Which type of wireless encryption is used for WPA2 in preshared key mode?

Which type of wireless encryption is used for WPA2 in preshared key mode?A . TKIP with RC4B . RC4C . AES-128D . AES-256View AnswerAnswer: C Explanation: We can see in this picture we have to type 64 hexadecimal characters (256 bit) for the WPA2 passphrase so we can deduce the...

March 15, 2024 No Comments READ MORE +

Which command accomplishes this task?

Refer to the exhibit. The network administrator wants VLAN 67 traffic to be untagged between Switch 1 and Switch 2 while all other VLANs are to remain tagged. Which command accomplishes this task?A . switchport access vlan 67B . switchport trunk allowed vlan 67C . switchport private-vlan association host 67D...

March 15, 2024 No Comments READ MORE +

Which function does the range of private IPv4 addresses perform?

Which function does the range of private IPv4 addresses perform?A . allows multiple companies to each use the same addresses without conflictsB . provides a direct connection for hosts from outside of the enterprise networkC . ensures that NAT is not required to reach the internet with private range addressingD...

March 15, 2024 No Comments READ MORE +

Which statement identifies the functionality of virtual machines?

Which statement identifies the functionality of virtual machines?A . Virtualized servers run most efficiently when they are physically connected to a switch that is separate from the hypervisorB . The hypervisor can virtualize physical components including CPU. memory, and storageC . Each hypervisor can support a single virtual machine and...

March 15, 2024 No Comments READ MORE +

What are two benefits of controller-based networking compared to traditional networking?

What are two benefits of controller-based networking compared to traditional networking?A . controller-based increases network bandwidth usage, while traditional lightens the load on the network.B . controller-based inflates software costs, while traditional decreases individual licensing costsC . Controller-based reduces network configuration complexity, while traditional increases the potential for errorsD ....

March 14, 2024 No Comments READ MORE +

What are two benefits of controller-based networking compared to traditional networking?

What are two benefits of controller-based networking compared to traditional networking?A . controller-based increases network bandwidth usage, while traditional lightens the load on the network.B . controller-based inflates software costs, while traditional decreases individual licensing costsC . Controller-based reduces network configuration complexity, while traditional increases the potential for errorsD ....

March 14, 2024 No Comments READ MORE +

What are two roles of the Dynamic Host Configuration Protocol (DHCP)? (Choose two)

What are two roles of the Dynamic Host Configuration Protocol (DHCP)? (Choose two)A . The DHCP server offers the ability to exclude specific IP addresses from a pool of IP addressesB . The DHCP client can request up to four DNS server addressesC . The DHCP server assigns IP addresses...

March 14, 2024 No Comments READ MORE +

Which two command sequences must you configure on switch to establish a Layer 3 EtherChannel with an open-standard protocol? (Choose two)

Which two command sequences must you configure on switch to establish a Layer 3 EtherChannel with an open-standard protocol? (Choose two)A . interface GigabitEthernet0/0/1 channel-group 10 mode onB . interface GigabitEthernet0/0/1 channel-group 10 mode activeC . interface GigabitEthernet0/0/1 channel-group 10 mode autoD . interface port-channel 10 switchport switchport mode trunkE...

March 14, 2024 No Comments READ MORE +

What is the next hop address for traffic that is destined to host 10.0.1.5?

Refer to the exhibit. What is the next hop address for traffic that is destined to host 10.0.1.5?A . 10.0.1.3B . 10.0.1.50C . 10.0.1.4D . Loopback DView AnswerAnswer: B

March 14, 2024 No Comments READ MORE +

Which two minimum parameters must be configured on an active interface to enable OSPFv2 to operate? (Choose two)

Which two minimum parameters must be configured on an active interface to enable OSPFv2 to operate? (Choose two)A . OSPF areaB . OSPF MD5 authentication keyC . iPv6 addressD . OSPf process IDE . OSPf stub flagView AnswerAnswer: AD

March 14, 2024 No Comments READ MORE +