Which component of a GETVPN deployment is responsible for obtaining an IPsec SA to encrypt data within a group?

Which component of a GETVPN deployment is responsible for obtaining an IPsec SA to encrypt data within a group?A . group memberB . key serverC . GDOID . GREView AnswerAnswer: C

December 8, 2019 No Comments READ MORE +

Which statement describes the operation of the Generalized TTL Security Mechanism (GTSM), used by routing protocols to prevent some type of attack?

Which statement describes the operation of the Generalized TTL Security Mechanism (GTSM), used by routing protocols to prevent some type of attack?A . An MD5 hash of the received TTL, source IP, destination IP, protocol, and shared key must matchB . The TTL in a received packet must be a...

December 8, 2019 No Comments READ MORE +

Which two statements about IPv4 and IPv6 networks are true? (Choose two)

Which two statements about IPv4 and IPv6 networks are true? (Choose two)A . In IPv6, hosts perform fragmentationB . IPv6 uses a UDP checksum to verify packet integrityC . In IPv6, routers perform fragmentationD . In IPv4, fragmentation is performed by the source of the packetE . IPv4 uses an...

December 8, 2019 No Comments READ MORE +

For which feature is the address family "rtf0ilter" used?

For which feature is the address family "rtf0ilter" used?A . Route Target ConstraintB . Enhanced Route RefreshC . Unified MPLSD . MPLS VPN filteringView AnswerAnswer: A

December 7, 2019 No Comments READ MORE +

Which statement about a type 4 LSA in OSPF is true?

Which statement about a type 4 LSA in OSPF is true?A . It is an LSA that is originated by an ABR, that is flooded throughout the AS, and that describes a route to the ASBRB . It is an LSA that is originated by an ASBR, that is flooded...

December 7, 2019 1 Comment READ MORE +

Drag and drop the B GP attributes on the left to the correct category on th e right Not all options will be used

Drag and drop the B GP attributes on the left to the correct category on th e right Not all options will be used View AnswerAnswer:

December 7, 2019 No Comments READ MORE +

Which two conditions can cause unicast flooding? (Choose two)

Which two conditions can cause unicast flooding? (Choose two)A . symmetric routingB . RIB table overflowC . multiple MAC addresses in the Layer 2 forwarding tableD . recurring TCNsE . forwarding table overflowView AnswerAnswer: D, E

December 7, 2019 No Comments READ MORE +

What are IPv6 addresses of the form FC00::/7 known as?

What are IPv6 addresses of the form FC00::/7 known as?A . unique local addressesB . transition addresses for 6to4C . link-local addressesD . multicast RP addressesView AnswerAnswer: A

December 6, 2019 No Comments READ MORE +

Which difference between using the Record option with the ping command vs the traceroute command is true?

Ping and Trace route extended options are very useful. Which difference between using the Record option with the ping command vs the traceroute command is true?A . The record option is not supported with the traceroute commandB . When leveraged with the ping command the Record option of this command...

December 6, 2019 2 Comments READ MORE +

When EIGRP Auto-Summary is enabled, what does Auto Summarization do in EIGRP?

When EIGRP Auto-Summary is enabled, what does Auto Summarization do in EIGRP?A . Summarize networks from the same network boundariesB . Summarizes networks form different network boundaries crossing the same major boundaryC . Summarizes all network boundariesD . Summarizes networks from different network boundaries Crossing different major boundaryView AnswerAnswer: D

December 6, 2019 No Comments READ MORE +