Home > Cloud & Virtual Services

Cloud & Virtual Services

May 31st, 2017 Go to comments

Question 1

Question 2

Explanation

Network virtualization architecture has three main components:
+ Network access control and segmentation of classes of users: Users are authenticated and either allowed or denied into a logical partition. Users a
re segmented into employees, contractors and consultants, and guests, with respective access to IT assets. This component identifies users who are authorized to access the network and then places them into the appropriate logical partition.
+ Path isolation: Network isolation is preserved across the entire enterprise: from the edge to the campus to the WAN and back again. This component maintains traffic partitioned over a routed infrastructure and transports traffic over and between isolated partitions. The function of mapping isolated paths to VLANs and to virtual services is also performed in component.
+ Network Services virtualization: This component provides access to shared or dedicated network services such as security, quality of service (QoS), and address management (Dynamic Host Configuration Protocol [DHCP] and Domain Name System [DNS]). It also applies policy per partition and isolates application environments, if required.

Cisco_network_virtualization.jpg

Reference: http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-series-switches/white_paper_c11-531522.pdf

Question 3

Question 4

Explanation

Network virtualization architecture has three main components:
+ Network access control and segmentation of classes of users: Users are authenticated and either allowed or denied into a logical partition. Users are segmented into employees, contractors and consultants, and guests, with respective access to IT assets. This component identifies users who are authorized to access the network and then places them into the appropriate logical partition.
+ Path isolation: Network isolation is preserved across the entire enterprise: from the edge to the campus to the WAN and back again. This component maintains traffic partitioned over a routed infrastructure and transports traffic over and between isolated partitions. The function of mapping isolated paths to VLANs and to virtual services is also performed in component.
+ Network Services virtualization: This component provides access to shared or dedicated network services such as security, quality of service (QoS), and address management (Dynamic Host Configuration Protocol [DHCP] and Domain Name System [DNS]). It also applies policy per partition and isolates application environments, if required.

Reference: http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-series-switches/white_paper_c11-531522.pdf

Comments (20) Comments
  1. Nick
    June 9th, 2017

    What is GSS

  2. Becky
    June 9th, 2017

    Can some explain Q3?

  3. Mose
    June 13th, 2017
  4. Allen
    June 28th, 2017

    @Mose, can you provide the complete dump.

  5. Lisa.sweetheart.ccna@gmail.com
    July 10th, 2017

    CAN SOMEONE PLEASE SEND ME THE LATEST DUMPS I’M WRITING VERY SOON. PLS SEND TO LISA.SWEETHEART.CCNA @ GMAIL.COM

    THANK YOU
    MWAH XOXOXO

  6. Kaycee
    July 27th, 2017

    Pls where do I see these questions. I only see explanations…

  7. CCNA Helper
    July 28th, 2017

    What are the three major components of cisco network virtualization ? (Choose Three)
    A. network access control
    B. path isolation
    C. virtual network services
    D. policy enforcement
    Correct Answer: ABC

  8. jjj
    August 15th, 2017

    someone orient me on how the exam is structured

  9. koijoijo
    August 23rd, 2017

    joijoju uhhiu hi

  10. koijoijo
    August 23rd, 2017

    Network virtualization architecture has three main components:
    + Network access control and segmentation of classes of users: Users are authenticated and either allowed or denied into a logical partition. Users are segmented into employees, contractors and consultants, and guests, with respective access to IT assets. This component identifies users who are authorized to access the network and then places them into the appropriate logical partition.
    + Path isolation: Network isolation is preserved across the entire enterprise: from the edge to the campus to the WAN and back again. This component maintains traffic partitioned over a routed infrastructure and transports traffic over and between isolated partitions. The function of mapping isolated paths to VLANs and to virtual services is also performed in component.
    + Network Services virtualization: This component provides access to shared or dedicated network services such as security, quality of service (QoS), and address management (Dynamic Host Configuration Protocol [DHCP] and Domain Name System [DNS]). It also applies policy per partition and isolates application environments, if required.

  11. koijoijo
    August 23rd, 2017

    Cisco Wireless is designed to provide 802.11 wireless networking solutions for enterprises and service providers. Cisco Wireless simplifies deploying and managing large-scale wireless LANs and enables a unique best-in-class security infrastructure. The operating system manages all data client, communications, and system administration functions, performs radio resource management (RRM) functions, manages system-wide mobility policies using the operating system security solution, and coordinates all security functions using the operating system security framework.

  12. koijoijo
    August 23rd, 2017

    Star is the most popular topology for Ethernet topology but hub and spoke is the most appropriate WAN topology.

    In a Hub-and-spoke network topology, one physical site act as Hub (Example, Main Office or Head Quarter), while other physical sites act as spokes. Spoke sites are connected to each other via Hub site. In Hub-and-spoke topology, the network communication between two spokes always travel through the hub (except when using DMVPN Phase II or Phase III where spokes can communicate with each other directly). The networking device at Hub site is often much more powerful than the ones at spoke sites.

  13. koijoijo
    August 23rd, 2017

    If you have any questions don’t hesitate i will help you all.
    Hari Om

  14. koijoijo
    August 23rd, 2017

    Im ready to help guys common ask qestions

  15. hl
    September 2nd, 2017

    Which three technical services support cloud computing?
    A. network-monitored power sources
    B. layer 3 network routing
    C. ip localization
    D. redundant connections
    E. VPN connectivity
    F. extended SAN services

    Please give the answers with explanations. thanks in advance.

  16. Joven
    September 25th, 2017

    Which three technical services support cloud computing?
    A. network-monitored power sources
    B. layer 3 network routing
    C. ip localization
    D. redundant connections
    E. VPN connectivity
    F. extended SAN services

    Why DEF instead of AEF? please give us an explanation.

  17. Anonymous
    September 27th, 2017

    Passed today,
    The IT-Libraries dumps are still valid (742q), you can download the dumps from h*t*t*p*s*:*/*/*w*w*w*.*i*t*l*i*b*r*a*r*i*e*s*.*c*o*m*/*d*o*w**n*l*o*a*d*s*/*2*0*0*-*1*2*5*-*2*/ (remove *)

  18. moatasem
    October 10th, 2017

    Can you send me the dump with the 742q to my email address
    Moatasem82 at hotmail.com please

  19. moatasem
    October 10th, 2017
  20. Anonymous
    October 17th, 2017

    @moatasem the new ones from them are valid.
    Passed today with 9xx

Add a Comment