Company XYZ wants to improve the security design of their network to include protection from reconnaissance and DoS attacks on their sub interfaces destined toward next hop routers. Which technology can be used to prevent these types of attacks?
Correct Answer:
B
https://learningnetwork.cisco.com/s/question/0D53i00000KsuyvCAB/copp-vs-cppr
What are two design constraints in a standard spine and leaf architecture? (Choose two.)
Correct Answer:
BE
Which design benefit of bridge assurance is true?
Correct Answer:
D
An architect receives a functional requirement for a NAC system from a customer security policy stating that if a corporate Wi-Fi device does not meet current AV definitions, then it cannot access the corporate network until the definitions are updated. Which component should be built into the NAC design?
Correct Answer:
A
Which function is performed at the access layer of the three-layer hierarchical network design model?
Correct Answer:
B