Which three techniques can be used to provide IPv6 firs…

Which three techniques can be used to provide IPv6 first-hop security to prevent man-in-themiddle attacks? (Choose three.)

Which three techniques can be used to provide IPv6 first-hop security to prevent man-in-themiddle attacks? (Choose three.)

A.
DHCP snooping

B.
Dynamic ARP Inspection

C.
RA Guard

D.
ND Inspection

E.
BPDU guard

F.
IPv6 provider-independent address space



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Nicole

Nicole

352-001 New added questions:

QUESTION
What is a key role for the access layer in a hierarchical network design?

A. The access layer provides a security, QoS, and policy trust boundary.
B. The access layer provides an aggregation point for services and applications.
C. The access layer serves as a distribution point for services and applications.
D. The access layer can be used to aggregate remote users.

Answer: A

QUESTION
You have been asked to deploy BGP across a satellite link system to a small number of retail stores.
What must you do to successfully deploy BGP in this situation?

A. configure all the BGP peering sessions across the satellite links as EBGP
B. set the BGP hold timer to under one second
C. configure the initial window size, maximum MTU, and TCP keepalive parameters
D. manually configure static routes to back up BGP across the satellite link

Answer: C

QUESTION
Among the design criteria for a network is the requirement that bandwidth capacity be managed proactively. Which two techniques would most effectively support the proactive management of network bandwidth capacity? (Choose two.)

A. analyze network bandwidth utilization to establish a baseline
B. implement QoS to increase available bandwidth and overall throughput
C. implement utilization measurement and tracking measures in the network
D. configure SNMP MIB collectors to trigger at utilization thresholds

Answer: AC

QUESTION
What are the two preferred mechanisms for detecting Layer 2 link failures quickly? (Choose two.)

A. BFD
B. fast RSVP hellos
C. LDP keepalives
D. loss of signal

Answer: AD

QUESTION
Which IPv4 addressing and routing scheme can increase the availability of a network service during a DoS attack?

A. unicast
B. broadcast
C. anycast
D. multicast

Answer: C

QUESTION
Which network management tool should a network manager consult in order to pinpoint the cause of a routing recursion error?

A. debug (for BGP output)
B. syslog (for BGP errors)
C. RMON events group
D. SNMP routing traps

Answer: A

QUESTION
Which resource does a TCP SYN flood attack target?

A. connection tables on the target host
B. send buffers on transit routers
C. shared memory on the routers closest to the target
D. SYN cookies on the target host

Answer: A

Full Version can be checked here: https://www.braindump2go.com/352-001.html