<< Prev Question Next Question >>

Question 87/174

Two routers R1 and R2 are directly connected through an Ethernet link Both routers are running OSPF. OSPF has been registered with BFD and BFD is running in asynchronous mode with the echo function enabled Which two actions occur that are related to the echo function? (Choose two)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (174q)
Question 1: A green data center is being deployed and a design requireme...
Question 2: Drag and drop the correct mitigation methods from the left o...
Question 3: Drag and drop the QoS technologies from the left onto the co...
Question 4: Company XYZ runs OSPF in their network. A design engineer de...
Question 5: You are designing the QoS policy for a company that is runni...
Question 6: Which two types of planning approaches are used to develop b...
Question 7: It is often seen that companies pick a cloud vendor solely b...
Question 8: Which two statements describe the hierarchical LAN design mo...
Question 9: Which technology is an open-source infrastructure automation...
Question 10: What are two examples of components that are part of an SDN ...
Question 11: A Service Provider is designing a solution for a managed CE ...
Question 12: A large enterprise customer has a single router that uses tw...
Question 13: Which two technologies enable multilayer segmentation? (Choo...
Question 14: Which two statements describe network automation and network...
Question 15: You are designing a network running both IPv4 and IPv6 to de...
Question 16: The network designer needs to use GLOP IP addresses in order...
Question 17: What is the most important operational driver in building a ...
Question 18: The SD-WAN architecture is composed of separate orchestratio...
Question 19: What are two examples of business goals to be considered whe...
Question 20: For a company that offers online billing systems for their c...
Question 21: Which SDN architecture component is used by the application ...
Question 22: A network security team uses a purpose-built tool to activel...
Question 23: The General Bank of Greece plans to upgrade its legacy end-o...
Question 24: Which solution component helps to achieve comprehensive thre...
Question 25: Which two impacts of adding the IP event dampening feature t...
Question 26: Drag and drop the design characteristics from the left onto ...
Question 27: Refer to the exhibit. (Exhibit) Which impact of using three ...
Question 28: Your company wants to deploy a new data center infrastructur...
Question 29: Which two characteristics are associated with 802 1s? (Choos...
Question 30: A service provider recently migrated to an SD-WAN solution f...
Question 31: What is a web-based model in which a third-party provider ho...
Question 32: Which two benefits can software defined networks provide to ...
Question 33: Company XYZ is in the process of identifying which transport...
Question 34: You have been asked to design a high-density wireless networ...
Question 35: Which BGP feature provides fast convergence?...
Question 36: Which two advantages of using DWDM over traditional optical ...
Question 37: (Exhibit) Refer to the exhibit A customer network design tea...
Question 38: Refer to the exhibit. (Exhibit) After a network audit a netw...
Question 39: Company XYZ is running SNMPv1 in their network and understan...
Question 40: Company XYZ network runs IPv4 and IPv6 and they want to Intr...
Question 41: What is a disadvantage of the traditional three-tier archite...
Question 42: SDN emerged as a technology trend that attracted many indust...
Question 43: Refer to the exhibit. (Exhibit) Company XYZ must design a DM...
Question 44: A thorough examination of the curant network infrastructure ...
Question 45: Refer to the exhibit. (Exhibit) This network is running EIGR...
Question 46: Customer XYZ network consists of an MPLS core. IS-IS running...
Question 47: Which three elements help network designers to construct sec...
Question 48: What is the most important operational driver when building ...
Question 49: Which design principal improves network resiliency?...
Question 50: Refer to the table. (Exhibit) A customer investigates connec...
Question 51: What are two key design principles when using a hierarchical...
Question 52: Company ABC wants to minimize the risk of users plugging una...
Question 53: Refer to the exhibit. (Exhibit) The enterprise customer want...
Question 54: Which two foundational aspects of loT are still evolving and...
Question 55: Refer to the exhibit. (Exhibit) A customer runs OSPF with Ar...
