لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which component of the SDN architecture automatically ensures that application traffic is routed according to policies established by network administrators?
A. acket forwarding engine
B. orthbound API
C. outhbound API
D. DN controller
عرض الإجابة
اجابة صحيحة: D
السؤال #2
Which relationship between iBGP and the underlying physical topology is true?
A. BGP full mesh requires an underlying fully meshed network topology
B. BGP full mesh requirement does not dictate any specific network topology
C. BGP does not work on a ring network topology even with an underlying IGP
D. BGP can work only on a ring network topology with a link-state protocol like OSPF or IS-IS
عرض الإجابة
اجابة صحيحة: A
السؤال #3
Which design solution reduces the amount of IGMP state in the network?
A. ne multicast group address thorough network regardless of IGMP version
B. ultiple multicast domains
C. GMP filtering
D. GMPv3 with PIM-SSM
عرض الإجابة
اجابة صحيحة: C
السؤال #4
Company XYZ is in the process of identifying which transport mechanism(s) to use as their WAN technology. Their main two requirements are:-a technology that could offer DPI, SLA, secure tunnels, privacy, QoS, scalability, reliability, and ease of management-a technology that is cost-effectiveWhich WAN technology(ies) should be included in the design of company XYZ?
A. end packets without encapsulation to the anchor controller over the routed network
B. ncapsulate packets into an EoIP tunnel and send them to the anchor controller
C. end packets from the foreign controller to the anchor controller via Layer 3 MPLS VPN or VRF-Lite
D. end packets from the foreign controller to the anchor controller via IPinIP or IPsec tunnel
عرض الإجابة
اجابة صحيحة: C
السؤال #5
Which two actions ensure voice quality in a branch location with a low-speed, high-latency WAN connection? (Choose two.)
A. Prioritize voice packets
B. Replace any electrical links with optical links
C. Increase memory on the branch switch
D. Fragment data packets
E. Increase WAN bandwidth
عرض الإجابة
اجابة صحيحة: AD
السؤال #6
What are two common approaches to analyzing and designing networks? (Choose two.)
A. 5 should be configured as a route reflector for R1, R2, R3 and R4
B. onfederation should be set up with R1, R5, and R3 in one sub AS, with R2 and R4 in another, and redistribution at R1 and R2
C. 1, R2, R3 and R4 must be set up with a neighbor relationship with R5 only
D. full mesh should be deployed between all the routers with mutual redistribution to take place at R1 and R2
عرض الإجابة
اجابة صحيحة: BD
السؤال #7
Refer to the exhibit. An engineer has been asked to redesign the traffic flow toward AS 111 coming from AS 500. Traffic destined to AS 111 network 91.7.0.0/16 should come in via AS 100, while traffic destined to all other networks in AS 111 should continue to use the existing path. Which BGP attributes are best suited to control this inbound traffic coming from BGP AS 500 into the 91.7.0.0/16 network?
A. aaS
B. aaS
C. aaS
D. ybrid cloud
عرض الإجابة
اجابة صحيحة: B
السؤال #8
Company XYZ network runs IPv4 and IPv6 and they want to introduce a multidomain, multicast-based network. The new design should use a flavor of PIM that forwards traffic using SPT. Which technology meets this requirement?
A. IM-SSM
B. IM-SM
C. IDIR-PIM
D. IM-DM
عرض الإجابة
اجابة صحيحة: A
السؤال #9
In an OSPF network with routers connected together with Ethernet cabling, which topology typically takes the longest to converge?
A. ncrease the memory on the core routers
B. ncrease bandwidth between the core routers
C. mplement eBGP between the core and distribution routers
D. ncrease the memory on the distribution routers
E. mplement route reflectors on the two core routers
عرض الإجابة
اجابة صحيحة: B
السؤال #10
Which three elements help network designers to construct secure systems that protect information and resources (such as devices, communication, and data) from unauthorized access, modification, inspection, or destruction? (Choose three.)
A. scalability
B. availability
C. serviceability
D. integrity
E. confidentiality
F. reliability
عرض الإجابة
اجابة صحيحة: BDE
السؤال #11
Which architecture does not require an explicit multicast signaling protocol, such as PIM or P2MP, to signal the multicast state hop-by-hop, but instead uses a link state protocol to advertise the multicast forwarding state?
