Which two statements about PPP PAP are true? (Choose two)
Which two statements about PPP PAP are true? (Choose two)A . An authenticated peer is periodically requested to re-authenticate itself during the PPP session lifetimeB . Login attempts are controlled by the node that authenticates itselfC . It is vulnerable to trial-and-error attacksD . It can protect against playback attacksE...
Which two features are incompatible with Loop Guard on a port? (Choose two)
Which two features are incompatible with Loop Guard on a port? (Choose two)A . BackboneFastB . BPDU skew detectionC . UplinkFastD . PortFastE . Root GuardView AnswerAnswer: D E
Which two statements about IGMP are true? (Choose two)
Which two statements about IGMP are true? (Choose two)A . IGMPv2 supports IGMP querier electionB . IGMPv2 supports explicit source signalingC . IGMPv3 uses 224.0.0.22 as destination address for repotsD . IGMPv3 is the first version of GMP to support a basic query-response mechanism.E . IGMPv1 supports group-specific queries.View AnswerAnswer:...
In which 802 1D port state are the root bridge, the root port, and the designated ports(s) elected?
In which 802 1D port state are the root bridge, the root port, and the designated ports(s) elected?A . ListeningB . disabledC . learningD . forwardingE . blockingView AnswerAnswer: A
Drag each NTP command on the left to its effect on the right
Drag each NTP command on the left to its effect on the right View AnswerAnswer:
Which statement about route summarization is true?
Which statement about route summarization is true?A . EIGRF and RIPv2 route summarization are configured with the ip summary-address command under the route processB . EIGRP can summarize routes at the classful network boundary.C . RIPv2 can summarize router beyond the classful network boundaryD . It can be disabled in...
Which feature can mitigate hung management sessions?
Which feature can mitigate hung management sessions?A . the service tcp-small servers commandB . Control Plane PolicingC . the service tcp-keepalives-in and service tcp-keepalives-out commandsD . vty line ACLSView AnswerAnswer: C
Which IPv6 tunneling mechanism requires a service provider to use one of its own native IPv6 blocks to guarantee that its IPv6 hosts will be reachable?
Which IPv6 tunneling mechanism requires a service provider to use one of its own native IPv6 blocks to guarantee that its IPv6 hosts will be reachable?A . automatic 4to6 tunnelingB . automatic 6to4 tunnelingC . ISATAP tunnelingD . manual ipv6ip tunnelingE . 6rd tunnelingF . NAT-PT tunnelingView AnswerAnswer: E
Drag and drop the NAT operations or the left to the correct sequential order on the right.
Drag and drop the NAT operations or the left to the correct sequential order on the right. View AnswerAnswer:
Which IPv6 first-hop security feature blocks traffic sourced from IPv6 addresses that are outside the prefix gleaned from router advertisements?
Which IPv6 first-hop security feature blocks traffic sourced from IPv6 addresses that are outside the prefix gleaned from router advertisements?A . IPv6 source guardB . IPv6 prefix guardC . IPv6 DHCP guardD . IPv6 RA guardView AnswerAnswer: A