1. Which of the following OSPF packets contains an abbreviated list of the LSDB of the sending router? Type 1: Hello packet Type 2: DBD packet Type 3: LSR packet Type 4: LSU packet Type 5: LSAck packet 2. Which of the following OSPF packets is used by …
1. Which of the following OSPF components is associated with the neighbor table? Dijkstra’s algorithm Link-State database Routing protocol messages Adjacency database Forwarding database 2. Which of the following OSPF components is responsible for computing the cost of each route? Dijkstra’s algorithm Link-State database Routing protocol messages Adjacency …
1. Refer to the exhibit. True or False? R1 must encapsulate received packets into new frames before forwarding them to R2. True False 2. Refer to the exhibit. True or False? R2 will forward frames to R3 with an all 1s Layer 2 address. True False 3. Refer …
1. Which two methods can be used to identify the next hop in a static route? (Choose two.) destination interface next hop IP address destination network address exit interface source IP address 2. Which IPv4 static route statement is true? The destination network is identified using the network …
1. Which type of routing automatically adapts to topology changes? static routes dynamic routing protocols both static routes and dynamic routing protocols 2. What type of routing is typically used with a stub network? static routes dynamic routing protocol 3. What metric is used by OSPF to determine …
1. Which routing table principle is not correct? Every router makes its decision alone, based on the information it has in its own routing table. The fact that one router has certain information in its routing table does not mean that other routers have the same information. Routing …
1. If a router needs to send an ARP Request for the destination IPv4 address of the packet, this means the packet will be forwarded: To a next-hop router To the device with the destination IPv4 address of the packet 2. If a router needs to send an …
1. What table does a router use to determine how to forward an IP packet? ARP table MAC address table neighbor cache routing table 2. What action will a router take on a packet with a destination IP address that is on a remote network? It will forward …
1. What are the best ways to secure WLANs? (Choose two.) Authentication SSID cloaking Encryption MAC address filtering 2. Which of the following authentication methods does not use a password shared between the wireless client and the AP? WEP WPA WPA2 WPA3 Open 3. Which encryption method is …
1. Which of the following is most likely NOT the source of a wireless DoS attack? Radio interference Improperly configured devices Rogue AP Malicious user 2. True or False: A rogue AP is a misconfigured AP connected to the network and a possible source of DoS attacks. True …