After the election process what is the root bridge in the HQ LAN?
Refer to the exhibit. Switch1: 0C.E0.38.57.24.22 Switch2: 0C.0E.15.22.1A.61 Switch3: 0C.0E.15.1D.3C.9A Switch4: 0C.E0.19.A1.4D.16 After the election process what is the root bridge in the HQ LAN? A. Switch 1 B. Switch 2 C. Switch 3 D. Switch 4View AnswerAnswer: C Explanation: The root bridge is determined by the lowest bridge ID,...
What are two roles of Domain Name Services (DNS)? (Choose Two)
What are two roles of Domain Name Services (DNS)? (Choose Two)A . builds a flat structure of DNS names for more efficient IP operations B. encrypts network Traffic as it travels across a WAN by default C. improves security by protecting IP addresses under Fully Qualified Domain Names (FQDNs) D....
Which option about JSON is true?
Which option about JSON is true?A . uses predefined tags or angle brackets () to delimit markup text B. used to describe structured data that includes arrays C. used for storing information D. similar to HTML, it is more verbose than XMLView AnswerAnswer: B Explanation: JSON data is written as...
Aside from discarding, which two states does the switch port transition through while using RSTP (802.1w)? (Choose two)
Aside from discarding, which two states does the switch port transition through while using RSTP (802.1w)? (Choose two)A . listening B. blocking C. forwarding D. learning E. speakingView AnswerAnswer: C,D
Drag and drop the attack-mitigation techniques from the left onto the Types of attack that they mitigate on the right
DRAG DROP Drag and drop the attack-mitigation techniques from the left onto the Types of attack that they mitigate on the right. View AnswerAnswer:
What is recommended for the wireless infrastructure design of an organization?
What is recommended for the wireless infrastructure design of an organization?A . group access points together to increase throughput on a given channel B. configure the first three access points are configured to use Channels 1, 6, and 11 C. include a least two access points on nonoverlapping channels to...
In which situation is private IPv4 addressing appropriate for a new subnet on the network of an organization?
In which situation is private IPv4 addressing appropriate for a new subnet on the network of an organization?A . There is limited unique address space, and traffic on the new subnet will stay local within the organization. B. The network has multiple endpoint listeners, and it is desired to limit...
Which usable IP address and subnet mask combination meets this criteria?
An engineer must configure a/30 subnet between two routers. Which usable IP address and subnet mask combination meets this criteria?A . interface e0/0 description to HQ-A370:19452 ip address 10.2.1.3 255.255.255.252 B. interface e0/0 description to HQ-A370:19452 ip address 192.168.1.1 255.255.255.248 C. interface e0/0 description to HQ-A370:19452 ip address 172.16.1.4 255.255.255.248...
Which command should be used?
A network analyst is tasked with configured the date and time on a router using EXEC mode. The date must be set to 12:00am. Which command should be used?A . Clock timezone B. Clock summer-time-recurring C. Clock summer-time date D. Clock setView AnswerAnswer: D
Which access list must be applied?
Refer to the exhibit. An access list is required to permit traffic from any host on interface G0/0 and deny traffic from interface G/0/1. Which access list must be applied?A . ip access-list standard 99 permit 10.100.100.0 0.0.0.255 deny 192.168.0.0 0.0.255.255 B . ip access-list standard 99 permit 10.100.100.0 0.0.0.255...