Which CLI mode must be used to configure the BGP keychain in Cisco IOS XR software?
Which CLI mode must be used to configure the BGP keychain in Cisco IOS XR software?A . global configuration mode B. routing configuration mode C. BGP neighbor configuration D. mode BGP address-family configuration modeView AnswerAnswer: A
Which action must the engineer perform to configure extended discovery to support the MPLS LDP session between the headend and tailend routers?
An engineer a cisco MPLS tunnel to improve the streaming experience for the clients of a video -on-demand server. Which action must the engineer perform to configure extended discovery to support the MPLS LDP session between the headend and tailend routers? A . Option A B. Option B C. Option...
Which additional step should the engineer use to enable LDP?
Refer to the exhibit: A network operator working for service provider with an employee id 3715 15:021 applied this configuration to a router. Which additional step should the engineer use to enable LDP?A . Disable Cisco Express Forwarding globally B. Delete the static router ID C. Enable MPLS LDP on...
Which configuration must the engineer apply to the router as part of the configuration process?
A service provider requires continuous real-time network monitoring to provide reliable SLAs to its customers. To satisfy this requirement, a network administrator is implementing gRPC dial out on an ASR with TLS. Receiver 192.168.10.2 will be assigned one of the subscriptions, and it will manage the ASR. Which configuration must...
Which type of attack is a Protocol attack?
Which type of attack is a Protocol attack?A . HTTP flood B. TFTP flood C. SYN flood D. SlowlorlsView AnswerAnswer: C Explanation: Protocol Attacks Includes SYN floods, fragmented packet attacks, Ping of Death, Smurf DDoS and more. This type of attack consumes actual server resources,
Which action should be performed on the routers to accomplish this task?
A network engineer is configuring RIP as the routing protocol between multiple PEs and CEs. The engineer must avoid advertising the same routes back to their sources. Which action should be performed on the routers to accomplish this task?A . Configure a different route distinguisher for each prefix. B. Define...
Which two actions must the engineer perform when implementing traffic shaping on the network in order to accomplish this task?
An engineer needs to implement QOS mechanism on customer's network as some applications going over the internet are slower than others. Which two actions must the engineer perform when implementing traffic shaping on the network in order to accomplish this task? (Choose two)A . Configure a queue with sufficient memory...
How can a network administrator secure rest APIs?
How can a network administrator secure rest APIs?A . They can allow read and write privileges to all users B. They can ensure that user sessions are authenticated using TACACS+ only C. They can have a general administrator login for multiple users to access that has command entries logged D....
Which configuration must the team implement on PE-XR1?
Refer to the exhibit. The network team must implement MPLS LDP session protection with two requirements: Session protection is provided for core loopback IP addresses only. The LDP session must remain operational for one hour when the WAN link on PE-XR1 fails. Which configuration must the team implement on PE-XR1?A...
Which additional configuration should the engineer perform on the PE routers to enable the virtual switch instance?
A network engineer is deploying VPLS configuration between multiple PE routers so that customer's remote offices have end-to-end LAN connectivity. Which additional configuration should the engineer perform on the PE routers to enable the virtual switch instance? A) B) C) D) A . Option A B. Option B C. Option...