A. IPsec
B. Generic Routing Encapsulation
C. SFTP
D. WPA2
E. HTTPS
F. null cipher
G. BiDi
A. priority queuing
B. queuing
C. WRED
D. CBWFQ
E. DSCP remarking
F. fair queuing
A. Use supernetting.
B. Use policy-based routing.
C. Apply a router ACL.
D. Use route summarization.
E. Use VLSM.
A. next-hop tracking
B. spanning-tree implications
C. routing protocol redistribution
D. NetFlow reporting accuracy
E. process for manually altering routes
F. overlapping application requirements
A. 2
B. 1
C. 4
D. 6
E. 5
F. 3
A. the size of the TCAM memory of the Layer 2 switch
B. the size of the VLAN table of the Layer 2 switch
C. the length of the Tag Protocol ID field of the 802.1Q frame
D. the length of the VLAN ID field of the 802.1Q frame
A. Cisco Nexus 1000V
B. OpenFlow
C. MPLS VPNs
D. VXLAN
E. OVSDB
F. OTV