A. Routing complexity
B. Encryption requirements
C. Collision domains
D. Broadcast domains
A. To dynamically adjust to network changes
B. To filter unwanted traffic
C. To summarize and reduce the number of routes in the routing table
D. To statically define a route to a specific destination
A. The local peer has sent an Update message but not received one from the remote peer.
B. The UDP session between the peers has not been established.
C. The local peer has sent an Open message but not received one from the remote peer.
D. The TCP session between the peers has not been established.
A. An IRB interface switches traffic within the same VLAN.
B. An IRB interface is a physical Layer 3 interface that connects VLANs together.
C. An IRB interface is a Layer 3 interface that can be used to route between VLANs.
D. An IRB interface trunks together VLANs on different switches.
A. The ge-0/0/0 interface has been explicitly assigned to a VLAN named default.
B. The default VLAN is a user defined VLAN name.
C. The asterisk indicates that the interface is active.
D. The ge-0/0/12 interfaces is an access port.
A. It does not provide authentication for an Ethernet traffic between two network nodes.
B. It provides authentication for an Ethernet traffic between two network nodes.
C. It does not provide encryption for an Ethernet traffic between two network nodes.
D. It provides encryption for an Ethernet traffic between two network nodes.
A. By the highest loopback interface IP address.
B. By a manually configured value in the router configuration.
C. By the lowest MAC address of the router.
D. By the highest IP address on any of the router's active interfaces.
A. It finds the path with the numerically lowest route preference.
B. It finds the path with the shortest autonomous system path.
C. It finds the path with the least number of hops.
D. It finds the path with the numerically lowest cost.
A. Redundant Switching Tree Protocol
B. Resilient Switching Transport Protocol
C. Rapid Spanning Tree Protocol
D. Routing Switch Transport Protocol
A. Layer 2 strategies are typically used for creating large, flat networks.
B. Layer 3 strategies help in reducing broadcast domains.
C. Layer 3 strategies cannot be used in conjunction with Layer 2 environments.
D. Layer 2 strategies are primarily used for inter-data center connectivity.