<< Prev Question Next Question >>

Question 5/189

A business customer deploys workloads in the public cloud. Now the customer network faces governance issues with the flow of IT traffic and must ensure the security of data and intellectual property. Which action helps to identify the issue for further resolution?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (189q)
Question 1: The line between security and compliance is easily blurred a...
Question 2: A healthcare customer requested that SNMP traps must be sent...
Question 3: In an OSPF network with routers connected together with Ethe...
Question 4: Retef to the exhibit. (Exhibit) An engineer is designing a m...
Question 5: A business customer deploys workloads in the public cloud. N...
Question 6: Company ABC uses IPv4-only. Recently they started deploying ...
Question 7: Company XYZ is running SNMPv1 in their network and understan...
Question 8: What are two examples of components that are part of an SDN ...
Question 9: Company XYZ has implemented policy-based routing in their ne...
Question 10: Which two features control multicast traffic in a VLAN envir...
Question 11: Which two descriptions of CWDM are true? (Choose two)...
Question 12: Which methodology is the leading lifecycle approach to netwo...
Question 13: Company XYZ wants to implement an IPS device to detect and b...
Question 14: Two enterprise networks must be connected together. Both net...
Question 15: As part of workspace digitization, a large enterprise has mi...
Question 16: Which project management methodology is characterized by a h...
Question 17: Company XYZ needs advice in redesigning their legacy Layer 2...
Question 18: Which two foundational aspects of loT are still evolving and...
Question 19: Cost is often one of the motivators for a business to migrat...
Question 20: Which two characteristics apply to firewall transparent mode...
Question 21: The cloud like the Internet is a massive network of independ...
Question 22: A Service Provider is designing a solution for a managed CE ...
Question 23: You are using iSCSI to transfer files between a 10 Gigabit E...
Question 24: Drag and drop the FCAPS network management reference models ...
Question 25: Which statement about OSPF hub-and-spoke topology is true?...
Question 26: A company uses equipment from multiple vendors in a data cen...
Question 27: What advantage of placing the IS-IS layer 2 flooding domain ...
Question 28: Company XYZ wants to use the FCAPS ISO standard for network ...
Question 29: What is an architectural framework created by ETSI that defi...
Question 30: A software-defined network can be defined as a network with ...
Question 31: When consumers that leverage laaS reach 100% resource capaci...
Question 32: Two routers R1 and R2 are directly connected through an Ethe...
Question 33: Which two mechanisms avoid suboptimal routing in a network w...
Question 34: You are designing a network for a branch office. In order to...
Question 35: Which two benefits can software defined networks provide to ...
Question 36: You want to mitigate failures that are caused by STP loops t...
Question 37: You are designing a network running both IPv4 and IPv6 to de...
Question 38: A customer migrates from a traditional Layer 2 data center n...
Question 39: Identity and access management between multiple users and mu...
Question 40: Company XYZ has a new network based on IPv6. Some of the sub...
Question 41: An engineer must design a network for a company that uses OS...
Question 42: As a service provider is implementing Strong Access Control ...
Question 43: The General Bank of Greece plans to upgrade its legacy end-o...
Question 44: What best describes the difference between Automation and Or...
Question 45: IPFIX data collection via standalone IPFIX probes is an alte...
Question 46: A network architect in an enterprise is designing a network ...
Question 47: With virtualization being applied in many parts of the netwo...
Question 48: Company XYZ is planning to deploy primary and secondary (dis...
Question 49: You want to split an Ethernet domain in two. Which parameter...
Question 50: Which design solution reduces the amount of IGMP state in th...
Question 51: Company XYZ is running OSPF in their network. They have merg...
Question 52: Which network management framework can be used to develop a ...
Question 53: Refer to the exhibit. (Exhibit) Company XYZ BGP topology is ...
Question 54: As more links are added to the network, information and attr...
Question 55: Refer to the exhibit. (Exhibit) Which impact of using three ...
Question 56: Refer to the exhibit. (Exhibit) This network is running OSPF...
Question 57: A service provider recently migrated to an SD-WAN solution f...
Question 58: Refer to the exhibit. (Exhibit) Refer to the exhibit. An arc...
Question 59: Refer to the exhibit. (Exhibit) The enterprise customer want...
Question 60: End users are moving swiftly toward a hybrid cloud model to ...
