Join the discussion
Question 1/136
An architect receives a functional requirement for a NAC system from a customer security policy stating that if a corporate Wi-Fi device does not meet current AV definitions, then it cannot access the corporate network until the definitions are updated. Which component should be built into the NAC design?
Correct Answer: B
Add Comments
- Other Question (136q)
- Q1. An architect receives a functional requirement for a NAC system from a customer security p...
- Q2. Which design solution reduces the amount of IGMP state in the network?...
- Q3. Refer to the exhibit. (Exhibit) Which impact of using three or more ABRs between the backb...
- Q4. Which main IoT migration aspect should be reviewed for a manufacturing plant?...
- Q5. Which option is a fate-sharing characteristic in regards to network design?...
- Q6. A network architect must redesign a service provider edge, where multiservice and multiten...
- Q7. An enterprise requires MPLS connected branches to access cloud-based Microsoft 365 service...
- Q8. A legacy enterprise is using a Service Provider MPLS network to connect its head office an...
- Q9. Which mechanism provides Layer 2 fault isolation between data centers?...
- Q10. Your company wants to deploy a new data center infrastructure Based on the requirements yo...
- Q11. Refer to the diagram. (Exhibit) Which solution must be used to send traffic from the forei...
- Q12. A large enterprise cloud design team is evaluating different cloud consumption models. Wha...
- Q13. Refer to the exhibit. (Exhibit) There are multiple trees in the Cisco FabricPath All switc...
- Q14. Refer to the exhibit. (Exhibit) An engineer is designing the traffic flow for AS 111. Traf...
- Q15. Drag and drop the design use cases from the left onto the correct uRPF techniques used to ...
- Q16. How many fully established neighbour relationships exist on an Ethernet with five routers ...
- Q17. A multinational enterprise integrates a cloud solution with these objectives * Achieve sea...
- Q18. What is the most important operational driver in building a resilient and secure modular n...
- Q19. A product manufacturing organization is integrating cloud services into their IT solution ...
- Q20. An engineer is designing the QoS strategy for Company XYZ. Based on initial analysis, a lo...
- Q21. A business requirement is supplied to an architect from a car manufacturer stating their b...
- Q22. A product manufacturing organization is integrating cloud services into their IT solution ...
- Q23. Refer to the exhibit. (Exhibit) This network is running legacy STP 802.1 d. Assuming "hell...
- Q24. A software-defined networking (SDN) controller teams network topology information by using...
- Q25. Drag and drop the multicast protocols from the left onto the current design situation on t...
- Q26. Which feature must be part of the network design to wait a predetermined amount of time be...
- Q27. A business wants to refresh its legacy Frame Relay WAN. It currently has product specialis...
- Q28. An enterprise plans to evolve from a traditional WAN network to a software-defined WAN net...
- Q29. Drag and drop the FCAPS network management reference models from the left onto the correct...
- Q30. QUESTION 69 Refer to the exhibit. AJI links are P2P Layer 3. A high availability applicati...
- Q31. Company XYZ, a global content provider, owns data centers on different continents. Their d...
- Q32. Refer to the exhibit. (Exhibit) An engineer is designing the network for a multihomed cust...
- Q33. SD-WAN can be used to provide secure connectivity to remote offices, branch offices, campu...
- Q34. A network security team observes phishing attacks on a user machine from a remote location...
- Q35. Company XYZ is planning to deploy primary and secondary (disaster recovery) data center si...
- Q36. Which two characteristics are associated with 802 1s? (Choose two)...
- Q37. Refer to the exhibit. (Exhibit) For Company XYZ Bangkok is using ECMP to reach the 172 20 ...
- Q38. A small organization of 20 employees is looking to deliver a network design service for mo...
- Q39. Drag and drop the design characteristics from the left onto the correct network filter tec...
- Q40. Refer to the exhibit. (Exhibit) Refer to the exhibit. An architect must design an enterpri...
- Q41. VPLS is implemented in a Layer 2 network with 2000 VLANs. What is the primary concern to e...
- Q42. As part of workspace digitization, a large enterprise has migrated all their users to Desk...
