Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which design consideration is valid when you contrast fabricPath and trill?

A.

FabricPath uses IS-IS, but TRILL uses VxLAN

B.

FabricPath permits active-active FHRP and TRILL support anycast gateway.

C.

FabricPath Permits ECMP, but TRILL does not

D.

FabricPath permits active-active mode, but TRILL supports only active-standby mode.

Full Access
Question # 5

A customer has a functional requirement that states HR systems within a data center should be segmented from other systems that reside in the same data center and same VLAN. The systems run legacy applications by using hard-coded IP addresses. Which segmentation method is suitable and scalable for the customer?

A.

data center perimeter firewalling

B.

VACLs on data center switches

C.

transparent firewalling

D.

routed firewalls

Full Access
Question # 6

What statement describes the application layer as defined in the software-defined networking architecture?

A.

This layer is responsible for collecting the network status such as network usage and topology.

B.

This layer contains programs that communicate their desired network behavior to controllers.

C.

This layer is responsible for handling packets based on the rules provided by the controller.

D.

This layer processes the instructions and requirements sent by networking components.

Full Access
Question # 7

Company XYZ is revisiting the security design for their data center because they now have a requirement to control traffic within a subnet and implement deep packet inspection Which technology meets the updated requirements and can be incorporated into the design?

A.

routed firewall

B.

VLAN ACLs on the switch

C.

transparent firewall

D.

zone-based firewall on the Layer 3 device

Full Access
Question # 8

Company XYZ wants to secure the data plane of their network. Which two technologies can be included in the security design? (Choose two)

A.

DAI

B.

IP Source Guard

C.

BEEP

D.

CPPr

E.

MPP

Full Access
Question # 9

An enterprise has identified these causes for inefficient CAPEX spending:

  • CAPEX planning is driven by technology and not by business objectives.
  • The CAPEX planning team lacks the data it needs to perform due diligence tasks.
  • The organizational structure lacks sufficient accountability and incentives.

Which corporate cultural change contributes to improving the effectiveness of CAPEX spending?

A.

Build a financial control function that delivers high-quality reports on operational expenses for business insight and financial reporting.

B.

CxO-level staff must have a full technical understanding but the should not trust their technical leaders fully.

C.

Adopt new organizational models that promote real accountability for ROI. not just revenue. EBITDA, and cash.

D.

Marketing and product management divisions must reduce their CAPEX budgets significantly to drive the change.

Full Access
Question # 10

An architect prepares a network design for a startup company. The design must be able to meet business requirements while the business grows and divests due to rapidly changing markets. What is the highest priority in this design?

A.

The network should be hierarchical

B.

The network should be modular.

C.

The network should be scalable.

D.

The network should have a dedicated core.

Full Access
Question # 11

Refer to the exhibit A service provider has a requirement to use Ethernet OAM to detect end-to-end connectivity failures between SP-SW1 and SP- SW2 Which two ways to design this solution are true? (Choose two)

A.

Enable unicast heartbeat messages to be periodically exchanged between MEPs

B.

Enable Connectivity Fault Management on the SP switches

C.

Use upward maintenance endpoints on the SP switches

D.

Forward E-LMI PDUs over VPLS

E.

Forward LLD PDUs over the VPLS

Full Access
Question # 12

A network architect must redesign a service provider edge, where multiservice and multitenant PEs are currently present. Which design feature should be minimized in the new design to achieve reliability?

A.

bridging

B.

fate sharing

C.

redundancy

D.

unicast overlay routing

Full Access
Question # 13

SDWAN networks capitalize the usage of broadband Internet links over traditional MPLS links to offer more cost benefits to enterprise customers. However, due to the insecure nature of the public Internet, it is mandatory to use encryption of traffic between any two SDWAN edge devices installed behind NAT gateways. Which overlay method can provide optimal transport over unreliable underlay networks that are behind NAT gateways?

A.

TLS

B.

DTLS

C.

IPsec

D.

GRE

Full Access
Question # 14

Which three tools are used for ongoing monitoring and maintenance of a voice and video environment? (Choose three.)

