Which action resolves the issue without opening full access to this router?
Refer to the exhibit. The ACL is placed on the inbound GigabitEthernet 0/1 interface of the router. Host 192.168.10.10 cannot SSH to host 192.168.100.1 even though the flow is permitted. Which action resolves the issue without opening full access to this router?A . Temporarily move the permit ip any any...
What are the two solutions to fix the issue?
Refer to the exhibit. BGP is flapping after the CoPP policy is applied. What are the two solutions to fix the issue? (Choose two)A . Configure BGP in the COPP-CRITICAL-7600 ACLB . Configure a higher value for CIR under the default class to allow more packets during peak trafficC ....
How is the issue fixed?
Refer to the exhibit. An engineer wanted to set a tag of 30 to route 10.1.80.65/32 but it failed. How is the issue fixed?A . Modify route-map ospf-to-eigrp permit 30 and match prefix-list ccnp2.B . Modify route-map ospf-to-eigrp permit 10 and match prefix-list ccnp2.C . Modify prefix-list ccnp3 to add...
What action will fix the issue?
Refer to the exhibit. R1 is connected with R2 via GigabitEthernet0/0, and R2 cannot ping R1. What action will fix the issue?A . Fix route dampening configured on the router.B . Replace the SFP module because it is not supported.C . Fix IP Event Dampening configured on the interface.D ....
Which action fixes the issue while keeping the reachability from R5 to 10.1.1.0/24 network?
Refer to the exhibit. To provide reachability to network 10.1.1.0/24 from R5, the network administrator redistributes EIGRP into OSPF on R3 but notices that R4 is now taking a suboptimal path through R5 to reach 10.1.1.0/24 network. Which action fixes the issue while keeping the reachability from R5 to 10.1.1.0/24...
What is an advantage of using BFD?
What is an advantage of using BFD?A . It detects local link failure at layer 1 and updates routing tableB . It detects local link failure at layer 3 and updates routing protocolsC . It has sub-second failure detection for layer 1 and layer 2 problemsD . It has sub-second...
Drag and Drop the IPv6 First-Hop Security features from the left onto the definitions on the right.
Drag and Drop the IPv6 First-Hop Security features from the left onto the definitions on the right. View AnswerAnswer: Explanation The DHCPv6 Guard feature blocks DHCP reply and advertisement messages that originate from unauthorized DHCP servers and relay agents that forward DHCP packets from servers to clients. Client messages or...
Drag and drop the operations from the left onto the locations where the operations are performed on the right.
Drag and drop the operations from the left onto the locations where the operations are performed on the right. View AnswerAnswer:
What action should be taken to resolve this issue?
Refer to the exhibit. R1 is being monitored using SNMP and monitoring devices are getting only partial information. What action should be taken to resolve this issue?A . Modify the access list to include snmptrapB . Modify the CoPP policy to increase the configured exceeded limit for SNMPC . Modify...
What is the WAN IP address of another spoke router within the DMVPN network?
Refer to the exhibit. An engineer has configured DMVPN on a spoke router. What is the WAN IP address of another spoke router within the DMVPN network?A . 192.168.1.1B . 172.18.16.2C . 192.168.1.4D . 172.18.46.2View AnswerAnswer: B Explanation From the output we can see there are 2 NHRP Peers. The...