A. i-Directional Implicit Replication
B. it Indexed Explicit Replication
C. inary Intermediate Enhanced Routing
D. inary Indexed Explicit Routing
عرض الإجابة
اجابة صحيحة: B
السؤال #12
A network security team uses a purpose-built tool to actively monitor the campus network, applications, and user activity. The team also analyzes enterprise telemetry data from IPFIX data records that are received from devices in the campus network. Which action can be taken based on the augmented data?
A. eduction in time to detect and respond to threats
B. ntegration with an incident response plan
C. doption and improvement of threat-detection response
D. sset identification and grouping decisions
عرض الإجابة
اجابة صحيحة: A
السؤال #13
Which two types of planning approaches are used to develop business-driven network designs and to facilitate the design decisions? (Choose two.)
A. trategic planning approach
B. usiness optimization approach
C. actical planning approach
D. odular approach
E. ost optimization approach
عرض الإجابة
اجابة صحيحة: AC
السؤال #14
Which technology is an open-source infrastructure automation tool that automates repetitive tasks for users who work in networks such as cloud provisioning and intraservice orchestration?
A. Java
B. Ansible
C. Contrail
D. Jinja2
عرض الإجابة
اجابة صحيحة: B
السؤال #15
Which two actions must merchants do to be compliant with the Payment Card Industry Data Security Standard? (Choose two.)
A. ystem-oriented architecture
B. SASE architecture
C. latform-oriented architecture
D. ASE architecture
عرض الإجابة
اجابة صحيحة: BC
السؤال #16
Company XYZ asks for design recommendations for Layer 2 redundancy. The company wants to prioritize fast convergence and resiliency elements in the design. Which two technologies are recommended? (Choose two.)
A. PU and memory usage on the spoke routers
B. emory usage on the hub router
C. PU usage on the hub router
D. nterface buffers on the hub and spoke routers
عرض الإجابة
اجابة صحيحة: BE
السؤال #17
Which network management framework can be used to develop a network architecture that contains business requirements analysis, gap analysis, and network diagrams as artifacts to be used for design and implementation later?
A. CAPS
B. obit
C. OGAF
D. TIL
عرض الإجابة
اجابة صحيحة: C
السؤال #18
Refer to the exhibit. This network is running OSPF and EIGRP as the routing protocols. Mutual redistribution of the routing protocols has been configured on the appropriate ASBRs. The OSPF network must be designed so that flapping routes in EIGRP domains do not affect the SPF runs within OSPF. The design solution must not affect the way EIGRP routes are propagated into the EIGRP domains. Which technique accomplishes the requirement?
A. oute summarization on the ASBR interfaces facing the OSPF domain
B. oute summarization on the appropriate ABRs
C. oute summarization on EIGRP routers connecting toward the ASBR
D. oute summarization on the appropriate ASBRs
عرض الإجابة
اجابة صحيحة: D
السؤال #19
A European national bank considers migrating its on-premises systems to a private cloud offering in a non-European location to significantly reduce IT costs. What is a primary factor prior to migration?
A. ecurity
B. loud connectivity
C. dditional latency
D. ata governance
عرض الإجابة
اجابة صحيحة: C
السؤال #20
Which two types of planning approaches are used to develop business-driven network designs and to facilitate the design decisions? (Choose two.)
A. umbai and Beijing
B. ape Town and Mumbai
C. ape Town and Beijing
D. antiago and Mumbai
E. antiago and Beijing
عرض الإجابة
اجابة صحيحة: AC
السؤال #21
Organizations that embrace Zero Trust initiatives ranging from business policies to technology infrastructure can reap business and security benefits. Which two domains should be covered under Zero Trust initiatives? (Choose two.)
A. echnical and physical access control
B. hysical device and media control
C. dministrative security management processes
D. echnical integrity and transmission security
عرض الإجابة
اجابة صحيحة: BE
السؤال #22
An enterprise has identified these causes for inefficient CAPEX spending:•CAPEX planning is driven by technology and not by business objectives.•The CAPEX planning team lacks the data it needs to perform due diligence tasks.•The organizational structure lacks sufficient accountability and incentives.Which corporate cultural change contributes to improving the effectiveness of CAPEX spending?
