Which two types of planning approaches are used to develop business-driven network designs and to facilitate the design decisions? (Choose two.)
ac
Reference:
https://community.cisco.com/legacyfs/online/ccde_9781587144615_chapter1.pdf page 18
Which two characteristics are associated with 802.1s? (Choose two.)
ad
Company XYZ is running a redundant private WAN network using OSPF as the underlay protocol. The current design accommodates for redundancy in the network, but it is taking over 30 seconds for the network to reconverge upon failure. Which technique can be implemented in the design to detect such a failure in a subsecond?
e
A large enterprise cloud design team is evaluating different cloud consumption models. What is an example of typical PaaS limitations or concerns that should be considered during service design?
a
Company XYZ wants to secure the data plane of their network. Which two technologies can be included in the security design? (Choose two.)
cd
Reference:
https://www.ciscopress.com/articles/article.asp?p=2928193&seqNum=4
Company XYZ wants to use the FCAPS ISO standard for network management design. The focus of the design should be to minimize network outages by employing a set of procedures and activities to detect and isolate network issues and the appropriate corrective actions to overcome current issues and prevent them from occurring again. Which layer accomplishes this design requirement?
a
A business wants to centralize services via VDI technology and to replace remote WAN desktop PCs with thin client-type machines to reduce operating costs. Which consideration supports the new business requirement?
c
Which parameter is the most important factor to consider when deciding service placement in a cloud solution?
d
Company XYZ uses an office model where the employees can use any open desk and plug their laptops in. They want to authenticate the end users using their domain username and password before allowing them access to the network. The design must also accommodate the ability of controlling traffic within the same group or subnet if a macro (or micro) segmentation-based model is adopted in the future. Which protocol can be recommended for this design to authenticate end users?
b
Data replication is being designed as part of a data protection setup to be run over the network. Which replication strategy is best suited when the primary and secondary systems are physically close to each other?
a