CCNA Routing & Switching 200-125: New Questions - Part 3

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Milosavljevicvm
M
Milosavljevicvm
Community Contributor
Quizzes Created: 2 | Total Attempts: 1,182
| Attempts: 714 | Questions: 49
Please wait...
Question 1 / 49
0 %
0/100
Score 0/100
1. Which circumstance is a common cause of late collisions?

Explanation

A duplex mismatch is a common cause of late collisions. A duplex mismatch occurs when two devices on a network have different duplex settings, meaning one device is set to full-duplex while the other is set to half-duplex. This results in data collisions and late collisions, where the transmitting device detects a collision after it has already started sending the data. This can lead to network congestion and slower performance.

Submit
Please wait...
About This Quiz
CCNA Routing & Switching 200-125: New Questions - Part 3 - Quiz

CCNA Routing & Switching 200-125: New Questions - Part 3 of 3.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Which two cable specifications can support 1-Gbps Ethernet? (Choose two.)

Explanation

Category 5e and Category 6 cables are both capable of supporting 1-Gbps Ethernet. These cable specifications are designed to provide high-speed data transmission and are commonly used in networking environments. RG11, RG-6, and Category 3 cables, on the other hand, do not have the necessary capabilities to support 1-Gbps Ethernet.

Submit
3. What are two features of IPv6? (Choose two.)

Explanation

IPv6 has two main features: multicast and anycast. Multicast allows the transmission of a packet to multiple destinations simultaneously. It is used for efficient group communication. Anycast, on the other hand, is a routing technique that allows multiple devices to share the same IP address. It is used to deliver packets to the nearest or most appropriate destination out of a group of potential recipients. The other options mentioned in the question, such as broadcast, allcast, and podcast, are not valid features of IPv6.

Submit
4. Which two benefits are provided by cloud resources to an enterprise network? (Choose two.)

Explanation

Cloud resources provide flexibility to an enterprise network by allowing them to easily scale up or down their resources based on their needs. This flexibility allows businesses to quickly adapt to changing demands and optimize their resource allocation. Additionally, cloud resources offer on-demand scalability, which means that businesses can quickly and easily add or remove resources as needed without any downtime. This scalability helps businesses to efficiently manage their resources and ensure that they are only paying for what they need.

Submit
5. Which QoS feature can drop traffic that exceeds the committed access rate?

Explanation

Policing is a QoS feature that can drop traffic that exceeds the committed access rate. Policing is a mechanism used to enforce traffic limits by monitoring the incoming traffic and discarding or marking packets that exceed the defined rate. It ensures that the traffic adheres to the specified rate and prevents network congestion by dropping excessive packets.

Submit
6. Which IP address can send traffic to all hosts on network 10.101.0.0/16?

Explanation

The IP address 10.101.255.255 can send traffic to all hosts on network 10.101.0.0/16 because it is the broadcast address for that network. The broadcast address is used to send a message to all hosts on a specific network, and it is the highest address in that network's range. In this case, since the network is 10.101.0.0/16, the broadcast address is 10.101.255.255.

Submit
7. Which command should you enter to verify the priority of a router in an HSRP group?

Explanation

The "show standby" command should be entered to verify the priority of a router in an HSRP group. This command displays the current HSRP configuration and status, including the priority of the router. By using this command, you can confirm the priority value assigned to the router and ensure that it is correctly configured within the HSRP group.

Submit
8. After an FTP session to ftp.cisco.com fails, you attempt to ping the server. A ping to ftp.cisco.com also fails, but a ping to the IP address of the server is successful. What is a reason for the failed FTP session?

Explanation

The reason for the failed FTP session is that the assigned DNS server is down. When the FTP session fails and the ping to ftp.cisco.com also fails, it indicates that the domain name resolution is not working. However, the successful ping to the IP address of the server suggests that the server itself is reachable. This implies that the issue lies with the DNS server, which is responsible for translating domain names into IP addresses. Since the DNS server is down, the FTP request cannot resolve the domain name and establish a connection.

Submit
9. What is the simplest IP SLA operation that can measure end-to-end response time between devices?

