In a VPLS design solution, which situation indicates that BGP must be used instead of LDP in the control plane?
In a VPLS design solution, which situation indicates that BGP must be used instead of LDP in the control plane?A . MAC address learning scales better through BGPB . BGP supports VPLS interworkingC . Pseudowire configuration overhead is reducedD . There are no full-mesh pseudowire due to the route reflection...
Which mechanism do you use along with UDLD?
You want to mitigate failures that are caused by STF loops that occur before UDLD detects the failure or that are caused by a device that is no longer sending BPOUs. Which mechanism do you use along with UDLD?A . root guardB . BPOU guardC . BPDU filteringD . loop...
Which design solution reduces the amount of IGMP state in the network?
Which design solution reduces the amount of IGMP state in the network?A . IGMPv3 with PIM-SSMB . IGMP filteringC . multiple multicast domainsD . one multicast group address through network regardless of IGMP versionView AnswerAnswer: A Explanation: https://tools.ietf.org/html/rfc3376
Which description of the RPF check in the multicast forwarding traffic is true?
Which description of the RPF check in the multicast forwarding traffic is true?A . The source address of the multicast packet is checked in the unicast routing table. If the multicast packet arrived from the interface that matches with the interface to reach the source address, this packet passes the...
Which of the following design solutions accomplishes these requirements?
Refer to the exhibit. You must ensure that both A and core B devices have only the minimum information required for reaching the spoke routers, yet maintain full reachability during network failures. Which of the following design solutions accomplishes these requirements?A . Implement PfR enhancements on hubs A and BB...
Which two design solutions ensure that the enterprise access routers reach all devices in this enterprise network?
A large enterprise company is redesigning their WAN infrastructure and has these design requirements Which two design solutions ensure that the enterprise access routers reach all devices in this enterprise network? (Choose two)A . Configure the access routers to send a default route to the MPLS network.B . Summarize the...
As part of the security protocol for your network design, you have designated that operator 82 is enabled for DHCP snooping. When option 82 is enabled, which information will be added to the DHCP request?
As part of the security protocol for your network design, you have designated that operator 82 is enabled for DHCP snooping. When option 82 is enabled, which information will be added to the DHCP request?A . remote ID and circuit IDB . switch IP address and VLAN, module and poetC...
What is the most common IoT threat vector?
What is the most common IoT threat vector?A . Attacks against programming errors in IoT devicesB . Insertion of invalid inputs that cause denial of serviceC . Physical access to IoT devices that are installed in non-secure locationsD . Human error and social engineering to access supervisory control systems.View AnswerAnswer:...
When is it required to leak routes into an IS-IS Level 1 area?
When is it required to leak routes into an IS-IS Level 1 area?A . when a multicast RP is configured in the non-backbone area.B . when MPLS L3VPN PE devices are configured in the Level 1 areasC . when equal cost load balancing is required between the backbone and non-backbone...
which technology supports Multi Chassis EtherChannel in the design of a network?
which technology supports Multi Chassis EtherChannel in the design of a network?A . StackWiseB . vPVC . REPD . VSSView AnswerAnswer: D Explanation: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Data_Center/vssdc_integrate.html#wp877472