Question 56: You are designing an Out of Band Cisco Network Admission Con...
Question 57: As part of workspace digitization, a large enterprise has mi...
Question 58: Which two factors must be considered while calculating the R...
Question 59: An enterprise solution team is performing an analysis of mul...
Question 60: A banking customer determines that it is operating POS and P...
Question 61: Refer to the exhibit. (Exhibit) Traffic was equally balanced...
Question 62: You have been tasked with designing a data center interconne...
Question 63: Company XYZ wants to deploy OSPF. The design plan requires t...
Question 64: Which option is a fate-sharing characteristic in regards to ...
Question 65: A key to maintaining a highly available network is building ...
Question 66: Which two actions minimize the impact of the trusted NMS pol...
Question 67: A business invests in SDN and develops its own SDN controlle...
Question 68: Which two features describe controller-based networking solu...
Question 69: Organic growth or decline comes from a company's normal busi...
Question 70: A business wants to centralize services via VDI technology a...
Question 71: As network designer, which option is your main concern with ...
Question 72: A healthcare provider discovers that protected health inform...
Question 73: Software-defined networking architecture is used for cost-ef...
Question 74: Which effect of using ingress filtering to prevent spoofed a...
Question 75: A customer migrates from a traditional Layer 2 data center n...
Question 76: As more links are added to the network, information and attr...
Question 77: Refer to the exhibit. (Exhibit) The WAN network of the Gener...
Question 78: Which two data plane hardening techniques are true? (Choose ...
Question 79: Which security architecture component offers streamlined sec...
Question 80: In a redundant hub and spoke "wheel" design, all spokes are ...
Question 81: Company XYZ wants to use the FCAPS ISO standard for network ...
Question 82: A multinational enterprise integrates a cloud solution with ...
Question 83: The administrator of a small branch office wants to implemen...
Question 84: Refer to the diagram. (Exhibit) Which solution must be used ...
Question 85: Which network management framework can be used to develop a ...
Question 86: An enterprise network has two core routers that connect to 2...
Question 87: Two routers R1 and R2 are directly connected through an Ethe...
Question 88: How many fully established neighbour relationships exist on ...
Question 89: Company XYZ wants to redesign the Layer 2 part of their netw...
Question 90: You are designing a large-scale DMVPN network with more than...
Question 91: A legacy enterprise is using a Service Provider MPLS network...
Question 92: Company XYZ wants to prevent switch loops caused by unidirec...
Question 93: synchronizing data between host A and host B. To increase ch...
Question 94: Company XYZ has 30 sites running a legacy private WAN archit...
Question 95: Drag and drop the FCAPS network management reference models ...
Question 96: An external edge router provides connectivity from a service...
Question 97: An enterprise service provider is designing the network for ...
Question 98: With virtualization being applied in many parts of the netwo...
Question 99: Which actions are performed at the distribution layer of the...
Question 100: Which two characteristics apply to firewall transparent mode...
Question 101: Company XYZ wants to improve the security design of their ne...
Question 102: A European government passport agency considers upgrading it...
Question 103: According to the CIA triad principles for network security d...
Question 104: One of the approaches used in cloud bursting scenarios is di...
Question 105: Company XYZ has a new network based on IPv6. Some of the sub...
Question 106: You are tasked to design a QoS policy for a service provider...
Question 107: Which protocol does an SD-Access wireless Access Point use f...
Question 108: Company XYZ has 30 sites using MPLS L3 VPN and the company i...
Question 109: Which statement about hot-potato routing architecture design...
Question 110: Company XYZ has a hub-and-spoke topology over an SP-managed ...
Question 111: Network operators have many options available, from fully ce...
Question 112: Company XYZ is designing their network using the three-layer...
Question 113: The cloud like the Internet is a massive network of independ...
Question 114: Which interface between the controller and the networking de...
Question 115: An organization is working on a design solution for a new In...
Question 116: A private cloud is accessed over the private IT network infr...
