A) route summarization
B) stub area
C) route filtering
D) not-so-stubby area
Correct Answer
verified
Multiple Choice
A) The configuration complexity on the routers will be increased.
B) Route reflectors will limit the total number of routes in the topology.
C) Multipath information is difficult to propagate in a route reflector topology.
D) Route reflectors will cause an opportunity to create routing loops.
Correct Answer
verified
Multiple Choice
A) There is no impact to increasing the number of ABRs.
B) The SPF calculations are more complex.
C) The number of externals and network summaries are increased.
D) The size of the FIB is increased.
Correct Answer
verified
Multiple Choice
A) Router A does per-flow load-balance across the two interfaces.
B) Router A relies on RIB toselect the desired interface.
C) Router A relies on FIBto select the desired interface.
D) Router A does per-packet load-balance across the two interfaces.
Correct Answer
verified
Multiple Choice
A) VLAN scalability
B) PE scalability
C) The underlying transport mechanism
D) Flooding is necessary to propagate MAC address reachability information
Correct Answer
verified
Multiple Choice
A) protects against DoS attacks targeted at the network infrastructure
B) increases the reliability, security, and availability of the network
C) protects data flowing through devices
D) separates attack traffic from normal network traffic
Correct Answer
verified
Multiple Choice
A) tuning the metric of the underlying IGP
B) tuning the multi-exit discriminator
C) setting the Site of Origin extended community
D) prepending AS path
Correct Answer
verified
Multiple Choice
A) the ability of a fault management tool to generate alerts for only an upstream device failure and to suppress the alarms related to all unreachable downstream sites
B) the ability of a router to suppress downstream route fluctuations to avoid introducing instability into the network core
C) the ability of a network management station to perform root cause analysis on a network fault and remove duplicates of all other alarms resulting from fault symptoms
D) the ability of an element manager to restrict forwarding to critical performance alarms northbound to the Manager of Managers and suppress other alarms
Correct Answer
verified
Multiple Choice
A) Summary routes are inserted in the routing table with a next hop of null 0 and a high administrative distance, to prevent black holing of traffic.
B) By default, EIGRP automatically summarizes internal routes, but only each time a major network boundary is crossed.
C) EIGRP route summarization can reduce the query diameter to help prevent SIA problems.
D) The metric for each summarized route is inherited from the lowest metric of the component routes.
Correct Answer
verified
Multiple Choice
A) Turn on route dampening.
B) Create network summaries.
C) Turn on the Incremental SPF feature.
D) Add more memory.
E) Turn on packet pacing.
F) Add redundancy between critical locations.
Correct Answer
verified
Multiple Choice
A) Design the network to include loop guard to prevent a loop in the switched network when a link has too much interference
B) Design the network to include backbone fast on all devices to accelerate failure convergence times
C) Design the network to include UDLD to detect unidirectional links and take them out of service
D) Design the network to include EtherChannel bundles to prevent a single-link failure from taking down a switch interconnection point
Correct Answer
verified
Multiple Choice
A) Summarization adds CPU overhead on the routers sourcing the summarized advertisement.
B) Summarization prevents the visibility of the metric to the component subnets.
C) Summarization creates routing loops.
D) Summarization causes packet loss when RPF is enabled.
Correct Answer
verified
Multiple Choice
A) UDLD
B) loop guard
C) BPDU guard?
D) root guard
Correct Answer
verified
Multiple Choice
A) BPDU Guard
B) PortFast
C) Loop Guard
D) Port Security
E) UDLD
Correct Answer
verified
Multiple Choice
A) IVR
B) FSPF
C) FICON
D) SANTap
Correct Answer
verified
Multiple Choice
A) Ensure that all network devices have their clocks synchronized
B) Look at inconsistent and bursty KPIs such as CPU utilization and interface utilization
C) Collect RMON poll information for future regression analysis
D) Validate data plane health, application, and services availability with synthetic traffic
E) Capture ingress and egress flow-based packets, while avoiding duplication of flows
F) Collect SNMP poll information for future regression analysis
Correct Answer
verified
Multiple Choice
A) static, and cannot be removed once they are first requested by a delay-sensitive, real-time application
B) static, and must always be installed after power-up
C) dynamic, and depend on the amount of delay-sensitive, real-time data passing through
D) dynamic, allocated when requested, and removed at the end of each session for which they were requested
Correct Answer
verified
Multiple Choice
A) MST
B) CST
C) PVST+
D) RSTP
Correct Answer
verified
Multiple Choice
A) dynamic reconfiguration
B) path MTU discovery
C) auto setup
D) remote management
Correct Answer
verified
Multiple Choice
A) BFD
B) Ethernet port debounce timers
C) link-state tracking
D) object tracking
E) fast IGP hello
Correct Answer
verified
Showing 561 - 580 of 660
Related Exams