Tag Archives: layer

An engineer must extend Layer 2 Between two campus sites connected through an MPLS backbone that encapsulates Layer 2 and Layer 3 data Which action must the engineer perform on the routers to accomplish this task?

A. Configure a EtherChannel for E-LAN. B. Configure a pseudowire for E-LINE. C. Configure Cisco MPLS TE for use with E-TREE. D. Configure QoS for MPLS and E-ACCESS Answer: Option B. Explanation:  No answer description available for this question Show AnswerDiscussion The post An engineer must extend Layer 2 Between two campus sites connected through an MPLS backbone… Read More »

Which technology is used to provide Layer 2 and Layer 3 logical networks in the Cisco SD-Access architecture?

A. underlay network B. VPN routing/forwarding C. easy virtual network D. overlay network Answer: Option D. Explanation:  No answer description available for this question Show AnswerDiscussion The post Which technology is used to provide Layer 2 and Layer 3 logical networks in the Cisco SD-Access architecture? appeared first on Majanto.

In a three-tier hierarchical campus network design, which action is a design best-practice for the core layer?

A. provide QoS prioritization services such as marking, queueing, and classification for critical network traffic B. provide redundant Layer 3 point-to-point links between the core devices for more predictable and faster convergence C. provide advanced network security features such as 802.1X, DHCP snooping, VACLs, and port security D. provide redundant aggregation for access layer devices and first-hop redundancy… Read More »

Which entity is responsible for maintaining Layer 2 isolation between segments in a VXLAN environment?

A. VNID B. switch fabric C. VTEP D. host switch Answer: Option A. Explanation:  No answer description available for this question Show AnswerDiscussion The post Which entity is responsible for maintaining Layer 2 isolation between segments in a VXLAN environment? appeared first on Majanto.

A customer has completed the installation of a Wi-Fi 6 greenfield deployment at their new campus. They want to leverage Wi-Fi 6 enhanced speeds on the trusted employee WLAN. To configure the employee WLAN, which two Layer 2 security policies should be used? (Choose two.)

A. WPA2 (AES) B. 802.1X C. OPEN D. WEP E. WPA (AES) Answer: Option A, B. Explanation:  No answer description available for this question Show AnswerDiscussion The post A customer has completed the installation of a Wi-Fi 6 greenfield deployment at their new campus. They want to leverage Wi-Fi 6 enhanced speeds on the trusted employee WLAN. To… Read More »

Which two actions, when applied in the LAN network segment, will facilitate Layer 3 CAPWAP discovery for lightweight AP? (Choose two.)

A. Utilize DHCP option 43. B. Utilize DHCP option 17. C. Configure an ip helper-address on the router interface. D. Enable port security on the switch port. E. Configure WLC IP address on LAN switch Answer: Option A, C. Explanation:  No answer description available for this question Show AnswerDiscussion The post Which two actions, when applied in the… Read More »

A network administrator has designed a network with two multilayer switches on the distribution layer, which act as default gateways for the end hosts. Which two technologies allcw every end host in a VLAN to use both gateways? (Choose two.)

A. VRRP B. GLBP C. VSS D. MHSRP E. HSRP Answer: Option A, D. Explanation:  No answer description available for this question Show AnswerDiscussion The post A network administrator has designed a network with two multilayer switches on the distribution layer, which act as default gateways for the end hosts. Which two technologies allcw every end host in… Read More »

Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?

A. SSL B. Cisco TrustSec C. MACsec D. IPsec Answer: Option C. Explanation:  No answer description available for this question Show AnswerDiscussion The post Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model? appeared first on Majanto.

An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy. Which device presents the web authentication for the WLAN?

A. ISE server B. RADIUS server C. anchor WLC D. local WLC Answer: Option D. Explanation:  No answer description available for this question Show AnswerDiscussion The post An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy.<br> Which device presents the web… Read More »