What are two characteristics of OSPF ABRs?
What are two characteristics of OSPF ABRs? (Choose two.) A. ABRs transmit routing information between the backbone and other areas. B. ABRs cannot be part of the backbone and another area at the same time. C. ABRs inject routing information from outside the OSPF domain. D. ABRs link two OSPF areas.
Referring to the exhibit, which configuration will force traffic to always use ae0.0 as long as it is active?
Referring to the exhibit, which configuration will force traffic to always use ae0.0 as long as it is active? A. B. C. D.
What are two reasons for configuring more than one VLAN on a switch?
What are two reasons for configuring more than one VLAN on a switch? (Choose two.) A. A group of clients requires that security be applied to traffic entering or exiting the group’s devices. B. A group of devices must forward traffic across a WAN. C. A group of devices are connected to the same Layer […]
Which two statements are correct regarding the root bridge election process when using STP?
Which two statements are correct regarding the root bridge election process when using STP? (Choose two.) A. A lower system MAC address is preferred. B. A higher bridge priority is preferred. C. A lower bridge priority is preferred. D. A higher system MAC address is preferred.
Which two routes belong to the 172.16.0.0/22 aggregate route?
Which two routes belong to the 172.16.0.0/22 aggregate route? (Choose two.) A. 172.16.4.0/24 B. 172.16.0.0/24 C. 172.16.5.0/24 D. 172.16.3.0/24
Which configuration statement is required to accomplish this task?
You want to configure Layer 2 services over an IP-based tunneling mechanism between two sites. Which configuration statement is required to accomplish this task? A. set interfaces gr-0/0/0.0 family bridge B. set interfaces ip-0/0/0.0 encapsulation vlan-bridge C. set interfaces gr-0/0/0.0 encapsulation vlan-bridge D. set interfaces ip-0/0/0.0 family bridge
Which two port security features use the DHCP snooping database for additional port security?
Which two port security features use the DHCP snooping database for additional port security? (Choose two.) A. dynamic ARP inspection B. MACsec C. IP Source Guard D. MAC learning
What are two advantages of a point-to-point OSPF adjacency?
What are two advantages of a point-to-point OSPF adjacency? (Choose two.) A. Only a DR is elected. B. No type 1 LSAs are generated. C. No type 2 LSAs are generated. D. There is quicker neighbor establishment.
Which two characteristics are true for EBGP peerings?
Which two characteristics are true for EBGP peerings? (Choose two.) A. EBGP peers must be directly connected. B. EBGP connects peer devices in the same autonomous system. C. EBGP connects peer devices in two different autonomous systems. D. EBGP peers can be connected over a multihop connection.
Which protocol prevents loops and calculates the best path through a switched network that contains redundant
Which protocol prevents loops and calculates the best path through a switched network that contains redundant paths? A. VRRP B. STP C. DHCP D. IS-IS