Which IPv6 first-hop security feature blocks traffic sourced from IPv6 addresses that are outside the prefix gleaned from router advertisements?
Which IPv6 first-hop security feature blocks traffic sourced from IPv6 addresses that are outside the prefix gleaned from router advertisements?A . IPv6 source guard.B . IPv6 RA guard.C . IPv6 prefix guard.D . IPv6 DHCP guard.View AnswerAnswer: C
Which two actions can you take to allow the network 1 72.29.224.0/24 to be reachable from peer 192.168.250.53?
Refer to the exhibit. Which two actions can you take to allow the network 1 72.29.224.0/24 to be reachable from peer 192.168.250.53? (Choose two)A . Modify the outbound route map to permit all additional traffic.B . Configure soft reconfiguration to peering 192.168.250.53C . Modify the community list to match community...
In RSTP, which event would cause a topology change?
In RSTP, which event would cause a topology change?A . Edge ports transitioning to the forwarding stateB . Non-edge ports transitioning to the forwarding stateC . Non-edge ports transitioning to the discarding stateD . Edge ports transitioning to the discarding stateView AnswerAnswer: B
Which way to influence path selection with EIGRP is preferred?
Which way to influence path selection with EIGRP is preferred?A . changing the delay, even if it must be done on multiple interfacesB . changing the bandwidth, because that is what Cisco recommendsC . changing the bandwidth, because it does not have any impact on other router featuresD . changing...
Which two statements about IPv6 RA guard are true?
Which two statements about IPv6 RA guard are true?A . It is applied only on the egress interfaceB . It is applied only on the ingress interfaceC . It can be applied on ingress and egress interfacesD . It must be applied individually to specific interfacesE . It can be...
Which options lists the cloud service models?
Which options lists the cloud service models?A . Infrastructure as a service, Platform as a service, and storage and storage as a serviceB . Infrastructure as a service, Platform as a service, and storage and software as a serviceC . Internet as a service, Platform as a service, and storage...
If you configure the set ip default next-hop command on a device and the device receives a packet whose destination is missing from the routing table, how does the device route the packet?
If you configure the set ip default next-hop command on a device and the device receives a packet whose destination is missing from the routing table, how does the device route the packet?A . The packet is policy routedB . The packet is policy routed to the destination address in...
Which two statements about CEF polarization are true? (Choose two)
Which two statements about CEF polarization are true? (Choose two)A . The AND operation is performed on the higher-order bits of the source and destination IP addressB . A single link is chosen for all flowsC . The AND operation is performed on the lower-order bits of the source and...
Which two authentication options were new in SNMPv3? (Choose two.)
Which two authentication options were new in SNMPv3? (Choose two.)A . noAuthB . authPrivC . PrivD . AuthE . authNoPrivF . noAuthNoPrivView AnswerAnswer: B E
Which router on the given network generates the IS-IS pseudocode?
Refer to the exhibit. Which router on the given network generates the IS-IS pseudocode?A . R1B . R4C . R2D . R3View AnswerAnswer: A