Which protocol prevents loops and calculates the best path through a switched network that contains redundant paths?
Which protocol prevents loops and calculates the best path through a switched network that contains redundant paths?
Spanning Tree Protocol (STP) is designed to prevent loops in a switched network and to create a loop-free logical topology. STP achieves this by identifying and shutting down redundant paths until they are needed, thus preventing broadcast storms and ensuring network stability.
Which two characteristics are true for EBGP peerings? (Choose two.)
EBGP connects peer devices in two different autonomous systems. While EBGP peers are typically directly connected, they can also be connected over a multihop connection using a higher TTL value.
What are two advantages of a point-to-point OSPF adjacency? (Choose two.)
A point-to-point OSPF adjacency has two main advantages. First, no type 2 LSAs are generated, which simplifies the OSPF database since type 2 LSAs are used for describing multi-access network segments like Ethernet. Second, there is quicker neighbor establishment because the formation process does not require the election of a Designated Router (DR) and Backup Designated Router (BDR), thus speeding up the convergence time.
Which two port security features use the DHCP snooping database for additional port security? (Choose two.)
Dynamic ARP inspection (DAI) and IP Source Guard both use the DHCP snooping database for additional port security. DAI helps protect the network from ARP spoofing and man-in-the-middle attacks by intercepting ARP packets on untrusted ports and validating them against the DHCP snooping database. IP Source Guard helps ensure that only clients with a valid IP-MAC address pair obtained through DHCP can communicate on the network, effectively preventing IP address spoofing.
You want to configure Layer 2 services over an IP-based tunneling mechanism between two sites.
Which configuration statement is required to accomplish this task?
To configure Layer 2 services over an IP-based tunneling mechanism, it is necessary to use the GRE (Generic Routing Encapsulation) interface. The correct configuration statement for enabling Layer 2 Ethernet packets over GRE tunnels involves specifying the bridge protocol family. Therefore, the required statement is: 'set interfaces gr-0/0/0.0 family bridge', which specifies the appropriate interface and family configuration for this task.