A. uild a financial control function that delivers high-quality reports on operational expenses for business insight and financial reporting
B. xO-level staff must have a full technical understanding but the should not trust their technical leaders fully
C. dopt new organizational models that promote real accountability for ROI, not just revenue, EBITDA, and cash
D. arketing and product management divisions must reduce their CAPEX budgets significantly to drive the change
عرض الإجابة
اجابة صحيحة: C
السؤال #23
Which two points must network designers consider when designing a new network design or when evaluating an existing network design to help them understand the high-level design direction with regards to the security aspects? (Choose two.)
A. PP
B. PPr
C. oPP
D. PP
عرض الإجابة
اجابة صحيحة: BE
السؤال #24
A legacy enterprise is using a Service Provider MPLS network to connect its head office and branches. Recently, they added a new branch to their network. Due to physical security concerns, they want to extend their existing IP CCTV network of the head office to the new branch, without any routing changes in the network. They are also under some time constraints. What is the best approach to extend the existing IP CCTV network to the new branch, without incurring any IP address changes?
A. RE
B. 2TPv3
C. XLAN
D. oMPLS
عرض الإجابة
اجابة صحيحة: B
السؤال #25
A European government passport agency considers upgrading its IT systems to increase performance and workload flexibility in response to constantly changing requirements. The budget manager wants to reduce capital expenses and IT staff and must adopt the lowest-cost technology. Which technology choice is suitable?
A. ublic cloud
B. ybrid cloud
C. n premises
D. rivate cloud
عرض الإجابة
اجابة صحيحة: A
السؤال #26
Which two statements explain the operation of BFD asynchronous mode? (Choose two.)
A. ignificant effort and time are required
B. ework is expected before the delivery
C. his provides more opportunity to think outside the box
D. his provides a flexible approach to incorporate changes
عرض الإجابة
اجابة صحيحة: AB
السؤال #27
Refer to the exhibit. An engineer is designing the network for a multihomed customer running in AS 111 AS 111 does not have any other ASs connected to it.Which technology is more comprehensive to use in the design to make sure that the AS is not being used as a transit AS?
A. nclude an AS path access list to send routes to the neighboring ASs that only have AS 111 in the AS path field
B. onfigure the AS-set attribute to allow only routes from AS 111 to be propagated to the neighbor ASs
C. se the local preference attribute to configure your AS as a "non-transit" AS
D. nclude a prefix list to only receive routes from neighboring ASs
عرض الإجابة
اجابة صحيحة: A
السؤال #28
DRAG DROP (Drag and Drop is not supported)Drag and drop the end-to-end network virtualization elements from the left onto the correct network areas on the right.Select and Place:
A. ee Explanation section for answer
عرض الإجابة
اجابة صحيحة: A
السؤال #29
An enterprise that runs numerous proprietary applications has major issues with its on-premises server estate hardware, to the point where business-critical functions are compromised. The enterprise accelerates plans to migrate services to the cloud. Which cloud service should be used if the enterprise wants to avoid hardware issues yet have control of its applications and operating system?
A. SaaS
B. PaaS
C. IaaS
D. hybrid cloud
عرض الإجابة
اجابة صحيحة: C
السؤال #30
DRAG DROP (Drag and Drop is not supported)Drag and drop the multicast protocols from the left onto the correct design situations on the right.Select and Place:
A. ee Explanation section for answer
عرض الإجابة
اجابة صحيحة: A
السؤال #31
What is a characteristic of a secure cloud architecture model?
A. ee Explanation section for answer
عرض الإجابة
اجابة صحيحة: A
السؤال #32
Which technology is an open-source infrastructure automation tool that automates repetitive tasks for users who work in networks such as cloud provisioning and intraservice orchestration?
A. ava
B. nsible
C. ontrail
D. inja2
عرض الإجابة
اجابة صحيحة: B
السؤال #33
Company XYZ is running a redundant private WAN network using OSPF as the underlay protocol. The current design accommodates for redundancy in the network, but it is taking over 30 seconds for the network to reconverge upon failure. Which technique can be implemented in the design to detect such a failure in a subsecond?
