00:00

QUESTION 36

Which two control plane policer designs must be considered to achieve high availability? (Choose two.)

Correct Answer: AD

QUESTION 37

Which two actions ensure voice quality in a branch location with a low-speed, high-latency WAN connection? (Choose two.)

Correct Answer: CE

QUESTION 38

A network security team observes phishing attacks on a user machine from a remote location. The organization has a policy of saving confidential data on two different systems using different types of authentication. What is the next step to control such events after the security team verifies all users in Zero Trust modeling?

Correct Answer: B

QUESTION 39

What are two common approaches to analyzing and designing networks? (Choose two.)

Correct Answer: AC

QUESTION 40

Which effect of using ingress filtering to prevent spoofed addresses on a network design is true?

Correct Answer: B