Question 6 of 69

Which protocol prevents loops and calculates the best path through a switched network that contains redundant paths?

    Correct Answer: B

    Spanning Tree Protocol (STP) is designed to prevent loops in a switched network and to create a loop-free logical topology. STP achieves this by identifying and shutting down redundant paths until they are needed, thus preventing broadcast storms and ensuring network stability.

Question 7 of 69

Which two characteristics are true for EBGP peerings? (Choose two.)

    Correct Answer: C, D

    EBGP connects peer devices in two different autonomous systems. While EBGP peers are typically directly connected, they can also be connected over a multihop connection using a higher TTL value.

Question 8 of 69

What are two advantages of a point-to-point OSPF adjacency? (Choose two.)

    Correct Answer: C, D

    A point-to-point OSPF adjacency has two main advantages. First, no type 2 LSAs are generated, which simplifies the OSPF database since type 2 LSAs are used for describing multi-access network segments like Ethernet. Second, there is quicker neighbor establishment because the formation process does not require the election of a Designated Router (DR) and Backup Designated Router (BDR), thus speeding up the convergence time.

Question 9 of 69

Which two port security features use the DHCP snooping database for additional port security? (Choose two.)

    Correct Answer: A, C

    Dynamic ARP inspection (DAI) and IP Source Guard both use the DHCP snooping database for additional port security. DAI helps protect the network from ARP spoofing and man-in-the-middle attacks by intercepting ARP packets on untrusted ports and validating them against the DHCP snooping database. IP Source Guard helps ensure that only clients with a valid IP-MAC address pair obtained through DHCP can communicate on the network, effectively preventing IP address spoofing.

Question 10 of 69

You want to configure Layer 2 services over an IP-based tunneling mechanism between two sites.

Which configuration statement is required to accomplish this task?

    Correct Answer: A

    To configure Layer 2 services over an IP-based tunneling mechanism, it is necessary to use the GRE (Generic Routing Encapsulation) interface. The correct configuration statement for enabling Layer 2 Ethernet packets over GRE tunnels involves specifying the bridge protocol family. Therefore, the required statement is: 'set interfaces gr-0/0/0.0 family bridge', which specifies the appropriate interface and family configuration for this task.