A. ate sharing
B. SPF LFA
C. lex links
D. TP
E. FD
عرض الإجابة
اجابة صحيحة: E
السؤال #34
An architect designs a multi-controller network architecture with these requirements:-Achieve fast failover to control traffic when controllers fail.-Yield a short distance and high resiliency in the connection between the switches and the controller.-Reduce connectivity loss and enable smart recovery to improve the SDN survivability.-Improve connectivity by adding path diversity and capacity awareness for controllers.Which control plane component of the multi-controller must be built to meet the requiremen
A. ontrol node reliability
B. ontrol path reliability
C. ontroller state consistency
D. ontroller clustering
عرض الإجابة
اجابة صحيحة: B
السؤال #35
Company XYZ has 30 sites running a legacy private WAN architecture that connects to the Internet via multiple high-speed connections. The company is now redesigning their network and must comply with these design requirements: •Use a private WAN strategy that allows the sites to connect to each other directly and caters for future expansion •Use the Internet as the underlay for the private WAN•Securely transfer the corporate data over the private WAN Which two technologies should be incorporated into the de
A. ED
B. ommunity
C. ocal preference
D. S path
عرض الإجابة
اجابة صحيحة: BD
السؤال #36
Refer to the exhibit. As part of a redesign project, you must predict multicast behavior. What happens to the multicast traffic received on the shared tree (*, G), if it is received on the LHR interface indicated?
A. It is switched due to a successful RPF check against the routing table
B. It is switched given that no RPF check is performed
C. It is dropped due to an unsuccessful RPF check against the multicast receiver
D. It is dropped due to an unsuccessful RPF check against the multicast source
عرض الإجابة
اجابة صحيحة: B
السؤال #37
Refer to the exhibit. This network is running legacy STP 802.1d. Assuming "hello_timer" is fixed to 2 seconds, which parameters can be modified to speed up convergence times after single link/node failure?
A. Only the maximum_transmission_halt_delay and diameter parameters are configurable parameters in 802
B. The max_age and forward delay parameters can be adjusted to speed up STP convergence process
C. The transit_delay=5 and bpdu_delay=20 are recommended values, considering hello_timer=2 and specified diameter
D. Only the transit_delay and bpdu_delay timers are configurable parameters in 802
عرض الإجابة
اجابة صحيحة: B
السؤال #38
Which effect of using ingress filtering to prevent spoofed addresses on a network design is true?
A. t filters RFC 1918 IP addresses
B. t protects the network infrastructure against spoofed DDoS attacks
C. t reduces the effectiveness of DDoS attacks when associated with DSCP remarking to Scavenger
D. t classifies bogon traffic and remarks it with DSCP bulk
عرض الإجابة
اجابة صحيحة: B
السؤال #39
Which management category is not part of FCAPS framework?
A. erformance
B. uthentication
C. ecurity
D. ault-management
E. onfiguration
عرض الإجابة
اجابة صحيحة: B
السؤال #40
02. What are two primary design constraints when a robust infrastructure solution is created?
A. onitoringcapabilitie
B. rojecttimeframe
C. taffexperience
D. omponentavailability
عرض الإجابة
اجابة صحيحة: B
السؤال #41
Refer to the exhibit. An engineer has been asked to redesign the traffic flow toward AS 111 coming from AS 500. Traffic destined to AS 111 network 91.7.0.0/16 should come in via AS 100, while traffic destined to all other networks in AS 111 should continue to use the existing path. Which BGP attributes are best suited to control this inbound traffic coming from BGP AS 500 into the 91.7.0.0/16 network?
A. Use local preference on R1 for the networks that AS 500 advertises to AS 111
B. Prepend AS path for the 91
C. Use extended community for the 91
D. Set higher MED for neighbor in AS 100 to influence incoming traffic for the 91
عرض الإجابة
اجابة صحيحة: B
السؤال #42
An enterprise network has two core routers that connect to 200 distribution routers and uses full-mesh iBGP peering between these routers as its routing method. The distribution routers are experiencing high CPU utilization due to the BGP process. Which design solution is the most cost effective?
A. irst-hop router registration to the RP
B. ulticast source registration to the RP
C. ulticast client registration to the RP
D. ransport of all IPv6 multicast traffic
عرض الإجابة
اجابة صحيحة: E
السؤال #43
08. A healthcare customer requested that SNMP traps must be sent over the MPLS Layer 3 VPN service. Which protocol must be enabled?
