Question 26
After a malicious actor used an open port in a company's lobby, a network architect needs to enhance network security. The solution must enable:
* Security posture check
* Auto remediation capabilities
* Network isolation
* Device and user authentication
Which of the following technologies best meets these requirements?
* Security posture check
* Auto remediation capabilities
* Network isolation
* Device and user authentication
Which of the following technologies best meets these requirements?
Question 27
A network architect is creating a network topology for a global SD-WAN deployment. The business has offices in Asia, Europe, and the United States and makes use of data centers in theUnited States and Europe.
Most traffic between sites must have the lowest latency possible. Which of the following topologies best meets this requirement?
Most traffic between sites must have the lowest latency possible. Which of the following topologies best meets this requirement?
Question 28
A network architect is designing a new network for a rural hospital system. Given the following requirements:
*Highly available
*Consistent data transmission
*Resilient to simultaneous failures
Which of the following topologies should the architect use?
*Highly available
*Consistent data transmission
*Resilient to simultaneous failures
Which of the following topologies should the architect use?
Question 29
A network architect needs to design a solution to ensure every cloud environment network is built to the same baseline. The solution must meet the following requirements:
Use automated deployment.
Easily update multiple environments.
Share code with a community of practice.
Which of the following are the best solutions? (Choose two.)
Use automated deployment.
Easily update multiple environments.
Share code with a community of practice.
Which of the following are the best solutions? (Choose two.)
Question 30
A network administrator is configuring firewall rules to lock down the network from outside attacks. Which of the following should the administrator configure to create the most strict set of rules?