Question 117: Which two actions ensure voice quality in a branch location ...
Question 118: Your network operations team is deploying Access Control Lis...
Question 119: An architect receives a functional requirement for a NAC sys...
Question 120: Company XYZ is designing the network for IPv6 security and t...
Question 121: Company XYZ, a global content provider, owns data centers on...
Question 122: Refer to the exhibit. (Exhibit) Company XYZ BGP topology is ...
Question 123: A network architect in an enterprise is designing a network ...
Question 124: (Exhibit) Refer to the exhibit A service provider has a requ...
Question 125: Company XYZ has designed their network to run GRE over IPsec...
Question 126: An MPLS service provider is offering a standard EoMPLS-based...
Question 127: As a network designer you need to support an enterprise with...
Question 128: Company XYZ plans to run OSPF on a DMVPN network. They want ...
Question 129: A business requirement stating that failure of WAN access fo...
Question 130: A network hacker is trying to interrupt the transport packet...
Question 131: You want to add 900 VLANs to the existing 90 VLANs on a data...
Question 132: A senior network designer suggests that you should improve n...
Question 133: Which two points must network designers consider when design...
Question 134: You want to mitigate failures that are caused by STP loops t...
Question 135: Refer to the exhibit. (Exhibit) This network is running lega...
Question 136: A company plans to use BFD between its routers to detect a c...
Question 137: Router R1 is a BGP speaker with one peering neighbor over li...
Question 138: Which two design option are available to dynamically discove...
Question 139: Refer to the exhibit. (Exhibit) This network is running OSPF...
Question 140: Company XYZ is running OSPF in their network. They have merg...
Question 141: SDWAN networks capitalize the usage of broadband Internet li...
Question 142: A Tier-3 Service Provider is evolving into a Tier-2 Service ...
Question 143: Which design consideration is valid when you contrast fabric...
Question 144: End users are moving swiftly toward a hybrid cloud model to ...
Question 145: In the wake of a security compromise incident where the inte...
Question 146: How can EIGRP topologies be designed to converge as fast as ...
Question 147: An engineer must design a network for a company that uses OS...
Question 148: You are using iSCSI to transfer files between a 10 Gigabit E...
Question 149: While designing a switched topology, in which two options is...
Question 150: In search of a system capable of hosting, monitoring compili...
Question 151: What are two primary design constraints when a robust infras...
Question 152: What is a characteristic of a secure cloud architecture mode...
Question 153: Company XYZ has implemented policy-based routing in their ne...
Question 154: Which design solution reduces the amount of IGMP state in th...
Question 155: Refer to the exhibit. (Exhibit) OSPF is running as the IGP t...
Question 156: What are two descriptions of network optimization? (Choose t...
Question 157: Which optimal use of interface dampening on a fast convergen...
Question 158: Drag and drop the design use cases from the left onto the co...
Question 159: Company XYZ has two routing domains in their network, EIGRP ...
Question 160: When planning their cloud migration journey what is crucial ...
Question 161: Network changes because of mergers, acquisitions, and divest...
Question 162: An enterprise campus is adopting a network virtualization de...
Question 163: An enterprise organization currently provides WAN connectivi...
Question 164: Which main IoT migration aspect should be reviewed for a man...
Question 165: Refer to the table. (Exhibit) A customer investigates connec...
Question 166: A customer migrates from a traditional Layer 2 data center n...
Question 167: Which action must be taken before new VoIP systems are imple...
Question 168: Company XYZ is revisiting the security design for their data...
Question 169: Which development model is closely associated with tradition...
Question 170: A business wants to refresh its legacy Frame Relay WAN. It c...
Question 171: A customer migrates from a traditional Layer 2 data center n...
Question 172: An enterprise that runs numerous proprietary applications ha...
Question 173: Which three Cisco products are used in conjunction with Red ...
Question 174: Which two application requirements are mandatory tor traffic...