What is the result?
What is the result?
What is the result?
Which two VPN technologies leverage replication in the …
You are deploying a nationwide intranet solution for a company with 4 data centers and 400
remote branches connected via a provider-based solution. As part of the network design, you
must ensure efficient content distribution of training material to remote sites. Which two VPN
technologies leverage replication in the network core and provide for efficient bandwidth
optimization? (Choose two.)
Which two actions, when combined, can achieve high avai…
A multicast network is using bidirectional PIM. Which two actions, when combined, can
achieve high availability so that two RPs within the same network can act in a redundant
manner? (Choose two.)
Which two options about the use of Constrained Route Di…
You are performing a BGP design review for a service provider that offers MPLS-based services
to their end customers. The network is comprised of several PE routers that run iBGP with a
pair of route reflectors for all BGP address families. Which two options about the use of
Constrained Route Distribution for BGP/MPLS VPNs are true? (Choose two.)
Which two design solutions provide this service?
Currently a service provider provides IPv4 traceroute services between MPLS PE routers. The
provider wants to implement IPv6 with MPLS 6PE/6VPE and then provide parallel IPv6
traceroute services between MPLS PE routers. Which two design solutions provide this service?
(Choose two.)
Which two factors can significantly affect the OSPF net…
Which two factors can significantly affect the OSPF network convergence time? (Choose two.)
Which three areas should the service provider monitor r…
A large service provider offers VoIP and Video services to business customers. Which three
areas should the service provider monitor related to these services? (Choose three.)
Which two link types will still form an OSPF adjacency …
Youare redesigning an OSPF v2 network and must migrate some links. Youare concerned that
there are different subnet masks. Which two link types will still form an OSPF adjacency even if
there are subnet mask mismatches? (Choose two.)