Which security mechanism can you implement to protect the OSPF" information that a router receives?

Which security mechanism can you implement to protect the OSPF" information that a router receives?A . privilege 15 credentialsB . administrator username and password authenticationC . RADIUS authenticationD . cryptographic authenticationView AnswerAnswer: D

March 8, 2018 No Comments READ MORE +

Which two values does EIGRP use to calculate the metric of a route in a converged EIGRP topology? (Choose two)

Which two values does EIGRP use to calculate the metric of a route in a converged EIGRP topology? (Choose two)A . redundancyB . bandwidthC . costD . delayE . hopsView AnswerAnswer: BD

March 6, 2018 No Comments READ MORE +

What is the minimum number of APICs requirement for a production ACI Fabric to continue to operate?

When APIC is down on cluster device ... What is the minimum number of APICs requirement for a production ACI Fabric to continue to operate?A . 1B . 2C . 3D . 4View AnswerAnswer: C Explanation: From Designing for Cisco Network Service Architecture Fourth Edition: The recommended minimum sizing has...

March 5, 2018 No Comments READ MORE +

Which two metric are used by EIGRP by default to calculate its cost? (Choose two)

Which two metric are used by EIGRP by default to calculate its cost? (Choose two)A . BandwidthB . LatencyC . MTUD . LoadView AnswerAnswer: A, B

March 4, 2018 No Comments READ MORE +

Which two BGP attributes can be set with outbound policy to manipulate inbound traffic, if honored by the remote Autonomous system (choose two)?

Which two BGP attributes can be set with outbound policy to manipulate inbound traffic, if honored by the remote Autonomous system (choose two)?A . Multi-exit discriminator (MED)B . AS pathC . Local PreferenceD . WeightView AnswerAnswer: A, B

March 3, 2018 No Comments READ MORE +

What are the two methods of ensuring that the RPF check passes? (Choose two)

What are the two methods of ensuring that the RPF check passes? (Choose two)A . implementing static mroutesB . implementing OSPF routing protocolC . implementing MBGPD . disabling the interface of the router back to the multicast sourceE . disabling BGP routing protocolView AnswerAnswer: AC Explanation: The router determines the...

March 2, 2018 No Comments READ MORE +

Which technology achieves this goals?

An engineer wants to have a resilent access layer in data center so that switches on the access layer have separate physical connections to a pair of redundant distribution switches. Which technology achieves this goals?A . PaGPB . LACPC . VSLD . EVPCE . VSSF . ECMPView AnswerAnswer: E

March 1, 2018 No Comments READ MORE +

Which correction allows for a more efficient design?

Refer to the exhibit. An engineer must provide a redesign for the distribution and access layers of the network. Which correction allows for a more efficient design?A . Change the link between Distribution Switch A and Distribution Switch B to be a routed link.B . Reconfigure the Distribution Switch A...

February 28, 2018 No Comments READ MORE +

What are two benefits of using 6to4 as an IPv6 transition method? (Choose two.)

What are two benefits of using 6to4 as an IPv6 transition method? (Choose two.)A . 6to4 tunnels allow isolated IPv6 domains to be remotely connected over IPv4 networks.B . Manual configuration (scalability) is easier.C . Point-to-multipoint automatic tunneling (automatic 6to4) is available.D . An infinite number of address spaces are...

February 28, 2018 No Comments READ MORE +

Which option is a design recommendation for route summarizations?

Which option is a design recommendation for route summarizations?A . Filtered redistribution for the prevention of re-advertising of routesB . Routing protocol stub areasC . Route summarization for scalable routing and addressing designD . Defensive route filtering to defence against inappropriate routing trafficE . Route summarization to support greater volumes...

February 27, 2018 No Comments READ MORE +