Which statement describes this configuration?

Refer to the exhibit. Which statement describes this configuration?A . Router 1 has a new data store to collect SNMP information, but configuration must still be done at the CLI only.B . Router 1 can be remotely managed by the CLI using Telnet.C . Router 1 has its running configuration...

March 17, 2020 No Comments READ MORE +

Which action causes the solution to fail?

Refer to the exhibit. A network engineer is configuring customer edge routers to finalize a L2VPN over MPLS deployment. Assume that the AToM L2VPN service that connects the two CEs is configured correctly on the service provider network. Which action causes the solution to fail?A . OSPF does not work...

March 17, 2020 No Comments READ MORE +

Which statement about this design is true if URPF in strict mode is configured on both interfaces?

Refer to the exhibit. R1 is connected to two service providers and is under a DDoS attack. Which statement about this design is true if URPF in strict mode is configured on both interfaces?A . R1 drops all traffic that ingresses either interface that has a FIB entry that exits...

March 17, 2020 No Comments READ MORE +

What does this value mean when it is received in XML?

Refer to the exhibit. What does this value mean when it is received in XML?A . It indicates a value assigned by a network administrator to tag a route.B . It indicates a break in a sequence.C . It means a data field is blank.D . It shows the ending...

March 17, 2020 No Comments READ MORE +

After you issue this command, which BGP packets does the PE accept?

While implementing TTL security, you issue the PE(config-router-af)#neighbor 2.2.2.2 ttl-security hops2 command. After you issue this command, which BGP packets does the PE accept?A . to 2.2.2.2, with a TTL of 2 or moreB . from 2.2.2.2, with a TTL of less than 2C . to 2.2.2.2, with a TTL...

March 16, 2020 No Comments READ MORE +

Which statement about this configuration is true?

Refer to the exhibit. An engineer is preparing to implement data plane security configuration. Which statement about this configuration is true?A . Router 2 is the router receiving the DDoS attack.B . Router 1 must be configured with uRPF for the RTBH implementation to be effective.C . Router 1 is...

March 16, 2020 No Comments READ MORE +

Which configuration mode do you use to apply the mpls ldp graceful-restart command in IOS XE Software?

Which configuration mode do you use to apply the mpls ldp graceful-restart command in IOS XE Software?A . MPLS LDP neighborB . interfaceC . MPLSD . globalView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/mp_ha/configuration/xe-3s/mp-ha-xe-3s­book/mp-ldp-grace-rstrt.html

March 16, 2020 No Comments READ MORE +

Why do Cisco MPLS TE tunnels require a link-state routing protocol?

Why do Cisco MPLS TE tunnels require a link-state routing protocol?A . The link-state database provides segmentation by area, which improves the path-selection process.B . The link-state database provides a data repository from which the tunnel endpoints can dynamically select a source ID . Link-state routing protocols use SPF calculations...

March 16, 2020 1 Comment READ MORE +

Which task must be performed first to implement BFD in an IS-IS environment?

Which task must be performed first to implement BFD in an IS-IS environment?A . Configure BFD in an interface configuration mode.B . Disable Cisco Express Forwarding on all interfaces running routing protocols other than IS-ID . Configure all IS-IS routers as Level 2 devices.E . Configure BFD under the IS-IS...

March 15, 2020 1 Comment READ MORE +

Which configuration accomplishes these objectives?

An engineer is setting up overlapping VPNs to allow VRF ABC and XYZ to communicate with VRF CENTRAL but wants to make sure that VRF ABC and XYZ cannot communicate. Which configuration accomplishes these objectives? A) B) C) D) A . Option AB . Option BC . Option CD ....

March 15, 2020 1 Comment READ MORE +