Which component of a GETVPN deployment is responsible for obtaining an IPsec SA to encrypt data within a group?
Which component of a GETVPN deployment is responsible for obtaining an IPsec SA to encrypt data within a group?A . group memberB . key serverC . GDOID . GREView AnswerAnswer: C
Which statement describes the operation of the Generalized TTL Security Mechanism (GTSM), used by routing protocols to prevent some type of attack?
Which statement describes the operation of the Generalized TTL Security Mechanism (GTSM), used by routing protocols to prevent some type of attack?A . An MD5 hash of the received TTL, source IP, destination IP, protocol, and shared key must matchB . The TTL in a received packet must be a...
Which two statements about IPv4 and IPv6 networks are true? (Choose two)
Which two statements about IPv4 and IPv6 networks are true? (Choose two)A . In IPv6, hosts perform fragmentationB . IPv6 uses a UDP checksum to verify packet integrityC . In IPv6, routers perform fragmentationD . In IPv4, fragmentation is performed by the source of the packetE . IPv4 uses an...
For which feature is the address family "rtf0ilter" used?
For which feature is the address family "rtf0ilter" used?A . Route Target ConstraintB . Enhanced Route RefreshC . Unified MPLSD . MPLS VPN filteringView AnswerAnswer: A
Which statement about a type 4 LSA in OSPF is true?
Which statement about a type 4 LSA in OSPF is true?A . It is an LSA that is originated by an ABR, that is flooded throughout the AS, and that describes a route to the ASBRB . It is an LSA that is originated by an ASBR, that is flooded...
Drag and drop the B GP attributes on the left to the correct category on th e right Not all options will be used
Drag and drop the B GP attributes on the left to the correct category on th e right Not all options will be used View AnswerAnswer:
Which two conditions can cause unicast flooding? (Choose two)
Which two conditions can cause unicast flooding? (Choose two)A . symmetric routingB . RIB table overflowC . multiple MAC addresses in the Layer 2 forwarding tableD . recurring TCNsE . forwarding table overflowView AnswerAnswer: D, E
What are IPv6 addresses of the form FC00::/7 known as?
What are IPv6 addresses of the form FC00::/7 known as?A . unique local addressesB . transition addresses for 6to4C . link-local addressesD . multicast RP addressesView AnswerAnswer: A
Which difference between using the Record option with the ping command vs the traceroute command is true?
Ping and Trace route extended options are very useful. Which difference between using the Record option with the ping command vs the traceroute command is true?A . The record option is not supported with the traceroute commandB . When leveraged with the ping command the Record option of this command...
When EIGRP Auto-Summary is enabled, what does Auto Summarization do in EIGRP?
When EIGRP Auto-Summary is enabled, what does Auto Summarization do in EIGRP?A . Summarize networks from the same network boundariesB . Summarizes networks form different network boundaries crossing the same major boundaryC . Summarizes all network boundariesD . Summarizes networks from different network boundaries Crossing different major boundaryView AnswerAnswer: D