Which three values are used to generate a unique bridge ID for each VLAN in PVST+? (Choose three)
Which three values are used to generate a unique bridge ID for each VLAN in PVST+? (Choose three)A . switch priorityB . spanning-tree MAC addressC . port costD . max ageE . extended system IDF . port priorityView AnswerAnswer: ABE
Which protocol does a host use to request IPv6 multicast traffic?
Which protocol does a host use to request IPv6 multicast traffic?A . MLDB . SSMC . IGMPV3D . PIM6View AnswerAnswer: A
Which method can an IPv6 host use to learn the RP in an IPv6 multicast-enabled network?
Which method can an IPv6 host use to learn the RP in an IPv6 multicast-enabled network?A . It extracts it from the multicast addressB . It use Auto-RPC . It receives an advertisement through MBGPD . It receives it as part of the DHCP scopeView AnswerAnswer: A
Which three components are in an MPLS hearder? (Choose three)
Which three components are in an MPLS hearder? (Choose three)A . a 3-bit experimental use fieldB . a 8-bit TTLC . a 20-bit labelD . a 4-bit experimental use fieldE . a 2-bit botton of stackF . a 4-bit label stack entryView AnswerAnswer: ABC
Which statement about NAT64 is true?
Which statement about NAT64 is true?A . NAT64 requires the use of DNS64B . NAT64 provides address family translation and can translate only IPv6 to IPv4C . NAT64 should be considered as a permanent solutionD . NAT64 provides address family translation and translates IPv4 to IPv6 and IPv6 to IPv4View...
How does MSTP maintain compatibility with RSTP?
How does MSTP maintain compatibility with RSTP?A . MSTP supports five port states in the same way as RSTPB . RSTP encodes region information from an MSTP BPDU into a single instanceC . RSTP implements a TTL that is compatible with the MSTP max age timerD . MSTP sends all...
Which two conditions can cause unicast flooding? (Choose two)
Which two conditions can cause unicast flooding? (Choose two)A . forwarding table overflowB . RIB table overflowC . recurring TCNsD . multiple MAC addresses in the Layer 2 forwarding tableE . symmetric routingView AnswerAnswer: AC
When action can you take to correct the problem?
Refer to the exhibit. When R2 attempted to copy a file from the TFTP server, it received tjis error message. When action can you take to correct the problem?A . Configure the ip tftp source-interface Loopback0 command on R2B . Configure the ip tftp source-interface Fa011 command on R2C ....
Which feature can you implement to most efficiently protect customer traffic in a rate-limited WAN Ethernet service?
Which feature can you implement to most efficiently protect customer traffic in a rate-limited WAN Ethernet service? A DiffServ B. HCBWFQ C. the IPsec VTI qos pre-classify command D IntSery with RSVP E Q-in-QView AnswerAnswer: B
Which two statements about a flat single-hub DMVPN with NHRP are true? (Choose two)
Which two statements about a flat single-hub DMVPN with NHRP are true? (Choose two)A . The spoke routers act as the NHRP serversB . NHRP dynamically provides information about the spoke routers to the hubC . NHRP shortens the configuration of the hub routerD . The hub router uses NHRP...