A. NMPv3
B. ysl
C. yslogTLS
D. NMPv2
عرض الإجابة
اجابة صحيحة: A
السؤال #44
09. Which BGP feature provides fast convergence?
A. GPPIC
B. GP-EVPN
C. GPFlowSpec
D. GP-LS
عرض الإجابة
اجابة صحيحة: A
السؤال #45
01. How must the queue sizes be designed to ensure that an application functions correctly?
A. achindividualdevicequeuingdelayinthechainmustbelessthanorequaltotheapplicationrequireddelay
B. hequeuingdelayoneverydeviceinthechainmustbeexactlythesametotheapplicationrequireddelay
C. hedefaultqueuesizesaregoodforanydeploymentasitcompensatestheserializationdelay
D. hesumofthequeuingdelayofalldevicesplusserializationdelayinthechainmustbelessthanorequaltotheapplicationrequireddelay
عرض الإجابة
اجابة صحيحة: D
السؤال #46
As part of workspace digitization, a large enterprise has migrated all their users to Desktop as a Service (DaaS), by hosting the backend system in their on-premises data center. Some of the branches have started to experience disconnections to the DaaS at periodic intervals, however, local users in the data center and head office do not experience this behavior. Which technology can be used to mitigate this issue?
A. raffic policing
B. RED
C. ail drop
D. raffic shaping
عرض الإجابة
اجابة صحيحة: B
السؤال #47
Which two statements describe the hierarchical LAN design model? (Choose two.)
A. se local preference on R1 for the networks that AS 500 advertises to AS 111
B. repend AS path for the 91
C. se extended community for the 91
D. et higher MED for neighbor in AS 100 to influence incoming traffic for the 91
عرض الإجابة
اجابة صحيحة: AC
السؤال #48
Company XYZ is planning to deploy primary and secondary (disaster recovery) data center sites. Each of these sites will have redundant SAN fabrics and data protection is expected between the data center sites. The sites are 100 miles (160 km) apart and target RPO/RTO are 3 hrs and 24 hrs, respectively. Which two considerations must Company XYZ bear in mind when deploying replication in their scenario? (Choose two.)
A. ynchronous replication over geographically dispersed dual data centers via MPLS
B. ynchronous replication over dual data centers via Metro Ethernet
C. synchronous replication over geographically dispersed dual data centers via CWDM
D. synchronous replication over dual data centers via DWDM
عرض الإجابة
اجابة صحيحة: BD
السؤال #49
Which two features control multicast traffic in a VLAN environment? (Choose two.)
A. quared
B. ing
C. artial mesh
D. riangulated
E. ull mesh
عرض الإجابة
اجابة صحيحة: DE
السؤال #50
A BGP route reflector in the network is taking longer than expected to converge during large network changes. Troubleshooting shows that the router cannot handle all the TCP acknowledgements during route updates. Which action can be performed to tune the device performance?
A. ecrease the size of the small buffers
B. ncrease the size of the large buffers
C. ncrease the keepalive timers for each BGP neighbor
D. ncrease the size of the hold queue
عرض الإجابة
اجابة صحيحة: D
السؤال #51
Company XYZ is running a redundant private WAN network using OSPF as the underlay protocol. The current design accommodates for redundancy in the network, but it is taking over 30 seconds for the network to reconverge upon failure. Which technique can be implemented in the design to detect such a failure in a subsecond?
A. fate sharing
B. OSPF LFA
C. flex links
D. STP
E. BFD
عرض الإجابة
اجابة صحيحة: E
السؤال #52
How many fully established neighbour relationships exist on an Ethernet with five routers running OSPF as network type broadcast?
A.
B.
C.
D. 0
E. 0
عرض الإجابة
اجابة صحيحة: C
السؤال #53
According to the CIA triad principles for network security design, which principle should be priority for a Zero Trust network?
A. equirement for data-in-motion encryption and 2FA authentication
B. ategorization of systems, data, and enterprise BYOD assets that are connected to network zones based on individual privacy needs
C. nsuring that authorized users have high-availability system access from defined zones to defined systems or zones
D. equirement for data-at-rest encryption for user identification within the VPN termination hardware
عرض الإجابة
اجابة صحيحة: A
السؤال #54
SDWAN networks capitalize the usage of broadband Internet links over traditional MPLS links to offer more cost benefits to enterprise customers. However, due to the insecure nature of the public Internet, it is mandatory to use encryption of traffic between any two SDWAN edge devices installed behind NAT gateways.Which overlay method can provide optimal transport over unreliable underlay networks that are behind NAT gateways?
A. ecurity management
B. erformance management
C. ccounting management
D. ault management
عرض الإجابة
اجابة صحيحة: C
السؤال #55
Refer to the exhibit.Company XYZ must design a DMVPN tunnel between the three sites Chicago is going to act as the NHS and the company wants DMVPN to detect peer endpoint failures Which technology should be used m the design?
