Which option would eliminate the risk of high CPU utilization across the network?
You are designing a solution to eliminate the risk of high CPU utilization on a core network
composed of CRS-1 devices. Which option would eliminate the risk of high CPU utilization across
the network?
which three mechanisms can be used to improve Layer 2 down detection and thereby reduce routing convergence ti
In a network design using carrier Ethernet, which three mechanisms can be used to improve Layer
2 down detection and thereby reduce routing convergence time? (Choose three.)
Which mode of Unicast RPF would you recommend as the lead network designer?
The network administrator of a branch office network has decided to deploy Unicast RPF at the
access layer. He insists that the design must guarantee that all the packets arriving on the router
interfaces are assigned to the same interface subnet.
Which mode of Unicast RPF would you recommend as the lead network designer?
Which three factors should you to consider when you adjust the timer values?
A senior network designer suggests that you should improve network convergence times by
reducing BGP timers between your CE router and the PE router of the service provider. Which
three factors should you to consider when you adjust the timer values? (Choose three.)
which security option must be configured on the switches?
Your design client has requested that you ensure that the client devices are not dynamically
configured with incorrect DNS information. When finalizing the network design, which security
option must be configured on the switches?
What are two functions of an NSSA in an OSPF network design?
What are two functions of an NSSA in an OSPF network design? (Choose two.)
which information will be added to the DHCP request?
As part of the security protocol for your network design, you have designated that option 82 is
enabled for DHCP snooping. When option 82 is enabled, which information will be added to the
DHCP request?
Which limitation is valid when using route reflectors in this design?
An IBGP mesh design is being scoped, and in the discussions, one of the design engineers
proposes the use of route reflectors. Which limitation is valid when using route reflectors in this
design?
Which two methods could be utilized?
Your firm has been awarded a contract to design a Criminal Justice Information Services Version
5.0-compliant network utilizing advanced authentication policies. Which two methods could be
utilized? (Choose two.)
What will happen to your EIGRP neighbors if there is an LCP failure once your network is implemented?
You have designed a network to support two offices connected by a T1. Your router serial
interfaces will be configured with encapsulation PPP. What will happen to your EIGRP neighbors
if there is an LCP failure once your network is implemented?