<< Prev Question Next Question >>

Question 122/163

A company requires a simple network access control solution that allows for software defined segmentation based on user and device contextual information. Which two technologies must be implemented to meet these requirements? (Choose two.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (163q)
Question 1: What is an advantage of using the vPC feature in a data cent...
Question 2: Which statement about the ToR design model is true?...
Question 3: Which QoS mechanism uses RSVP?
Question 4: In which multicast configuration is MSDP most useful?...
Question 5: Which STP feature can prevent other switches on the network ...
Question 6: An engineer is designing a campus network and must implement...
Question 7: A client's security policy requires separate management and ...
Question 8: Which option is a method of restricting access for users bas...
Question 9: Which Layer 2 messaging protocol maintains VLAN configuratio...
Question 10: A network administrator wants to provide high availability i...
Question 11: CoS is applied for Layer 2 markings in an Ethernet environme...
Question 12: What is one reason to implement Control Plane Policing?...
Question 13: What is the correct state between two BGP peers that are nei...
Question 14: Which option must be included in the design when implementin...
Question 15: Which network technology provides Layer 2 high availability ...
Question 16: Which two types of authentication mechanisms can be used by ...
Question 17: Which Cisco feature can be run on a Cisco router that termin...
Question 18: Which two design principles should be followed to improve EI...
Question 19: Which mechanism is enabled by default in the OTV technology ...
Question 20: In what situation must spanning-tree be implemented?...
Question 21: Refer to the exhibit. A network engineer manually reconfigur...
Question 22: What are two point-to-multipoint overlay tunneling strategie...
Question 23: Which feature enables the VRRP-enabled router to regain the ...
Question 24: What is an advantage of having an out-of-band management?...
Question 25: DRAG DROP An engineer must provide segmentation for a shop f...
Question 26: A network designer needs to explain the advantages of route ...
Question 27: Which VPN technology is tunnel-less?...
Question 28: An organization is designing the IP allocation of a new site...
Question 29: What is the recommended subnet between two sites that have a...
Question 30: Voice and video-conferencing applications that support multi...
Question 31: Multicast has been enabled and configured in the Enterprise,...
Question 32: A network engineer wants to connect two sites via a WAN tech...
Question 33: Why is QoS important for in-band management?...
Question 34: VPLS uses which transport protocol for tunneling Ethernet fr...
Question 35: A network engineer must select a network technology to simpl...
Question 36: A BGP network is having difficulty scaling with the full mes...
Question 37: In which multicast configuration is MSDP most useful?...
Question 38: What are the three configuration requirements for implementi...
Question 39: A company requires redundancy for its multihomed BGP externa...
Question 40: Summary address blocks can be used to support which network ...
Question 41: A VPN solution requires bulk traffic encryption, low operati...
Question 42: Two companies want to merge their OSPF networks, but they ru...
Question 43: Which option prevents the dropping of asymmetrically routed ...
Question 44: To which network layer should Cisco Express Forwarding be tu...
Question 45: After an incident caused by a DDos attack on a router, an en...
Question 46: Which feature must be configured for the VRRP-enabled router...
Question 47: Which option is correct when using Virtual Switching System ...
Question 48: Which statement about vPC technology is true?...
Question 49: A network engineer is designing a network that must incorpor...
Question 50: A network engineer is designing an access layer that require...
Question 51: What is the purpose of an OTV edge device?...
Question 52: Which option is an advantage of using PIM sparse mode instea...
Question 53: A network link is going up and down rapidly, and it is hinde...
Question 54: DRAG DROP Drag and drop the isolation technique from the lef...
Question 55: Refer to the exhibit. A customer discovers router R1 remains...
Question 56: Which security mechanism can you implement to protect the OS...
Question 57: Which algorithm does IS-IS use to determine the shortest pat...
Question 58: Private lines make use of which connection type based on cel...
Question 59: DRAG DROP Drag the rule on the left to match the appropriate...
Question 60: Which technology allows network managers to centrally manage...
Question 61: In what situation must spanning-tree be implemented?...
Question 62: A network engineer has implemented a looped triangle switch ...
Question 63: A network manager wants to securely connect a new remote sit...
Question 64: What is the next action taken by the Cisco NAC Appliance aft...
Question 65: Which technology extends Layer 2 LANs over any network that ...
Question 66: A campus network utilizes EIGRP to connect to several remote...
Question 67: The direction of the flow of multicast traffic is based on w...
Question 68: Which two design principles should be followed to scale EIGR...
Question 69: A company has hired an entry-level network administrator for...
Question 70: Which protocol should be run on the LAN side of two edge rou...
Question 71: Recently, the WAN links between the headquarters and branch ...
Question 72: An engineer is designing a Cisco Application Centric Infrast...
Question 73: What is the maximum number of neighbors that a router should...
Question 74: Which option does best practice dictate for the maximum numb...
Question 75: Which three statements about 802.1X are true? (Choose three....
Question 76: Which option is the unique requirement when supporting IP Mu...
Question 77: Which technology allows multiple instances of a routing tabl...
Question 78: Which first-hop redundancy protocol that was designed by Cis...
Question 79: While planning a new WAN design, an engineering team is aske...
Question 80: A Layer 2 switch in the network has recently started broadca...
Question 81: Which security feature can help prevent spoofed packets on t...