- Q43. Which parameter is the most important factor to consider when deciding service placement i...
- Q44. Which two conditions must be met for EIGRP to maintain an alternate loop-free path to a re...
- Q45. Company XYZ wants to improve the security design of their network to include protection fr...
- Q46. Company XYZ Is running a redundant private WAN network using OSPF as the underlay protocol...
- Q47. Which two features describe controller-based networking solutions compared to traditional ...
- Q48. A company requires an RPO of less than 10 seconds to ensure business continuity. Which tec...
- Q49. An enterprise network has two core routers that connect to 200 distribution routers and us...
- Q50. An external edge router provides connectivity from a service provider to an enterprise Whi...
- Q51. A Tier-3 Service Provider is evolving into a Tier-2 Service Provider due to the amount of ...
- Q52. What are two primary design constraints when a robust infrastructure solution is created? ...
- Q53. Which best practice ensures data security in the private cloud?...
- Q54. Refer to the exhibit. (Exhibit) A customer runs OSPF with Area 5 between its aggregation r...
- Q55. A network security team uses a purpose-built tool to actively monitor the campus network, ...
- Q56. Which solution component helps to achieve comprehensive threat protection and compliance f...
- Q57. Which two protocols are used bv SDN controllers to communicate with switches and routers? ...
- Q58. Which two features control multicast traffic in a VLAN environment? (Choose two)...
- Q59. Which two mechanisms avoid suboptimal routing in a network with dynamic mutual redistribut...
- Q60. A network engineering team is in the process of designing a lab network for a customer dem...
- Q61. What are two examples of components that are part of an SDN architecture? (Choose two.)...
- Q62. Which network management framework can be used to develop a network architecture that cont...
- Q63. A European government passport agency considers upgrading its IT systems to increase perfo...
- Q64. Company XYZ has a hub-and-spoke topology over an SP-managed infrastructure. To measure tra...
- Q65. Company XYZ wants to use the FCAPS ISO standard for network management design. The focus o...
- Q66. A business wants to centralize services via VDI technology and to replace remote WAN deskt...
- Q67. When consumers that leverage laaS reach 100% resource capacity, what can be used to redire...
- Q68. Company XYZ is in the process of identifying which transport mechanism(s) to use as their ...
- Q69. Which MPLS TE design consideration is true?
- Q70. A software-defined network can be defined as a network with an API that allows application...
- Q71. According to the CIA triad principles for network security design, which principle should ...
- Q72. Refer to the diagram. (Exhibit) Which solution must be used to send traffic from the forei...
- Q73. Company XYZ Is running a redundant private WAN network using OSPF as the underlay protocol...
- Q74. A Service Provider is designing a solution for a managed CE service to a number of local c...
- Q75. The SD-WAN architecture is composed of separate orchestration management, control, and dat...
- Q76. Company XYZ is running OSPF in their network. They have merged with another company that i...
- Q77. Refer to the exhibit. (Exhibit) OSPF is running as the IGP to provide reachability to all ...
- Q78. Which effect of using ingress filtering to prevent spoofed addresses on a network design i...
- Q79. Company XYZ is revisiting the security design for their data center because they now have ...
- Q80. Company XYZ has 30 sites running a legacy private WAN architecture that connects to the In...
- Q81. Refer to the exhibit. (Exhibit) A customer runs OSPF with Area 5 between its aggregation r...
- Q82. An MPLS service provider is offering a standard EoMPLS-based VPLS service to Customer A. p...
- Q83. Drag and drop the characteristics from the left onto the corresponding network management ...
- Q84. A network security team observes phishing attacks on a user machine from a remote location...
- Q85. The Company XYZ network requires OSPF dead neighbor detection in a subsecond manner Howeve...
- Q86. Retef to the exhibit. (Exhibit) This network is running OSPF and EIGRP as the routing prot...
- Q87. Drag and drop the design use cases from the left onto the correct uRPF techniques used to ...
- Q88. Which feature is supported by NETCONF but is not supported by SNMP?...
- Q89. Which undesired effect of increasing the jitter compensation buffer is true?...
- Q90. Refer to the exhibit. (Exhibit) An engineer is designing the network for a multihomed cust...
