Question 111
In the SD-WAN underlay network, which WAN Edge VPN ID is defined as the transport VPN and is used to carry control traffic?
A. VPN 0
B. VPN 512
C. VPN 128
D. VPN 256
Question 112
A company's security policy requires that all connections between sites be encrypted in a manner that does not require maintenance of permanent tunnels. The sites are connected through a private MPLS-based service that uses a dynamically changing key and spoke-to-spoke communication. Which type of transport encryption must be used in this environment?
A. GETVPN
B. DMVPN
C. GRE VPN
D. standard IPsec VPN
Question 113
Which PIM mode uses a shared tree only?
A. bidirectional
B. sparse
C. dense
D. source-specific
Question 114
Which two statements describe source trees in a multicast environment? (Choose two.)
A. Source trees guarantee the minimum amount of network latency for forwarding multicast traffic
B. Source trees create an optimal path between the source and the receivers
C. Source trees use a single common root placed at some chosen point in the network
D. Source trees can introduce latency in packet delivery
E. Source trees can create suboptimal paths between the source and the receivers
Question 115
Which two best practices must be followed when designing an out-of-band management network? (Choose two.)
A. Enforce access control
B. Facilitate network integration
C. Back up data using the management network
D. Ensure that the management network is a backup to the data network
E. Ensure network isolation
Question 116
What is a benefit of using VRRPv3 as compared to VRRPv2?
A. VRRPv3 supports IPv4 and IPv6
B. VRRPv3 supports authentication
C. VRRPv3 supports preemption
D. VRRPv3 supports stateful switchover
Question 117
A customer is discussing QoS requirements with a network consultant. The customer has specified that end-to-end path verification is a requirement. Which QoS solution meets this requirement?
A. IntServ model with RSVP to support the traffic flows
B. DiffServ model with PHB to support the traffic flows
C. marking traffic at the access layer with DSCP to support the traffic flows
D. marking traffic at the access layer with CoS to support the traffic flows
Question 118
Which nonproprietary mechanism can be used to automate rendezvous point distribution in a large PIM domain?
A. Embedded RP
B. BSR
C. Auto-RP
D. Static RP
Question 119
Which QoS feature responds to network congestion by dropping lower priority packets?
A. CBWFQ
B. tail drop
C. WRED
D. strict priority
Question 120
An engineer is designing a QoS policy that queues excess packets for later transmission. Which mechanism must be included in the design?
A. shaping
B. WRED
C. policing
D. RED