Company XYZ uses an office model where the employees can use any open desk and plug their laptops in. They want to authenticate the end users using their domain username and password before allowing them access to the network. The design must also accommodate the ability of controlling traffic within the same group or subnet if a macro (or micro) segmentation-based model is adopted in the future. Which protocol can be recommended for this design to authenticate end users?
Correct Answer:
D
https://www.networkstraining.com/what-is-cisco-ise/
Which two characteristics apply to firewall transparent mode operations in a firewall solution design? (Choose two.)
Correct Answer:
CD
A company plans to use BFD between its routers to detect a connectivity problem inside the switched network. An IPS is transparently installed between the switches. Which packets shold the IPS forward for BFD to work under all circumstances?
Correct Answer:
E
An architect designs a multi-controller network architecture with these requirements: Achieve fast failover to control traffic when controllers fail.
Reduce connectivity loss and enable smart recovery to improve the SDN survivability.
Improve connectivity by adding path diversity and capacity awareness for controllers.
Which control plane component of the multi-controller must be built to meet the requirements?
Correct Answer:
B
As part of workspace digitization, a large enterprise has migrated all their users to Desktop as a Sen/ice (DaaS), by hosting the backend system in their on-premises data center. Some of the branches have started to experience disconnections to the DaaS at periodic intervals, however, local users in the data center and head office do not experience this behavior. Which technology can be used to mitigate this issue?
Correct Answer:
B
Traffic Shaping does help with congestion and better bandwidth utilization over the WAN.