Popular Post raptoriks Posted March 16, 2022 Popular Post Share Posted March 16, 2022 9 minutes ago, cciede11sure said: Here is link for This is the hidden content, please Sign In or Sign Up CZTA focus on workplace, workload and workforce. Thanks you're the man 🙂 Thanks a lot Was looking for this one 131 15 2 1 2 Link to comment Share on other sites More sharing options...
raptoriks Posted March 16, 2022 Share Posted March 16, 2022 (edited) I think this is correct IGMP is for IPV4 and MLD is for IPv6 Edited March 16, 2022 by raptoriks 1 Link to comment Share on other sites More sharing options...
raptoriks Posted March 16, 2022 Share Posted March 16, 2022 This is what I think is correct At least I didn't find anything much about other tecnologies than Cloud onRamp SaaS 3 Link to comment Share on other sites More sharing options...
raptoriks Posted March 16, 2022 Share Posted March 16, 2022 I am not sure about this one More seems A and C, even SD-WAN is control and forwarding planes are separate 2 Link to comment Share on other sites More sharing options...
synhack Posted March 16, 2022 Share Posted March 16, 2022 could someone please kindly share the file in pdf format? Thanks 1 Link to comment Share on other sites More sharing options...
raptoriks Posted March 16, 2022 Share Posted March 16, 2022 50 minutes ago, synhack said: could someone please kindly share the file in pdf format? Thanks At the beggining of the thread you have the vce and lower you have the vce reader and designer You can download and use them 3 1 1 Link to comment Share on other sites More sharing options...
Popular Post keje Posted March 16, 2022 Author Popular Post Share Posted March 16, 2022 (edited) I think this is the correct answer now. before it was A and E This is the hidden content, please Sign In or Sign Up IPv6 source guard is an interface feature between the populated binding table and data traffic filtering. This feature enables the device to deny traffic when it is originated from an address that is not stored in the binding table. The IPv6 Prefix Guard feature works within the IPv6 Source Guard feature, enabling the device to deny traffic originated from nontopologically correct addresses. Edited March 18, 2022 by keje info update 89 20 1 Link to comment Share on other sites More sharing options...
Popular Post cciede11sure Posted March 17, 2022 Popular Post Share Posted March 17, 2022 (edited) 17 hours ago, raptoriks said: This is what I think is correct At least I didn't find anything much about other tecnologies than Cloud onRamp SaaS Ans is A Very well explain on this link This is the hidden content, please Sign In or Sign Up Refer Use case 2 Edited March 17, 2022 by cciede11sure 97 21 1 Link to comment Share on other sites More sharing options...
Popular Post cciede11sure Posted March 17, 2022 Popular Post Share Posted March 17, 2022 13 hours ago, keje said: I think this is the correct answer now. before it was A and E This is the hidden content, please Sign In or Sign Up Agree A and E. here is link for E - This is the hidden content, please Sign In or Sign Up 71 12 1 Link to comment Share on other sites More sharing options...
cciede11sure Posted March 17, 2022 Share Posted March 17, 2022 11 minutes ago, cciede11sure said: Agree A and E. here is link for E - This is the hidden content, please Sign In or Sign Up 14 hours ago, keje said: I think this is the correct answer now. before it was A and E This is the hidden content, please Sign In or Sign Up Correct Ans is A and E.. Refer below bold remarks meet both the condition mention in question...and definition is from above cisco link IPv6 Prefix Guard Overview The IPv6 Prefix Guard feature works within the IPv6 Source Guard feature, enabling the device to deny traffic originated from nontopologically correct addresses. IPv6 prefix guard is often used when IPv6 prefixes are delegated to devices (for example, home gateways) using DHCP prefix delegation. The feature discovers ranges of addresses assigned to the link and blocks any traffic sourced with an address outside this range. IPv6 Destination Guard Overview The IPv6 Destination Guard feature works with IPv6 neighbor discovery to ensure that the device performs address resolution only for those addresses that are known to be active on the link. It relies on the address glean functionality to populate all destinations active on the link into the binding table and then blocks resolutions before they happen when the destination is not found in the binding table. 26 7 2 Link to comment Share on other sites More sharing options...
cciede11sure Posted March 17, 2022 Share Posted March 17, 2022 (edited) Company XYZ, a global content provider, owns data centers on different continents. Their data center design involves a standard three-layer design with a Layer 3-only core. HSRP is used as the FHRP. They require VLAN extension across access switches in all data centers, and they plan to purchase a Layer 2 interconnection between two of their data centers in Europe. In the absence of other business or technical constraints, which termination point is optimal for the layer 2 interconnection? A. at the access layer because the STP root bridge does not need to align with the HSRP active node B. at the core layer, to offer the possibility to isolate STP domains C. at the core layer because all external connections must terminate there for security reasons D. at the aggregation layer because it is the Layer 2 to Layer 3 demarcation point Please comment on this one.. I will go with B because Core is only Layer 3 device which host the SVI for all the vlans, it means connecting the L2 link on Core switches will ensure gateway reachability from other DC. Edited March 17, 2022 by cciede11sure 1 1 Link to comment Share on other sites More sharing options...
