Which aspect of BGP-LS makes it scalable in large network when multiarea topology information must be gathered?
Which security architecture component offers streamlined security operations, ease of use, and visibility across all network security elements, independent of location or form factor?
Which two design option are available to dynamically discover the RP in an IPv6 multicast network? (Choose
two)
A business wants to centralize services via VDI technology and to replace remote WAN desktop PCs with thin client-type machines to reduce operating costs Which consideration supports the new business requirement?
You are designing the routing design for two merging companies that have overlapping IP address space. Which of these must you consider when developing the routing and NAT design?
Company XYZ has two routing domains in their network, EIGRP and OSPF. The company wants to provide full reachability between the two domains by implementing redistribution on a router running both protocols. They need to design the redistribution in a way that the OSPF routers will see link costs added to external routes. How must the redistribution strategy be designed for this network?
Company XYZ network runs IPv4 and IPv6 and they want to Introduce a multidomain, multicast-based network. The new design should use a flavor of PIM that forwards traffic using SPT. Which technology meets this requirement?
An enterprise service provider is designing the network for a customer who runs a video application in both a centralized and distributed fashion The team has looked at the following parameters
•The available bandwidth for branches and the associated cost
•Video resource cost
•Usage patterns at hub-and-spoke sites.
•Call agent bridge selection algorithm
Which key piece of information is missing and needs to be taken into consideration in order to determine the correct resource allocation model?
Company XYZ wants to improve the security design of their network to include protection from reconnaissance and DoS attacks on their sub interfaces destined toward next hop routers. Which technology can be used to prevent these types of attacks?
Which two impacts of adding the IP event dampening feature to a network design are true? (Choose two.)