Question 6 of 92

Which protocol prevents loops and calculates the best path through a switched network that contains redundant paths?
Answer

Suggested Answer

The suggested answer is B.

Spanning Tree Protocol (STP) is designed to prevent loops in a switched network and to create a loop-free logical topology. STP achieves this by identifying and shutting down redundant paths until they are needed, thus preventing broadcast storms and ensuring network stability.

Community Votes1 vote
BSuggested
100%
Question 7 of 92

Which two characteristics are true for EBGP peerings? (Choose two.)
Answer

Suggested Answer

The suggested answer is C, D.

EBGP connects peer devices in two different autonomous systems. While EBGP peers are typically directly connected, they can also be connected over a multihop connection using a higher TTL value.

Community Votes

No votes yet

Join the discussion to cast yours

Question 8 of 92

What are two advantages of a point-to-point OSPF adjacency? (Choose two.)
Answer

Suggested Answer

The suggested answer is C, D.

A point-to-point OSPF adjacency has two main advantages. First, no type 2 LSAs are generated, which simplifies the OSPF database since type 2 LSAs are used for describing multi-access network segments like Ethernet. Second, there is quicker neighbor establishment because the formation process does not require the election of a Designated Router (DR) and Backup Designated Router (BDR), thus speeding up the convergence time.

Community Votes

No votes yet

Join the discussion to cast yours

Question 9 of 92

Which two port security features use the DHCP snooping database for additional port security? (Choose two.)
Answer

Suggested Answer

The suggested answer is A, C.

Dynamic ARP inspection (DAI) and IP Source Guard both use the DHCP snooping database for additional port security. DAI helps protect the network from ARP spoofing and man-in-the-middle attacks by intercepting ARP packets on untrusted ports and validating them against the DHCP snooping database. IP Source Guard helps ensure that only clients with a valid IP-MAC address pair obtained through DHCP can communicate on the network, effectively preventing IP address spoofing.

Community Votes

No votes yet

Join the discussion to cast yours

Question 10 of 92

You want to configure Layer 2 services over an IP-based tunneling mechanism between two sites.
Which configuration statement is required to accomplish this task?
Answer

Suggested Answer

The suggested answer is A.

To configure Layer 2 services over an IP-based tunneling mechanism, it is necessary to use the GRE (Generic Routing Encapsulation) interface. The correct configuration statement for enabling Layer 2 Ethernet packets over GRE tunnels involves specifying the bridge protocol family. Therefore, the required statement is: 'set interfaces gr-0/0/0.0 family bridge', which specifies the appropriate interface and family configuration for this task.

Community Votes1 vote
CMost voted
100%