Your applications are migrating from a legacy data center to an EVPN over a VXLAN-based VM environment. A few critical legacy applications not support this environment and must remain on bare metal servers and the applications must be able to access the Internet. What must be included in the VXLAN design to satisfy these requirements?
A. VTEP tunneling
B. VXLAN gateway
C. SR-IOV
D. nested VM capability
You are designing a multi-site data center environment with data center interconnects between sites. Which two statements are true in this scenario? (Choose two. )
A. VPLS can be used to interconnect the multiple sites.
B. EVPN with VXLAN can be used to interconnect the multiple sites.
C. The data centers must be connected with a full mesh design.
D. All data centers must be in the same Layer 2 broadcast domain and subnet.
You are asked to design a DDoS prevention system to help mitigate denial-of-service attacks that target your customers. The management group wants to know the effect FlowSpec may have on current network operations if it is implemented as a solution. In this scenario which two statements are correct? (Choose two )
A. FlowSpec can block traffic based on stateful flow information.
B. FlowSpec can block traffic based on the source address.
C. FlowSpec requires Jflow implementation and licensing.
D. FlowSpec can block traffic based on the destination address.
Exhibit: Referring to the exhibit which type of IPsec VPN should be used to create the desired topology?
A. AutoVPN
B. fully meshed VPN
C. Group VPN
D. hub-and-spoke VPN
What are two considerations for all WAN designs that use best industry practices? (Choose two )
A. to provide a dynamic routing protocol internally in the LAN
B. to provide scalability
C. to provide ease of deployment
D. to provide VXLAN and EVPN solutions
You want to implement Source Packet Routing in Networking (SPRING) in your network core using MPLS as the data plane for traffic engineering purposes. In this scenario what are two protocols that would be used to distribute the segment IDs? (Choose two )
A. OSPF
B. RSVP
C. LDP
D. IS-IS
Your customer connects to their service providers using fiber-based Ethernet connections in a shared
collocation room. The customer has expressed concerns about wire tapping and man-in-the-middle
attacks, and has asked for your design recommendation to minimize such attacks.
Which service addresses the customer's concern?
A. 802 1x
B. MACsec
C. BGPFIowSpec
D. 802 3ad
Your customer requires virtual machine mobility between two data centers, and they are pursuing a managed service. Which solution would satisfy the customer's requirement?
A. an EVPN service provided over IP
B. an L3VPN service
C. a routed service
D. an IPsec VPN service between CE routers
You work for a service provider that offers L3VPN services to its customers. While designing L3VPN
solutions for customers, you sometimes need to share routes between routing instances as part of the
design.
What are two reasons for sharing routes between routing-instances? (Choose two)
A. so customers can reach the Internet
B. to allow the service provider's OoB network to be reachable by customers
C. so customers can reach the service provider's public cloud infrastructure
D. to support network address translation
You are designing a solution for an energy trading organization that allows them to stream natural gas prices to trading partners. Prices will be streamed to trading partners using the Internet. Trading regulations require that any trading data streamed over a public network must be encrypted and authenticated. Which connectivity solution meets these requirements?
A. L2VPN
B. IPsec
C. VPLS
D. L3VPN