Question 82: Which action can be taken on a multiaccess segment with OSPF...
Question 83: Which ISP technology can be implemented as a service when de...
Question 84: Which option provides software modularity in Cisco NX-OS sof...
Question 85: What are the two methods of ensuring that the RPF check pass...
Question 86: An organization is using a link state routing protocol that ...
Question 87: Which virtualization technology allows for HSRP protocol to ...
Question 88: Which STP feature allows an access port to bypass the learni...
Question 89: Refer to the exhibit. Which option should be the default gat...
Question 90: EIGRP uses which algorithm to build a routing table?...
Question 91: Which unique EIGRP feature allows for faster Layer 3 converg...
Question 92: What is an advantage of using the Cisco FabricPath feature i...
Question 93: Which protocol is best when there are circuit connections wi...
Question 94: Which option can be implemented to manipulate the election o...
Question 95: What is an advantage of using the vPC feature in a data cent...
Question 96: Which technology can block ports to provide a loop-free topo...
Question 97: Which feature supports multiple routing tables with overlapp...
Question 98: An engineer must design a Cisco VSS-based configuration with...
Question 99: On which two types of links should routing protocol peerings...
Question 100: A company has asked for an OOB management network design. Wh...
Question 101: Which two methods are available to connect a Cisco IOS devic...
Question 102: When a Cisco ASA adaptive security appliance is configured f...
Question 103: What are two of Cisco's best practices at the access layer t...
Question 104: Which VPN technology supports dynamic creation of spoke-to-s...
Question 105: Which protocol is required for end-to-end signaling in an In...
Question 106: What are two methods of ensuring that the multicast RPF chec...
Question 107: A network design team is experiencing sustained congestion o...
Question 108: Refer to the exhibit. A customer requires a web application ...
Question 109: You are assigned the network of 192.168.1.0/24. You want to ...
Question 110: Which feature can be used in the Cisco Nexus 7000 to create ...
Question 111: Which command can you enter to inject BGP routes into an IGP...
Question 112: Which option is a benefit of the vPC+ feature?...
Question 113: DRAG DROP Drag and drop the Remote Data Center Layer 2 Exten...
Question 114: The network engineering team is interested in deploying NAC ...
Question 115: What is the maximum number of routers that each OSPF area (i...
Question 116: Which option is used as a top-of-rack device that is managed...
Question 117: A network design engineer has been asked to reduce the size ...
Question 118: Which two ВGР attributes can be set with outbound policy t...
Question 119: When designing a layer 2 STP-based LAN with Layer 3 FHRP, wh...
Question 120: Which two technologies provide web and URL filtering and mit...
Question 121: Which security feature can help prevent spoofed packets on t...
Question 122: A company requires a simple network access control solution ...
Question 123: An organization is acquiring another company and merging the...
Question 124: A device failure in an active/active ASA firewall pair cause...
Question 125: Which virtualization technology uses Layer 3 BFD to detect n...
Question 126: Which option is a primary requirement for the deployment of ...
Question 127: Which technology can block interfaces and provide a loop-fre...
Question 128: Which two WAN technologies support IEEE 802.1Q, site-to-site...
Question 129: A VPN solution requires bulk traffic encryption, low OpEx to...
Question 130: Which protocol should be configured if a network administrat...
Question 131: A network engineer is building a LAN design that includes Ci...
Question 132: To which network layer should Cisco Express Forwarding be tu...
Question 133: An engineer has implemented a QoS architecture that requires...
Question 134: Which route summarization most efficiently reduces perceived...
Question 135: Refer to the exhibit. Which two features can enable high ava...
Question 136: Which technology should a network designer combine with VSS ...
Question 137: Which QoS mechanism uses PHBs?
Question 138: Port security supports which type of port?...
Question 139: Which protocol is used in an in-band network and why?...
Question 140: During the design of a new data center, a company requires t...
Question 141: Which option is correct when using VSS to combine two physic...
Question 142: Refer to the exhibit. Which functionality must be enabled on...
Question 143: A designer should have which three technologies in the netwo...
Question 144: Which routing protocol provides the fastest convergence and ...
Question 145: What are two advantages of using Cisco FEX devices in the da...
Question 146: Which Nexus feature enables you to support server connectivi...
Question 147: Which method does Cisco recommend for deploying OTV to multi...
Question 148: (Exhibit) Refer to the exhibit. Based on the configuration, ...
Question 149: Which OSPF option can you configure to connect two parts of ...
Question 150: Which authentication framework is used in wireless networks ...
Question 151: Which statement best describes Cisco OTV internal interfaces...
Question 152: A network engineer is designing a network that must incorpor...
Question 153: Which technology fulfills these requirements? Utilize a conn...
Question 154: What are two benefits of using 6to4 as an IPv6 transition me...
Question 155: Which QoS architecture provides scalability of implementatio...
Question 156: In which OSI layer does IS-IS operate?...
Question 157: What two features are inherent advantages of MPLS VPN servic...
Question 158: What are three primary components in IS-IS fast convergence?...
Question 159: Which three authentication services are supported by Cisco N...
Question 160: What network technology provides Layer 2 high availability b...
Question 161: An engineer notices that many BGP peers utilize the same con...
Question 162: Which interface characteristic is used to calculate the cost...
Question 163: What is an advantage of using the Virtual Device Contexts fe...