Which three components are in an MPLS header? (Choose three)A . a 4-bit experimental use fieldB . a 4-bit label stack entryC . an 8-bit TTLD . a 2-bottom of stackE . a 3-bit experimental use fieldF . a 20-bit label View Answer Answer: C, E, F...
Drag and drop the OSPFv3 LSA type on the left to the functionality it provides on the right View Answer Answer:...
Which two statement are true about IS-IS (choose Two)A . IS-IS DIS election is nondeterministicB . IS-IS work over the data link layer, which does not provide for Fragmentation and reassemblyC . IS-IS can never be routed beyond the immediate next hopD . IS-IS SPF calculation is performed in three phases View Answer Answer:...Continue reading
Refer to the exhibit You need to modify the IOS L3 switch configuration for High Availability operation. What additional configuration is needed, if any?A . Enable HSRP pre-empt with a delay to allow time for the routing and switching protocol to convergeB . The shown configuration is sufficient for High Availability functionalityC . Enable...Continue reading
Which two statements about PfR are true? (Choose two)A . It provides a narrower scope of route control than OERB . It manages traffic classesC . It supports split tunneling and spoke-to-spoke linksD . It provides intelligent route control on a per-application basisE . It always prefers the least cost path View Answer Answer:...Continue reading
Which two statements about LDP are true? (Choose two)A . LDP sessions are established between LSRsB . It uses a 16-byte identifierC . It supports only directed-connected neighborsD . It sends hello messages are UDP packets via unicastE . It enables LSRs to communicate label bindingsF . It sends hello messages over TCP View...Continue reading
Which two methods can you use to limit the range for EIGRP queries? (Choose two)A . Configure unicast EIGRP on all routers in the EIGRP domainB . Configure route tagging for all EIGRP routesC . Summarize routes at the boundary routers of the EIGRP domainD . Use an access list to deny the multicast...Continue reading
Which two statements about IS-IS authentication are true? (Choose two)A . if LSP authentication is in use, unauthorized devices can be form neighbor adjacenciesB . Area and domain authentication must be configured on a per-interface basisC . Passwords can be configured on a per-interface basisD . Level 1 LSPs use the domain passwordE ....Continue reading
What are three core features of GET VPN? (Choose three)A . The rekey mechanismB . Time-based anti-replayC . AESD . MPLSE . Partial meshF . Cooperative key servers View Answer Answer: A, B, F...
Which two limitations of PIM snooping are true? (Choose two)A . 224 0 1 39 and 224 0 1 40 are always floodedB . If non-PIMv2 multicast routers are on the network, they are flooded with all trafficC . All join and prune messages are flooded to all router portsD . All traffic in...Continue reading