An organization requires a second technician to verify changes before applying them to network devices. When checking the configuration of a network device, a technician determines that a coworker has improperly configured the AS number on the device. This would result in which of the following?
A. The OSPF not-so-stubby area is misconfigured
B. Reduced wireless network coverage
C. Spanning tree ports in flooding mode
D. BGP routing issues
Answer: D. BGP routing issues
You might also like to view...
What two items dictate which practices can be assessed or performed concurrently?
A. Project plan and architecture B. Project plan and security policy C. Security policy and assurance policy D. Architecture and organizational schedule
Savadone University, a small, private university specializing in graduate programs, needs to keep track of the list of students who (a) apply, (b) are accepted, and (c) actually enroll in the university. For security purposes the university also must send a report to the government with a list of foreign students who enroll but fail to register.
Suggest a kind of code for this purpose, and give an example of its use in the university that demonstrates its appropriateness. What are its advantages?