Which option is a method of restricting access for users based on user roles and locales?
Which technology should a network designer combine with VSS to ensure a loop free topology with optimal convergence time?
What are two methods of ensuring that the multicast RPF check passes without changing the unicast routing table? (Choose two.)
Which two design principles should be followed to improve EIGRP scaling in any size network? (Choose two.)
Which security mechanism can you implement to protect the OSPF information that a router receives?
In which OSI layer does IS-IS operate?