Company XYZ wants to secure the data plane of their network. Which two technologies can be included in the security design? (Choose two)
A. DAI
B. IP Source Guard
C. BEEP
D. CPPr
E. MPP
Which two actions ensure voice quality in a branch location with a low-speed, high-latency WAN connection? (Choose two.)
A. Increase WAN bandwidth
B. Increase memory branch switch.
C. Fragment data packets.
D. Replace any electrical links with optical links
E. Prioritize voice packets
An architect receives a business requirement from a CTO that states the RTO and RPO for a new system should be as close as possible to zero. Which replication method and data center technology should be used?
A. asynchronous replication over dual data centers via DWDM
B. synchronous replication over geographically dispersed dual data centers via MPLS
C. synchronous replication over dual data centers via Metro Ethernet
D. asynchronous replication over geographically dispersed dual data centers via CWDM
As part of workspace digitization, a large enterprise has migrated all their users to Desktop as a Sen/ice (DaaS), by hosting the backend system in their on-premises data center. Some of the branches have started to experience disconnections to the DaaS at periodic intervals, however, local users in the data center and head office do not experience this behavior. Which technology can be used to mitigate this issue?
A. tail drop
B. traffic shaping
C. WRED
D. traffic policing
Company XYZ wants to improve the security design of their network to include protection from reconnaissance and DoS attacks on their sub interfaces destined toward next hop routers. Which technology can be used to prevent these types of attacks?
A. MPP
B. CPPr
C. CoPP
D. DPP
A network architect in an enterprise is designing a network policy for certain database applications. The goal of the policy is to allow these applications to access the internet directly, whereas other user and network applications that communicate with systems or users outside their own network must be routed through the data center. The focus is on achieving higher availability and a better user experience for the database applications, but switching between different network paths based on performance characteristics must be supported.
Which solution meets these requirements?
A. MPLS L3VPN with QoS
B. Cloud onRamp for laaS
C. Cloud onRamp for SaaS
D. MPLS direct connect
While designing a switched topology, in which two options is UplinkFast recommended? (Choose two )
A. when switches of different spanning-tree types are connected (for example. 802.1d connecting to 802.1w)
B. on distribution layer switches
C. when hello timers are changed to more aggressive values
D. on access layer switches
E. on the core switches
Which two characteristics apply to firewall transparent mode operations in a firewall solution design? (Choose two.)
A. Changes in the existing IP addressing and subnets are required
B. The firewall can participate actively on spanning tree.
C. Multicast traffic can traverse the firewall.
D. OSPF adjacencies can be established through the firewall
E. The firewall acts like a router hop in the network.
During evaluation of migrating current on premises infrastructure to add cloud-based infrastructure, a network planning team must meet three core requirements as they make recommendations on which cloud strategy to adopt going forward
1.
Technology is changing rapidly, therefore the enterprise must be open to adopting new ways of doing things, and be ready to invest CapEx-funds in the next three years
2.
Network bandwidth capacity requirements are dynamic and are expected to change over the next year
3.
If new technologies are to be introduced, operational expenses must be kept at a minimum.
Which cloud strategy meets these requirements?
A. private
B. hybrid
C. public
D. multicloud
When consumers that leverage laaS reach 100% resource capacity, what can be used to redirect the overflow of traffic to the public cloud so there is no disruption to service?
A. cloud policing
B. cloud spill
C. cloud bursting
D. cloud shaping