Which three of these Metro service types map to E-Line (versus E-LAN) services that are defined by the Metro E
Which three of these Metro service types map to E-Line (versus E-LAN) services that are defined
by the Metro Ethernet Forum (MEF)? (Choose three.)
which layer of the OSI model does the Spanning Tree Protocol (STP) operate at?
At which layer of the OSI model does the Spanning Tree Protocol (STP) operate at?
Which two design concerns must be addressed when designing a multicast implementation?
Which two design concerns must be addressed when designing a multicast implementation?
(Choose two.)
Which two descriptions are correct regarding multicast addressing?
In computer networking a multicast address is an identifier for a group of hosts that have joined a
multicast group. Multicast addressing can be used in the Link Layer (OSI Layer 2), such as Ethernet
Multicast, as well as at the Internet Layer (OSI Layer 3) as IPv4 or IPv6 Multicast. Which two
descriptions are correct regarding multicast addressing?
Which two of these are characteristics of multicast routing?
Which two of these are characteristics of multicast routing? (Choose two.)
What causes these SIA routes?
EIGRP is being used as the routing protocol on the Company network. While troubleshooting some
network connectivity issues, you notice a large number of EIGRP SIA (Stuck in Active) messages.
What causes these SIA routes? (Select two)
Which two design recommendations are most appropriate when OSPF is the data center core routing protocol?
Which two design recommendations are most appropriate when OSPF is the data center core
routing protocol? (Choose two.)
What two steps can be taken to help prevent this?
You want to enhance the security within the Company LAN and prevent VLAN hopping. What two
steps can be taken to help prevent this? (Select two)
Which two design recommendations are most appropriate when EIGRP is the data center core routing protocol?
Which two design recommendations are most appropriate when EIGRP is the data center core
routing protocol? (Choose two.)
Which type of Layer 2 attack is being used here?
The Company network is being flooded with invalid Layer 2 addresses, causing switch CAM tables to
be filled and forcing unicast traffic to be transmitted out all switch ports. Which type of Layer 2
attack is being used here?