In which two ways does the IPv6 First-Hop Security Binding Table operate? (Choose two.)
In which two ways does the IPv6 First-Hop Security Binding Table operate? (Choose two.)
The IPv6 First-Hop Security Binding Table operates by using various IPv6 guard features to validate the data link layer address, ensuring the legitimacy of IPv6 addresses and preventing spoofing and redirect attacks. Additionally, it employs a recovery mechanism to recover the binding table in the event of a device reboot, maintaining security and continuity of operation.
given answer is correct, first two lines from this article: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_fhsec/configuration/15-s/ip6-fhs-bind-table.html
The given answer is correct
Ref: IPv6 First-Hop Security Binding Table – Cisco “… Overview of the IPv6 First-Hop Security Binding Table … This database, or binding table, is used by various IPv6 guard features to validate the link-layer address (LLA), the IPv4 or IPv6 address, and the prefix binding of the neighbors to prevent spoofing and redirect attacks. … IPv6 First-Hop Security Binding Table Recovery Mechanism The IPv6 first-hop security binding table recovery mechanism enables the binding table to recover in the event of a device reboot. …” A. by IPv6 HSRP to make sure neighbors are authenticated before being used as gateways Wrong answer. B. by various IPv6 guard features to validate the data link layer address Correct answer. C. by the recovery mechanism to recover the binding table in the event of a device reboot Correct answer. D. by IPv6 routing protocols to securely build neighborships without the need of authentication Wrong answer. E. by storing hashed keys for IPsec tunnels for the built-in IPsec features Wrong answer.
B & C are correct
B, C : https://www.exam-answer.com/ipv6-first-hop-security-binding-table-operation