Which security mechanism can you implement to protect the OSPF" information that a router receives?
Which security mechanism can you implement to protect the OSPF" information that a router receives?A . privilege 15 credentialsB . administrator username and password authenticationC . RADIUS authenticationD . cryptographic authenticationView AnswerAnswer: D
Which two values does EIGRP use to calculate the metric of a route in a converged EIGRP topology? (Choose two)
Which two values does EIGRP use to calculate the metric of a route in a converged EIGRP topology? (Choose two)A . redundancyB . bandwidthC . costD . delayE . hopsView AnswerAnswer: BD
What is the minimum number of APICs requirement for a production ACI Fabric to continue to operate?
When APIC is down on cluster device ... What is the minimum number of APICs requirement for a production ACI Fabric to continue to operate?A . 1B . 2C . 3D . 4View AnswerAnswer: C Explanation: From Designing for Cisco Network Service Architecture Fourth Edition: The recommended minimum sizing has...
Which two metric are used by EIGRP by default to calculate its cost? (Choose two)
Which two metric are used by EIGRP by default to calculate its cost? (Choose two)A . BandwidthB . LatencyC . MTUD . LoadView AnswerAnswer: A, B
Which two BGP attributes can be set with outbound policy to manipulate inbound traffic, if honored by the remote Autonomous system (choose two)?
Which two BGP attributes can be set with outbound policy to manipulate inbound traffic, if honored by the remote Autonomous system (choose two)?A . Multi-exit discriminator (MED)B . AS pathC . Local PreferenceD . WeightView AnswerAnswer: A, B
What are the two methods of ensuring that the RPF check passes? (Choose two)
What are the two methods of ensuring that the RPF check passes? (Choose two)A . implementing static mroutesB . implementing OSPF routing protocolC . implementing MBGPD . disabling the interface of the router back to the multicast sourceE . disabling BGP routing protocolView AnswerAnswer: AC Explanation: The router determines the...
Which technology achieves this goals?
An engineer wants to have a resilent access layer in data center so that switches on the access layer have separate physical connections to a pair of redundant distribution switches. Which technology achieves this goals?A . PaGPB . LACPC . VSLD . EVPCE . VSSF . ECMPView AnswerAnswer: E
Which correction allows for a more efficient design?
Refer to the exhibit. An engineer must provide a redesign for the distribution and access layers of the network. Which correction allows for a more efficient design?A . Change the link between Distribution Switch A and Distribution Switch B to be a routed link.B . Reconfigure the Distribution Switch A...
What are two benefits of using 6to4 as an IPv6 transition method? (Choose two.)
What are two benefits of using 6to4 as an IPv6 transition method? (Choose two.)A . 6to4 tunnels allow isolated IPv6 domains to be remotely connected over IPv4 networks.B . Manual configuration (scalability) is easier.C . Point-to-multipoint automatic tunneling (automatic 6to4) is available.D . An infinite number of address spaces are...
Which option is a design recommendation for route summarizations?
Which option is a design recommendation for route summarizations?A . Filtered redistribution for the prevention of re-advertising of routesB . Routing protocol stub areasC . Route summarization for scalable routing and addressing designD . Defensive route filtering to defence against inappropriate routing trafficE . Route summarization to support greater volumes...