consider also following changes in 247 as discussed:
(195-Questions, Q17)
A. Apply a context based network access control policy
(195-Questions, Q33)
A. contingency exit strategy steps
(195-Questions, Q38)
B. Redistribute the external prefixes onto OSPF and ensure that the total metric calculation includes only the external value & the value is same in all ASBR’s
(195-Questions, Q39)
A. Layer 2 switches will not affect in implementation of IPv6, They can be included in their current state
(195-Questions, Q40)
B. hosts bating routers that reside attached links the IPv6 Neighbour Discovery Protocol
(195-Questions, Q47)
SAML 2.0 (Note to provide authentication and authorization services)
(195-Questions, Q74)
B. DTLS
(195-Questions, Q97)
C. tolerance to packet loss
D. intolerance to jitter
(195-Questions, Q125)
B. DWDM
======================
(42-New Questions, Q11)
B. Enforce policies and micro segmentation
(42-New Questions, Q24)
B. MSDP
(42-New Questions, Q34)
B. Ensure trustworthiness of devices
======================
(All Drag&Drops, Q3)
Ingress ACL, — It requires manual configuration
strict Reverse Path Forwarding — It is used to prevent spooled attacks when there are alternate routes to a given IP address
Feasible Reverse Path Forwarding — It is used to check the exist of a route without regard to the incoming interface
loose RPF — It is used as filtering technique for Martian IP addresses
(All Drag&Drops, Q7)
Strict Mode — To ensure the incoming interface is the best reverse path to a given IP address
Feasible Mode —- Th check whether a router to a given IP address exists without regard to its incoming interface
Loose Mode —- To filter Bogon IP addresses