cciede11sure Posted March 17, 2022 Share Posted March 17, 2022 (edited) Which purpose of a dynamically created tunnel interface on the design of IPv6 multicast services is true? A. first-hop router registration to the RP B. multicast client registration to the RP C. multicast source registration to the RP D. Transport of all IPv6 multicast traffic. Any suggestion on this one ? Edited March 17, 2022 by cciede11sure 2 Link to comment Share on other sites More sharing options...
cciede11sure Posted March 17, 2022 Share Posted March 17, 2022 (edited) Which two application requirements are mandatory for traffic to receive proper treatment when placed in the priority queue? (Choose two.) A. intolerance to jitter B. TCP-based application C. FC WRED drop treatment D. small transactions (HTTP-like behavior) E. tolerance to packet loss Agree with A...but couldn't find second option. E could be second option because LLQ also allows queue depths to be specified to determine when the router should drop packets if too many packets are waiting in any particular class queue. Edited March 17, 2022 by cciede11sure 2 1 Link to comment Share on other sites More sharing options...
Popular Post cciede11sure Posted March 17, 2022 Popular Post Share Posted March 17, 2022 (edited) In an OSPF network with routers connected together with Ethernet cabling, which topology typically takes the longest to converge? A. partial mesh B. triangulated C. ring D. squared E. full mesh A will win from E because OSPF design guide - This is the hidden content, please Sign In or Sign Up B and D can be easily ruled out because we cannot triangulated or squared 20 router with ethernet cable... Now we need to delibrate between C and E . Discussed on Cisco learning site This is the hidden content, please Sign In or Sign Up Looks like C Ring is right Ans. Edited March 17, 2022 by cciede11sure 55 7 1 1 Link to comment Share on other sites More sharing options...
cciede11sure Posted March 17, 2022 Share Posted March 17, 2022 As part of workspace digitization, a large enterprise has migrated all their users to Desktop as a Service (DaaS) by hosting the backend system in their on-premises data center. Some of the branches have started to experience disconnections to the DaaS at periodic intervals, however, local users in the data center and head office do not experience this behavior. Which technology can be used to mitigate this issue? A. WRED B. tall drop C. traffic policing D. Traffic shaping Any suggestion... 2 Link to comment Share on other sites More sharing options...
cciede11sure Posted March 17, 2022 Share Posted March 17, 2022 23 hours ago, keje said: Thanks for the update changed answer in vce, as we work through them all i will share the final version again, go team! 7 is correct Ans because In broadcast network...Router can either be DR or BDR or NON-DR/NON-BDR, NON-DR/NON-BDR router can become neighbor with another NON-DR/NON-BDR router but their state stop at 2-way not full. All NON-DR/NON-BDR router will have full neighborship with DR/BDR. So we have 3 NON-DR/NON-BDR Router in question which will have full neighborship with DR and BDR so 6 Full Neighborship and one more full neighborship between DR and BDR so total is 7 3 Link to comment Share on other sites More sharing options...
cciede11sure Posted March 17, 2022 Share Posted March 17, 2022 On 3/16/2022 at 9:14 AM, bluechief said: Question: How many fully established neighbor relationships exist on an Ethernet with five routers running OSPF as network type broadcast? Answer as provided is 10. It is wrong. Correct answer is 7. Reference: This is the hidden content, please Sign In or Sign Up 7 is correct Ans because In broadcast network...Router can either be DR or BDR or NON-DR/NON-BDR, NON-DR/NON-BDR router can become neighbor with another NON-DR/NON-BDR router but their state stop at 2-way not full. All NON-DR/NON-BDR router will have full neighborship with DR/BDR. So we have 3 NON-DR/NON-BDR Router in question which will have full neighborship with DR and BDR so 6 Full Neighborship and one more full neighborship between DR and BDR so total is 7 31 4 Link to comment Share on other sites More sharing options...
keje Posted March 17, 2022 Author Share Posted March 17, 2022 4 hours ago, cciede11sure said: Company XYZ, a global content provider, owns data centers on different continents. Their data center design involves a standard three-layer design with a Layer 3-only core. HSRP is used as the FHRP. They require VLAN extension across access switches in all data centers, and they plan to purchase a Layer 2 interconnection between two of their data centers in Europe. In the absence of other business or technical constraints, which termination point is optimal for the layer 2 interconnection? A. at the access layer because the STP root bridge does not need to align with the HSRP active node B. at the core layer, to offer the possibility to isolate STP domains C. at the core layer because all external connections must terminate there for security reasons D. at the aggregation layer because it is the Layer 2 to Layer 3 demarcation point Please comment on this one.. I will go with B because Core is only Layer 3 device which host the SVI for all the vlans, it means connecting the L2 link on Core switches will ensure gateway reachability from other DC. B is correct, this would be similar to a DCI link which terminates on the core and not on access or aggregation switches 1 Link to comment Share on other sites More sharing options...
