange dynamic routing directly
E. requires all sites to have dual Internet connections
A network design includes a long signaling delay in notifying the Layer 3 control plane that an interface has failed Which two of these actions would reduce that delay? (Choose two.)
A. Increase network stability.
B. Reduce the time for the network to reconverge.
C. Increase the notification of interface flaps.
D. Enable lower data link layer recovery systems to have an opportunity to restore the interface
Refer to the exhibit.
Your company designed a network to allow server VLANs to span all access switches in a data center In the design, Layer 3 VLAN interfaces and HSRP are configured on the aggregation switches Which two features improve STP stability within the network design? (Choose two.)
A. BPDU guard on access ports
B. BPDU guard on the aggregation switch downlinks toward access switches
C. root guard on the aggregation switch downlinks toward access switches
D. root guard on access ports
E. edge port on access ports
F. access switch pairs explicitly determined to be root and backup root bridges
What is an architectural framework created by ETSI that defines standards to decouple network functions from proprietary hardware-based appliances and have them run in software on standard x86 servers?
A. NFVIS
B. NFV
C. VNF
D. NPIV
What is a disadvantage of the traditional three-tier architecture model when east west traffic between different pods must go through the distribution and core layers?
A. low bandwidth
B. security
C. scalability
D. high latency
DRAG DROP
An enterprise wants to migrate an on-premises network to a cloud network, and the design team is finalizing the overall migration process. Drag and drop the options from the left into the correct order on the right.
Select and Place: