which three are true about Cisco spanning-tree features?
Refer to the following descriptions, which three are true about Cisco spanning-tree features? (Choose three.)
what is done with received VTP advertisements?
If a Cisco switch is configured with VTPv1 in transparent mode, what is done with received VTP advertisements?
Which IOS security feature is configured by the ip inspect inspection-name {in | out} command?
Which IOS security feature is configured by the ip inspect inspection-name {in | out} command?
which two commands are needed to globally configure NAT to get this to work?
If you have overlapping IP address between two different networks or routing domains, which two commands are needed to globally configure NAT to get this to work?
What prerequisite is there for enabling BGP to run on this network?
You work as a network engineer for the company, you want to configure two BGP speakers to form an EBGP session across a firewall. On the engineer’s network, the firewall always permits TCP sessions that are initiated from the inside network (the network attached to the inside interface of the firewall). What prerequisite is there for enabling BGP to run on this network?
What could you do to prevent this type of problem in the future, particularly when connecting and reconnecting
You deployed new fibers in your network to replace copper spans that were too long. While reconnecting the network, you experienced network problems because you reconnected wrong fibers to wrong ports. What could you do to prevent this type of problem in the future, particularly when connecting and reconnecting fiber pairs?
which the traffic is selecting a longer path. How is the path cost calculated?
Network A has a spanning-tree problem in which the traffic is selecting a longer path. How is the path cost calculated?
What is an important consideration that should be taken into account when configuring shaped round robin?
What is an important consideration that should be taken into account when configuring shaped round robin?
How would you confirm the existing nodes using one single command?
While troubleshooting a network, you need to verify the liveness of hosts in the subnet 192.168.1.64/26. All of the hosts are able to reply to ping requests. How would you confirm the existing nodes using one single command?
What happens when you apply this ACL on the MPLS-EBGP connection to BHK?
A request arrived on your MPLS-vpn-bgp group. Due to a security breach, your customer is experiencing DoS attacks coming from specific subnets (200.0.10.0/24, 200.0.12.0/24). You have checked all MPLS-EBGP routes being advertised to BHK from other VPN sites and found four subnets listed:
200.0.10.0/24, 200.0.11.0/24, 200.0.12.0/24, 200.0.13.0/24. You immediately apply an outbound ACL filter using the appropriate MPLS-EBGP tool: access-list 1 deny 0.0.0.0 255.255.254.255 access-list 1 permit any What happens when you apply this ACL on the MPLS-EBGP connection to BHK?