How does a layer 2 switch populate its bridge table?
How does a layer 2 switch populate its bridge table?A . It stores the protocol number of frames traversing the network.B . It stores both the source and destination MAC addresses of frames traversing the network.C . It stores the destination MAC address of frames traversing the network.D . It...
In OSPF, what is the function of the Link-State Database (LSDB)?
In OSPF, what is the function of the Link-State Database (LSDB)?A . To store OSPF routing tables.B . To maintain a list of OSPF neighbors.C . To keep the topology structure of the network.D . To log changes in network topology.View AnswerAnswer: C
When configuring BGP, which command is commonly used to define a BGP neighbor?
When configuring BGP, which command is commonly used to define a BGP neighbor?A . bgp set neighborB . neighbor <IP_ADDRESS> remote-as <AS_NUMBER>C . set bgp peerD . add bgp connectionView AnswerAnswer: B
Which of the following are correct about OSPF router ID selection? (Choose two)
Which of the following are correct about OSPF router ID selection? (Choose two)A . It can be manually configured.B . It is chosen based on the highest IP address of any active interface by default.C . It is always the IP address of the loopback interface.D . It is selected...
Which of the following is a key benefit of implementing High Availability (HA) in a network?
Which of the following is a key benefit of implementing High Availability (HA) in a network?A . Reduced network securityB . Increased network downtimeC . Enhanced data redundancyD . Slower data recoveryView AnswerAnswer: C
Which two prefixes are contributing routes to a 10.20.0.0/18 aggregate route? (Choose two)
Which two prefixes are contributing routes to a 10.20.0.0/18 aggregate route? (Choose two)A . 10.20.0.0/24B . 10.20.60.0/23C . 10.20.0.0/16D . 10.20.100.0/24View AnswerAnswer: AB
In OSPF, which command is commonly used to monitor neighbor relationships?
In OSPF, which command is commonly used to monitor neighbor relationships?A . show ip ospf neighborsB . show ospf databaseC . show ip route ospfD . show ospf interfacesView AnswerAnswer: A
Which of the following are true about Layer 2 and Layer 3 strategies in data center architectures? (Choose two)
Which of the following are true about Layer 2 and Layer 3 strategies in data center architectures? (Choose two)A . Layer 2 strategies are typically used for creating large, flat networks.B . Layer 3 strategies cannot be used in conjunction with Layer 2 environments.C . Layer 3 strategies help in...
What is the main advantage of using MACsec?
What is the main advantage of using MACsec?A . It increases the speed of the network.B . It provides Layer 2 encryption for data confidentiality and integrity.C . It creates multiple virtual networks over a single physical infrastructure.D . It allows for the use of longer cable runs.View AnswerAnswer: B
VLANs help in reducing which of the following? (Choose two)
VLANs help in reducing which of the following? (Choose two)A . Collision domainsB . Broadcast domainsC . Routing complexityD . Encryption requirementsView AnswerAnswer: AB