Exam 44: Deploying Cisco Unified Contact Center Express

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which three techniques can be used to improve fault isolation in an enterprise network design? (Choose three.)

Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
Verified

A,D,E

What are three key design principles when using a classic hierarchical network model? (Choose three.)

Free
(Multiple Choice)
4.7/5
(28)
Correct Answer:
Verified

B,D,F

Refer to the exhibit. You are planning a migration to a dual-stack IPv4/IPv6 campus environment while providing a flexible and scalable design with fault isolation. The design must allow IPv6 devices to tunnel over portions of the campus that are not yet natively IPv6-enabled, including wireless and voice endpoints. Your plan requires an interim approach that allows for a faster introduction of new services without requiring a network wide hot cutover. Which two services block functions meet these requirements? (Choose two.) Refer to the exhibit. You are planning a migration to a dual-stack IPv4/IPv6 campus environment while providing a flexible and scalable design with fault isolation. The design must allow IPv6 devices to tunnel over portions of the campus that are not yet natively IPv6-enabled, including wireless and voice endpoints. Your plan requires an interim approach that allows for a faster introduction of new services without requiring a network wide hot cutover. Which two services block functions meet these requirements? (Choose two.)

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

A,C

What is the reason that you want to synchronize IGP and BGP convergence by advertising an infinite metric in OSPF or setting the overload bit in IS-IS?

(Multiple Choice)
4.7/5
(27)

Study the following exhibit carefully. A service provider with a multi-area OSPF environment would like to deploy MPLS TE tunnels among PE routers across area boundaries. Configure the LSPs with bandwidth constraints and explicit loose route hops as indicated by the arrows in the following path: PE1 -> ABR1 -> ABR2 -> PE2 Which two items identify devices that will execute constraint-based SPF in order to set up LSP from PE1 to PE2? (Choose two.) Study the following exhibit carefully. A service provider with a multi-area OSPF environment would like to deploy MPLS TE tunnels among PE routers across area boundaries. Configure the LSPs with bandwidth constraints and explicit loose route hops as indicated by the arrows in the following path: PE1 -> ABR1 -> ABR2 -> PE2 Which two items identify devices that will execute constraint-based SPF in order to set up LSP from PE1 to PE2? (Choose two.)

(Multiple Choice)
4.7/5
(37)

According to the network provided in the following exhibit, all routers are performing OSPF on all links and all links have the same cost. OSPF timers have not been modified on any router. Which network will converge faster, and why, if the link between 10.1.1.0/24 and router P4S-RA fails? According to the network provided in the following exhibit, all routers are performing OSPF on all links and all links have the same cost. OSPF timers have not been modified on any router. Which network will converge faster, and why, if the link between 10.1.1.0/24 and router P4S-RA fails?

(Multiple Choice)
4.7/5
(31)

When is the site-to-site remote access model appropriate?

(Multiple Choice)
4.9/5
(30)

A large enterprise customer has more than 300 worldwide locations, each with at least two different WAN connections to their five regional data centers across US, Europe, and Asia. These data centers offer different application services and work as primary, with a remote data center as backup. You must provide a solution to securely select the traffic path for specific applications based on an IT policy. Which solution allows the easiest management of the path decision from the data center sites?

(Multiple Choice)
4.9/5
(44)

A service provider creates a network design that runs MPLS in its WAN backbone using OSPF as the IGP routing protocol. What would be two effects of additionally implementing MPLS-TE? (Choose two.)

(Multiple Choice)
4.9/5
(36)

Which main IoT migration aspect must be reviewed for a manufacturing plant?

(Multiple Choice)
4.9/5
(34)

To ensure voice packets are kept within the Committed Information Rate (CIR) of a Frame Relay link, what should be used in the CPE?

(Multiple Choice)
4.8/5
(35)

You work as a network technician for an IT company, you are tasked to deploy BGP across a satellite link system to a small number of retail stores. What must be done in order to successfully deploy BGP in this situation?

(Multiple Choice)
4.9/5
(34)

Refer to the exhibit. Refer to the exhibit.   In this BGP design, what is the next hop for 10.1.1.0/24 on R8 and R7? In this BGP design, what is the next hop for 10.1.1.0/24 on R8 and R7?

(Multiple Choice)
4.8/5
(35)

A company wants a design that would support OSPF through a service provider ATM network. Which two OSPF network types should the designer use to establish OSPF neighborship between OSPF routers through the ATM network? (Choose two.)

(Multiple Choice)
4.8/5
(29)

A network is designed to use OSPF to reach eBGP peers. Which condition should be avoided in the design to potentially prevent the eBGP peers to flap continuously in case of link failure?

(Multiple Choice)
4.9/5
(36)

Which three methods allow storage access across an IP network? (Choose three.)

(Multiple Choice)
4.8/5
(30)

At all sites provided in the following exhibit. OSPF is used as the PE-CE protocol Which path is preferred from CE1 to CE3? At all sites provided in the following exhibit. OSPF is used as the PE-CE protocol Which path is preferred from CE1 to CE3?

(Multiple Choice)
4.9/5
(28)

You work as a network administrator for the P4S company. Study the exhibit carefully, the network is running EIGRP. You need traffic from P4S-R5 destined for 172.30.1.0/24 to be routed through P4S-R4. You should complete which two actions combined? (Choose two.) You work as a network administrator for the P4S company. Study the exhibit carefully, the network is running EIGRP. You need traffic from P4S-R5 destined for 172.30.1.0/24 to be routed through P4S-R4. You should complete which two actions combined? (Choose two.)

(Multiple Choice)
4.8/5
(47)

You have been hired by Acme Corporation to evaluate their existing network and determine if the current network design is secure enough to prevent man-in-the-middle attacks. When evaluating the network, which switch security option should you investigate to ensure that authorized ARP responses take place according to known IP-to-MAC address mapping?

(Multiple Choice)
4.9/5
(40)

Which advantage is of creating an in-band instead of an out-of-band management network?

(Multiple Choice)
4.9/5
(35)
Showing 1 - 20 of 660
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)