Explanation

ICMP echo is the simplest IP SLA operation that can measure end-to-end response time between devices. ICMP echo sends a single packet from a source device to a destination device and measures the round-trip time for the packet to reach the destination and return to the source. This operation is commonly used to test network connectivity and latency between devices. ICMP path jitter, ICMP path echo, and ICMP jitter are not the correct answers as they do not specifically measure end-to-end response time.

Submit
10. Which Rapid PVST+ port role provides a different path to the root bridge?

Explanation

The alternate port role in Rapid PVST+ provides a different path to the root bridge. This means that if the primary path to the root bridge fails, the alternate port will be used to establish a new path. This helps in maintaining network redundancy and ensuring that there is always a backup path available in case of link failures. The alternate port role is important in preventing network downtime and improving network resilience.

Submit
11. Which two technologies can combine multiple physical switches into one logical switch? (Choose two.)

Explanation

StackWise and VSS are the two technologies that can combine multiple physical switches into one logical switch. StackWise is a Cisco technology that allows multiple switches to be connected together and operate as a single logical unit, increasing scalability and simplifying management. VSS (Virtual Switching System) is also a Cisco technology that combines two physical switches into one virtual switch, providing redundancy and load balancing. Both technologies enhance network performance and availability by creating a unified and resilient switching infrastructure.

Submit
12. Which value is included in the initial TCP SYN message?

Explanation

The initial TCP SYN message includes a sequence number. This number is used to keep track of the order of the packets sent and received during the TCP handshake process. It helps in establishing a reliable and ordered connection between the client and server.

Submit
13. Which feature or method can you use to isolate physical layer problems on a serial link?

Explanation

Loopback tests can be used to isolate physical layer problems on a serial link. A loopback test involves sending a signal from a device and then receiving it back on the same device. By doing this, any issues with the physical layer, such as cable faults or interface problems, can be identified and isolated. This helps in troubleshooting and resolving connectivity issues on the serial link.

Submit
14. What is the minimum Ethernet frame size?

Explanation

The minimum Ethernet frame size is 64 bytes. This is because the Ethernet standard requires a minimum frame size of 64 bytes in order to ensure proper collision detection and avoid data corruption. Frames smaller than 64 bytes would not provide enough space for the necessary headers and data, leading to inefficient network performance.

Submit
15. Which plane handles switching traffic through a Cisco router?

Explanation

The correct answer is "data" because the data plane is responsible for handling the actual traffic forwarding and switching within a Cisco router. It processes packets based on the routing table and forwards them to the appropriate destination. The data plane operates independently of the control plane, which is responsible for managing the router's overall operation and configuration. The management plane handles administrative tasks, while the performance plane focuses on optimizing the router's performance.

Submit
16. Which two statements correctly describe the ping utility? (Choose two.)

Explanation

The ping utility uses ICMP (Internet Control Message Protocol) to send echo request messages to a remote device and receive echo reply messages. This allows it to verify connectivity to a remote device without identifying the specific path that the packet takes. It does not use UDP (User Datagram Protocol) for this purpose. Additionally, it cannot identify the path that a packet takes to a remote device, but it can identify the source of an ICMP "time exceeded" message if it receives one.

Submit
17. Which two pieces of information can you determine from the output of the show ntp status command? (Choose two.)

Explanation

From the output of the "show ntp status" command, you can determine two pieces of information. Firstly, you can determine the IP address of the peer to which the clock is synchronized. This information is important for understanding the network time synchronization. Secondly, you can determine whether the clock is synchronized or not. This is crucial for ensuring accurate timekeeping in a network environment.

Submit
18. Which value is used to build the CAM table?

Explanation

The CAM table, also known as the Content Addressable Memory table, is used in networking to store the MAC addresses of devices connected to a switch. When a device sends a frame to the switch, the switch examines the source MAC address of the frame and records it in the CAM table along with the corresponding port. This allows the switch to quickly and efficiently forward frames to the correct destination based on the MAC address. Therefore, the source MAC address is used to build the CAM table.

Submit
19. What is the easiest way to verify the Layer 3 path from a router to host 192.168.2.1?

