What is the reason that the router still sends traffic that is destined to AS 690 to a neighbor other than 10.222.10.1?
Refer to the exhibit. A router receiving BGP routing updates from multiple neighbors for routers in AS 690. What is the reason that the router still sends traffic that is destined to AS 690 to a neighbor other than 10.222.10.1?A . The local preference value in another neighbor statement is...
Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office? (Choose two.)
Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office? (Choose two.)A . DMVPNB . MPLS VPNC . Virtual Tunnel Interface (VTI)D . SSL VPNE . PPPoEView AnswerAnswer: AC Explanation: IP security (IPsec) virtual tunnel interfaces (VTIs) provide a routable interface type for...
Which control plan policy limits BGP traffic that is destined to the CPU to 1 Mbps and ignores BGP traffic that is higher rate?
Refer to the exhibit. Which control plan policy limits BGP traffic that is destined to the CPU to 1 Mbps and ignores BGP traffic that is higher rate?A . policy-map SHAPE_BGPB . policy-map LIMIT_BGPC . policy-map POLICE_BGPD . policy-map COPPView AnswerAnswer: D
Which statement about MPLS LDP router ID is true?
Which statement about MPLS LDP router ID is true?A . The force keyword changes the router ID to the specific address causing any impact.B . The loopback with the highest IP address is selected as the router ID . If not configured, the operational physical interface is chosen as the...
Drag and Drop Question
Drag and Drop Question Drag and drop the MPLS VPN concepts from the left onto the correct descriptions on the right. View AnswerAnswer:
Which command allows traffic to load-balance in an MPLS Layer 3 VPN configuration?
Which command allows traffic to load-balance in an MPLS Layer 3 VPN configuration?A . Multi-paths eibgp 2B . Maximum-paths ibgp 2C . Multi-paths 2D . Maximum-paths 2View AnswerAnswer: B Explanation: The command “maximum-paths [ ibgp ] number-of-paths” configures the maximum number of multipaths allowed. Use the ibgp keyword to configure...
Which two actions are needed to allow the file to copy?
An engineer is trying to copy an IOS file from one router to another router by using TFTP. Which two actions are needed to allow the file to copy? (Choose two.)A . Configure the TFTP authentication on the source router with the tftp-server authentication local command.B . Configure a user...
Which action fixes the issue within the current resources?
Refer to the exhibit. Users report that IP addresses cannot be acquired from the DHCP server. The DHCP server is configured as shown. About 300 total nonconcurrent users are using this DHCP server, but none of them are active for more than two hours per day. Which action fixes the...
Drag and Drop Question
Drag and Drop Question Drag and drop the address from the left onto the correct IPv6 filter purposes on the right. View AnswerAnswer: Explanation: HTTP and HTTPs run on TCP port 80 and 443, respectively and we have to remember them. Syslog runs on UDP port 514 while NTP runs...
Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office? (Choose two.)
Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office? (Choose two.)A . DMVPNB . MPLS VPNC . Virtual Tunnel Interface (VTI)D . SSL VPNE . PPPoEView AnswerAnswer: AC Explanation: IP security (IPsec) virtual tunnel interfaces (VTIs) provide a routable interface type for...