Which networks does R2 advertise to R1?
Refer to the exhibit. After you apply the given configurations to R1 and R2. Which networks does R2 advertise to R1?A . 172.16.0.0/16 onlyB . Both 172.16.32.0/20 and 172.16.33.0/24C . 172.16.32.0/20 onlyD . 172.16.33.0/24 onlyView AnswerAnswer: A
When you implement CoPP on your network, what is its default action?
When you implement CoPP on your network, what is its default action?A . Rate-limit bidirectional traffic to the control plane.B . Permit all trafficC . Block all trafficD . Drop management ingress traffic to the control plane.E . Monitor ingress and egress traffic to the control plane by using access...
Drag and drop each EIGRP packet type from the left onto the matching description on the right.
Drag and drop each EIGRP packet type from the left onto the matching description on the right. View AnswerAnswer:
Which two statements about IPv6 PACLs are true? (Choose two)
Which two statements about IPv6 PACLs are true? (Choose two)A . They are supported only on ingressB . They are supported only for L2C . They are supported only for L3D . They require an IPv6 access list to be configured firstE . They are supported only on egressView AnswerAnswer:...
What mechanism should you choose to prevent unicast flooding?
What mechanism should you choose to prevent unicast flooding?A . Make sure that all end systems are connected to the network with a single physical connection.B . Use control plane policing (CPP) to limit unicast flooding.C . Configure the ARP cache timers to be longer than the switch forwarding cache...
Which two options are valid IPv6 extension header types? (Choose two)
Which two options are valid IPv6 extension header types? (Choose two)A . MobilityB . Encapsulating Security PayloadC . VersionD . Flow LabelE . Traffic ClassView AnswerAnswer: A, B
Which EIGRP routes will appear in the routing table of R2?
Refer to the exhibit. Which EIGRP routes will appear in the routing table of R2?A . 2001:12::1/64B . 2001:12::1/128C . 2001:112::/64,2001:12::1/64D . 2001:112::/64,2001:12::1/128View AnswerAnswer: B
Which Layer 2 technology is best suited in this scenario?
A cloud service provider is designing a large multitenant data center to support thousands of tenants. The provider is connected about the scalability of the Layer 2 network and providing Layer 2 segmentation to potentially thousands of tenants. Which Layer 2 technology is best suited in this scenario?A . Extended...
Which two statements about the client-identifier in a DHCP pool are true? (Choose two.)
Which two statements about the client-identifier in a DHCP pool are true? (Choose two.)A . It specifies a unique identifier that is used only for BOOTP requests.B . It specifies a hardware address for the clientC . It is specified by appending 01 to the MAC address of a DHCP...
Which two statements about root guard are true? (Choose two)
Which two statements about root guard are true? (Choose two)A . It allows unknown devices to participate in STPB . It automatically re-enables blocked portsC . It requires the administrator to manually re-enable ports that have been blockedD . It supports the errdisable-timeout commandE . It automatically error-disables a port...