Explanation

Executing a traceroute from the router to host 192.168.2.1 is the easiest way to verify the Layer 3 path. Traceroute is a network diagnostic tool that shows the route (path) taken by packets from the router to the destination host. It displays the IP addresses of the routers (hops) along the path, allowing you to verify the Layer 3 connectivity and identify any issues or delays in the network. This helps in troubleshooting and ensuring that the packets are being routed correctly to the intended destination.

Submit
20. Which two statements about UTP cables are true? (Choose two.)

Explanation

Category 6a Ethernet cable can transmit up to 10 Gbps because it has improved specifications and performance compared to Category 6 cables. Category 5e Ethernet cables support speeds up to 1000 Mbps because they have been designed to support Fast Ethernet and Gigabit Ethernet standards.

Submit
21. What is the maximum number of switches that StackWise can support in one stack?

Explanation

StackWise is a technology used in Cisco switches to create a virtual switch stack. It allows multiple physical switches to behave as a single logical switch, providing increased scalability and redundancy. The maximum number of switches that StackWise can support in one stack is 9. This means that up to 9 physical switches can be connected together to form a single logical switch using StackWise technology.

Submit
22. Which two statements about an Ethernet frame source addresses are true? (Choose two.)

Explanation

The leftmost bit is always 0 in an Ethernet frame source address. This is because the leftmost bit is used to indicate whether the address is a unicast (0) or multicast (1) address.

The address is 6 bytes long in an Ethernet frame source address. This is because Ethernet addresses are typically represented in 48-bit binary format, which is equivalent to 6 bytes.

Submit
23. Which two circumstances can prevent two routers from establishing an OSPF neighbor adjacency? (Choose two.)

Explanation

Mismatched hello timers and dead timers can prevent two routers from establishing an OSPF neighbor adjacency because OSPF uses hello packets to establish and maintain neighbor relationships. If the routers have different hello timers or dead timers, they will not be able to synchronize their hellos and establish a neighbor relationship. Additionally, if both routers have the same router ID, OSPF will see them as the same router and will not establish a neighbor adjacency.

Submit
24. Which task do you need to perform first when you configure IP SLA to troubleshoot a network connectivity issue?

Explanation

To troubleshoot a network connectivity issue using IP SLA, the first task that needs to be performed is enabling the ICMP echo operation. This operation allows the router to send ICMP echo requests to a specific destination IP address and measure the response time. By enabling this operation, the router can start monitoring the network connectivity and gather data for troubleshooting purposes. Once enabled, other tasks such as specifying the test frequency, verifying the ICMP echo operation, and scheduling the ICMP operation can be performed to further analyze and optimize network performance.

Submit
25. Which two statements about static routing are true? (Choose two.)

Explanation

Static routing allows the administrator to determine the entire path of a packet because the administrator manually configures the routes in the routing table. Additionally, the default administrative distance of static routing is lower than EIGRP, which means that static routes are preferred over EIGRP routes when multiple routes to the same destination exist.

Submit
26. Which access layer threat mitigation technique provides security by acting as a filter between trusted and untrusted traffic sources?

Explanation

802.1X is an access layer threat mitigation technique that provides security by acting as a filter between trusted and untrusted traffic sources. It is an authentication protocol that allows only authorized devices to connect to the network. By requiring users and devices to authenticate before granting access, 802.1X ensures that only trusted traffic is allowed onto the network, while untrusted sources are blocked. This helps to prevent unauthorized access and potential security threats from entering the network.

Submit
27. Which two actions must you take to correctly configure PPPoE on a client? (Choose two.)

Explanation

To correctly configure PPPoE on a client, two actions must be taken. First, the client needs to define a dialer interface. This interface will be used to establish the PPPoE connection with the service provider. Second, the client needs to create a dialer pool and bind it to the physical interface. The dialer pool will contain the necessary parameters for the PPPoE connection, such as the username and password. Binding the dialer pool to the physical interface ensures that the PPPoE connection is established on that interface.

Submit
28. Which two circumstances can prevent two routers from establishing an EIGRP neighbor adjacency? (Choose two.)

Explanation

Two circumstances that can prevent two routers from establishing an EIGRP neighbor adjacency are having mismatched K values and being on different subnets. Having mismatched K values means that the routers have different metrics for determining the best path, which can prevent them from establishing a neighbor adjacency. Being on different subnets means that the routers are not directly connected and cannot form a neighbor adjacency.

