Tag Archives: protocols

A network engineer is configuring a newly installed PE router at the regional gateway location. The new PE router must use MPLS core routing protocols with the existing P router, and LDP sessions between the two routers must be protected to provide faster MPLS convergence. Which configuration must the engineer perform on the network so that LDP sessions are established?

A. Enable communication over TCP port 646 for T-LDP hello messages. B. Enable RSVP-TE FRR on the LDP interface to protect the LDP session between routers. C. Enable LDP session protection on either one of the routers, which allows them to autonegotiate. D. Set the LDP session protection timer on each router to the same value. Answer: Option… Read More »

Which method does Cisco DNA Center use to allow management of non-Cisco devices through southbound protocols?

A. It creates device packs through the use of an SDK. B. It uses an API call to interrogate the devices and register the returned data. C. It obtains MIBs from each vendor that details the APIs available. D. It imports available APIs for the non-Cisco device in a CSV format. Answer: Option A. Explanation:  No answer description… Read More »

Drag and drop the characteristics from the left onto the routing protocols they describe on the right.

Drag and drop the characteristics from the left onto the routing protocols they describe on the right. Select and Place: Answer: Explanation:  No answer description available for this question Show AnswerDiscussion The post Drag and drop the characteristics from the left onto the routing protocols they describe on the right. appeared first on Majanto.

Drag and drop the Cisco SD-Access solution areas from the left onto the protocols they use on the right.

Drag and drop the Cisco SD-Access solution areas from the left onto the protocols they use on the right. Select and Place: Answer: Explanation:  No answer description available for this question Show AnswerDiscussion The post Drag and drop the Cisco SD-Access solution areas from the left onto the protocols they use on the right. appeared first on Majanto.

An engineer must design an in-band management solution for a customer with branch sites. The solution must allow remote management of the branch sites using management protocols over an MPLS WAN. Queueing is implemented at the remote sites using these classes: Class1 equals voice traffic Class2 equals mission-critical traffic Class3 equals default traffic How must the solution prioritize the management traffic over the WAN?

An engineer must design an in-band management solution for a customer with branch sites. The solution must allow remote management of the branch sites using management protocols over an MPLS WAN. Queueing is implemented at the remote sites using these classes: Class1 equals voice traffic Class2 equals mission-critical traffic Class3 equals default traffic How must the solution prioritize… Read More »

Drag and drop the characteristics from the left onto the configuration protocols they describe on the right.

DRAG DROP Drag and drop the characteristics from the left onto the configuration protocols they describe on the right. Select and Place: Answer: Explanation:  No answer description available for this question. Show AnswerDiscussion The post Drag and drop the characteristics from the left onto the configuration protocols they describe on the right. appeared first on Majanto.

Drag and drop the network automation interfaces from the left onto the transport protocols that they support on the right.

DRAG DROP Drag and drop the network automation interfaces from the left onto the transport protocols that they support on the right. Select and Place: Answer: Explanation:  No answer description available for this question. Show AnswerDiscussion The post Drag and drop the network automation interfaces from the left onto the transport protocols that they support on the right.… Read More »

Access to the management interface of devices must be restricted by using SSH and HTTPS. Which two ports must be included in the ACLs for the protocols towork? (Choose two.)

A. 22 B. 23 C. 80 D. 443 E. 880 Answer: Option A, D. Explanation:  No answer description available for this question. Show AnswerDiscussion The post Access to the management interface of devices must be restricted by using SSH and HTTPS. Which two ports must be included in the ACLs for the protocols towork? (Choose two.) appeared first… Read More »

Router R1 is running three different routing protocols. Which route characteristic is used by the router to forward the packet that it receives for destination IP 172.16.32.1?

Refer to the exhibit. Router R1 is running three different routing protocols. Which route characteristic is used by the router to forward the packet that it receives for destination IP 172.16.32.1? A. longest prefix B. administrative distance C. cost D. metric Answer: Option A. Explanation:  No answer description available for this question. Show AnswerDiscussion The post Router R1… Read More »