Which control plane policy limits BGP traffic that is destined to the CPU to 1 Mbps and ignores BGP traffic that is sent at higher rate?
Refer to the exhibit. Which control plane policy limits BGP traffic that is destined to the CPU to 1 Mbps and ignores BGP traffic that is sent at higher rate?A . policy-map SHAPE_BGPB . policy-map LIMIT_BGPC . policy-map POLICE_BGPD . policy-map COPPView AnswerAnswer: D
Which two actions are needed to allow the file to copy?
An engineer is trying to copy an IOS file from one router to another router by using TFTP. Which two actions are needed to allow the file to copy? (Choose two.)A . Configure the TFTP authentication on the source router with the tftp-server authentication local command.B . Configure a user...
Drag and Drop Question
Drag and Drop Question Drag and drop the MPLS VPN concepts from the left on to the correct descriptions on the right. View AnswerAnswer:
Which configuration configures a policy on R1 to forward any traffic that is sourced from the 192.168.130.0/24 network to R2?
Refer to the exhibit. Which configuration configures a policy on R1 to forward any traffic that is sourced from the 192.168.130.0/24 network to R2? A) B) C) D) A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: D
Which subnet is redistributed from EIGRP to OSPF routing protocols?
Refer to the exhibit. Which subnet is redistributed from EIGRP to OSPF routing protocols?A . 10.2.2.0/24B . 10.1.4.0/26C . 10.1.2.0/24D . 10.2.3.0/26View AnswerAnswer: A Explanation: Only the subnet that matches prefix-list OSPF-TAG-PRF-1 will be redistributed into OSPF(as indicated by "route-map OSPF-TAG-1 permit 10').This subnet must match the prefix-list OSPF-TAG-PRF-1 so...
Drag and Drop Question
Drag and Drop Question Drag and drop the packet types from the left on to the correct descriptions on the right. View AnswerAnswer: Explanation: Unlike legacy network technologies such as ISDN, Frame Relay, and ATM that defined separate data and control channels, IP carries all packets within a single pipe....
Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office? (Choose two.)
Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office? (Choose two.)A . DM VPNB . MPLS VPNC . Virtual Tunnel Interface (VTI)D . SSL VPNE . PPPoEView AnswerAnswer: AC Explanation: IP security (IPsec) virtual tunnel interfaces (VT Is) provide a routable interface...
What is the reason that the router still sends traffic that is destined to AS 690 to a neighbor other than 10.222.1.1?
Refer to the exhibit. A router receiving BGP routing updates from multiple neighbors for routers in AS 690. What is the reason that the router still sends traffic that is destined to AS 690 to a neighbor other than 10.222.1.1?A . The local preference value in another neighbor statement is...
Which list defines the contents of an MPLS label?
Which list defines the contents of an MPLS label?A . 20-bit label; 3-bit traffic class; 1-bit bottom stack; 8-bit TTLB . 32-bit label; 3-bit traffic class; 1-bit bottom stack; 8-bit TTLC . 20-bit label; 3-bit flow label; 1-bit bottom stack; 8-bit hop limitD . 32-bit label; 3-bit flow label; 1-bit...
Which two actions are needed to allow the file to copy?
An engineer is trying to copy an IOS file from one router to another router by using TFTP. Which two actions are needed to allow the file to copy? (Choose two.)A . Configure the TFTP authentication on the source router with the tftp-server authentication local command.B . Configure a user...