Tag Archives: network

Which TWO Oracle Cloud Infrastructure (OCI) Virtual Cloud Network (VCN) firewall features can be used

Which TWO Oracle Cloud Infrastructure (OCI) Virtual Cloud Network (VCN) firewall features can be used for controlling traffic?(Choose all correct answers} A. Network Security Groups B. VNIC Metrics C. Network visualizer D. Security Lists E. VCN Flow Logs Correct Answer: A,D

Which statement regarding Oracle Cloud Infrastructure (OCI) Virtual Cloud Network (VCN) peering is valid?

Which statement regarding Oracle Cloud Infrastructure (OCI) Virtual Cloud Network (VCN) peering is valid? A. A VCN peering connection is a physical network link between two VCNs within a single OCI. B. A VCN peering connection is required for OCI Object Storage. C. A VCN peering connection is a VPN-based connection. D. Peered VCNs can exist in different… Read More »

Which TWO are valid regarding Oracle Cloud Infrastructure (OCI) Virtual Cloud Network (VCN) peering?

Which TWO are valid regarding Oracle Cloud Infrastructure (OCI) Virtual Cloud Network (VCN) peering?(Choose all correct answers) A. Peered VCNs can have overlapping classless inter-domain routing (CIDR). B. Peered VCNs can exist in different OCI regions. C. Peered VCNs can exist in the same OCI region. D. A VCN peering connection is a VPN based connection. E. Peered… Read More »

A service binding provides communication over a private overlay network within your Identity domain between

A service binding provides communication over a private overlay network within your Identity domain between Oracle Application Container Cloud Service and the other Oracle Cloud service. In which metadata file/files can you configure Service Bindings?Response: A. config.yml B. deployment.json C. app.yml D. manifest.json Correct Answer: D

A service binding provides communication over a private overlay network within your Identity domain between

A service binding provides communication over a private overlay network within your Identity domain between Oracle Application Container Cloud Service and the other Oracle Cloud service. In which metadata file/files can you configure Service Bindings?Response: A. app.yml B. deployment.json C. config.yml D. manifest.json Correct Answer: D

The network engineer who manages ASN 65010 is provisioning a customer VRF named CUSTOMERABC on PE-2. The PE-CE routing protocol is OSPF Internet reachability is available via the OSPF 0 0 0.0/0 route advertised by CE-1 to PE-1 In the customer VRF Which configuration must the network engineer Implement on PE-2 so that CE-2 has connectivity to the Internet?

Refer to the exhibit. The network engineer who manages ASN 65010 is provisioning a customer VRF named CUSTOMERABC on PE-2. The PE-CE routing protocol is OSPF Internet reachability is available via the OSPF 0 0 0.0/0 route advertised by CE-1 to PE-1 In the customer VRF Which configuration must the network engineer Implement on PE-2 so that CE-2… Read More »

A network operator working for a telecommunication company with an employee 3994:37:650 is implementing a cisco Unified MPLS solution. What is the effect of this implementation?

Refer to the exhibit. A network operator working for a telecommunication company with an employee 3994:37:650 is implementing a cisco Unified MPLS solution. What is the effect of this implementation? A. EIGRP is deployed between the PEs and ABRs with RFC 3107. B. OSPF is deployed between the PEs and ABRs with RFC 3107. C. IS-IS is deployed… Read More »

An engineer has started to configure a router for OSPF, as shown Which configuration must an engineer apply on the network so that area 15 traffic from R5 to R1 will prefer the route through R4?

Refer to the exhibit. An engineer has started to configure a router for OSPF, as shown Which configuration must an engineer apply on the network so that area 15 traffic from R5 to R1 will prefer the route through R4? A. Place the link between R3 and R5 in a stub area to force traffic to use the… Read More »

An engineer has started to configure a router for secure remote access as shown. All users who require network access need to be authenticated by the SSH Protocol. Which two actions must the engineer implement to complete the SSH configuration? (Choose two.)

Refer to the exhibit. An engineer has started to configure a router for secure remote access as shown. All users who require network access need to be authenticated by the SSH Protocol. Which two actions must the engineer implement to complete the SSH configuration? (Choose two.) A. Configure an IP domain name. B. Configure service password encryption. C.… Read More »

A network engineer is configuring a newly installed PE router at the regional gateway location. The new PE router must use MPLS core routing protocols with the existing P router, and LDP sessions between the two routers must be protected to provide faster MPLS convergence. Which configuration must the engineer perform on the network so that LDP sessions are established?

A. Enable communication over TCP port 646 for T-LDP hello messages. B. Enable RSVP-TE FRR on the LDP interface to protect the LDP session between routers. C. Enable LDP session protection on either one of the routers, which allows them to autonegotiate. D. Set the LDP session protection timer on each router to the same value. Answer: Option… Read More »