How does ERS use the VLAN tag?

How does ERS use the VLAN tag? A. to provide service internetworking B. to support transparency for Layer 2 frames C. as a connection identifier to indicate destination D. as a mapping to the DLCI in service internetworking E. to provide a trunk by which all VLANs can navigate from one site to one or […]

Read More

Which path selection protocol is used by Fibre Channel fabrics?

Which path selection protocol is used by Fibre Channel fabrics? A. IVR B. VoQ C. FSPF D. VSANs E. SANTap Explanation: Fabric Shortest Path First (FSPF) is a routing protocol used in Fibre Channel networks. It calculates the best path between switches, establishes routes across thefabric and calculates alternate routes in event of a failure […]

Read More

Which recommended practice is applicable?

Refer to the exhibit. Which recommended practice is applicable?Exhibit:   A. If no core layer is deployed, the design will be easier to scale. B. A dedicated campus core layer should be deployed for connecting three or more buildings. C. If no core layer is deployed, the distribution switches should not be fully meshed D. […]

Read More

What deployment model should be used if the team requests that the NAC be logically inline with

The network engineering team is interested in deploying NAC within the enterprise network to enhance security. What deployment model should be used if the teamrequests that the NAC be logically inline with clients? A. Layer 2 in-band B. Layer 2 out-of-band C. Layer 3 in-band D. Layer 3 out-of-band Explanation: https://www.cisco.com/c/en/us/products/collateral/security/nac-appliance-clean-access/product_data_sheet0900aecd802da1b5.html Passing traffic mode· Virtual […]

Read More

Which feature should be used to allow limited access?

A company has hired an entry-level network administrator for its new data center. The company CIO wants to give the administrator limited access on the newlyconfigured Cisco Nexus 7000. Which feature should be used to allow limited access? A. NAC B. VDC C. RBAC D. vPC Explanation: Role-based access control (RBAC) is a method of […]

Read More