Which function does an SNMP agent perform?
Which function does an SNMP agent perform?A . It manages routing between Layer 3 devices in a network,B . It coordinates user authentication between a network device and a TACACS+ or RADIUS server.C . It sends information about MIB variables in response to requests from the NME . It requests...
Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)
Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)A . It drops lower-priority packets before it drops higher-priority packetsB . It can identify different flows with a high level of granularityC . It guarantees the delivery of high-priority packetsD . It can mitigate congestion by...
When configuring IPv6 on an interface, which two IPv6 multicast groups are joined? (choose two)
When configuring IPv6 on an interface, which two IPv6 multicast groups are joined? (choose two)A . 2000::/3B . 2000::5C . FC00::/7D . FF02::1E . FF02::2View AnswerAnswer: DE Explanation: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6/configuration/xe-3s/ipv6-xe-36s-book/ip6-multicast.html
Which action corrects the configuration issue?
Refer to the exhibit. The default-information originate command is configured under the R1 OSPF configuration. After testing, workstation on VLAN 20 at Site B cannot reach a DNS server on the Internet. Which action corrects the configuration issue?A . Add the default-information originate command on R2B . Add the always...
What benefit does controller-based networking provide versus traditional networking?
What benefit does controller-based networking provide versus traditional networking?A . provides an added layer of security to protect from DDoS attacksB . combines control and data plane functionality on a single device to minimize latencyC . moves from a two-tier to a three-tier network architecture to provide maximum redundancyD ....
Which command prevents passwords from being stored in the configuration as plaintext on a router or switch?
Which command prevents passwords from being stored in the configuration as plaintext on a router or switch?A . enable secretB . service password-encryptionC . username Cisco password encryptD . enable passwordView AnswerAnswer: B
Which API is used in controller-based architectures to interact with edge devices?
Which API is used in controller-based architectures to interact with edge devices?A . overlayB . northboundC . underlayD . southboundView AnswerAnswer: D
What is the expected behavior for the traffic flow for route 10.10.13.0/25?
Refer to the exhibit. An engineer is bringing up a new circuit to the MPLS provider on the Gi0/1 interface of Router1.The new circuit uses eBGP and teams the route to VLAN25 from the BGP path . What is the expected behavior for the traffic flow for route 10.10.13.0/25?A ....
Which prefix does Router 1 use to Host A?
Refer to the exhibit. Which prefix does Router 1 use to Host A?A . 10.10.10.0/28B . 10.10.13.0/25C . 10.10.13.144/28D . 10.10.13.208/29View AnswerAnswer: D
How does the router manage traffic to 192.168.12.16?
Refer to the exhibit . How does the router manage traffic to 192.168.12.16?A . It selects RIP route because it has the longest prefix inclusive of the destination addressB . It chooses the EIGRP route because it has the lowest administrative distanceC . It load-balances traffic between all three routesD...