Which control plane policy limits BGP traffic that is destined to the CPU to 1 Mbps and ignores BGP traffic that is sent at higher rate?

Refer to the exhibit. Which control plane policy limits BGP traffic that is destined to the CPU to 1 Mbps and ignores BGP traffic that is sent at higher rate?A . policy-map SHAPE_BGPB . policy-map LIMIT_BGPC . policy-map POLICE_BGPD . policy-map COPPView AnswerAnswer: D

May 18, 2021 No Comments READ MORE +

Which two actions are needed to allow the file to copy?

An engineer is trying to copy an IOS file from one router to another router by using TFTP. Which two actions are needed to allow the file to copy? (Choose two.)A . Configure the TFTP authentication on the source router with the tftp-server authentication local command.B . Configure a user...

May 18, 2021 No Comments READ MORE +

Drag and Drop Question

Drag and Drop Question Drag and drop the MPLS VPN concepts from the left on to the correct descriptions on the right. View AnswerAnswer:

May 18, 2021 No Comments READ MORE +

Which configuration configures a policy on R1 to forward any traffic that is sourced from the 192.168.130.0/24 network to R2?

Refer to the exhibit. Which configuration configures a policy on R1 to forward any traffic that is sourced from the 192.168.130.0/24 network to R2? A) B) C) D) A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: D

May 17, 2021 No Comments READ MORE +

Which subnet is redistributed from EIGRP to OSPF routing protocols?

Refer to the exhibit. Which subnet is redistributed from EIGRP to OSPF routing protocols?A . 10.2.2.0/24B . 10.1.4.0/26C . 10.1.2.0/24D . 10.2.3.0/26View AnswerAnswer: A Explanation: Only the subnet that matches prefix-list OSPF-TAG-PRF-1 will be redistributed into OSPF(as indicated by "route-map OSPF-TAG-1 permit 10').This subnet must match the prefix-list OSPF-TAG-PRF-1 so...

May 17, 2021 No Comments READ MORE +

Drag and Drop Question

Drag and Drop Question Drag and drop the packet types from the left on to the correct descriptions on the right. View AnswerAnswer: Explanation: Unlike legacy network technologies such as ISDN, Frame Relay, and ATM that defined separate data and control channels, IP carries all packets within a single pipe....

May 17, 2021 No Comments READ MORE +

Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office? (Choose two.)

Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office? (Choose two.)A . DM VPNB . MPLS VPNC . Virtual Tunnel Interface (VTI)D . SSL VPNE . PPPoEView AnswerAnswer: AC Explanation: IP security (IPsec) virtual tunnel interfaces (VT Is) provide a routable interface...

May 17, 2021 No Comments READ MORE +

What is the reason that the router still sends traffic that is destined to AS 690 to a neighbor other than 10.222.1.1?

Refer to the exhibit. A router receiving BGP routing updates from multiple neighbors for routers in AS 690. What is the reason that the router still sends traffic that is destined to AS 690 to a neighbor other than 10.222.1.1?A . The local preference value in another neighbor statement is...

May 17, 2021 No Comments READ MORE +

Which list defines the contents of an MPLS label?

Which list defines the contents of an MPLS label?A . 20-bit label; 3-bit traffic class; 1-bit bottom stack; 8-bit TTLB . 32-bit label; 3-bit traffic class; 1-bit bottom stack; 8-bit TTLC . 20-bit label; 3-bit flow label; 1-bit bottom stack; 8-bit hop limitD . 32-bit label; 3-bit flow label; 1-bit...

May 16, 2021 No Comments READ MORE +

Which two actions are needed to allow the file to copy?

An engineer is trying to copy an IOS file from one router to another router by using TFTP. Which two actions are needed to allow the file to copy? (Choose two.)A . Configure the TFTP authentication on the source router with the tftp-server authentication local command.B . Configure a user...

May 16, 2021 No Comments READ MORE +