option
Cuestiones
ayuda
daypo
buscar.php

enar-cap18-20

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del Test:
enar-cap18-20

Descripción:
preparacion

Fecha de Creación: 2022/09/25

Categoría: Otros

Número Preguntas: 32

Valoración:(0)
COMPARTE EL TEST
Nuevo ComentarioNuevo Comentario
Comentarios
NO HAY REGISTROS
Temario:

An network administrator has created VRF instances on a router and assigned interfaces to the VRF instances. What command can the administrator issue to verify what IP address is assigned to the interface, what VRF instance the interface is in, and whether the interface is up or down?. show ip route. show interface. show ip vrf interfaces. show ip vrf.

When connectivity over a VRF instance is being verified, what information must be specified as part of the ping command?. the VRF instance. the source interface. the source address. the datagram size.

Which two components used in MPLS operation are associated with the router data plane? (Choose two.). label distribution protocol (LDP). IP forwarding table (FIB). IP routing table (RIB). label forwarding table (LFIB). label information base (LIB).

In an MPLS Layer 3 VPN network, which router is responsible for adding both the VPN and the LDP labels to packets?. egress PE. CE. ingress PE. P.

Which database on an LSR is used to make forwarding decisions on labeled packets?. RIB. FIB. LIB. LFIB.

Refer to the exhibit. Which router will perform penultimate hop popping on packets destined for the 10.0.2.0/24 network?. R1. R2. R4. R5. R6.

What is a characteristic of CE routers in an MPLS Layer 3 VPN environment?. They perform penultimate hop popping. They run the label distribution protocol to share and distribute labels. They are unaware of MPLS and labels. They remove labels at the end of the label path.

Refer to the exhibit. Which two routers would be participating in MP-BGP? (Choose two.). R1. R2. R3. R4. R5. R6.

What addressing method is used by MPLS-enabled routers to forward packets through the MPLS domain?. labels. destination IP address. DLCI. Layer 4 port number.

Refer to the exhibit. Which two routers are considered P routers? (Choose two.). R1. R2. R3. R4. R5. R6.

Match the DMVPN tunnel state with the description. (Not all options are used.). IPsec. NHRP. INTF.

Refer to the exhibit. Which DMVPN phase or phases will support a DMVPN tunnel between R5 and R6?. Phase 1, 2, or 3. Phase 1 and 2 only. Phase 2 and 3 only. Phase 3 only.

After how many NHRP registration request re-transmissions is a next-hop server (NHS) declared “down” if a spoke has not received an NHRP registration reply?. 2. 3. 4. 5.

When implementing IPv6 DMVPN with IPv6 as the tunneling protocol, what IPv6 address type must be assigned to the tunnel interface?. unique global. link-local. anycast. unique local.

Which additional command, beyond DVMPN Phase 1 configuration, is added to spoke routers for Phase 3 DMVPN (Multipoint)?. ip nhrp nhs. ip nhrp redirect. ip nhrp shortcut. ip nhrp map.

Which capability is supported by all three DMVPN phase models?. direct spoke-to-hub communication. spoke-to-spoke between DMVPN networks. direct spoke-to-spoke communication. on-demand VPN tunnels between spokes.

Match the NHRP message type with the description. resolution. redirect. registration. purge.

Which solution would prevent the problem of recursive routing over DMVPN tunnels?. conditional forwarding. NHRP. STP. front door VRF.

Refer to the exhibit. A network administrator has configured a GRE tunnel between routers CE1 and CE2 to connect two corporate sites across the provider network. From the perspective of router CE1, how many hops away is network 10.0.0.0/24?. 0. 1. 2. 3.

What is the default NHRP cache holdtime period?. 60 seconds. 600 seconds. 15 minutes. 2 hours.

Which component is an element of secure data transport that is concerned with ensuring data is viewable to only authorized users?. confidentiality. availability. integrity. accountability.

What element of security is ensured by data confidentiality?. Data is accurate and has not been changed in transit. Data can be modified only by authorized users. Data is viewable to only authorized users. Data is always available for users.

Which security mechanism is used to ensure data integrity?. preshared keys. encryption algorithms. hashing algorithms. digital certificates.

What protection is provided by IPsec perfect forward secrecy?. ensuring that packets are not modified in transit. ensuring a compromised session key does not lead to the compromise of future keys. providing protection against hackers trying to capture and insert network traffic. creating new security keys between endpoints on a specified time interval.

What is a characteristic of the IPsec Encapsulation Security Payload protocol?. functions only in transport mode. does not encrypt the original payload of the packet. provides data confidentiality, integrity, and authentication. uses protocol number 51 located in the IP header.

What are two characteristics of IPsec ESP tunnel mode? (Choose two.). It adds a new IPsec header. It encrypts and authenticates only the original packet payload. It encrypts the IPsec and ESP headers. It encrypts the entire original packet. It routes packets based on the original IP header.

What is a characteristic of the DMVPN IPsec tunnel mode?. It encrypts both the GRE and ESP headers. It encrypts and authenticates only the original packet payload. It uses the original IP header to routes packets. It encrypts the entire original packet and the GRE IP header.

What algorithm is used with IPsec to provide data confidentiality?. SHA. MD5. AES. RSA. Diffie-Hellman.

What can be configured with DMVPN tunnels to provide confidentiality and integrity to data transported over the Internet?. digital certificates. IPsec. SSH. SSL.

Which algorithm is used to support ESP encryption?. AES. SHA. MD5. HMAC.

What two protocols provide data authentication and integrity for IPsec? (Choose two.). AH. L2TP. GRE. ESP. PPTP.

Which NHRP message flag indicates that a specific mapping entry in the NHRP cache was used to forward data packets within the past 60 seconds?. nhop. implicit. used. rib.

Denunciar Test