option
Questions
ayuda
daypo
search.php

the kimball model

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
the kimball model

Description:
kimbal model basics

Creation Date: 2025/07/17

Category: Others

Number of questions: 26

Rating:(0)
Share the Test:
Nuevo ComentarioNuevo Comentario
New Comment
NO RECORDS
Content:

What is the recommended MTU size for a Cisco SD-Access Fabric?. A. 4464. B. 17914. C. 9100. D. 1500.

What is the function of the fabric control plane node in a Cisco SD-Access deployment?. A. It is responsible for policy application and network segmentation in the fabric. B. It performs traffic encapsulation and security profiles enforcement in the fabric. C. It holds a comprehensive database that tracks endpoints and networks in the fabric. D. It provides integration with legacy nonfabric-enabled environments.

What is the data policy in a Cisco SD-WAN deployment?. A. list of ordered statements that define node configurations and authentication used within the SD-WAN overlay. B. set of statements that defines how data is forwarded based on IP packet information and specific VPNs. C. detailed database mapping several kinds of addresses with their corresponding location. D. group of services tested to guarantee devices and links liveliness within the SD-WAN overlay.

In Cisco SD-WAN, which protocol is used to measure link quality?. a. IPsec. B. OMP. C. RSVP. D. BFD.

How is 802.11 traffic handled in a fabric-enabled SSID?. A. centrally switched back to WLC where the user traffic is mapped to a VXLAN on the WLC. B. converted by the AP into 802.3 and encapsulated into VXLAN. C. centrally switched back to WLC where the user traffic is mapped to a VLAN on the WLC. D. converted by the AP into 802.3 and encapsulated into a VLAN.

An engineer is installing a new pair of routers in a redundant configuration. When checking on the standby status of each router, the engineer notices that the routers are not functioning as expected. Which action will resolve the configuration error?. A. configure matching hold and delay timers. B. configure matching key-strings. C. configure matching priority values. D. configure unique virtual IP addresses.

An engineer has deployed a single Cisco 5520 WLC with a management IP address of 172 16.50.5/24. The engineer must register 50 new Cisco AIR-CAP2802I- E-K9 access points to the WLC using DHCP option 43. The access points are connected to a switch in VLAN 100 that uses the 172.16.100.0/24 subnet. The engineer has configured the DHCP scope on the switch as follows: Network 172.16.100.0 255.255.255.0 Default Router 172.16.100.1 Option 43 ASCII 172.16.50.5 The access points are failing to join the wireless LAN controller. Which action resolves the issue?. A. configure option 43 Hex F104.AC10.3205. B. configure option 43 Hex F104.CA10.3205. C. configure dns-server 172.16.50.5. D. configure dns-server 172. 16.100.1.

What is the role of vSmart in a Cisco SD-WAN environment?. A. to establish secure control plane connections. B. to monitor, configure, and maintain SD-WAN devices. C. to provide secure data plane connectivity over WAN links. D. to perform initial authentication of devices.

Which action is performed by Link Management Protocol in a Cisco StackWise Virtual domain?. A. It determines which switch becomes active or standby. B. It determines if the hardware is compatible to form the StackWise Virtual domain. C. It rejects any unidirectional link traffic forwarding. D. It discovers the StackWise domain and brings up SVL interfaces.

Which LISP device is responsible for publishing EID-to-RLOC mappings for a site?. A. ETR. B. MR. C. ITR. D. MS.

Which two GRE features are configured to prevent fragmentation? (Choose two.). A. TCP window size. B. IP MTU. C. TCP MSS. D. DF bit clear. E. MTU ignore.

What are two reasons why broadcast radiation is caused in the virtual machine environment? (Choose two.). A. vSwitch must interrupt the server CPU to process the broadcast packet. B. The Layer 2 domain can be large in virtual machine environments. C. Virtual machines communicate primarily through broadcast mode. D. Communication between vSwitch and network switch is broadcast based. E. Communication between vSwitch and network switch is multicast based.

Assuming that R1 is a CE router, which VRF is assigned to Gi0/0 on R1?. A. default VRF. B. VRF VPN_A. C. VRF VPN_B. D. management VRF.

Which statement about route targets is true when using VRF-Lite?. A. Route targets control the import and export of routes into a customer routing table. B. When BGP is configured, route targets are transmitted as BGP standard communities. C. Route targets allow customers to be assigned overlapping addresses. D. Route targets uniquely identify the customer routing table.

Which LISP infrastructure device provides connectivity between non-LISP sites and LISP sites by receiving non-LISP traffic with a LISP site destination?. A. PITR. B. map resolver. C. map server. D. PETR.

Which statement about VXLAN is true?. A. VXLAN encapsulates a Layer 2 frame in an IP-UDP header, which allows Layer 2 adjacency across router boundaries. B. VXLAN uses the Spanning Tree Protocol for loop prevention. C. VXLAN extends the Layer 2 Segment ID field to 24-bits, which allows up to 4094 unique Layer 2 segments over the same network. D. VXLAN uses TCP as the transport protocol over the physical data center network.

Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel?. A. MSS. B. MTU. C. MRU. D. window size.

Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel?. A. MSS. B. MTU. C. MRU. D. window size.

Which two namespaces does the LISP network architecture and protocol use? (Choose two.). A. TLOC. B. RLOC. C. DNS. D. VTEP. E. EID.

Which action is a function of VTEP in VXLAN?. A. tunneling traffic from IPv6 to IPv4 VXLANs. B. allowing encrypted communication on the local VXLAN Ethernet segment. C. encapsulating and de-encapsulating VXLAN Ethernet frames. D. tunneling traffic from IPv4 to IPv6 VXLANs.

Drag and drop the LISP components from the left onto the functions they perform on the right. Not all options are used. Select and Place: LISP. Map resolver. proxy ETR. Route reflector. ITR. map server.

Which two actions provide controlled Layer 2 network connectivity between virtual machines running on the same hypervisor? (Choose two.). A. Use a virtual switch provided by the hypervisor. B. Use a virtual switch running as a separate virtual machine. C. Use VXLAN fabric after installing VXLAN tunneling drivers on the virtual machines. D. Use a single routed link to an external router on stick. E. Use a single trunk link to an external Layer2 switch.

Which two actions provide controlled Layer 2 network connectivity between virtual machines running on the same hypervisor? (Choose two.). A. Use a virtual switch provided by the hypervisor. B. Use a virtual switch running as a separate virtual machine. B. Use a virtual switch running as a separate virtual machine. C. Use VXLAN fabric after installing VXLAN tunneling drivers on the virtual machines. D. Use a single routed link to an external router on stick. E. Use a single trunk link to an external Layer2 switch.

Refer to the exhibit. A network engineer configures a GRE tunnel and enters the show interface tunnel command. What does the output confirm about the configuration?. A. The keepalive value is modified from the default value. B. The physical interface MTU is 1476 bytes. C. The tunnel mode is set to the default. D. Interface tracking is configured.

What it the purpose of the LISP routing and addressing architecture?. A. It creates two entries for each network node, one for its identity and another for its location on the network. B. It allows LISP to be applied as a network virtualization overlay though encapsulation. C. It allows multiple instances of a routing table to co-exist within the same router. D. It creates head-end replication used to deliver broadcast and multicast frames to the entire network.

What function does VXLAN perform in a Cisco SD-Access deployment?. A. policy plane forwarding. B. control plane forwarding. C. data plane forwarding. D. systems management and orchestration.

Report abuse