MultipleChoice
Refer to the exhibit.
An architect must design an enterprise WAN that connects the headquarters with 22 branch offices. The number of remote sites is expected to triple in the next three years. The final solution must comply with these requirements:
* Only the loopback address of each of the enterprise CE X and Y routers must be advertised to the interconnecting service provider cloud network.
* The transport layer must carry the VPNv4 label and VPN payload over the MP-BGP control plane.
* The transport layer must not be under service provider control.
Which enterprise WAN transport virtualization technique meets the requirements?
OptionsMultipleChoice
What are two top cloud-native security challenges faced by today's cloud-oriented organizations? (Choose two )
OptionsMultipleChoice
Refer to the exhibit
A service provider has a requirement to use Ethernet OAM to detect end-to-end connectivity failures between SP-SW1 and SP- SW2 Which two ways to design this solution are true? (Choose two)
OptionsMultipleChoice
An enterprise campus is adopting a network virtualization design solution with these requirements
* It must include the ability to virtualize the data plane and control plane by using VLANs and VRFs
* It must maintain end-to-end logical path transport separation across the network
* resources available grouped at the access edge
Which two primary models can this network virtualization design be categorized? (Choose two)
OptionsMultipleChoice
Company XYZ has 30 sites running a legacy private WAN architecture that connects to the Internet via multiple high- speed connections The company is now redesigning their network and must comply with these design requirements :
* Use a private WAN strategy that allows the sites to connect to each other directly and caters for future expansion.
* Use the Internet as the underlay for the private WAN.
* Securely transfer the corporate data over the private WAN.
Which two technologies should be Incorporated into the design of this network? (Choose two.)
OptionsMultipleChoice
An architect designs a multi-controller network architecture with these requirements:
* Achieve fast failover to control traffic when controllers fail.
* Yield a short distance and high resiliency in the connection between the switches and the controller.
* Reduce connectivity loss and enable smart recovery to improve the SDN survivability.
* Improve connectivity by adding path diversity and capacity awareness for controllers.
Which control plane component of the multi-controller must be built to meet the requirements?
OptionsMultipleChoice
A small organization of 20 employees is looking to deliver a network design service for modernizing customer networks to support advanced solutions.
* Project scope and weekly progress should be visualized by the management.
* Always consider feedback and make changes accordingly during the project.
* Should consider flexibility to change scope at the point of time.
Which project methodology meets the requirements and have the least impact on the outcome?
OptionsMultipleChoice
Company XYZ is designing the network for IPv6 security and they have these design requirements:
* A switch or router must deny access to traffic from sources with addresses that are correct, but are topologically incorrect
* Devices must block Neighbor Discovery Protocol resolution for destination addresses that are not found in the binding table.
Which two IPv4 security features are recommended for this company? (Choose two)
OptionsMultipleChoice
Refer to the exhibit.
Refer to the exhibit A service provider has a requirement to use Ethernet OAM to detect end-to-end connectivity failures between SP-SW1 and SP- SW2 Which two ways to design this solution are true? (Choose two)
OptionsMultipleChoice
An enterprise campus is adopting a network virtualization design solution with these requirements
It must include the ability to virtualize the data plane and control plane by using VLANs and VRFs
It must maintain end-to-end logical path transport separation across the network
resources available grouped at the access edge
Which two primary models can this network virtualization design be categorized? (Choose two)
Options