What is the reason for this error?
Refer to the exhibit. An administrator noticed that after a change was made on R1, the timestamps on the system logs did not match the clock. What is the reason for this error?A . An authentication error with the NTP server results in an incorrect timestamp.B . The keyword localtime...
Which interface configuration must be configured on the spoke A router to enable a dynamic DMVPN tunnel with the spoke B router?
Refer to the exhibit. Which interface configuration must be configured on the spoke A router to enable a dynamic DMVPN tunnel with the spoke B router? A) B) C) D) A. Option A B. Option B C. Option C D. Option DView AnswerAnswer: B Explanation: The command Dip nhrp map...
Which statement about IPv6 ND inspection is true?
Which statement about IPv6 ND inspection is true?A . It learns and secures bindings for stateless autoconfiguration addresses in Layer 3 neighbor tables.B . It learns and secures bindings for stateless autoconfiguration addresses in Layer 2 neighbor tables.C . It learns and secures bindings for stateful autoconfiguration addresses in Layer...
What is needed to fix the problem?
Refer to the exhibit. During troubleshooting it was discovered that the device is not reachable using a secure web browser. What is needed to fix the problem?A . permit tcp port 443B . permit udp port 465C . permit tcp port 465D . permit tcp port 22View AnswerAnswer: A
Which protocol is used to determine the NBMA address on the other end of a tunnel when mGRE is used?
Which protocol is used to determine the NBMA address on the other end of a tunnel when mGRE is used?A . NHRPB . IPsecC . MP-BGPD . OSPFView AnswerAnswer: A
Which action produces the desired configuration?
Refer to the exhibit. An engineer is trying to configure local authentication on the console line, but the device is trying to authenticate using TACACS+. Which action produces the desired configuration?A . Add the aaa authentication login default none command to the global configuration.B . Replace the capital āCā with...
Which configuration configures a policy on R1 to forward any traffic that is sourced from the 192.168.130.0/24 network to R2?
Refer to the exhibit. Which configuration configures a policy on R1 to forward any traffic that is sourced from the 192.168.130.0/24 network to R2? A) B) C) D) A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: D
Which configuration denies Telnet traffic to router 2 from 198A:0:200C::1/64?
Refer to the exhibit. Which configuration denies Telnet traffic to router 2 from 198A:0:200C::1/64? A) B) C) D) A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: A
Which command allows traffic to load-balance in an MPLS Layer 3 VPN configuration?
Which command allows traffic to load-balance in an MPLS Layer 3 VPN configuration?A . multi-paths eibgp 2B . maximum-paths 2C . maximum-paths ibgp 2D . multi-paths 2View AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx-os/mpls/configuration/guide/mpls_cg/mp_vpn_multipath.html
Which transport layer protocol is used to form LDP sessions?
Which transport layer protocol is used to form LDP sessions?A . UDPB . SCTPC . TCPD . RDPView AnswerAnswer: C