What additional configuration is needed, if any?
Refer to the exhibit You need to modify the IOS L3 switch configuration for High Availability operation. What additional configuration is needed, if any?A . Enable HSRP pre-empt with a delay to allow time for the routing and switching protocol to convergeB . The shown configuration is sufficient for High...
Which two statements about PfR are true? (Choose two)
Which two statements about PfR are true? (Choose two)A . It provides a narrower scope of route control than OERB . It manages traffic classesC . It supports split tunneling and spoke-to-spoke linksD . It provides intelligent route control on a per-application basisE . It always prefers the least cost...
Which two statements about LDP are true? (Choose two)
Which two statements about LDP are true? (Choose two)A . LDP sessions are established between LSRsB . It uses a 16-byte identifierC . It supports only directed-connected neighborsD . It sends hello messages are UDP packets via unicastE . It enables LSRs to communicate label bindingsF . It sends hello...
Which two methods can you use to limit the range for EIGRP queries? (Choose two)
Which two methods can you use to limit the range for EIGRP queries? (Choose two)A . Configure unicast EIGRP on all routers in the EIGRP domainB . Configure route tagging for all EIGRP routesC . Summarize routes at the boundary routers of the EIGRP domainD . Use an access list...
Which two statements about IS-IS authentication are true? (Choose two)
Which two statements about IS-IS authentication are true? (Choose two)A . if LSP authentication is in use, unauthorized devices can be form neighbor adjacenciesB . Area and domain authentication must be configured on a per-interface basisC . Passwords can be configured on a per-interface basisD . Level 1 LSPs use...
What are three core features of GET VPN? (Choose three)
What are three core features of GET VPN? (Choose three)A . The rekey mechanismB . Time-based anti-replayC . AESD . MPLSE . Partial meshF . Cooperative key serversView AnswerAnswer: A, B, F
Which two limitations of PIM snooping are true? (Choose two)
Which two limitations of PIM snooping are true? (Choose two)A . 224 0 1 39 and 224 0 1 40 are always floodedB . If non-PIMv2 multicast routers are on the network, they are flooded with all trafficC . All join and prune messages are flooded to all router portsD...
On a network with multiple VLANs, which three tasks must you perform to configure IP source guard on VLAN 50 only? (Choose three)
On a network with multiple VLANs, which three tasks must you perform to configure IP source guard on VLAN 50 only? (Choose three)A . Configure the ip dhcp snooping vlan 50 command globallyB . Configure the ip dhcp snooping vlan 50 command on the interfaceC . Configure the ip dhcp...
What is the most likely reason the tunnel failed?
Refer to the exhibit While troubleshooting the failure of two devices to establish an IPSec tunnel, you generated the given debug output on R2. What is the most likely reason the tunnel failed?A . Main Mode processing failed on the peerB . Main Mode processing failed on R2C . The...
Which two actions can you take to allow the network 172.29.224.0/24 to be reachable from peer 192.168.250.53?
Refer to the exhibit Which two actions can you take to allow the network 172.29.224.0/24 to be reachable from peer 192.168.250.53? (Choose two)A . Modify the community list to match communities 64513:69040 attached to 172.29.224.0/24B . Configure soft reconfiguration to peering 192.168.250.53C . Modify the outbound route map to permit...