Jump to content

[Offer]- CCDE dump that needs fixes


keje

Recommended Posts

1 hour ago, moosedaari said:

Can anyone advise how to send msg to this member.
I tried it, but it says my account is not allowed.
It is very hard to reach who offer the materials.

if anyone one want dump and study try to join skype study group..its "genjk39"

Link to comment
Share on other sites

Company XYZ is revisiting the security design for their data center because they now have a requirement to control traffic within a subnet and implement deep packet inspection. Which technology meets the updated requirements and can be incorporated into the design? 
A. routed firewall

B. VLAN ACLs on the switch

C. zone-based firewall on the Layer 3 device

D. transparent firewall 
 

Link to comment
Share on other sites


Which two characteristics apply to firewall transparent mode operations in a firewall solution design? (Choose two.) 

A. Changes in the existing IP addressing and subnets are required
 
B. The firewall can participate actively on spanning tree.
 
C. Multicast traffic can traverse the firewall.
 
D. OSPF adjacencies can be established through the firewall
 
E. The firewall acts like a router hop in the network.

Link to comment
Share on other sites

15 hours ago, AncientOne said:


Which two characteristics apply to firewall transparent mode operations in a firewall solution design? (Choose two.) 

A. Changes in the existing IP addressing and subnets are required
 
B. The firewall can participate actively on spanning tree.
 
C. Multicast traffic can traverse the firewall.
 
D. OSPF adjacencies can be established through the firewall
 
E. The firewall acts like a router hop in the network.

C and D

Link to comment
Share on other sites

On 2/6/2023 at 12:31 AM, discojammy said:

Company XYZ is revisiting the security design for their data center because they now have a requirement to control traffic within a subnet and implement deep packet inspection. Which technology meets the updated requirements and can be incorporated into the design? 
A. routed firewall

B. VLAN ACLs on the switch

C. zone-based firewall on the Layer 3 device

D. transparent firewall 
 

B. VACL

VLAN Access-List (VACL)

VLAN access-lists (VACL) are very useful if you want to filter traffic within the VLAN.

Edited by peqwilber
Link to comment
Share on other sites

On 2/2/2023 at 6:53 PM, Thunderbird said:

Very Tricky question.... 🙂

It depends on many factors, if this question is from Security point of view than my answer:

 

First Answer (Preferred)

A & E ( because we want to enforce security policy and routing segmentation based on policy based routing like we do in ACI)

Source:

This is the hidden content, please

 

Second Answer:

If they are asking from Routing point of view then answer will be :

C & E (if you are controlling route leaking based on ACLs, route-map etc.)

I would welcome comments from other members.


IMO, it should be Firewall and data plane markings. 

Explanation: With the Zero Trust approach, Inter-VN segmentation is done by Firewalls and Intra-VN is done by SGT's. I.e. markings rather than using IP addresses. 

This is the hidden content, please

Edited by madmaran
  • Like 27
  • Thanks 5
Link to comment
Share on other sites

On 3/17/2022 at 11:08 AM, cciede11sure said:

A will win from E because OSPF design guide - 

This is the hidden content, please

B and D can be easily ruled out because we cannot triangulated or squared 20 router with ethernet cable...

Now we need to delibrate between C and E . Discussed on Cisco learning site 

This is the hidden content, please
 

Looks like C Ring is right Ans.

just passed the exam with really low score byy following 247dump

  • Like 29
  • Thanks 4
  • Haha 1
Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...