Aside from discarding, which two states does the switch port transition through while using RSTP (802.1w)? (Choose two)
Aside from discarding, which two states does the switch port transition through while using RSTP (802.1w)? (Choose two)A . listening B. blocking C. forwarding D. learning E. speakingView AnswerAnswer: C,D
What are two benefits of controller-based networking compared to traditional networking?
What are two benefits of controller-based networking compared to traditional networking?A . controller-based increases network bandwidth usage, while traditional lightens the load on the network. B. controller-based inflates software costs, while traditional decreases individual licensing costs C. Controller-based reduces network configuration complexity, while traditional increases the potential for errors D....
What causes a port to be placed in the err-disabled state?
What causes a port to be placed in the err-disabled state?A . latency B. port security violation C. shutdown command issued on the port D. nothing plugged into the portView AnswerAnswer: B Explanation: This mode is the default violation mode; when in this mode, the switch will automatically force the...
What software defined architecture plane assists network devices with making packet-forwarding decisions by providing Layer 2 reachability and Layer 3 routing information?
What software defined architecture plane assists network devices with making packet-forwarding decisions by providing Layer 2 reachability and Layer 3 routing information?A . data plane B. control plane C. policy plane D. management planeView AnswerAnswer: B
Which state does the switch port move to when PortFast is enabled?
Which state does the switch port move to when PortFast is enabled?A . learning B. forwarding C. blocking D. listeningView AnswerAnswer: B
How does Cisco DNA Center gather data from the network?
How does Cisco DNA Center gather data from the network?A . Network devices use different services like SNMP, syslog, and streaming telemetry to send data to the controller B. Devices establish an iPsec tunnel to exchange data with the controller C. Devices use the call-home protocol to periodically send data...
Which two functions are performed by the core layer in a three-tier architecture? (Choose two)
Which two functions are performed by the core layer in a three-tier architecture? (Choose two)A . Provide uninterrupted forwarding service. B. Police traffic that is sent to the edge of the network. C. Provide direct connectivity for end user devices. D. Ensure timely data transfer between layers. E. Inspect packets...
Drag and drop the DNS lookup components from the left onto the functions on the right
DRAG DROP Drag and drop the DNS lookup components from the left onto the functions on the right. View AnswerAnswer: Explanation: Diagram Description automatically generated
Drag drop the descriptions from the left onto the correct configuration-management technologies on the right
DRAG DROP Drag drop the descriptions from the left onto the correct configuration-management technologies on the right. View AnswerAnswer: Explanation: The focus of Ansible is to be streamlined and fast, and to require no node agent installation. Thus, Ansible performs all functions over SSH. Ansible is built on Python, in...
Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)
Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)A . It drops lower-priority packets before it drops higher-priority packets B. It can identify different flows with a high level of granularity C. It guarantees the delivery of high-priority packets D. It can mitigate congestion by...