A. The FIB maintains network topologies and routing tables. The RIB is a list of routes to particular network destinations. B. The FIB includes many routes to a single destination. The RIB is the best route to a single destination. C. The RIB is used to create network topologies and routing tables. The FIB is a list of… Read More »
A. onboard WAN Edge nodes into the Cisco SD-WAN fabric B. gather telemetry data from WAN Edge routers C. distribute policies that govern data forwarding performed within the Cisco SD-WAN fabric D. handle, maintain, and gather configuration and status for nodes within the Cisco SD-WAN fabric Answer: Option C. Explanation: No answer description available for this question Show… Read More »
A. fabric control plane node B. fabric wireless controller C. fabric border node D. fabric edge node Answer: Option A. Explanation: No answer description available for this question Show AnswerDiscussion The post In a Cisco SD-Access wireless architecture, which device manages endpoint ID to edge node bindings? appeared first on Majanto.
A. underlay network B. VPN routing/forwarding C. easy virtual network D. overlay network Answer: Option D. Explanation: No answer description available for this question Show AnswerDiscussion The post Which technology is used to provide Layer 2 and Layer 3 logical networks in the Cisco SD-Access architecture? appeared first on Majanto.
A. hypervisor B. virtual router C. vSwitch D. pNIC Answer: Option C. Explanation: Each VM is provided with a virtual NIC (vNIC) that is connected to the virtual switch. Multiple vNICs can connect to a single vSwitch, allowing VMs on a physical host to communicate with one another at layer 2 without having to go out to a… Read More »
A. requires synchronization between supervisors in order to guarantee continuous connectivity B. the multicast state is preserved during switchover C. must be combined with NSF to support uninterrupted Layer 3 operations D. both supervisors must be configured separately E. must be combined with NSF to support uninterrupted Layer 2 operations Answer: Option A, C. Explanation: No answer description… Read More »
Refer to the exhibit. Which two commands ensure that DSW1 becomes the root bridge for VLAN 10 and 20? (Choose two.) A. spanning-tree mst 1 priority 4096 B. spanning-tree mst 1 root primary C. spanning-tree mst vlan 10,20 priority root D. spanning-tree mst 1 priority 1 E. spanning-tree mstp vlan 10,20 root primary Answer: Option A, B. Explanation: … Read More »
A. mainframe B. host C. virtual machine D. container Answer: Option C. Explanation: No answer description available for this question Show AnswerDiscussion The post What is an emulated machine that has dedicated compute, memory, and storage resources and a fully installed operating system? appeared first on Majanto.