which command or set of commands completes the configuration that will load balance packets to destinations 17
— Exhibit —
policy-statement load-balance {
from {
route-filter 172.24.0.0/24 exact;
route-filter 172.24.1.0/24 exact;
}
then {
load-balance per-packet;
}
}
— Exhibit —
Referring to the exhibit, which command or set of commands completes the configuration that will
load balance packets to destinations 172.24.0.0 and 172.24.0.1?
Which statement is true based on the graceful restart (GR) configuration?
— Exhibit —
[edit]
user@router# show routing-options
graceful-restart {
disable;
}
[edit]
user@router# show protocols bgp
graceful-restart;
group my-group {
type internal;
local-address 192.168.1.1;
neighbor 192.168.1.2;
neighbor 192.168.2.2 {
graceful-restart {
disable;
} }
}
— Exhibit —
You have configured your router as shown in the exhibit.
Which statement is true based on the graceful restart (GR) configuration?
Which function would you use to prevent a Layer 2 loop?
80 from the user with IP address 10.10.10.10?
Which steps are required for the switch to process and forward the Ethernet frame?
You have an Ethernet frame with an unknown destination address.
Which steps are required for the switch to process and forward the Ethernet frame?
What is the purpose of the native VLAN?
What is the purpose of the native VLAN?
what determines which switch will become the designated bridge?
Two switches are powered on at the same time on the same LAN segment.
By default, what determines which switch will become the designated bridge?
Which command meets this requirement?
You must modify the default RSTP port behavior on interface ge-0/0/9 so it can transition states
immediately when a host is plugged in. It is on a half-duplex link.
Which command meets this requirement?
Which statement describes how root protection protects your network?
Which statement describes how root protection protects your network?
Which three statements accurately describe IP source guard?
You need additional security and are configuring IP source guard.
Which three statements accurately describe IP source guard? (Choose three.)