Which OSPF networks types are compatible and allow communication through the two peering devices?
Which OSPF networks types are compatible and allow communication through the two peering devices?A . broadcast to nonbroadcastB . point-to-multipoint to nonbroadcastC . broadcast to point-to-pointD . point-to-multipoint to broadcastView AnswerAnswer: A Explanation: The following different OSPF types are compatible with each other: + Broadcast and Non-Broadcast (adjust hello/dead timers)...
Which configuration commands can the engineer use to allow this traffic without disrupting existing traffic flows?
Refer to the exhibit. An engineer must modify the access control list EGRESS to allow all IP traffic from subnet 10.1.10.0/24 to 10.1.2.0/24. The access control list is applied in the outbound direction on router interface GigabitEthemet 0/1. Which configuration commands can the engineer use to allow this traffic without...
What is a characteristic of MACsec?
What is a characteristic of MACsec?A . 802.1AE provides encryption and authentication servicesB . 802.1AE is bult between the host and switch using the MKA protocol, which negotiates encryption keys based on the master session key from a successful 802.1X sessionC . 802.1AE is bult between the host and switch...
What is the role of the RP in PIM sparse mode?
What is the role of the RP in PIM sparse mode?A . The RP responds to the PIM join messages with the source of requested multicast groupB . The RP maintains default aging timeouts for all multicast streams requested by the receivers.C . The RP acts as a control-plane node...
Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial?
Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial?A . under interface saturation conditionB . under network convergence conditionC . under all network conditionD . under traffic classification and marking conditions.View AnswerAnswer: A
Drag and drop the characteristics from the left onto the routing protocols they describe on the right
DRAG DROP Drag and drop the characteristics from the left onto the routing protocols they describe on the right. View AnswerAnswer:
Which data is properly formatted with JSON?
Which data is properly formatted with JSON? A) B) C) D) A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: A
Which measure is used by an NTP server to indicate its closeness to the authoritative time source?
Which measure is used by an NTP server to indicate its closeness to the authoritative time source?A . latencyB . hop countC . time zoneD . stratumView AnswerAnswer: D
Which algorithms are used to secure REST API from brute attacks and minimize the impact?
Which algorithms are used to secure REST API from brute attacks and minimize the impact?A . SHA-512 and SHA-384B . MD5 algorithm-128 and SHA-384C . SHA-1, SHA-256, and SHA-512D . PBKDF2, BCrypt, and SCryptView AnswerAnswer: D Explanation: One of the best practices to secure REST APIs is using password hash....
Which is the cause of the message?
Refer to the Exhibit. An engineer configures a new HSRP group. While reviewing the HSRP status, the engineer sees the logging message generated on R2. Which is the cause of the message?A . The same virtual IP address has been configured for two HSRP groupsB . The HSRP configuration has...