- Q91. A European government passport agency considers upgrading its IT systems to increase perfo...
- Q92. Refer to the exhibit. (Exhibit) A new high availability DB sever cluster is installed in t...
- Q93. A company plans to use BFD between its routers to detect a connectivity problem inside the...
- Q94. A healthcare provider discovers that protected health information of patients was altered ...
- Q95. Which two possible drawbacks should you consider when introducing Network Functions Virtua...
- Q96. Agile and Waterfall are two popular methods for organizing projects. What describes any Ag...
- Q97. Sometimes SDN leverages various overlay networking technologies to create layer(s) of netw...
- Q98. You have been tasked with designing a data center interconnect to provide business continu...
- Q99. A network architect in an enterprise is designing a network policy for certain database ap...
- Q100. Software-defined networking architecture is used for cost-effective, adaptable, and easily...
- Q101. Which two advantages of using DWDM over traditional optical networks are true? (Choose two...
- Q102. What statement describes the application layer as defined in the software-defined networki...
- Q103. Which two characteristics apply to firewall transparent mode operations in a firewall solu...
- Q104. SDWAN networks capitalize the usage of broadband Internet links over traditional MPLS link...
- Q105. Retef to the exhibit. (Exhibit) An engineer is designing a multiarea OSPF network for a cl...
- Q106. SDN emerged as a technology trend that attracted many industries to move from traditional ...
- Q107. Refer to the exhibit. (Exhibit) An architect must design an enterprise WAN that connects t...
- Q108. Company ABC uses IPv4-only. Recently they started deploying new endpoint devices. For oper...
- Q109. Which BGP feature provides fast convergence?
- Q110. Refer to the table. (Exhibit) A customer investigates connectivity options for a DCI betwe...
- Q111. Refer to the exhibit. (Exhibit) The WAN network of the General Bank of Greece has experien...
- Q112. Refer to the exhibit. (Exhibit) The enterprise customer wants to stream one-way video from...
- Q113. An enterprise has identified these causes for inefficient CAPEX spending: * CAPEX plannin...
- Q114. Refer to the exhibit. (Exhibit) An engineer has been asked to redesign the traffic flow to...
- Q115. Which two factors provide multifactor authentication for secure access to applications and...
- Q116. Company XYZ plans to run OSPF on a DMVPN network. They want to use spoke-to-spoke tunnels ...
- Q117. Which design principal improves network resiliency?...
- Q118. A healthcare provider discovers that protected health information of patients was altered ...
- Q119. Drag and drop the end-to-end network virtualization elements from the left onto the correc...
- Q120. An architect designs a multi-controller network architecture with these requirements: Achi...
- Q121. You want to mitigate failures that are caused by STP loops that occur before UDLD detects ...
- Q122. An enterprise wants to migrate an on-premises network to a cloud network, and the design t...
- Q123. Drag and drop the QoS technologies from the left onto the correct capabilities on the righ...
- Q124. The Layer 3 control plane is the intelligence over the network that steers traffic toward ...
- Q125. An enterprise requires MPLS connected branches to access cloud-based Microsoft 365 service...
- Q126. Refer to the exhibit. (Exhibit) An engineer is designing the network for a multihomed cust...
- Q127. A business invests in SDN and develops its own SDN controller that, due to budget constrai...
- Q128. Which component of the SDN architecture automatically ensures that application traffic is ...
- Q129. You are designing the routing design for two merging companies that have overlapping IP ad...
- Q130. Company XYZ has 30 sites using MPLS L3 VPN and the company is now concerned about data int...
- Q131. Which two factors must be considered for high availability in campus LAN designs to mitiga...
- Q132. A business requirement stating that failure of WAN access for dual circuits into an MPLS p...
- Q133. Refer to the exhibit. (Exhibit) An engineer is designing the traffic flow for AS 111. Traf...
- Q134. You are designing a large-scale DMVPN network with more than 500 spokes using EIGRP as the...
- Q135. A financial company requires that a custom TCP-based stock-trading application be prioriti...
- Q136. Which action must be taken before new VoIP systems are implemented on a network to ensure ...