Question 61: A banking customer determines that it is operating POS and P...
Question 62: A large enterprise customer is planning a new WAN connection...
Question 63: Company XYZ wants to redesign the Layer 2 part of their netw...
Question 64: Which design consideration is valid when you contrast fabric...
Question 65: Refer to the exhibit. (Exhibit) The network 10.10.0 .0/16 ha...
Question 66: Creating a network that functions as a strategic part of the...
Question 67: An international media provider is an early adopter of Docke...
Question 68: Company XYZ is redesigning their QoS policy. Some of the app...
Question 69: You were tasked to enhance the security of a network with th...
Question 70: Which MPLS TE design consideration is true?...
Question 71: Organic growth or decline comes from a company's normal busi...
Question 72: SD-WAN can be used to provide secure connectivity to remote ...
Question 73: The major business applications of an enterprise are largely...
Question 74: Drag and drop the end-to-end network virtualization elements...
Question 75: Company XYZ wants design recommendations for Layer 2 redunda...
Question 76: As network designer, which option is your main concern with ...
Question 77: Which statement about hot-potato routing architecture design...
Question 78: The administrator of a small branch office wants to implemen...
Question 79: A European national bank considers migrating its on-premises...
Question 80: Company XYZ has 30 sites using MPLS L3 VPN and the company i...
Question 81: Drag and drop the correct mitigation methods from the left o...
Question 82: The Layer 3 control plane is the intelligence over the netwo...
Question 83: Which feature must be part of the network design to wait a p...
Question 84: Which three Cisco products are used in conjunction with Red ...
Question 85: An enterprise service provider is designing the network for ...
Question 86: Which feature is supported by NETCONF but is not supported b...
Question 87: Which mechanism provides Layer 2 fault isolation between dat...
Question 88: In search of a system capable of hosting, monitoring compili...
Question 89: Refer to the exhibit. (Exhibit) Refer to the exhibit Company...
Question 90: An enterprise network has two core routers that connect to 2...
Question 91: You are tasked with the design of a high available network. ...
Question 92: A small organization of 20 employees is looking to deliver a...
Question 93: The SD-WAN architecture is composed of separate orchestratio...
Question 94: Company XYZ Is running a redundant private WAN network using...
Question 95: Company XYZ has a hub-and-spoke topology over an SP-managed ...
Question 96: Which Interconnectivity method offers the fastest convergenc...
Question 97: As part of a new network design documentation, you are requi...
Question 98: You are leading design discussions about IPv6 implementation...
Question 99: Refer to the exhibit. (Exhibit) A customer runs OSPF with Ar...
Question 100: One of the approaches used in cloud bursting scenarios is di...
Question 101: When planning their cloud migration journey what is crucial ...
Question 102: Which management category is not part of FCAPS framework?...
Question 103: Which SDN architecture component is used by the application ...
Question 104: Refer to the exhibit. (Exhibit) For Company XYZ Bangkok is u...
Question 105: Company XYZ connects its sites over a private WAN. Their ove...
Question 106: A business wants to centralize services via VDI technology a...
Question 107: Which function is performed at the access layer of the three...
Question 108: The controller has a global view of the network, and it can ...
Question 109: Which two technologies enable multilayer segmentation? (Choo...
Question 110: An enterprise plans to evolve from a traditional WAN network...
Question 111: The Company XYZ network requires OSPF dead neighbor detectio...
Question 112: Customer XYZ network consists of an MPLS core. IS-IS running...
Question 113: A legacy enterprise is using a Service Provider MPLS network...
Question 114: Which of the following is a potential challenge in a network...
Question 115: A network security team observes phishing attacks on a user ...
Question 116: Company XYZ is connecting its sites over a private WAN The c...
Question 117: Sometimes SDN leverages various overlay networking technolog...
Question 118: Refer to the exhibit. (Exhibit) The WAN network of the Gener...
Question 119: Which actions are performed at the distribution layer of the...
Question 120: A company plans to use BFD between its routers to detect a c...
Question 121: SDWAN networks capitalize the usage of broadband Internet li...
Question 122: Refer to the diagram. (Exhibit) Which solution must be used ...
Question 123: Company XYZ is in the process of identifying which transport...
Question 124: A customer migrates from a traditional Layer 2 data center n...
