You are designing a solution to allow secure communication over the public Internet for a corporate WAN
deployment. For business policy reasons, all branch-to-branch traffic must first pass through the corporate headquarters.
Which solution will work in this scenario?
Answer : D
In a network design using the traditional tiered structure, which two tiers connect to untrusted domains?
(Choose two.)
Answer : B, D
You are designing a network management strategy for a new network. The requirements for the management
of network devices are shown below:
-- Administrator passwords must have an expiration date.
-- Administrators must be assigned role-specific privileges on each device.
In this scenario, which statement is true?
Answer : B
Your campus network is rolling out a BYOD policy. Your design must ensure that guest users are restricted from accessing internal network resources.
Which two actions would solve this problem? (Choose two.)
Answer : A, B
What are two guidelines when designing campus networks? (Choose two.)
Answer : B, C
What are two tiers used in a traditional data center design? (Choose two.)
Answer : A, B
What are two characteristics of using the Virtual Chassis technology in the aggregation tier of a data center? (Choose two.)
Answer : A, C