Which two statements are true about IS-IS? (Choose two.)
Which two statements are true about IS-IS? (Choose two.)A . IS-IS SPF calculation is performed in three phases.B . IS-IS can never be routed beyond the immediate next hop.C . IS-IS works over the data link layer, which does not provide for fragmentation and reassembly.D . IS-IS DIS election is...
Which effect of this configuration is true?
Refer to the exhibit. Which effect of this configuration is true?A . It configures a PPPoE serverB . It configures a PPPoE neighbor relationship with a Layer 3 switchC . It configures a PPPoE clientD . It configures a PPPoE session with an ISPView AnswerAnswer: A
Drag and drop the BGP feature on the left to the corresponding function it performs on the right
Drag and drop the BGP feature on the left to the corresponding function it performs on the right View AnswerAnswer:
Drag and drop each SNMP feature from the left onto the correct SNMP version on the right
Drag and drop each SNMP feature from the left onto the correct SNMP version on the right View AnswerAnswer:
Which three options are possible reasons for this behavior?
R1 is performing mutual redistribution, but OSPF routes from R3 are unable to reach R2. Which three options are possible reasons for this behavior? (Choose three.)A . R1 requires a seed metric to redistribute RIC . The RIP version supports only classful subnet masks.D . R1 is filtering OSPF routes...
Drag and drop each description from the left onto the corresponding IP multicast protocol on the right.
Drag and drop each description from the left onto the corresponding IP multicast protocol on the right. View AnswerAnswer:
Which two methods do IPsec VTIs used to identify and transmit encrypted traffic through the tunnel? (Choose two)
Which two methods do IPsec VTIs used to identify and transmit encrypted traffic through the tunnel? (Choose two)A . static routingB . dynamic routingC . object groupsD . ACLsE . NATView AnswerAnswer: A, B
What terminal line command can you enter to prevent a router from attempting a Telnet connection in response to an incorrect host name entry at the EXEC prompt?
What terminal line command can you enter to prevent a router from attempting a Telnet connection in response to an incorrect host name entry at the EXEC prompt?A . Transport preferred noneB . Transport output noneC . No ip domain-lookupD . Transport input noneE . Logging synchronousView AnswerAnswer: A
Which three terms are used to describe an OS-level virtualization method for deploying and running distributed applications? (Choose three)
Which three terms are used to describe an OS-level virtualization method for deploying and running distributed applications? (Choose three)A . ContainerizationB . Container networkingC . Container-based virtualizationD . Virtualized networkingE . Application containerizationF . Container StackG . Shared KernelView AnswerAnswer: ACE Explanation: https://searchservervirtualization.techtarget.com/quiz/VMs-vs-containers-Do-you-know-the-differences? q0=3&q1=2&q2=0&q3=0&q4=3&q5=2&q6=3&q7=2&q8=2&q9=0&x=88&y=9
Drag and drop the implementation steps on the left to the corresponding order on the right when configuring a L3 VxLAN gateway.
Drag and drop the implementation steps on the left to the corresponding order on the right when configuring a L3 VxLAN gateway. View AnswerAnswer: