Which action is taken by the phone?
A Cisco IP phone receive untagged data traffic from an attached PC. Which action is taken by the phone?A . It allows the traffic to pass through unchangedB . It drops the trafficC . It tags the traffic with the default VLAND . It tags the traffic with the native...
Which output displays a JSON data representation?
Which output displays a JSON data representation? A) B) C) D) A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: C Explanation: JSON data is written as name/value pairs. A name/value pair consists of a field name (in double quotes), followed by a colon, followed...
Which error must be corrected?
Refer to the Exhibit. After the switch configuration the ping test fails between PC A and PC B Based on the output for switch 1. Which error must be corrected?A . There is a native VLAN mismatchB . Access mode is configured on the switch portsC . The PCs are...
R1 has learned route 192.168.12.0/24 via IS-IS. OSPF, RIP. and Internal EIGRP Under normal operating conditions, which routing protocol is installed in the routing table?
R1 has learned route 192.168.12.0/24 via IS-IS. OSPF, RIP. and Internal EIGRP Under normal operating conditions, which routing protocol is installed in the routing table?A . IS-ISB . RIPC . Internal EIGRPD . OSPFView AnswerAnswer: C Explanation: With the same route (prefix), the router will choose the routing protocol with...
What are two characteristics of a controller-based network? (Choose two)
What are two characteristics of a controller-based network? (Choose two)A . The administrator can make configuration updates from the CLIB . It uses northbound and southbound APIs to communicate between architectural layers.C . It moves the control plane to a central pointD . It decentralizes the control plane, which allows...
Which option is a valid IPv6 address?
Which option is a valid IPv6 address?A . 2001:0000:130F::099a::12aB . 2002:7654:A1AD:61:81AF:CCC1C . FEC0:ABCD:WXYZ:0067::2A4D . 2004:1:25A4:886F::1View AnswerAnswer: D Explanation: An IPv6 address is represented as eight groups of four hexadecimal digits, each group representing 16 bits (two octets). The groups are separated by colons (:). An example of an IPv6 address...
Which command prevents passwords from being stored in the configuration as plaintext on a router or switch?
Which command prevents passwords from being stored in the configuration as plaintext on a router or switch?A . enable secretB . service password-encryptionC . username Cisco password encryptD . enable passwordView AnswerAnswer: B
Which type of wireless encryption is used for WPA2 in pre-shared key mode?
Which type of wireless encryption is used for WPA2 in pre-shared key mode?A . TKIP with RC4B . RC4C . AES-128D . AES-256View AnswerAnswer: D Explanation: We can see in this picture we have to type 64 hexadecimal characters (256 bit) for the WPA2 passphrase so we can deduce the...
Which action is taken by a switch port enabled for PoE power classification override?
Which action is taken by a switch port enabled for PoE power classification override?A . When a powered device begins drawing power from a PoE switch port a syslog message is generatedB . As power usage on a PoE switch port is checked data flow to the connected device is...
How does HSRP provide first hop redundancy?
How does HSRP provide first hop redundancy?A . It load-balances traffic by assigning the same metric value to more than one route to the same destination m the IP routing tableB . It load-balances Layer 2 traffic along the path by flooding traffic out all interfaces configured with the same...