What is a disadvantage of the traditional three-tier architecture model when east west traffic between different pods must go through the distribution and core layers?
A
Which two actions must merchants do to be compliant with the Payment Card Industry Data Security Standard? (Choose two.)
BC
Which solution component helps to achieve comprehensive threat protection and compliance for migration to multicloud SDX architectures?
D
What are two descriptions of network optimization? (Choose two.)
DE
An engineer is designing the QoS strategy for Company XYZ. Based on initial analysis, a lot of scavenger type of traffic is traversing the network’s 20Mb Internet link toward the service provider. The new design must use a QoS technique that limits scavenger traffic to 2 Mbps, which helps avoid oversubscription of the link during times of congestion. Which QoS technique can be used to facilitate this requirement?
C
A legacy enterprise is using a Service Provider MPLS network to connect its head office and branches. Recently, they added a new branch to their network. Due to physical security concerns, they want to extend their existing IP CCTV network of the head office to the new branch, without any routing changes in the network. They are also under some time constraints. What is the best approach to extend the existing IP CCTV network to the new branch, without incurring any IP address changes?
B
Identity and access management between multiple users and multiple applications has become a mandatory requirement for Company XYZ to fight against ever increasing cybersecurity threats. To achieve this, federated identity services have been deployed in the Company XYZ network to provide single sign-on and Multi-Factor Authentication for the applications and services. Which protocol can be used by Company XYZ to provide authentication and authorization services?
D
A network security team uses a purpose-built tool to actively monitor the campus network, applications, and user activity. The team also analyzes enterprise telemetry data from IPFIX data records that are received from devices in the campus network. Which action can be taken based on the augmented data?
A
An enterprise has identified these causes for inefficient CAPEX spending:
• CAPEX planning is driven by technology and not by business objectives.
• The CAPEX planning team lacks the data it needs to perform due diligence tasks.
• The organizational structure lacks sufficient accountability and incentives.
Which corporate cultural change contributes to improving the effectiveness of CAPEX spending?
C
Which design solution reduces the amount of IGMP state in the network?
C