What event has occurred if a router sends a notice level message to a syslog server?
What event has occurred if a router sends a notice level message to a syslog server?A . A TCP connection has been torn down B. An ICMP connection has been built C. An interface line has changed status D. A certificate has expired.View AnswerAnswer: C
What facilitates a Telnet connection between devices by entering the device name?
What facilitates a Telnet connection between devices by entering the device name?A . SNMP B. DNS lookup C. syslog D. NTPView AnswerAnswer: B
When a switch receives a frame for a known destination MAC address, how is the frame handed?
When a switch receives a frame for a known destination MAC address, how is the frame handed?A . sent to the port identified for the known MAC address B. broadcast to all ports C. forwarded to the first available port D. flooded to all ports except the one from which...
Which command on a port enters the forwarding state immediately when a PC is connected to it?
Which command on a port enters the forwarding state immediately when a PC is connected to it?A . switch(config)#spanning-tree portfast default B. switch(config)#spanning-tree portfast bpduguard default C. switch(config-if)#spanning-tree portfast trunk D. switch(config-if)#no spanning-tree portfastView AnswerAnswer: C
Which level of severity must be set to get informational syslogs?
Which level of severity must be set to get informational syslogs?A . alert B. critical C. notice D. debugView AnswerAnswer: C
Which command must be configured to increment the security-violation count and forward an SNMP trap?
A port security violation has occurred on a switch port due to the maximum MAC address count being exceeded. Which command must be configured to increment the security-violation count and forward an SNMP trap?A . switchport port-security violation access B. switchport port-security violation protect C. switchport port-security violation restrict D....
What is a characteristic of cloud-based network topology?
What is a characteristic of cloud-based network topology?A . wireless connections provide the sole access method to services B. onsite network services are provided with physical Layer 2 and Layer 3 components C. services are provided by a public, private, or hybrid deployment D. physical workstations are configured to share...
Which configuration ensures that the switch is always the root for VLAN 750?
Which configuration ensures that the switch is always the root for VLAN 750?A . Switch(config)#spanning-tree vlan 750 priority 38003685 B. Switch(config)#spanning-tree vlan 750 root primary C. Switch(config)#spanning-tree vlan 750 priority 614440 D. Switch(config)#spanning-tree vlan 750 priority 0View AnswerAnswer: D Explanation: Although the spanning-tree vlan 10 root primary command will ensure...
What is recommended for the wireless infrastructure design of an organization?
What is recommended for the wireless infrastructure design of an organization?A . group access points together to increase throughput on a given channel B. configure the first three access points are configured to use Channels 1, 6, and 11 C. include a least two access points on nonoverlapping channels to...
By default, how Does EIGRP determine the metric of a route for the routing table?
By default, how Does EIGRP determine the metric of a route for the routing table?A . it uses the bandwidth and delay values of the path to calculate the route metric B. it uses a default metric of 10 for all routes that are learned by the router C. it...