Exhibit

As shown in the exhibit, you have implemented CoS classifiers using Differentiated Services Code Point (DSCP)
In this scenario, which two statements are correct? (Choose two.)
You are asked to establish authentication for users connecting to the corporate network. You must ensure that only corporate devices that are identified by MAC addresses are allowed to authenticate and connect Authentication must be handled by a centralized database.
Which authentication method would you implement in this scenario?
You need to perform maintenance on one of your OSPF routers. You do not want the other OSPF routers on the network to forward traffic to this router dunng the maintenance window
Which OSPF configuration parameter would you implement to accomplish this task?
Exhibit

What is the OSPF router type shown in the exhibit for router 192.168.2.1?
Exhibit

You are receiving the 203 0.113.0/24 route from both upstream ISPs You are asked to ensure that ISP A is the preferred ISP for traffic being sent to the 203.0.113.0/24 network from devices in AS 65512.
Referring to the exhibit, which two statements will accomplish this behavior? (Choose two.)
You have deployed 802.1X with server fail fallback enabled on an EX Series switch and specified the vlan-name feature for all access ports. The RADIUS server is unavailable.
Which two statements are correct in this scenario? (Choose two )
Your router is discarding an EBGP route because the next hop is not directly connected. Which BGP configuration would you use to override this behavior?
Exhibit

Referring to the exhibit, what will enable active routes from both peers?
You have created a private community VLAN called RND The private community VLAN works fine within switch S1, but traffic in the private RND community VLAN does not reach VLAN members connected to switch S2.
Which statement is correct in this scenario?
Your Layer 2 network uses 802.1X to authenticate user devices connecting to the network. You are asked to include a new Layer 2 interface connection from the conference room in your network. You must ensure that only a single device is allowed to authenticate on this port at one time to avoid users from being able to plug in a rogue switch to this port.
In this scenario, which 802.1X method would you use for the new interface?
TESTED 21 Mar 2026