A.

flow-based analysis to measure bandwidth mix of applications and their flows

B.

call management analysis to identify network convergence-related failures

C.

call management analysis to identify CAC failures and call quality issues

D.

active monitoring via synthetic probes to measure loss, latency, and jitter

E.

passive monitoring via synthetic probes to measure loss, latency, and jitter

F.

flow-based analysis with PTP time-stamping to measure loss, latency, and jitter

Full Access
Question # 15

While designing a switched topology, in which two options is UplinkFast recommended? (Choose two )

A.

when switches of different spanning-tree types are connected (for example. 802.1d connecting to 802.1w)

B.

on distribution layer switches

C.

when hello timers are changed to more aggressive values

D.

on access layer switches

E.

on the core switches

Full Access
Question # 16

An architect receives a business requirement from a CTO that states the RTO and RPO for a new system should be as close as possible to zero. Which replication method and data center technology should be used?

A.

asynchronous replication over dual data centers via DWDM

B.

synchronous replication over geographically dispersed dual data centers via MPLS

C.

synchronous replication over dual data centers via Metro Ethernet

D.

asynchronous replication over geographically dispersed dual data centers via CWDM

Full Access
Question # 17

What is a web-based model in which a third-party provider hosts applications that are available to customers over the Internet?

A.

PaaS

B.

SaaS

C.

laaS

D.

WaaS

Full Access
Question # 18

Refer to the exhibit. An architect must design an enterprise WAN that connects the headquarters with 22 branch offices. The number of remote sites is expected to triple in the next three years. The final solution must comply with these requirements:

  • Only the loopback address of each of the enterprise CE X and Y routers must be advertised to the interconnecting service provider cloud network.
  • The transport layer must carry the VPNv4 label and VPN payload over the MP-BGP control plane.
  • The transport layer must not be under service provider control.

Which enterprise WAN transport virtualization technique meets the requirements?

A.

EIGRP Over the Top

B.

MPLS over BGP over multipoint GRE

C.

DMVPN per VRF

D.

point-to-point GRE per VRF

Full Access
Question # 19

The Layer 3 control plane is the intelligence over the network that steers traffic toward its intended destination. Which two techniques can be used in service provider-style networks to offer a more dynamic, flexible, controlled, and secure control plane design? (Choose two.)

A.

access control lists

B.

firewalls

C.

QoS policy propagation with BGP

D.

remote black-holing trigger

E.

prefix lists

Full Access
Question # 20

Which two features are advantages of SD-WAN compared to MPLS-based connectivity? (Choose two.)

A.

uses FEC constructs for traffic forwarding, thereby improving efficiency

B.

separates infrastructure and policy

C.

uses policy-based forwarding of real-time traffic with less complexity

D.

unifies the WAN backbone

E.

manages failures through backup links

Full Access
Question # 21

What are two primary design constraints when a robust infrastructure solution is created? (Choose two.)

A.

monitoring capabilities

B.

project time frame

C.

staff experience

D.

component availability

E.

total cost

Full Access
Question # 22

What is the most important operational driver in building a resilient and secure modular network design?

A.

Dependencies on hardware or software that is difficult to scale

B.

Minimize app downtime

C.

Reduce the frequency of failures requiring human intervention

D.

Increase time spent on developing new features

Full Access
Question # 23

Which feature is supported by NETCONF but is not supported by SNMP?

A.

distinguishing between configuration data and operational data

B.

taking administrative actions

C.

collecting the status of specific fields

D.

changing the configuration of specific fields

Full Access
Question # 24

A healthcare provider discovers that protected health information of patients was altered without patient consent. The healthcare provider is subject to HIPAA compliance and is required to protect PHI data. Which type of security safeguard should be implemented to resolve this issue?

A.

technical and physical access control

B.

administrative security management processes

C.

physical device and media control

D.

technical integrity and transmission security

Full Access
Question # 25

Company ABC uses IPv4-only. Recently they started deploying new endpoint devices. For operational reasons, IPv6 cannot be disabled on these new endpoint devices. Which security measure prevents the new endpoint from learning an IPv6 prefix from an attacker?

A.

Source Guard and Prefix Guard

B.

Router Advertisement Guard

C.

Prefix Guard

D.

Secure Neighbor Discovery

Full Access
Question # 26

You have been tasked with designing a data center interconnect to provide business continuity You want to encrypt the traffic over the DCI using IEEE 802 1AE MACsec to prevent the deployment of any firewall or IPS. Which two interconnect technologies support MACsec? (Choose two.)

A.

EoMPLS

B.

MPLS Layer 3 VPN

C.

DMVPN

D.

GET VPN

E.

KVPLS

Full Access
Question # 27

You have been asked to design a high-density wireless network for a university campus. Which two principles would you apply in order to maximize the wireless network capacity? (Choose two.)

A.

Implement a four-channel design on 2.4 GHz to increase the number of available channels

B.

Choose a high minimum data rate to reduce the duty cycle.

C.

increases the number of SSlDs to load-balance the client traffic.

D.

Make use of the 5-GHz band to reduce the spectrum utilization on 2.4 GHz when dual-band clients are used.

E.

Enable 802.11n channel bonding on both 2.4 GHz and 5 GHz to increase the maximum aggregated cell throughput.

Full Access
Question # 28

Which optimal use of interface dampening on a fast convergence network design is true?

A.

When occasional flaps of long duration occur

B.

when numerous adjacent flaps of very short duration occur

C.

when the router hardware it slower than the carrier delay down detection

D.

when the switch hardware is faster than the debounce timer down detection

Full Access
Question # 29

A business requirement stating that failure of WAN access for dual circuits into an MPLS provider for a Data Centre cannot happen due to related service credits that would need to be paid has led to diversely routed circuits to different points of presence on the providers network? What should a network designer also consider as part of the requirement?

A.

Provision of an additional MPLS provider

B.

Out of band access to the MPLS routers

C.

Ensuring all related remote branches are dual homed to the MPLS network

D.

Dual PSUs & Supervisors on each MPLS router

Full Access
Question # 30

Company XYZ wants to improve the security design of their network to include protection from reconnaissance and DoS attacks on their sub interfaces destined toward next hop routers. Which technology can be used to prevent these types of attacks?

A.

MPP

B.

CPPr

C.

CoPP

D.

DPP

Full Access
Question # 31

Drag and drop the multicast protocols from the left onto the current design situation on the right.

Full Access
Question # 32
A.

low bandwidth

B.

security

C scalability

C.

high latency

Full Access
Question # 33

How must the queue sizes be designed to ensure that an application functions correctly?

A.

Each individual device queuing delay in the chain must be less than or equal to the application required delay.

B.

The queuing delay on every device in the chain must be exactly the same to the application required delay.

C.

The default queue sizes are good for any deployment as it compensates the serialization delay.

D.

The sum of the queuing delay of all devices plus serialization delay in the chain must be less than or equal to the application required delay.

Full Access
Question # 34

The network team in XYZ Corp wants to modernize their infrastructure and is evaluating an implementation and migration plan to allow integration MPLS-based, Layer 2 Ethernet services managed by a service provider to connect branches and remote offices. To decrease OpEx and improve

response times when network components fail, XYZ Corp decided to acquire and deploy new routers. The network currently is operated over E1 leased lines (2 Mbps) with a managed CE service provided by the telco.

Drag and drop the implementation steps from the left onto the corresponding targets on the right in the correct order.

Full Access
Question # 35

A company plans to use BFD between its routers to detect a connectivity problem inside the switched network. An IPS is transparently installed between the switches. Which packets shold the IPS forward for BFD to work under all circumstances?

A.

Fragmented packet with the do-not-fragment bit set

B.

IP packets with broadcast IP source addresses

C.

IP packets with the multicast IP source address

D.

IP packet with the multicast IP destination address

E.

IP packets with identical source and destination IP addresses

F.

IP packets with the destination IP address 0.0.0.0.

Full Access
Question # 36

A financial company requires that a custom TCP-based stock-trading application be prioritized over all other traffic for the business due to the associated revenue. The company also requires that VoIP be prioritized for manual trades. Which directive should be followed when a QoS strategy is developed for the business?

A.

Allow VoIP and the custom application to share the same priority queue,

B.

The custom application and VoIP must be assigned their own separate priority queue.

C.

Interleave the custom application with other TCP applications in the same CBWR

D.

Avoid placing the custom application in a CBWFQ queue that contains other

Full Access
Question # 37

Which solution component helps to achieve rapid migration to the cloud for SaaS and public cloud leveraging SD-WAN capabilities?

A.

service-oriented cloud architecture

B.

Cloud onramp

C.

cloud registry

D.

microservices in the cloud

Full Access
Question # 38

Company XYZ network runs IPv4 and IPv6 and they want to Introduce a multidomain, multicast-based network. The new design should use a flavor of PIM that forwards traffic using SPT. Which technology meets this requirement?

A.

PIM-DM

B.

PIM-SM

C.

PIM-SSM

D.

BIDIR-PIM

Full Access
Question # 39

In search of a system capable of hosting, monitoring compiling. and testing code in an automated way, what can be recommended to the organization?

A.

Jenkins

B.

Ansible

C.

Perl

D.

Chef

Full Access