A. PLS
B. P SLA
C. RE
D. 2TPv3
عرض الإجابة
اجابة صحيحة: B
السؤال #56
Refer to the exhibit. ACME Mining has four data centers in Santiago, Cape Town, Mumbai, and Beijing, full-mesh connected via a 400 Mb/s EVP-LAN. They want to deploy a new mission-critical application with these requirements:* cluster heartbeat 2 MB/s continuous (250 KB/s)* cluster heartbeat one-way maximum latency 100 msThese are the current ping tests results between the four data centers: Which hosting data center pair can host the new application?
A. WDM over dark fiber
B. etro Ethernet
C. PLS wires only
D. WDM over dark fiber
عرض الإجابة
اجابة صحيحة: B
السؤال #57
How must the queue sizes be designed to ensure that an application functions correctly?
A. he default queue sizes are good for any deployment as it compensates the serialization delay
B. he queuing delay on every device in the chain must be exactly the same to the application required delay
C. ach individual device queuing delay in the chain must be less than or equal to the application required delay
D. he sum of the queuing delay of all devices plus serialization delay in the chain must be less than or equal to the application required delay
عرض الإجابة
اجابة صحيحة: D
السؤال #58
04. While designing a switched topology, in which two options is UplinkFast recommended?
A. henswitchesofdifferentspanning-treetypesareconnected(forexample
B. ndistributionlayerswitche
C. henhellotimersarechangedtomoreaggressivevalue
D. naccesslayerswitche
عرض الإجابة
اجابة صحيحة: AD
السؤال #59
Refer to the exhibit. For Company XYZ, Bangkok is using ECMP to reach the 172.20.2.0/24 network. The company wants a design that would allow them to forward traffic from 172.16.2.0/24 toward 172.20.2.0/24 via the Singapore router as the preferred route. The rest of the traffic should continue to use ECMP. Which technology fulfills this design requirement?
A. olicy-based routing
B. nequal-cost load balancing using variance
C. oute summarization
D. FA
عرض الإجابة
اجابة صحيحة: A
السؤال #60
Company XYZ runs OSPF in their network. A design engineer decides to implement hot-potato routing architecture. How can this implementation be achieved?
A. nable iBGP and apply prepend to ensure all prefixes will have the same length of the AS path attribute value
B. edistribute the external prefixes onto OSPF and ensure that the total metric calculation includes external and internal values
C. nable OSPF load-balancing over unequal cost path
D. edistribute the external prefixes onto OSPF and ensure the total metric calculation includes only the external value and the value is the same in all ASBRs
عرض الإجابة
اجابة صحيحة: B
السؤال #61
Which two statements describe the hierarchical LAN design model? (Choose two.)
A. It is a well-understood architecture that provides scalability
B. It is the best design for modem data centers
C. Changes, upgrades, and new services can be introduced in a controlled and staged manner
D. It is the most optimal design but is highly complex
E. It provides a simplified design
عرض الإجابة
اجابة صحيحة: AC
السؤال #62
Which two mechanisms avoid suboptimal routing in a network with dynamic mutual redistribution between multiple OSPFv2 and EIGRP boundaries? (Choose two.)
A. ink-local addresses
B. rivate addresses
C. nique local addresses
D. ocal addresses
عرض الإجابة
اجابة صحيحة: AE
السؤال #63
Refer to the exhibit. This enterprise customer wants to stream one-way video from their head office to eight branch offices using multicast. Their current service provider provides a Layer 3 VPN solution and manages the CE routers, but they do not currently support multicast. Which solution quickly allows this multicast traffic to go through while allowing for future scalability?
A. nable a GRE tunnel between nodes C1 and C4
B. nable a GRE tunnel between nodes C2 and C4
C. nable a GRE tunnel between nodes CE1 and CE2
D. mplement hub and spoke MPLS VPN over DMVPN (also known as 2547oDMVPN) between CE1 and CE2
E. he service provider must provide a Draft Rosen solution to enable a GRE tunnel between nodes PE1 and PE2
عرض الإجابة
اجابة صحيحة: D
السؤال #64
How can EIGRP topologies be designed to converge as fast as possible in the event of a point-to-point link failure?
