Router R4 is dynamically learning the path to the server. If R4 is connected to R1 via OSPF Area 20, to R2 v2ia R2 BGP, and to R3 via EIGRP 777, which path is installed in the routing table of R4?

Refer to the exhibit. Router R4 is dynamically learning the path to the server. If R4 is connected to R1 via OSPF Area 20, to R2 v2ia R2 BGP, and to R3 via EIGRP 777, which path is installed in the routing table of R4?A . the path through R1,...

April 14, 2023 No Comments READ MORE +

Which API is used in controller-based architectures to interact with edge devices?

Which API is used in controller-based architectures to interact with edge devices?A . overlay B. northbound C. underlay D. southboundView AnswerAnswer: D

April 13, 2023 No Comments READ MORE +

Which resource is able to be shared among virtual machines deployed on the same physical server?

Which resource is able to be shared among virtual machines deployed on the same physical server?A . disk B. applications C. VM configuration file D. operating systemView AnswerAnswer: C

April 13, 2023 No Comments READ MORE +

What criteria is used first during me root port selection process?

What criteria is used first during me root port selection process?A . local port ID B. lowest path cost to the root bridge C. lowest neighbor's bridge ID D. lowest neighbor's port IDView AnswerAnswer: B

April 13, 2023 No Comments READ MORE +

What event has occurred if a router sends a notice level message to a syslog server?

What event has occurred if a router sends a notice level message to a syslog server?A . A TCP connection has been torn down B. An ICMP connection has been built C. An interface line has changed status D. A certificate has expired.View AnswerAnswer: C

April 13, 2023 No Comments READ MORE +

Which command prevents passwords from being stored in the configuration as plain text on a router or switch?

Which command prevents passwords from being stored in the configuration as plain text on a router or switch?A . enable secret B. service password-encryption C. username Cisco password encrypt D. enable passwordView AnswerAnswer: B

April 12, 2023 No Comments READ MORE +

What is a characteristic of cloud-based network topology?

What is a characteristic of cloud-based network topology?A . wireless connections provide the sole access method to services B. onsite network services are provided with physical Layer 2 and Layer 3 components C. services are provided by a public, private, or hybrid deployment D. physical workstations are configured to share...

April 12, 2023 No Comments READ MORE +

Which command provides this output?

Refer to the exhibit. Which command provides this output?A . show ip route B. show ip interface C. show interface D. show cdp neighborView AnswerAnswer: D

April 12, 2023 No Comments READ MORE +

Which command on a port enters the forwarding state immediately when a PC is connected to it?

Which command on a port enters the forwarding state immediately when a PC is connected to it?A . switch(config)#spanning-tree portfast default B. switch(config)#spanning-tree portfast bpduguard default C. switch(config-if)#spanning-tree portfast trunk D. switch(config-if)#no spanning-tree portfastView AnswerAnswer: C

April 12, 2023 No Comments READ MORE +

Which implementation provides the strongest encryption combination for the wireless environment?

Which implementation provides the strongest encryption combination for the wireless environment?A . WPA2 + AES B. WPA + AES C. WEP D. WPA + TKIPView AnswerAnswer: A

April 12, 2023 No Comments READ MORE +