Question 125: Which effect of using ingress filtering to prevent spoofed a...
Question 126: Which two data plane hardening techniques are true? (Choose ...
Question 127: You are a network designer and you must ensure that the netw...
Question 128: QUESTION 69 Refer to the exhibit. AJI links are P2P Layer 3....
Question 129: In the case of outsourced IT services, the RTO is defined wi...
Question 130: An MPLS service provider is offering a standard EoMPLS-based...
Question 131: Which design benefit of PortF ast is true?...
Question 132: An architect receives a functional requirement for a NAC sys...
Question 133: Refer to the exhibit. (Exhibit) After a network audit a netw...
Question 134: Which technology supports antispoofing and does not have any...
Question 135: A senior network designer suggests that you should improve n...
Question 136: What are two examples of business goals to be considered whe...
Question 137: An enterprise requires MPLS connected branches to access clo...
Question 138: Company XYZ network runs IPv4 and IPv6 and they want to Intr...
Question 139: Company XYZ has two routing domains in their network, EIGRP ...
Question 140: What are two advantages of controller-based networks versus ...
Question 141: A network uses an SDN architecture with switches and a centr...
Question 142: Which parameter is the most important factor to consider whe...
Question 143: Refer to the exhibit. (Exhibit) This network is running lega...
Question 144: Which two characteristics are associated with 802 1s? (Choos...
Question 145: The Agile release train workflow focuses on tasks which can ...
Question 146: Which two statements describe the hierarchical LAN design mo...
Question 147: Company XYZ runs OSPF in their network. A design engineer de...
Question 148: Which two statements about MLD snooping are true? (Choose tw...
Question 149: While designing a switched topology, in which two options is...
Question 150: Which optimal use of interface dampening on a fast convergen...
Question 151: Which relationship between IBGP and the underlying physical ...
Question 152: Which three tools are used for ongoing monitoring and mainte...
Question 153: What is a disadvantage of the traditional three-tier archite...
Question 154: A multicast network is sing Bidirectional PIM. Which two com...
Question 155: The network designer needs to use GLOP IP address in order m...
Question 156: A healthcare provider discovers that protected health inform...
Question 157: Which security architecture component offers streamlined sec...
Question 158: The network designer needs to use GLOP IP addresses in order...
Question 159: The Agile Manifesto is a document that defines the key value...
Question 160: You have been tasked with designing a data center interconne...
Question 161: Network changes because of mergers, acquisitions, and divest...
Question 162: An enterprise campus is adopting a network virtualization de...
Question 163: Two routers R1 and R2 are directly connected through an Ethe...
Question 164: Company XYZ branch offices connect to the headquarter sites ...
Question 165: You have been asked to design a remote access VPN solution t...
Question 166: Refer to the exhibit. (Exhibit) An engineer is designing the...
Question 167: SDN is still maturing Throughout the evolution of SDN which ...
Question 168: Company XYZ is designing the network for IPv6 security and t...
Question 169: You have been asked to design a high-density wireless networ...
Question 170: Which two design option are available to dynamically discove...
Question 171: A product manufacturing organization is integrating cloud se...
Question 172: Refer to the exhibit. (Exhibit) Refer to the exhibit A custo...
Question 173: Which two statements describe the usage of the IS-IS overloa...
Question 174: A European government passport agency considers upgrading it...
Question 175: Refer to the exhibit. (Exhibit) Company XYZ is currently run...
Question 176: An organization is working on a design solution for a new In...
Question 177: Refer to the exhibit. (Exhibit) Refer to the exhibit A servi...
Question 178: Company XYZ wants to deploy OSPF. The design plan requires t...
Question 179: Which two benefits can software-defined networks provide to ...
Question 180: An engineer is designing the QoS strategy for Company XYZ. B...
Question 181: The network team in XYZ Corp wants to modernize their infras...
Question 182: A service provider hires you to design its new managed CE of...
Question 183: Which two areas of business presents a technical solution to...
Question 184: Drag and drop the multicast protocols from the left onto the...
Question 185: When a detection system for protecting a network from threat...
Question 186: Refer to the table. (Exhibit) A customer investigates connec...
Question 187: An engineer is designing a DMVPN network where OSPF has been...
Question 188: A thorough examination of the curant network infrastructure ...
Question 189: What are two top cloud-native security challenges faced by t...