Intermediate devices must have a route to the destination address of the traffic being tunneled.
Intermediate devices must have a route to both the tunnel source address and the tunnel destination address.
Intermediate devices must have a route to the tunnel destination address but do not require a route to the tunnel source address.
Intermediate devices must have a route to the tunnel source address but do not require a route to the tunnel destination address.
Correct answer: C
Question 2
You have a conference room with an open network port that is used by employees to connect to the network. You are concerned about rogue switches being connected to this port.
Which two features should you enable on your switch to limit access to this port? (Choose two.)
DHCP snooping
dynamic ARP inspection
MAC limiting
802.1X
Correct answer: AB
Question 3
Which statement is correct about IS-IS link state PDUs?
They are used to maintain link-state database synchronization.
They are used to establish adjacencies.
They are used to build the link-state database.
They are used to determine whether the neighbors are Level 1 or Level 2.