Which two of these key fields are used to identify a flow in a traditional NetFlow implementation? (Choose two
Which two of these key fields are used to identify a flow in a traditional NetFlow implementation? (Choose two.)
Which two areas of security would you advise the company to strengthen? (Choose two
The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures. Which two areas of security would you advise the company to strengthen? (Choose two.)
Which VPN topology should you recommend?
You are the network consultant from Cisco.com.Your customer has eight sites and will add in the future.
Branch site to branch site traffic is approaching 30 percent. The customer’s goals are to make it easier to add branch sites in the future and to reduce traffic through the hub. Which VPN topology should you recommend?
What is the recommended number of network management server(s)?
ABC Company has 1500 managed devices and 15,000 end users on a campus network. LAN Management Solution (LMS) is being deployed as the network management application. What is the recommended number of network management server(s)?
Which is the most appropriate design topology?
One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?
Which three LAN routing protocols would be appropriate for a small retail organization with a multi- vendor LA
Which three LAN routing protocols would be appropriate for a small retail organization with a multi- vendor LAN infrastructure? (Choose three.)
Which two of these are characteristics of an IPS device? (Choose two
Which two of these are characteristics of an IPS device? (Choose two.)
Which three are used in configuring Call Manager dial plans? (Choose three
Which three are used in configuring Call Manager dial plans? (Choose three.)
Which remote access VPN addressing technique supports a static IP address to support a specific application?
Which remote access VPN addressing technique supports a static IP address to support a specific application?
What are two considerations to using IP Multicast delivery? (Choose two
What are two considerations to using IP Multicast delivery? (Choose two.)