Company XYZ is planning to deploy primary and secondary (disaster recovery) data center sites. Each of these sites will have redundant SAN fabrics and data protection is expected between the data center sites. The sites are 100 miles (160 km) apart and target RPO/RTO are 3 hrs and 24 hrs, respectively. Which two considerations must Company XYZ bear in mind when deploying replication in their scenario? (Choose two.)
Correct Answer:
CD
synchronous data replication must be used to meet the business requirements, is incorrect. As described above, asynchronous replication would be a better choice in this scenario due to the distance between the data center sites and the target RPO/RTO requirements.
asynchronous data replication should be used in this scenario to avoid performance impact in the primary site, is correct. Asynchronous replication would allow Company XYZ to meet the target RPO/RTO requirements while avoiding the performance impact of synchronous replication.
While reviewing an existing network design, you are discussing the characteristics of different STP versions. Which protocol minimizes unicast flooding during a Topology Change Notification in a Layer 2 switched network with many VLANs?
Correct Answer:
A
What are two examples of components that are part of an SDN architecture? (Choose two.)
Correct Answer:
BD
SDWAN networks capitalize the usage of broadband Internet links over traditional MPLS links to offer more cost benefits to enterprise customers. However, due to the insecure nature of the public Internet, it is mandatory to use encryption of traffic between any two SDWAN edge devices installed behind NAT gateways. Which overlay method can provide optimal transport over unreliable underlay networks that are behind NAT gateways?
Correct Answer:
C
Company XYZ uses an office model where the employees can use any open desk and plug their laptops in. They want to authenticate the end users using their domain username and password before allowing them access to the network. The design must also accommodate the ability of controlling traffic within the same group or subnet if a macro (or micro) segmentation-based model is adopted in the future. Which protocol can be recommended for this design to authenticate end users?
Correct Answer:
D
https://www.networkstraining.com/what-is-cisco-ise/