Which two statements correctly describe the BGP ttl-security feature? (Choose two.)
Which two statements correctly describe the BGP ttl-security feature? (Choose two.)A . This feature protects the BGP processes from CPU utilization-based attacks from EBGP neighbors which can be multiple hops awayB . This feature prevents IBGP sessions with non-directly connected IBGP neighborsC . This feature will cause the EBGP updates...
Which field in the IPv6 header can be used to set the DSCP value?
Which field in the IPv6 header can be used to set the DSCP value?A . Flow LabelB . Type of ServiceC . Traffic Class D . Precedence E . EXPView AnswerAnswer: C Explanation: Traffic Class The Traffic Class field is an 8 bit field that is used to signify the importance of...
Refer to the Cisco IOS-XR BGP configuration exhibit.
Refer to the Cisco IOS-XR BGP configuration exhibit. Identify two configuration errors. (Choose two.)A . The neighbor-group efg is missing the ebgp-multihop 2 configurationB . The ttl-security configuration command is missing the option to set the number of hopsC . The passall route policy is wrongD . The route-policy passall...
The IPv6 2002::/16 prefix is used in which kind of implementations?
The IPv6 2002::/16 prefix is used in which kind of implementations?A . 6RDB . 6to4C . NAT64D . IPv6 MulticastView AnswerAnswer: B
When implementing source-based remote-triggered black hole filtering, which two configurations are required on the edge routers that are not the signaling router? (Choose two.)
When implementing source-based remote-triggered black hole filtering, which two configurations are required on the edge routers that are not the signaling router? (Choose two.)A . A static route to a prefix that is not used in the network with a next hop set to the Null0 interfaceB . A static...
Why did the ping fail?
Refer to the exhibit for the outputs from an ASR9K router. Why did the ping fail?A . The ping command is missing the ipv6 option: ping ipv6 2001:db8:10:1:10::1/128B . There is a problem with the IS-IS configurationsC . The fe80::eab7:48ff:fe2c:a180 next-hop is not reachableD . The prefix length should be...
Which of the following is a feature added in IGMPv3?
Which of the following is a feature added in IGMPv3?A . Support for source filteringB . Support for Host Membership Report and a Leave Group messageC . Uses a new variation of the Host Membership Query called the Group-Specific Host Membership QueryD . Uses an election process to determine the...
Which IPv6 mechanism occurs between a provider edge router and the customer premises equipment router to allow an ISP to automate the process of assigning a block of IPv6 addresses to a customer for use within the customer network?
Which IPv6 mechanism occurs between a provider edge router and the customer premises equipment router to allow an ISP to automate the process of assigning a block of IPv6 addresses to a customer for use within the customer network?A . Router AdvertisementB . DHCPv6 Prefix DelegationC . DHCPv6 LiteD ....
Please Answer Questions Follow The Prompts Below
DRAG DROP View AnswerAnswer: Explanation: The amount of time for the penalty to decrease to one-half of its current value - 60 Suppress a route when its penalty exceeds this value - 2400 If a flapping route penalty decreases and falls below this value , the route is unsuppressed -...
Which types of multicast distribution tree can PIM-SM use?
Which types of multicast distribution tree can PIM-SM use?A . Only shared tree rooted at the sourceB . Only shared tree rooted at the RPC . Only shortest path tree rooted at the RPD . Shared tree rooted at the source and shortest path tree switchoverE . Shared tree rooted...