Which option is the best for protecting CPU utilization on a device?
Which option is the best for protecting CPU utilization on a device?A . fragmentationB . COPPC . ICMP redirectsD . ICMP unreachable messagesView AnswerAnswer: B
Which action can the engineer take to solve the issue so that all the PCs are reachable?
Refer to the exhibit. After redistribution is enabled between the routing protocols; PC2, PC3, and PC4 cannot reach PC1. Which action can the engineer take to solve the issue so that all the PCs are reachable?A . Set the administrative distance 100 under the RIP process on R2.B . Filter...
Which protocol is used to determine the NBMA address on the other end of a tunnel when mGRE is used?
Which protocol is used to determine the NBMA address on the other end of a tunnel when mGRE is used?A . NHRPB . IPsecC . MP-BGPD . OSPFView AnswerAnswer: A
Which method changes the forwarding decision that a router makes without first changing the routing table or influencing the IP data plane?
Which method changes the forwarding decision that a router makes without first changing the routing table or influencing the IP data plane?A . nonbroadcast multiaccessB . packet switchingC . policy-based routingD . forwarding information baseView AnswerAnswer: C
Which command should the engineer use to complete this action?
A network engineer needs to verify IP SLA operations on an interface that shows on indication of excessive traffic. Which command should the engineer use to complete this action?A . show frequencyB . show trackC . show reachabilityD . show thresholdView AnswerAnswer: B
What is a limitation of IPv6 RA Guard?
What is a limitation of IPv6 RA Guard?A . It is not supported in hardware when TCAM is programmedB . It does not offer protection in environments where IPv6 traffic is tunneled.C . It cannot be configured on a switch port interface in the ingress directionD . Packets that are...
What is needed to fix the problem?
Refer to the exhibit. During troubleshooting it was discovered that the device is not reachable using a secure web browser. What is needed to fix the problem?A . permit tcp port 443B . permit udp port 465C . permit tcp port 465D . permit tcp port 22View AnswerAnswer: A
Drag and drop the packet types from the left onto the correct descriptions on the right
DRAG DROP Drag and drop the packet types from the left onto the correct descriptions on the right. View AnswerAnswer: Explanation: Unlike legacy network technologies such as ISDN, Frame Relay, and ATM that defined separate data and control channels, IP carries all packets within a single pipe. Thus, IP network...
Which command allows the logging on the switch to show the time of the flap according to the clock on the device?
A network engineer is investigating a flapping (up/down) interface issue on a core switch that is synchronized to an NTP server. Log output currently does not show the time of the flap. Which command allows the logging on the switch to show the time of the flap according to the...
Which command allows traffic to load-balance in an MPLS Layer 3 VPN configuration?
Which command allows traffic to load-balance in an MPLS Layer 3 VPN configuration?A . multi-paths eibgp 2B . maximum-paths 2C . Maximum-paths ibgp 2D . multi-paths 2View AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx-os/mpls/configuration/guide/mpls_cg/mp_vpn_multipath.html