Which OSPF LSA type has a domain flooding scope?
A. router
B. network
C. external
D. summary
Which two LSA types are only generated by area border routers? (Choose two.)
A. Type 2
B. Type 3
C. Type 4
D. Type 5
Which three statements accurately describe the factory-default storm control configuration? (Choose three.)
A. Storm control monitors traffic levels for broadcast traffic.
B. Storm control monitors traffic levels for unknown unicast traffic.
C. Storm control drops all monitored traffic in excess of 80 percent.
D. Storm control monitors traffic levels for multicast traffic.
E. Storm control shuts down the interface on which the storm control level is exceeded.
Router 2 is peered using EBGP to Router 3's physical interface. A route is announced from Router 3 to Router 2. Router 2 then announces this route to Router 1 using IBGP. No routing policies are configured on any of the three routers. What will the BGP next-hop attribute of this route be when examined on Router 1?
A. 172.17.5.5
B. 10.10.10.1
C. 10.10.10.2
D. 192.168.5.50
Refer to the router configuration shown in the exhibit. To which IS-IS area does this router belong?
A. Area 49
B. Area 0100
C. Area 49.2020
D. Area 49.2020.0100.1001.0001
-- Exhibit -user@Switch-1# run show dhcp snooping binding DHCP Snooping Information: MAC address IP address Lease (seconds) Type VLAN Interface
00:26:88:02:74:89 172.28.1.4 - static default ge-0/0/9.0
00:26:88:02:74:86 172.28.1.2 86113 dynamic default ge-0/0/6.0
00:26:88:02:74:87
172.28.1.3 86378 dynamic default ge-0/0/7.0
-- Exhibit -DHCP snooping is implemented on an EX Series switch. The results display a static MAC to IP binding on interface ge-0/0/9 as shown in the exhibit.
Which statement is correct?
A.
MAC address 00:26:88:02:74:89 is a static MAC address configured for a host attached to interface ge-0/0/9.
B.
MAC address 00:26:88:02:74:89 is a static MAC address to IP address binding in the DHCP server.
C.
MAC address 00:26:88:02:74:89 is a static MAC address to IP address configured on the L3 interface ge-0/0/9.
D.
MAC address 00:26:88:02:74:89 is a static address assigned using the command set interface ge-0/0/9.0 mac-allowed 00:26:88:02:74:89.
What are three common characteristics of OSPF and IS-IS? (Choose three.)
A. Both routing protocols maintain a link-state database calculated using the Dijkstra shortest path first algorithm.
B. Both routing protocols elect a designated router and backup designated router for a shared LAN segment.
C. Both routing protocols use hello packets to form and maintain adjacencies.
D. Both routing protocols use a SHA-1 hash for authentication purposes.
E. Both routing protocols allow for address summarization between areas.
You have recently configured EBGP on R1 using the ge-0/0/2 interface. You notice that the EBGP-learned routes are present on R1 but these routes are not present in the routing tables on any of the other IBGP peers. During your
investigation, you notice that the routes on the other IBGP peers are hidden.
What are two solutions to this problem? (Choose two.)
A. Use an import policy on R1 to change the next hop of the EBGP-learned routes before advertising them to the IBGP peers.
B. Include the ge-0/0/2 interface as passive in R1's IGP configuration.
C. Use an export policy on R1 to change the next hop of the EBGP-learned routes before advertising them to the IBGP peers.
D. Include the IBGP-facing interfaces as passive in R1's IGP configuration.
-- Exhibit -{master:0}[edit]
user@switch# show firewall
family ethernet-switching {
filter block-traffic {
term count {
from {
source-address {
10.100.0.254/32;
}
}
then count blocked-subnet;
}
term reject-traffic {
from {
source-address {
10.100.0.254/32;
}
}
then discard;
}
term accept-rest {
then accept;
}
}
}
-- Exhibit -You have a device that is sending a malicious packet to other devices in your Layer 2 network. You are asked to ensure that packets sent from this device are not allowed to enter your network. You must also keep track of the number of
packets that are being received. The device's IP address is 10.100.0.254. You have created and applied the firewall filter shown in the exhibit to the correct port. However, traffic is still being forwarded into the network.
What is causing the problem?
A. The reject-traffic term must be placed before the count term.
B. The filter family is incorrect for a port based filter.
C. Layer 2 firewall filters do not have visibility to the Layer 3 header information.
D. The count term is implicitly accepting the traffic.
Interface ge-0/0/3 has been disabled because a storm control limit has been exceeded. Which two commands are valid to recover the interface? (Choose two.)
A. user@switch> clear ethernet-switching storm-control-error interface ge-0/0/3
B. user@switch# set ethernet-switching-options secure-access-port disable-timeout 30
C. user@switch> clear ethernet-switching port-error interface ge-0/0/3
D. user@switch# set ethernet-switching-options port-error-disable disable-timeout 30