单项选择题 ArequestarrivedonyourMPLS-vpn-bgpgroup.Duetoasecuritybreach,yourcustomerisexperiencingDoSattackscomingfromspecificsubnets(200.0.10.0/24,200.0.12.0/24).YouhavecheckedallMPLS-EBGProutesbeingadvertisedtoBHKfromotherVPNsitesandfoundfoursubnetslisted:200.0.10.0/24,200.0.11.0/24,200.0.12.0/24,200.0.13.0/24.YouimmediatelyapplyanoutboundACLfilterusingtheappropriateMPLS-EBGPtool:access-list1deny0.0.0.0255.255.254.255access-list1permitanyWhathappenswhenyouapplythisACLontheMPLS-EBGPconnectiontoBHK?()
问答题 What2methodsareavailableforovercomingtheBGPfullmeshrequirement?
多项选择题 Refer to the exhibit. The Layer 2 network uses VTP to manage its VLAN database. A network designer created all VLANs on the VTP server (switch 1) and it has been advertised through VTP to all other VTP clients (switches 2 through 4). Due to network growth,a network operator decided to add a new switch between switch 1 and switch 3. The network operator has been instructed to use a refurbished switch and use a VTP client. Which three of these factors should the network operator consider to minimize the impact of adding a new switch?()