Which OSPF networks types are compatible and allow communication through the two peering devices?

Which OSPF networks types are compatible and allow communication through the two peering devices?A . broadcast to nonbroadcastB . point-to-multipoint to nonbroadcastC . broadcast to point-to-pointD . point-to-multipoint to broadcastView AnswerAnswer: A Explanation: The following different OSPF types are compatible with each other: + Broadcast and Non-Broadcast (adjust hello/dead timers)...

January 31, 2024 No Comments READ MORE +

Which configuration commands can the engineer use to allow this traffic without disrupting existing traffic flows?

Refer to the exhibit. An engineer must modify the access control list EGRESS to allow all IP traffic from subnet 10.1.10.0/24 to 10.1.2.0/24. The access control list is applied in the outbound direction on router interface GigabitEthemet 0/1. Which configuration commands can the engineer use to allow this traffic without...

January 30, 2024 No Comments READ MORE +

What is a characteristic of MACsec?

What is a characteristic of MACsec?A . 802.1AE provides encryption and authentication servicesB . 802.1AE is bult between the host and switch using the MKA protocol, which negotiates encryption keys based on the master session key from a successful 802.1X sessionC . 802.1AE is bult between the host and switch...

January 30, 2024 No Comments READ MORE +

What is the role of the RP in PIM sparse mode?

What is the role of the RP in PIM sparse mode?A . The RP responds to the PIM join messages with the source of requested multicast groupB . The RP maintains default aging timeouts for all multicast streams requested by the receivers.C . The RP acts as a control-plane node...

January 30, 2024 No Comments READ MORE +

Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial?

Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial?A . under interface saturation conditionB . under network convergence conditionC . under all network conditionD . under traffic classification and marking conditions.View AnswerAnswer: A

January 30, 2024 No Comments READ MORE +

Drag and drop the characteristics from the left onto the routing protocols they describe on the right

DRAG DROP Drag and drop the characteristics from the left onto the routing protocols they describe on the right. View AnswerAnswer:

January 30, 2024 No Comments READ MORE +

Which data is properly formatted with JSON?

Which data is properly formatted with JSON? A) B) C) D) A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: A

January 30, 2024 No Comments READ MORE +

Which measure is used by an NTP server to indicate its closeness to the authoritative time source?

Which measure is used by an NTP server to indicate its closeness to the authoritative time source?A . latencyB . hop countC . time zoneD . stratumView AnswerAnswer: D

January 30, 2024 No Comments READ MORE +

Which algorithms are used to secure REST API from brute attacks and minimize the impact?

Which algorithms are used to secure REST API from brute attacks and minimize the impact?A . SHA-512 and SHA-384B . MD5 algorithm-128 and SHA-384C . SHA-1, SHA-256, and SHA-512D . PBKDF2, BCrypt, and SCryptView AnswerAnswer: D Explanation: One of the best practices to secure REST APIs is using password hash....

January 30, 2024 No Comments READ MORE +

Which is the cause of the message?

Refer to the Exhibit. An engineer configures a new HSRP group. While reviewing the HSRP status, the engineer sees the logging message generated on R2. Which is the cause of the message?A . The same virtual IP address has been configured for two HSRP groupsB . The HSRP configuration has...

January 30, 2024 No Comments READ MORE +