Which two statements are true about IS-IS? (Choose two.)

Which two statements are true about IS-IS? (Choose two.)A . IS-IS SPF calculation is performed in three phases.B . IS-IS can never be routed beyond the immediate next hop.C . IS-IS works over the data link layer, which does not provide for fragmentation and reassembly.D . IS-IS DIS election is...

November 20, 2018 1 Comment READ MORE +

Which effect of this configuration is true?

Refer to the exhibit. Which effect of this configuration is true?A . It configures a PPPoE serverB . It configures a PPPoE neighbor relationship with a Layer 3 switchC . It configures a PPPoE clientD . It configures a PPPoE session with an ISPView AnswerAnswer: A

November 19, 2018 No Comments READ MORE +

Drag and drop the BGP feature on the left to the corresponding function it performs on the right

Drag and drop the BGP feature on the left to the corresponding function it performs on the right View AnswerAnswer:

November 19, 2018 No Comments READ MORE +

Drag and drop each SNMP feature from the left onto the correct SNMP version on the right

Drag and drop each SNMP feature from the left onto the correct SNMP version on the right View AnswerAnswer:

November 19, 2018 No Comments READ MORE +

Which three options are possible reasons for this behavior?

R1 is performing mutual redistribution, but OSPF routes from R3 are unable to reach R2. Which three options are possible reasons for this behavior? (Choose three.)A . R1 requires a seed metric to redistribute RIC . The RIP version supports only classful subnet masks.D . R1 is filtering OSPF routes...

November 19, 2018 1 Comment READ MORE +

Drag and drop each description from the left onto the corresponding IP multicast protocol on the right.

Drag and drop each description from the left onto the corresponding IP multicast protocol on the right. View AnswerAnswer:

November 18, 2018 No Comments READ MORE +

Which two methods do IPsec VTIs used to identify and transmit encrypted traffic through the tunnel? (Choose two)

Which two methods do IPsec VTIs used to identify and transmit encrypted traffic through the tunnel? (Choose two)A . static routingB . dynamic routingC . object groupsD . ACLsE . NATView AnswerAnswer: A, B

November 11, 2018 No Comments READ MORE +

What terminal line command can you enter to prevent a router from attempting a Telnet connection in response to an incorrect host name entry at the EXEC prompt?

What terminal line command can you enter to prevent a router from attempting a Telnet connection in response to an incorrect host name entry at the EXEC prompt?A . Transport preferred noneB . Transport output noneC . No ip domain-lookupD . Transport input noneE . Logging synchronousView AnswerAnswer: A

November 9, 2018 No Comments READ MORE +

Which three terms are used to describe an OS-level virtualization method for deploying and running distributed applications? (Choose three)

Which three terms are used to describe an OS-level virtualization method for deploying and running distributed applications? (Choose three)A . ContainerizationB . Container networkingC . Container-based virtualizationD . Virtualized networkingE . Application containerizationF . Container StackG . Shared KernelView AnswerAnswer: ACE Explanation: https://searchservervirtualization.techtarget.com/quiz/VMs-vs-containers-Do-you-know-the-differences? q0=3&q1=2&q2=0&q3=0&q4=3&q5=2&q6=3&q7=2&q8=2&q9=0&x=88&y=9

November 3, 2018 No Comments READ MORE +

Drag and drop the implementation steps on the left to the corresponding order on the right when configuring a L3 VxLAN gateway.

Drag and drop the implementation steps on the left to the corresponding order on the right when configuring a L3 VxLAN gateway. View AnswerAnswer:

November 3, 2018 No Comments READ MORE +