Which action do the switches take on the trunk link?
Refer to Exhibit. Which action do the switches take on the trunk link?A . The trunk does not form and the ports go into an err-disabled statusB . The trunk forms but the mismatched native VLANs are merged into a single broadcast domainC . The trunk does not form, but...
Which two encoding methods are supported by REST APIs? (Choose two)
Which two encoding methods are supported by REST APIs? (Choose two)A . YAMLB . JSONC . EBCDICD . SGMLE . XMLView AnswerAnswer: BE Explanation: The Application Policy Infrastructure Controller (APIC) REST API is a programmatic interface that uses REST architecture. The API accepts and returns HTTP (not enabled by default)...
What is a benefit of using a Cisco Wireless LAN Controller?
What is a benefit of using a Cisco Wireless LAN Controller?A . Central AP management requires more complex configurationsB . Unique SSIDs cannot use the same authentication methodC . It supports autonomous and lightweight APsD . It eliminates the need to configure each access point individuallyView AnswerAnswer: D
What is the primary different between AAA authentication and authorization?
What is the primary different between AAA authentication and authorization?A . Authentication verifies a username and password, and authorization handles the communication between the authentication agent and the user databaseB . Authentication identifies a user who is attempting to access a system, and authorization validates the users passwordC . Authentication...
What does router R1 use as its OSPF router-ID?
Refer to the exhibit. What does router R1 use as its OSPF router-ID?A . 10.10.1.10B . 10.10.10.20C . 172.16.15.10D . 192.168.0.1View AnswerAnswer: C Explanation: OSPF uses the following criteria to select the router ID:
Which command enables a router to become a DHCP client?
Which command enables a router to become a DHCP client?A . ip address dhcpB . ip helper-addressC . ip dhcp poolD . ip dhcp clientView AnswerAnswer: A Explanation: If we want to get an IP address from the DHCP server on a Cisco device, we can use the command “ip...
Which set of action satisfy the requirement for multifactor authentication?
Which set of action satisfy the requirement for multifactor authentication?A . The user swipes a key fob, then clicks through an email linkB . The user enters a user name and password, and then clicks a notification in an authentication app on a mobile deviceC . The user enters a...
What does router R1 use as its OSPF router-ID?
Refer to the exhibit. What does router R1 use as its OSPF router-ID?A . 10.10.1.10B . 10.10.10.20C . 172.16.15.10D . 192.168.0.1View AnswerAnswer: C Explanation: OSPF uses the following criteria to select the router ID:
What is the primary effect of the spanning-tree portfast command?
What is the primary effect of the spanning-tree portfast command?A . It enables BPDU messagesB . It minimizes spanning-tree convergence timeC . It immediately puts the port into the forwarding state when the switch is reloadedD . It immediately enables the port in the listening stateView AnswerAnswer: B
Which cipher fulfills the configuration requirement?
An engineer must configure a WLAN using the strongest encryption type for WPA2-PSK. Which cipher fulfills the configuration requirement?A . WEPB . RC4C . AESD . TKIPView AnswerAnswer: C Explanation: Many routers provide WPA2-PSK (TKIP), WPA2-PSK (AES), and WPA2-PSK (TKIP/AES) as options. TKIP is actually an older encryption protocol introduced...