Which three tools are used for ongoing monitoring and maintenance of a voice and video environment? (Choose three.)
A. flow-based analysis to measure bandwidth mix of applications and their flows
B. call management analysis to identify network convergence-related failures
C. call management analysis to identify CAC failures and call quality issues
D. active monitoring via synthetic probes to measure loss, latency, and jitter
E. passive monitoring via synthetic probes to measure loss, latency, and jitter
F. flow-based analysis with PTP time-stamping to measure loss, latency, and jitter
Which two statements describe network automation and network orchestration? (Choose two.)
A. Network automation does not provide governance or policy management.
B. Network automation spans multiple network services, vendors, and environments.
C. Network orchestration is done through programmatic REST APIs enabling automation across devices and management platforms.
D. Provisioning network services is an example of network automation.
E. Network orchestration is used to run single, low-level tasks without human intervention
Company XYZ has a new network based on IPv6. Some of the subnets that they are planning to use will be confidential and need an addressing scheme that confines them to the local campus network. Which type of IPv6 addresses can be used for these networks in the IPv6 addressing design?
A. local addresses
B. private addresses
C. link-local addresses
D. unique local addresses
A business invests in SDN and develops its own SDN controller that, due to budget constraints, runs on a single controller. The controller actively places an exclusive lock on the configuration of the devices to ensure it is the only source of changes to the environment. What is the result if the controller fails?
A. All device configurations are in read-only mode until the controller is restored.
B. The control plane is unavailable until the controller is restored.
C. If a device fails, the configuration backup is unavailable
D. Manual changes are only possible until the controller is restored
A customer has a functional requirement that states HR systems within a data center should be segmented from other systems that reside in the same data center and same VLAN. The systems run legacy applications by using hard-coded IP addresses. Which segmentation method is suitable and scalable for the customer?
A. data center perimeter firewalling
B. VACLs on data center switches
C. transparent firewalling
D. routed firewalls
The controller has a global view of the network, and it can easily ensure that the network is in a consistent and optimal configuration. Which two statements describe a centralized SDN control path? (Choose two.)
A. It significantly improves the latency when performing reactive handling of PACKET_IN events
B. Integrating smart NIC capabilities on the local host level is made easier through rest APIs
C. A centralized controller can support all southbound APIs, which allows for easy integration with legacy equipment
D. It is highly-available by design with no single-point-of-failure risks present
E. Scaling of the centralized controller cluster is challenging for services like DHCP and load-balancing
Which two factors must be considered for high availability in campus LAN designs to mitigate concerns about unavailability of network resources? (Choose two.)
A. device resiliency
B. device type
C. network type
D. network resiliency
E. network size
Your company wants to deploy a new data center infrastructure Based on the requirements you have chosen VXLAN as encapsulation technology The customer is concerned about miss-configuration of Layer 2 devices and DC wide outages caused by Layer 2 loops.
What do you answer?
A. VXLAN offers native loop avoidance mechanism
B. Storm Control should be enabled on all ports
C. VPC+ could prevent L2 loop on access ports
D. BPDU Guard should be enabled on all VTEP access ports
An MPLS service provider is offering a standard EoMPLS-based VPLS service to Customer A. providing Layer 2 connectivity between a central site and approximately 100 remote sites. Customer A wants to use the VPLS network to carry its internal multicast video feeds which are sourced at the central site and consist of 20 groups at Mbps each. Which service provider recommendation offers the most scalability?
A. EoMPLS-based VPLS can carry multicast traffic in a scalable manner
B. Use a mesh of GRE tunnels to carry the streams between sites
C. Enable snooping mechanisms on the provider PE routers.
D. Replace VPLS with a Layer 3 MVPN solution to carry the streams between sites
Router R1 is a BGP speaker with one peering neighbor over link "A". When the R1 link/interface "A" fails, routing announcements are terminated, which results in the tearing down of the state for all BGP routes at each end of the link. What is this a good example of?
A. fault isolation
B. resiliency
C. redundancy
D. fate sharing
While designing a switched topology, in which two options is UplinkFast recommended? (Choose two )
A. when switches of different spanning-tree types are connected (for example. 802.1d connecting to 802.1w)
B. on distribution layer switches
C. when hello timers are changed to more aggressive values
D. on access layer switches
E. on the core switches
Which three items do you recommend for control plane hardening of an infrastructure device? (Choose three.)
A. redundant AAA servers
B. Control Plane Policing
C. warning banners
D. to enable unused .services
E. SNMPv3
F. routing protocol authentication
SDN emerged as a technology trend that attracted many industries to move from traditional networks to SDN. Which challenge is solved by SDN for cloud service providers?
A. need for intelligent traffic monitoring
B. exponential growth of resource-intensive application
C. complex and distributed management flow
D. higher operating expense and capital expenditure
Company XYZ is revisiting the security design for their data center because they now have a requirement to control traffic within a subnet and implement deep packet inspection Which technology meets the updated requirements and can be incorporated into the design?
A. routed firewall
B. VLAN ACLs on the switch
C. transparent firewall
D. zone-based firewall on the Layer 3 device
Which effect of using ingress filtering to prevent spoofed addresses on a network design is true?
A. It reduces the effectiveness of DDoS attacks when associated with DSCP remarking to Scavenger.
B. It protects the network Infrastructure against spoofed DDoS attacks.
C. It Classifies bogon traffic and remarks it with DSCP bulk.
D. It filters RFC 1918 IP addresses.