When configuring IPv6 on an interface, which two IPv6 multicast groups are joined? (Choose two)
When configuring IPv6 on an interface, which two IPv6 multicast groups are joined? (Choose two)A . 2000::/3B . 2002::5C . FC00::/7D . FF02::1E . FF02::2View AnswerAnswer: DE Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6/configuration/xe-3s/ipv6-xe-36s-book/ip6-multicast.html When an interface is configured with IPv6 address, it automatically joins the all nodes (FF02::1) and solicited-node (FF02::1:FFxx:xxxx) multicast groups....
Which two steps will fulfill the request?
An engineer is asked to protect unused ports that are configured in the default VLAN on a switch. Which two steps will fulfill the request? (Choose two)A . Configure the ports in an EtherChannel.B . Administratively shut down the portsC . Configure the port type as access and place in...
When configuring a WLAN with WPA2 PSK in the Cisco Wireless LAN Controller GUI, which two formats are available to select? (Choose two)
When configuring a WLAN with WPA2 PSK in the Cisco Wireless LAN Controller GUI, which two formats are available to select? (Choose two)A . ASCIIB . base64C . binaryD . decimalE . hexadecimalView AnswerAnswer: A, E Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-4/configuration/guides/consolidated/b_cg74_CONSOLIDATED/b_cg74_CONSOLIDATED_chapter_010 10001.html
Which MAC address is recognized as a VRRP virtual address?
Which MAC address is recognized as a VRRP virtual address?A . 0000.5E00.010aB . 0005.3711.0975C . 0000.0C07.AC99D . 0007.C070/AB01View AnswerAnswer: A Explanation: With VRRP, the virtual router’s MAC address is 0000.5E00.01xx, in which xx is the VRRP group.
What is the next hop address for traffic that is destined to host 10.0.1.5?
Refer to the exhibit. What is the next hop address for traffic that is destined to host 10.0.1.5?A . 10.0.1.3B . 10.0.1.50C . 10.0.1.4D . Loopback DView AnswerAnswer: B
In which two ways does a password manager reduce the chance of a hacker stealing a users password? (Choose two.)
In which two ways does a password manager reduce the chance of a hacker stealing a users password? (Choose two.)A . It automatically provides a second authentication factor that is unknown to the original user.B . It uses an internal firewall to protect the password repository from unauthorized access.C ....
Drag and drop the WLAN components from the left onto the correct descriptions on the right
DRAG DROP Drag and drop the WLAN components from the left onto the correct descriptions on the right. View AnswerAnswer:
What are two benefits of controller-based networking compared to traditional networking?
What are two benefits of controller-based networking compared to traditional networking?A . controller-based increases network bandwidth usage, while traditional lightens the load on the network.B . controller-based inflates software costs, while traditional decreases individual licensing costsC . Controller-based reduces network configuration complexity, while traditional increases the potential for errorsD ....
Which protocol allows the engineer to perform this function using the Cisco IOS MIB?
A network engineer must back up 20 network router configurations globally within a customer environment. Which protocol allows the engineer to perform this function using the Cisco IOS MIB?A . CDPB . SNMPC . SMTPD . ARPView AnswerAnswer: B Explanation: SNMP is an application-layer protocol that provides a message format...
Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)
Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)A . It drops lower-priority packets before it drops higher-priority packetsB . It can identify different flows with a high level of granularityC . It guarantees the delivery of high-priority packetsD . It can mitigate congestion by...