Which one of these addresses would the ACL need for tra…
Yournetwork operations team is deploying Access Control Lists (ACLs) across your Internet
gateways. They wish to place an ACL inbound on the Internet gateway interface facing the core
network (the “trusted” interface). Which one of these addresses would the ACL need for traffic
sourced from the inside interface, to match the source address of the traffic?
which two ways can this routing be achieved?
A data center provider has designed a network using these requirements:
Two data center sites are connected to the public Internet.
Both data centers are connected to different Internet providers.
Both data centers are also directly connected with a private
connection for the internal traffic, and public Internet traffic can also be
routed at this direct connection.
The data center provider has only one /19 public IP address block.
Under normal conditions, Internet traffic should be routed directly to the data center where the
services are located. When one Internet connection fails, the complete traffic for both data
centers should be routed by using the remaining Internet connection. In which two ways can
this routing be achieved? (Choose two.)
how would you reduce LSA repetition?
When designing a large full mesh network running OSPF, how would you reduce LSA repetition?
Which of these conditions should be avoided in the desi…
A planned EBGP network will use OSPF to reach the EBGP peer addresses. Which of these
conditions should be avoided in the design that could otherwise cause the peers to flap
continuously?
How is this accomplished without creating routing loops?
Yourdesign plan includes mutual redistribution of two OSPF networks at multiple locations,
with connectivity to all locations in both networks. How is this accomplished without creating
routing loops?
How do you plan to prevent infected devices on your net…
You are a network designer and are responsible for ensuring that the network you design is
secure. How do you plan to prevent infected devices on your network from sourcing random
DDoS attacks using forged source addresses?
what is likely to happen when you enable IPv6 routing o…
what is the next hop for 10.1.1.0/24 on R8 and R7?
which two ways will this network be impacted if there i…
Which two main factors will you address to improve netw…
Youare designing a network to support data, voice and video. Which two main factors will you
address to improve network convergence? (Choose two.)