Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office? (Choose two.)

Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office? (Choose two.)A . DMVPNB . MPLS VPNC . Virtual Tunnel Interface (VTI)D . SSL VPNE . PPPoEView AnswerAnswer: AC

April 1, 2024 No Comments READ MORE +

What is the reason that the router still sends traffic that is destined to AS 690 to a neighbor other than 10.222.1.1?

Refer to the exhibit. A router receiving BGP routing updates from multiple neighbors for routers in AS 690. What is the reason that the router still sends traffic that is destined to AS 690 to a neighbor other than 10.222.1.1?A . The local preference value in another neighbor statement is...

April 1, 2024 No Comments READ MORE +

Drag and drop the operations from the left onto the locations where the operations are performed on the right

DRAG DROP Drag and drop the operations from the left onto the locations where the operations are performed on the right. View AnswerAnswer: Explanation: Label Switch Router

April 1, 2024 No Comments READ MORE +

Which two actions are needed to allow the file to copy?

An engineer is trying to copy an IOS file from one router to another router by using TFTP. Which two actions are needed to allow the file to copy? (Choose two.)A . Copy the file to the destination router with the copy tftp: flash: commandB . Enable the TFTP server...

April 1, 2024 No Comments READ MORE +

Which two configurations will fix it?

An engineer configured a leak-map command to summarize EIGRP routes and advertise specifically loopback 0 with an IP of 10.1.1.1.255.255.255.252 along with the summary route. After finishing configuration, the customer complained not receiving summary route with specific loopback address. Which two configurations will fix it? (Choose two.)A . Configure access-list...

March 31, 2024 No Comments READ MORE +

What are the two solutions to fix the issue?

Refer to the exhibit. BGP is flapping after the Copp policy is applied. What are the two solutions to fix the issue? (Choose two)A . Configure BGP in the COPP-CRITICAL-7600 ACLB . Configure a higher value for CIR under the default class to allow more packets during peak trafficC ....

March 31, 2024 No Comments READ MORE +

What is the result when the route-map OUT command is applied toward an eBGP neighbor R1 (1.1.1.1) by using the neighbor 1.1.1.1 route-map OUT out command?

R2 has a locally originated prefix 192.168.130.0/24 and has these configurations: What is the result when the route-map OUT command is applied toward an eBGP neighbor R1 (1.1.1.1) by using the neighbor 1.1.1.1 route-map OUT out command?A . R1 sees 192.168.130.0/24 as two AS hops away instead of one AS...

March 31, 2024 No Comments READ MORE +

Which SNMP verification command shows the encryption and authentication protocols that are used in SNMPV3?

Which SNMP verification command shows the encryption and authentication protocols that are used in SNMPV3?A . show snmp groupB . show snmp userC . show snmpD . show snmp viewView AnswerAnswer: B

March 31, 2024 No Comments READ MORE +

Which two statements about VRF-Lite configurations are true? (Choose two.)

Which two statements about VRF-Lite configurations are true? (Choose two.)A . They support the exchange of MPLS labelsB . Different customers can have overlapping IP addresses on different VPNsC . They support a maximum of 512.000 routesD . Each customer has its own dedicated TCAM resourcesE . Each customer has...

March 31, 2024 No Comments READ MORE +

Which protocol is used in a DMVPN network to map physical IP addresses to logical IP addresses?

Which protocol is used in a DMVPN network to map physical IP addresses to logical IP addresses?A . BGPB . LLDPC . EIGRPD . NHRPView AnswerAnswer: D

March 31, 2024 No Comments READ MORE +