Which two statements describe the usage of the IS-IS overload bit technique? (Choose two )
Correct Answer:
AD
An engineer must design a network for a company that uses OSPF LFA to reduce loops. Which type of loop would be reduced by using this design?
Correct Answer:
B
A customer asks you to perform a high level review of their upcoming WAN refresh for remote sites The review is specially focused on their retail store operations consisting of 500+ locations connected via mutlipoint IPsec VPN solution. Which routing protocol would be valid but would also be the most restrictive for the expansion of this deployment model?
Correct Answer:
B
What is a web-based model in which a third-party provider hosts applications that are available to customers over the Internet?
Correct Answer:
B
The Company XYZ network is experiencing attacks against their router. Which type of Control Plane Protection must be used on the router to protect all control plane IP traffic that is destined directly for one of the router interfaces?
Correct Answer:
A