Company XYZ connects its sites over a private WAN. Their overlay network is running a DMVPN setup where the headquarters site is the hub. The company is planning on implementing multicast routing on the network. What should be used in the multicast routing design?
A. PIM dense mode with RP located at the hub
B. PIM sparse mode with RP located at each remote site
C. PIM sparse mode with RP located at the hub
D. PIM dense mode with RP located at each remote site
Company XYZ uses an office model where the employees can use any open desk and plug their laptops in. They want to authenticate the end users using their domain username and password before allowing them access to the network. The design must also accommodate the ability of controlling traffic within the same group or subnet if a macro (or micro) segmentation-based model is adopted in the future. Which protocol can be recommended for this design to authenticate end users?
A. LDAP
B. EAP
C. TACACS+
D. RADIUS
Company XYZ wants to use the FCAPS ISO standard for network management design. The focus of the design should be to minimize network outages by employing a set of procedures and activities to detect and isolate network issues and the appropriate corrective actions to overcome current issues and prevent them from occurring again. Which layer accomplishes this design requirement?
A. fault management
B. performance management
C. security management
D. accounting management
Which two factors must be considered for high availability in campus LAN designs to mitigate concerns about unavailability of network resources? (Choose two.)
A. device resiliency
B. device type
C. network type
D. network resiliency
E. network size
Which two control plane policer designs must be considered to achieve high availability? (Choose two.)
A. Control plane policers are enforced in hardware to protect the software path, but they are hardware platform dependent in terms of classification ability.
B. Control plane policers are really needed only on externally facing devices.
C. Control plane policers can cause the network management systems to create false alarms.
D. Control plane policers must be processed before a forwarding decision is made.
E. Control plane policers require that adequate protocols overhead are factored in to allow protocol convergence.
Company XYZ wants to improve the security design of their network to include protection from reconnaissance and DoS attacks on their sub interfaces destined toward next hop routers. Which technology can be used to prevent these types of attacks?
A. MPP
B. CPPr
C. CoPP
D. DPP
Company XYZ asks for design recommendations for Layer 2 redundancy. The company wants to prioritize fast convergence and resiliency elements. In the design. Which two technologies are recommended? (Choose two.)
A. Design MLAG/MC-LAG into the network wherever possible.
B. Configure DHCP snooping on the switches.
C. Use root guard.
D. Use BPDU guard.
E. Use UniDirectional Link Detection.
Software-defined networking architecture is used for cost-effective, adaptable, and easily manageable applications. In which two software-defined networks is SDN commonly used? (Choose two.)
A. wide area network
B. mobile network
C. metro network
D. application network
E. control network
A network engineering team is in the process of designing a lab network for a customer demonstration. The design engineer wants to show that the resiliency of the MPLS traffic Engineering Fast Reroute solution has the same failover/ failback times as a traditional SONET/SDH network (around 50MSEC). In order to address both link failure and node failure within the lab typology network, which type of the MPLS TE tunnels must be considered for this demonstration?
A. TE backup tunnel
B. Next-hop (NHop) tunnel
C. FRR Backup tunnel
D. next-next-hop (NNHop) tunnel
Which two protocols are used by SDN controllers to communicate with switches and routers? (Choose two.)
A. NetFlash
B. NetFlow
C. Open vSwitch Database
D. OpenFlash
E. OpenFlow