In this scenario, what are two methods to receive the active source information on R2?

Referring to the exhibit, anycast RP is implemented to ensure multicast service availability.

The source is currently sending multicast traffic using group 239.1.1.1 and R3 is receiving PIM register messages, but R2 does not have active source information.

In this scenario, what are two methods to receive the active source information on R2? (Choose two.)
A . Configure an RP set in PIM on R1, allowing R1 to forward PIM register messages to R2 and R3 in the set.
B. Configure an MSDP protocol between R2 and R3.
C. Configure an RP set in PIM on R2 and R3, allowing the RPs to forward PIM register messages to the other RPs in the set.
D. Configure an MSDP protocol between R1 and R2.

Answer: A,C

Referring to the exhibit, which statement is correct?

You recently committed a change to a router to reject OSPF routes sourced from area 10.

However, you are still seeing area 10 routes in the routing table.

Referring to the exhibit, which statement is correct?

A . The OSPF protocol is first matched by find-ospf and accepted.
B. The routes only timeout after 24 hours.
C. The routes remain in the table until the device is rebooted.
D. The routes remain in the table until the routing daemon is restarted.

Answer: D

Which two steps would you take to further troubleshoot this problem?

You are troubleshooting an EVPN-VXLAN IP fabric and observe the loop shown in the exhibit.

Which two steps would you take to further troubleshoot this problem? (Choose two.)
A . Verify that the same ESI is configured on the link from the host and that it matches the source.
B. Issue the show route table bgp.evpn.0 command on Leaf2 and verify that Type 4 routes are present.
C. Issue the show route table bgp.evpn.0 command on Leaf2 and verify that Type 3 routes are present.
D. Verify that the same ESI is configured on the two links from the source.

Answer: B,C

Which authentication method would satisfy this requirement?

You are asked to establish interface level authentication for users connecting to your network. You must ensure that only corporate devices, identified by MAC addresses, are allowed to connect and authenticate. Authentication must be handled by a centralized server to increase scalability.

Which authentication method would satisfy this requirement?
A . MAC RADIUS
B. captive portal
C. 802.1X with single-secure supplicant mode
D. 802.1X with multiple supplicant mode

Answer: A

Referring to the exhibit, how will router E quickly learn that the remote MAC addresses are no longer reachable through the router attached to the failed link?

Referring to the exhibit, how will router E quickly learn that the remote MAC addresses are no longer reachable through the router attached to the failed link?

A . Router E receives Type 2 withdrawal messages from router D.
B. Router E receives Type 1 withdrawal messages from router D.
C. Router E receives Type 1 withdrawal messages from router C.
D. Router E receives Type 2 withdrawal messages from router C.

Answer: B