A. imit the query domain by use of summarization
B. imit the query domain by use of default routes
C. uild neighbor adjacencies in a squared fashion
D. imit the query domain by use of distribute lists
E. uild neighbor adjacencies in a triangulated fashion
عرض الإجابة
اجابة صحيحة: A
السؤال #65
What are two primary design constraints when a robust infrastructure solution is created? (Choose two.)
A. omponent availability
B. onitoring capabilities
C. roject time frame
D. taff experience
E. otal cost
عرض الإجابة
اجابة صحيحة: CE
السؤال #66
Company XYZ, a global content provider, owns data centers on different continents. Their data center design involves a standard three-layer design with a Layer 3-only core. HSRP is used as the FHRP. They require VLAN extension across access switches in all data centers, and they plan to purchase a Layer 2 interconnection between two of their data centers in Europe. In the absence of other business or technical constraints, which termination point is optimal for the Layer 2 interconnection?
A. t the core layer, to offer the possibility to isolate STP domains
B. t the aggregation layer because it is the Layer 2 to Layer 3 demarcation point
C. t the access layer because the STP root bridge does not need to align with the HSRP active node
D. t the core layer because all external connections must terminate there for security reasons
عرض الإجابة
اجابة صحيحة: B
السؤال #67
Company XYZ wants design recommendations for Layer 2 redundancy (using Layer 2 technologies). The company wants to prioritize flexibility and scalability elements in the new design. Which two technologies help meet these requirements? (Choose two.)
A. valuate bandwidth utilization and connection quality
B. nable special requirements such as direct DID lines on pickup
C. ake recommendations to limit the size of the half-open session table on routers
D. heck if anomaly detection is enabled for SIP and H
عرض الإجابة
اجابة صحيحة: CE
السؤال #68
Which interconnectivity method offers the fastest convergence in the event of a unidirectional issue between three Layer 3 switches connected together with routed links in the same rack in a data center?
A. iber Ethernet connectivity with UDLD enabled
B. opper Ethernet connectivity with UDLD enabled
C. iber Ethernet connectivity with BFD enabled
D. opper Ethernet connectivity with BFD enabled
عرض الإجابة
اجابة صحيحة: C
السؤال #69
Company XYZ has a hub-and-spoke topology over an SP-managed infrastructure. To measure traffic performance metrics, they implemented IP SLA senders on all spoke CE routers and an IP SLA responder on the hub CE router. What must they monitor to have visibility on the potential performance impact due to the constantly increasing number of spoke sites?
A. eighted random early detection
B. eighted fair queuing
C. irst-in first-out
D. ow-latency queuing
عرض الإجابة
اجابة صحيحة: C
السؤال #70
Refer to the exhibit. As part of a redesign project, you must predict multicast behavior. What happens to the multicast traffic received on the shared tree (*, G), if it is received on the LHR interface indicated?
A. t is switched due to a successful RPF check against the routing table
B. t is switched given that no RPF check is performed
C. t is dropped due to an unsuccessful RPF check against the multicast receiver
D. t is dropped due to an unsuccessful RPF check against the multicast source
عرض الإجابة
اجابة صحيحة: B
السؤال #71
10. You want to mitigate failures that are caused by STP loops that occur before UDLD detects the failure or that are caused by a device that is no longer sending BPDUs. Which mechanism do you use along with UDLD?
A. ootguard
B. PDUguard
C. oopguard
D. PDUfilteri
عرض الإجابة
اجابة صحيحة: C
السؤال #72
Company XYZ has implemented policy-based routing in their network. Which potential problem must be kept in mind about network reconvergence and PBR?
A. t can limit network scalability
B. t can create microloops during reconvergence
C. t reduces convergence time
D. t increases convergence time
عرض الإجابة
اجابة صحيحة: B
السؤال #73
What is a disadvantage of the traditional three-tier architecture model when east west traffic between different pods must go through the distribution and core layers?
A. ow bandwidth
B. ecurity
C. calability
D. igh latency
عرض الإجابة
اجابة صحيحة: A
السؤال #74
DRAG DROP (Drag and Drop is not supported)Drag and drop the FCAPS network management reference models from the left onto the correct definitions on the right.Select and Place:
A. ee Explanation section for answer
عرض الإجابة
اجابة صحيحة: A
السؤال #75
IPFIX data collection via standalone IPFIX probes is an alternative to flow collection from routers and switches. Which use case is suitable for using IPFIX probes?
A. ee Explanation section for answer
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: