Which two types of traffic must be prioritized as management traffic?
While designing quality of service policies, which two types of traffic must be prioritized as management traffic? (Choose two.) A. RADIUS B. SSH C. SCP D. HTTPS E. ICMP
While designing quality of service policies, which two types of traffic must be prioritized as management traffic? (Choose two.) A. RADIUS B. SSH C. SCP D. HTTPS E. ICMP
What are the two main elements used by RBAC to provide secure access within an Enterprise? (Choose two.) A. User privileges B. User roles C. User profile D. User locales E. User domains
An engineer has been requested to utilize a method in an ACI network that will ensure only permitted communications are transmitted between each End Point Group tier in a three tier application. Which element would be utilized to accomplish this…
Which IPv6 migration strategy supports IPv4 and IPv6 on the same router? A. IPv6 tunneling B. Dual-stack C. IPv6 translation D. NAT
A company is building a large data center. About 80% of its traffic will be North to South and the other 20% will be east to west. The company is also expecting a significant amount of data center growth over…
An engineer has been asked to design a LAN topology with high availability and the loop-free features of STP. It must also support etherchannels between multiple chassis and a separate control plane for each switch terminating these multichassis connections. Which…
A legacy OSPF network design solution historically included a large number of routers in a single backbone area 0. The network currently has over 300 OSPF routers. How is the network redesigned to allow further expansion? A. Break down area…
An engineer must optimize a single-homed connection in a small branch office. Which technology accomplishes this goal? A. DMVPN B. MSE C. WAE D. MPLS
An engineer is considering time of convergence in a new layer 3 environment design. Which two attributes must be considered? (Choose two.) A. OSPF database updates B. SPT timers updates C. Addition of a valid forwarding path D. Forwarding table…
What added enforcement feature is available on IDS-based devices to terminate active malicious traffic? A. Signature detection B. SNMP alert C. TCP reset D. Layer 4 filtering