In which two ways does the IPv6 First-Hop Security Binding Table operate? (Choose two)
In which two ways does the IPv6 First-Hop Security Binding Table operate? (Choose two)
A . by IPv6 routing protocols to securely build neighborships without the need of authentication
B . by the recovery mechanism to recover the binding table in the event of a device reboot
C . by IPv6 HSRP to make sure neighbors are authenticated before being used as gateways
D . by various IPv6 guard features to validate the data link layer address
E . by storing hashed keys for IPsec tunnels for the built-in IPsec features
Answer: B D
Latest 300-410 Dumps Valid Version with 213 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Overview of the IPv6 First-Hop Security Binding Table
…
This database, or binding table, is used by various IPv6 guard features to validate the link-layer address (LLA), the IPv4 or IPv6 address, and the prefix binding of the neighbors to prevent spoofing and redirect attacks.
…
IPv6 First-Hop Security Binding Table Recovery Mechanism
The IPv6 first-hop security binding table recovery mechanism enables the binding table to recover in the event of a device reboot.