In which two ways does the IPv6 First-Hop Security Binding Table operate? (Choose two)

In which two ways does the IPv6 First-Hop Security Binding Table operate? (Choose two)
A . by IPv6 routing protocols to securely build neighborships without the need of authentication
B . by the recovery mechanism to recover the binding table in the event of a device reboot
C . by IPv6 HSRP to make sure neighbors are authenticated before being used as gateways
D . by various IPv6 guard features to validate the data link layer address
E . by storing hashed keys for IPsec tunnels for the built-in IPsec features

Answer: B D

Latest 300-410 Dumps Valid Version with 213 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
1 Comment
Inline Feedbacks
View all comments
gero
gero
2 years ago

Overview of the IPv6 First-Hop Security Binding Table
…
This database, or binding table, is used by various IPv6 guard features to validate the link-layer address (LLA), the IPv4 or IPv6 address, and the prefix binding of the neighbors to prevent spoofing and redirect attacks.
…
IPv6 First-Hop Security Binding Table Recovery Mechanism

The IPv6 first-hop security binding table recovery mechanism enables the binding table to recover in the event of a device reboot.