keje Posted March 17, 2022 Author Share Posted March 17, 2022 1 hour ago, cciede11sure said: As part of workspace digitization, a large enterprise has migrated all their users to Desktop as a Service (DaaS) by hosting the backend system in their on-premises data center. Some of the branches have started to experience disconnections to the DaaS at periodic intervals, however, local users in the data center and head office do not experience this behavior. Which technology can be used to mitigate this issue? A. WRED B. tall drop C. traffic policing D. Traffic shaping Any suggestion... My second thought was shaping outbound to keep the traffic smooth and consistent from the remote side but that does nothing if not applied to the DC side as well 2 1 Link to comment Share on other sites More sharing options...
Popular Post bluechief Posted March 18, 2022 Popular Post Share Posted March 18, 2022 (edited) On 3/17/2022 at 2:55 PM, cciede11sure said: Which purpose of a dynamically created tunnel interface on the design of IPv6 multicast services is true? A. first-hop router registration to the RP B. multicast client registration to the RP C. multicast source registration to the RP D. Transport of all IPv6 multicast traffic. Any suggestion on this one ? Document suggests A. That is incorrect. Correct answer should be C. In a PIM-SM network, sources must send their traffic to the RP. In sparse mode, a router assumes that other routers do not want to forward multicast packets for a group, unless there is an explicit request for the traffic. When hosts join a multicast group, the directly connected routers send PIM Join messages toward the RP. The RP keeps track of multicast groups. Hosts that send multicast packets are registered with the RP by the first hop router of that host. The RP then sends Join messages toward the source. At this point, packets are forwarded on a shared distribution tree. If the multicast traffic from a specific source is sufficient, the first hop router of the host may send Join messages toward the source to build a source-based distribution tree. Automatic Multicast Tunneling (AMT) provides a method to tunnel multicast data over a unicast network. The tunneling is performed between AMT relays and AMT gateways, using User Datagram Protocol (UDP) encapsulation. AMT enables service providers and their customers to participate in delivering multicast traffic even in the absence of end-to-end multicast connectivity. References: This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up Edited March 19, 2022 by bluechief Adding References 68 12 1 Link to comment Share on other sites More sharing options...
keje Posted March 18, 2022 Author Share Posted March 18, 2022 3 hours ago, bluechief said: Document suggests A. That is incorrect. Correct answer should be C. In a PIM-SM network, sources must send their traffic to the RP. In sparse mode, a router assumes that other routers do not want to forward multicast packets for a group, unless there is an explicit request for the traffic. When hosts join a multicast group, the directly connected routers send PIM Join messages toward the RP. The RP keeps track of multicast groups. Hosts that send multicast packets are registered with the RP by the first hop router of that host. The RP then sends Join messages toward the source. At this point, packets are forwarded on a shared distribution tree. If the multicast traffic from a specific source is sufficient, the first hop router of the host may send Join messages toward the source to build a source-based distribution tree. Automatic Multicast Tunneling (AMT) provides a method to tunnel multicast data over a unicast network. The tunneling is performed between AMT relays and AMT gateways, using User Datagram Protocol (UDP) encapsulation. AMT enables service providers and their customers to participate in delivering multicast traffic even in the absence of end-to-end multicast connectivity. please provide link for reference 2 Link to comment Share on other sites More sharing options...
keje Posted March 18, 2022 Author Share Posted March 18, 2022 I'd like to thank everyone providing feedback with references to the corrected answers. updating the file and will share as vce and pdf in the next day or 2. If there are anymore spotted please provide answer with reference link. lets knock this one out! 4 1 Link to comment Share on other sites More sharing options...
nema Posted March 19, 2022 Share Posted March 19, 2022 + Link to comment Share on other sites More sharing options...
mkamal Posted March 20, 2022 Share Posted March 20, 2022 A healthcare customer requested the SNMP traps must be sent over the MPLS Layer 3 VPN service, which protocol must be enabled? A. SNMPV3 B. Syslog C. Syslog TLS D. SNMPV2 E. SSH My Answer: A Is it correct 2 1 Link to comment Share on other sites More sharing options...
Popular Post keje Posted March 20, 2022 Author Popular Post Share Posted March 20, 2022 5 hours ago, mkamal said: A healthcare customer requested the SNMP traps must be sent over the MPLS Layer 3 VPN service, which protocol must be enabled? A. SNMPV3 B. Syslog C. Syslog TLS D. SNMPV2 E. SSH My Answer: A Is it correct The main thing to catch is what i just bolded "which protocol must be enabled" Here is the reference for the correct answer This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up The answer is B any additional inputs 94 20 1 Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now