ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 162 - 300-410 discussion

Report
Export

In which two ways does the IPv6 First-Hop Security Binding Table operate? (Choose two.)

A.

by IPv6 routing protocols to securely build neighborships without the need of authentication

Answers
A.

by IPv6 routing protocols to securely build neighborships without the need of authentication

B.

by the recovery mechanism to recover the binding table in the event of a device reboot

Answers
B.

by the recovery mechanism to recover the binding table in the event of a device reboot

C.

by IPv6 HSRP to make sure neighbors are authenticated before being used as gateways

Answers
C.

by IPv6 HSRP to make sure neighbors are authenticated before being used as gateways

D.

by various IPv6 guard features to validate the data link layer address

Answers
D.

by various IPv6 guard features to validate the data link layer address

E.

by storing hashed keys for IPsec tunnels for the built-in IPsec features

Answers
E.

by storing hashed keys for IPsec tunnels for the built-in IPsec features

Suggested answer: B, D

Explanation:

Overview of the IPv6 First-Hop Security Binding Table

A database table of IPv6 neighbors connected to the device is created from information sources such as NDP snooping. This database, or binding table, is used by variousIPv6 guard features to validate the link-layer address (LLA), the IPv4 or IPv6 address, and the prefix binding of the neighbors to prevent spoofing and redirect attacks.

IPv6 First-Hop Security Binding Table Recovery MechanismThe IPv6 first-hop security binding table recovery mechanism enables the binding table to recover in the event of a device reboot.

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_fhsec/configuration/15-s/ip6-fhs-bind-table.html

asked 07/10/2024
Aziz ZENNOUN
27 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first