Submit
29. Which two statements about RIPv2 are true? (Choose two.)

Explanation

RIPv2 uses the Bellman-Ford routing algorithm, which is a distance-vector algorithm that calculates the best path to a destination based on the number of hops. This algorithm allows RIPv2 to determine the most efficient route to a destination. Additionally, RIPv2 supports CIDR (Classless Inter-Domain Routing) and VLSM (Variable Length Subnet Mask), which allow for more efficient use of IP addresses by allowing the use of smaller subnets. These features make RIPv2 a more advanced and flexible routing protocol compared to RIPv1.

Submit
30. Which two address spaces are valid Class B IPv4 ranges that are non-routable to the Internet? (Choose two.)

Explanation

The two valid Class B IPv4 ranges that are non-routable to the Internet are 169.254.0.0 through 169.254.255.255 and 172.16.0.0 through 172.31.255.255. These ranges are reserved for private use and are not meant to be routed on the public Internet. The 169.254.0.0/16 range is specifically allocated for Automatic Private IP Addressing (APIPA), which allows devices to assign themselves an IP address when no DHCP server is available. The 172.16.0.0/12 range is part of the private address space defined by RFC 1918 and is commonly used for local area networks (LANs).

Submit
31. Which two commands should you enter to view the PID and serial number of a router? (Choose two.)

Explanation

To view the PID (Product IDentifier) and serial number of a router, you need to enter the "show version" and "show license udi" commands. The "show version" command provides detailed information about the hardware and software components of the router, including the PID. On the other hand, the "show license udi" command displays the Unique Device Identifier (UDI) information, which includes the serial number of the router. By using these two commands, you can obtain both the PID and serial number of the router.

Submit
32. Which two commands should you enter to prevent a Cisco device from sharing information with upstream devices? (Choose two.)

Explanation

The two commands that should be entered to prevent a Cisco device from sharing information with upstream devices are "R1(config-if)#no cdp enable" and "R1(config)#no cdp run". The "no cdp enable" command is used to disable CDP (Cisco Discovery Protocol) on a specific interface, while the "no cdp run" command is used to globally disable CDP on the entire device. By disabling CDP, the device will not share any information with upstream devices, helping to enhance security and prevent unauthorized access.

Submit
33. Which two commands can you use to configure a PAgP EtherChannel? (Choose two.)

Explanation

The correct answer is "channel-group 10 mode auto" and "channel-group 10 mode desirable". These two commands are used to configure a PAgP (Port Aggregation Protocol) EtherChannel. The "channel-group 10 mode auto" command enables the auto mode, which allows the interface to negotiate with the other end of the link to form an EtherChannel. The "channel-group 10 mode desirable" command enables the desirable mode, which actively tries to negotiate with the other end to form an EtherChannel.

Submit
34. Which command should you enter to configure a single port to prevent alternate ports from becoming designated ports?

Explanation

The command "spanning-tree guard loop" should be entered to configure a single port to prevent alternate ports from becoming designated ports. This command enables the loop guard feature in Spanning Tree Protocol (STP), which helps to prevent loops in the network by detecting and blocking any ports that may cause a loop. By configuring "spanning-tree guard loop" on a port, it ensures that the port will not transition to a designated port if it receives a superior BPDU (Bridge Protocol Data Unit) from another switch.

Submit
35. Which two statements about the successor and feasible successor are true? (Choose two.)

Explanation

The first statement is true because the feasible successor is stored in both the topology table and the routing table. The second statement is also true because the successor is indeed stored in the routing table. The third statement is incorrect because the successor is the primary route, not the feasible successor. The fourth statement is also incorrect because the feasible successor is not the secondary route. The last statement is incorrect because the feasible successor may have a higher metric than the successor.

Submit
36. Which symbol in the APIC-EM Path Trace tool output indicates that an ACL is present and might deny packets?

Explanation

In the APIC-EM Path Trace tool output, the symbol that indicates the presence of an ACL and the potential denial of packets is Option 1.

Submit
37. Which command allows you to set the administrative distance for EIGRP for IPv6?

Explanation

The command "ipv6 summary-address eigrp" allows you to set the administrative distance for EIGRP for IPv6. This command is used to configure a summary address for EIGRP routing protocol in IPv6 networks. It helps in summarizing multiple routes into a single route, reducing the size of the routing table and improving network efficiency.

Submit
38. Which two pieces of information can you learn by viewing the routing table? (Choose two.)

Explanation

By viewing the routing table, you can learn the length of time that a route has been known. This information helps in understanding the stability and reliability of the route. Additionally, you can also determine whether the administrative distance was manually or dynamically configured. Administrative distance is a measure of the trustworthiness of a routing protocol, and knowing how it was configured provides insights into the network's routing decisions.

Submit
39. Refer to the exhibit. Which two statements about the interface that generated the output are true? (Choose two.)

Explanation

The exhibit shows that the interface has dynamically learned two secure MAC addresses, which means that it has learned the MAC addresses of two devices that are allowed to communicate through this interface. Additionally, the exhibit also indicates that the learned MAC addresses are deleted after five minutes of inactivity, which helps to ensure that only active and authorized devices can communicate through the interface.

Submit
40. Which two commands can you enter to configure an interface to actively negotiate an EtherChannel? (Choose two.)

Explanation

The two commands that can be entered to configure an interface to actively negotiate an EtherChannel are "channel-group 10 mode desirable" and "channel-group 10 mode active". The "channel-group 10 mode desirable" command enables the interface to actively try to form an EtherChannel with the remote device, while the "channel-group 10 mode active" command enables the interface to actively negotiate an EtherChannel with the remote device.

Submit
41. Which two statements about TACACS+ are true? (Choose two.)

Explanation

TACACS+ uses TCP port 49 for communication, allowing reliable and connection-oriented data transfer. Additionally, TACACS+ supports full command logging, which enables the tracking and auditing of all commands executed by users.

Submit
42. Refer to the exhibit. Which two events occur on the interface, if packets from an unknown source address arrive after the interface learns the maximum number of secure MAC addresses? (Choose two.)

Explanation

When the interface learns the maximum number of secure MAC addresses, it will start dropping traffic from unknown MAC addresses. This is a security measure to prevent unauthorized devices from accessing the network. Additionally, the security violation counter does not increment in this scenario. This counter usually increases when a security violation occurs, such as when an unknown MAC address is detected. Therefore, in this case, the interface will drop traffic from unknown MAC addresses and the security violation counter will not increment.

Submit
43. Which adverse circumstance can occur when you connect full-duplex devices to a shared Ethernet hub?

Explanation

When full-duplex devices are connected to a shared Ethernet hub, excessive collisions can occur. In a full-duplex communication, both devices can transmit and receive data simultaneously, but a shared Ethernet hub does not support full-duplex communication. As a result, when multiple devices try to transmit data at the same time, collisions occur and the data packets have to be retransmitted, leading to a decrease in network performance.

Submit
44.  Which two features are compatible with port security? (Choose two.)

Explanation

Voice VLAN and SPAN source port are compatible with port security.

Voice VLAN allows for the separation of voice and data traffic on a network, ensuring that only authorized devices can access the voice VLAN. This helps to enhance security and prioritize voice traffic.

SPAN source port is used for port mirroring, which allows the monitoring of network traffic for analysis and troubleshooting purposes. Port security can be implemented on the SPAN source port to control and restrict access to the mirrored traffic, ensuring that only authorized devices can access it.

Submit
45. Refer to the exhibit. If all routers on this network run RIPv2, which two configurations can you apply to router R3 to produce this routing table? (Choose two.)

Explanation

The correct answer is the first and third configurations. In the first configuration, the "passive-interface default" command is used, which makes all interfaces passive by default, except for the interfaces that are explicitly configured with the "no passive-interface" command. This allows R3 to advertise its directly connected networks (192.168.3.0, 192.168.4.0, and 192.168.23.0) to its neighboring routers. In the third configuration, the "passive-interface default" command is not used, but the "network" command is used to advertise the same directly connected networks. Both configurations will result in the same routing table.

Submit
46. Refer to the exhibit. Which two statements about router R1 are true? (Choose two.)

