Which IPv6 address type provides communication between subnets and cannot route on the Internet?
Which IPv6 address type provides communication between subnets and cannot route on the Internet?A . global unicastB . unique localC . link-localD . multicastView AnswerAnswer: B Explanation: A IPv6 Unique Local Address is an IPv6 address in the block FC00::/7. It is the approximate IPv6 counterpart of the IPv4 private...
Which two tasks must be performed to configure NTP to a trusted server in client mode on a single network device? (Choose two)
Which two tasks must be performed to configure NTP to a trusted server in client mode on a single network device? (Choose two)A . Enable NTP authentication.B . Verify the time zone.C . Disable NTP broadcasts.D . Specify the IP address of the NTP server.E . Set the NTP server...
When a floating static route is configured, which action ensures that the backup route is used when the primary route fails?
When a floating static route is configured, which action ensures that the backup route is used when the primary route fails?A . The floating static route must have a higher administrative distance than the primary route so it is used as a backup.B . The administrative distance must be higher...
Which option about JSON is true?
Which option about JSON is true?A . uses predefined tags or angle brackets (<>) to delimit markup textB . used to describe structured data that includes arraysC . used for storing informationD . similar to HTML, it is more verbose than XMLView AnswerAnswer: B Explanation: JSON data is written as...
Which two must be met before SSH can operate normally on a Cisco IOS switch? (Choose two)
Which two must be met before SSH can operate normally on a Cisco IOS switch? (Choose two)A . The switch must be running a k9 (crypto) IOS image.B . The ip domain-name command must be configured on the switch.C . IP routing must be enabled on the switch.D . A...
Which set of action satisfy the requirement for multi-factor authentication?
Which set of action satisfy the requirement for multi-factor authentication?A . The user swipes a key fob, then clicks through an email link.B . The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device.C . The user enters a...
Which set of action satisfy the requirement for multi-factor authentication?
Which set of action satisfy the requirement for multi-factor authentication?A . The user swipes a key fob, then clicks through an email link.B . The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device.C . The user enters a...
What is the effect of this configuration?
Refer to the exhibit. What is the effect of this configuration?A . All ARP packets are dropped by the switch.B . Egress traffic is passed only if the destination is a DHCP server.C . All ingress and egress traffic is dropped because the interface is untrusted.D . The switch discard...
Which route does R1 select for traffic that is destined to 192 168.16.2?
Refer to the exhibit. Which route does R1 select for traffic that is destined to 192 168.16.2?A . 192.168.16.0/21B . 192.168.16.0/24C . 192.168 26.0/26D . 192.168.16.0/27View AnswerAnswer: D Explanation: The destination IP addresses match all four entries in the routing table but the 192.168.16.0/27 has the longest prefix so it...
When OSPF learns multiple paths to a network, how does it select a route?
When OSPF learns multiple paths to a network, how does it select a route?A . It multiple the active K value by 256 to calculate the route with the lowest metric.B . For each existing interface, it adds the metric from the source router to the destination to calculate the...