Which IPv6 first-hop security feature blocks traffic sourced from IPv6 addresses that are outside the prefix gleaned from router advertisements?

Which IPv6 first-hop security feature blocks traffic sourced from IPv6 addresses that are outside the prefix gleaned from router advertisements?A . IPv6 source guard.B . IPv6 RA guard.C . IPv6 prefix guard.D . IPv6 DHCP guard.View AnswerAnswer: C

June 3, 2018 No Comments READ MORE +

Which two actions can you take to allow the network 1 72.29.224.0/24 to be reachable from peer 192.168.250.53?

Refer to the exhibit. Which two actions can you take to allow the network 1 72.29.224.0/24 to be reachable from peer 192.168.250.53? (Choose two)A . Modify the outbound route map to permit all additional traffic.B . Configure soft reconfiguration to peering 192.168.250.53C . Modify the community list to match community...

June 3, 2018 No Comments READ MORE +

In RSTP, which event would cause a topology change?

In RSTP, which event would cause a topology change?A . Edge ports transitioning to the forwarding stateB . Non-edge ports transitioning to the forwarding stateC . Non-edge ports transitioning to the discarding stateD . Edge ports transitioning to the discarding stateView AnswerAnswer: B

June 3, 2018 No Comments READ MORE +

Which way to influence path selection with EIGRP is preferred?

Which way to influence path selection with EIGRP is preferred?A . changing the delay, even if it must be done on multiple interfacesB . changing the bandwidth, because that is what Cisco recommendsC . changing the bandwidth, because it does not have any impact on other router featuresD . changing...

May 30, 2018 No Comments READ MORE +

Which two statements about IPv6 RA guard are true?

Which two statements about IPv6 RA guard are true?A . It is applied only on the egress interfaceB . It is applied only on the ingress interfaceC . It can be applied on ingress and egress interfacesD . It must be applied individually to specific interfacesE . It can be...

May 30, 2018 No Comments READ MORE +

Which options lists the cloud service models?

Which options lists the cloud service models?A . Infrastructure as a service, Platform as a service, and storage and storage as a serviceB . Infrastructure as a service, Platform as a service, and storage and software as a serviceC . Internet as a service, Platform as a service, and storage...

May 27, 2018 No Comments READ MORE +

If you configure the set ip default next-hop command on a device and the device receives a packet whose destination is missing from the routing table, how does the device route the packet?

If you configure the set ip default next-hop command on a device and the device receives a packet whose destination is missing from the routing table, how does the device route the packet?A . The packet is policy routedB . The packet is policy routed to the destination address in...

May 23, 2018 No Comments READ MORE +

Which two statements about CEF polarization are true? (Choose two)

Which two statements about CEF polarization are true? (Choose two)A . The AND operation is performed on the higher-order bits of the source and destination IP addressB . A single link is chosen for all flowsC . The AND operation is performed on the lower-order bits of the source and...

May 19, 2018 No Comments READ MORE +

Which two authentication options were new in SNMPv3? (Choose two.)

Which two authentication options were new in SNMPv3? (Choose two.)A . noAuthB . authPrivC . PrivD . AuthE . authNoPrivF . noAuthNoPrivView AnswerAnswer: B E

May 19, 2018 No Comments READ MORE +

Which router on the given network generates the IS-IS pseudocode?

Refer to the exhibit. Which router on the given network generates the IS-IS pseudocode?A . R1B . R4C . R2D . R3View AnswerAnswer: A

May 10, 2018 No Comments READ MORE +