Explanation

The given correct answer states that at least two IGP routing protocols are running on the router and the router is learning external OSPF and EIGRP routes. This can be inferred from the fact that the router has an OSPF Area 0 adjacency with the device at 10.82.4.42 and it also has two EIGRP neighbors. Therefore, it can be concluded that the router is running both OSPF and EIGRP as its IGP routing protocols and is learning routes from external OSPF and EIGRP sources.

Submit
47. Which two facts must you take into account when you deploy PPPoE? (Choose two.)

Explanation

When deploying PPPoE, two important facts to consider are:
1) An individual PVC can support one PPPoE client. This means that each Point-to-Point Virtual Circuit (PVC) can only accommodate a single PPPoE client connection.
2) PPPoE supports a maximum of 10 clients per customer premises equipment (CPE). This means that a single CPE can have up to 10 PPPoE client connections.

Submit
48. Drag and drop each WAN design option on the left onto the correct description on the right.
Submit
49. Which two statements about PDU encapsulation are true? (Choose two.)

Explanation

During encapsulation, each layer adds a header and sometimes adds a trailer to the PDU from the layer above. This is true because each layer in the networking stack adds its own header information to the data received from the layer above it. Additionally, PDU encapsulation does not take place only at the transport layer. It occurs at multiple layers in the networking stack, including the network layer, data link layer, and physical layer.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 04, 2019
    Quiz Created by
    Milosavljevicvm
Cancel
  • All
    All (49)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which circumstance is a common cause of late collisions?
Which two cable specifications can support 1-Gbps Ethernet? (Choose...
What are two features of IPv6? (Choose two.)
Which two benefits are provided by cloud resources to an enterprise...
Which QoS feature can drop traffic that exceeds the committed access...
Which IP address can send traffic to all hosts on network...
Which command should you enter to verify the priority of a router in...
After an FTP session to ftp.cisco.com fails, you attempt to ping the...
What is the simplest IP SLA operation that can measure end-to-end...
Which Rapid PVST+ port role provides a different path to the root...
Which two technologies can combine multiple physical switches into one...
Which value is included in the initial TCP SYN message?
Which feature or method can you use to isolate physical layer problems...
What is the minimum Ethernet frame size?
Which plane handles switching traffic through a Cisco router?
Which two statements correctly describe the ping utility? (Choose...
Which two pieces of information can you determine from the output of...
Which value is used to build the CAM table?
What is the easiest way to verify the Layer 3 path from a router to...
Which two statements about UTP cables are true? (Choose two.)
What is the maximum number of switches that StackWise can support in...
Which two statements about an Ethernet frame source addresses are...
Which two circumstances can prevent two routers from establishing an...
Which task do you need to perform first when you configure IP SLA to...
Which two statements about static routing are true? (Choose two.)
Which access layer threat mitigation technique provides security by...
Which two actions must you take to correctly configure PPPoE on a...
Which two circumstances can prevent two routers from establishing an...
Which two statements about RIPv2 are true? (Choose two.)
Which two address spaces are valid Class B IPv4 ranges that are...
Which two commands should you enter to view the PID and serial number...
Which two commands should you enter to prevent a Cisco device from...
Which two commands can you use to configure a PAgP EtherChannel?...
Which command should you enter to configure a single port to prevent...
Which two statements about the successor and feasible successor are...
Which symbol in the APIC-EM Path Trace tool output indicates that an...
Which command allows you to set the administrative distance for EIGRP...
Which two pieces of information can you learn by viewing the routing...
Refer to the exhibit. Which two statements about the interface that...
Which two commands can you enter to configure an interface to actively...
Which two statements about TACACS+ are true? (Choose two.)
Refer to the exhibit. Which two events occur on the interface, if...
Which adverse circumstance can occur when you connect full-duplex...
 Which two features are compatible with port security? (Choose...
Refer to the exhibit. If all routers on this network run RIPv2, which...
Refer to the exhibit. Which two statements about router R1 are true?...
Which two facts must you take into account when you deploy PPPoE?...
Drag and drop each WAN design option on the left onto the correct...
Which two statements about PDU encapsulation are true? (Choose two.)
Alert!

Advertisement