Which action resolves this issue?

Refer to the exhibit. An engineer attempts to create a configuration to allow the Blue VRF to leak into the global routing table, but the configuration does not function as expected. Which action resolves this issue?A . Change the access-list destination mask to a wildcard. B. Change the source network...

November 2, 2022 No Comments READ MORE +

Which command resolves the issue?

Refer to the exhibit. A network engineer troubleshoots an issue with the port channel between SW1 and SW2. Which command resolves the issue?A . SW1(config-if)#channel-group 10 mode desirable B. SW1(config-if)#channel-group 10 mode active C. SW2(config-if)#switchport mode trunk D. SW2(config-if)#channel-group 10 mode onView AnswerAnswer: B

November 2, 2022 No Comments READ MORE +

Which single security feature is recommended to provide Network Access Control in the enterprise?

Refer to the exhibit. Which single security feature is recommended to provide Network Access Control in the enterprise?A . MAB B. 802.1X C. WebAuth D. port security sticky MACView AnswerAnswer: B

November 2, 2022 No Comments READ MORE +

When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required?

When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required?A . NTP server B. PKI server C. RADIUS server D. TACACS serverView AnswerAnswer: C

November 1, 2022 No Comments READ MORE +

Which JSON syntax is valid?

Which JSON syntax is valid?A . {“switch”:”name”:”dist1″,”interfaces”:[“gig1″,”gig2″,”gig3”]} B. {„switch‟:(„name‟:‟dist1′,‟interfaces‟:[„gig1′,‟gig2′,‟gig3‟])} C. {“switch”:{“name”:”dist1″,”interfaces”:[“gig1″,”gig2″,”gig3”]}} D. {/”switch/”:{/”name/”:”dist1″,/”interfaces/”:[“gig1″,”gig2″,”gig3”]}}View AnswerAnswer: C Explanation: This JSON can be written as follows: { 'switch': { 'name': 'dist1', 'interfaces': ['gig1', 'gig2', 'gig3'] } }

November 1, 2022 No Comments READ MORE +

What is one benefit of implementing a VSS architecture?

What is one benefit of implementing a VSS architecture?A . It provides multiple points of management for redundancy and improved support B. It uses GLBP to balance traffic between gateways. C. It provides a single point of management for improved efficiency. D. It uses a single database to manage configuration...

November 1, 2022 No Comments READ MORE +

When two actions from the initial value of the TTL?

Refer to the exhibit. Which troubleshooting a routing issue, an engineer issues a ping from S1 to S2. When two actions from the initial value of the TTL? (Choose two.)A . The packet reaches R3, and the TTL expires B. R2 replies with a TTL exceeded message C. R3 replies...

November 1, 2022 No Comments READ MORE +

Which measure is used by an NTP server to indicate its closeness to the authoritative time source?

Which measure is used by an NTP server to indicate its closeness to the authoritative time source?A . latency B. hop count C. time zone D. stratumView AnswerAnswer: D

November 1, 2022 No Comments READ MORE +

What is a consideration when designing a Cisco SD-Access underlay network?

What is a consideration when designing a Cisco SD-Access underlay network?A . End user subnets and endpoints are part of the underlay network. B. The underlay switches provide endpoint physical connectivity for users. C. Static routing is a requirement, D. It must support IPv4 and IPv6 underlay networksView AnswerAnswer: B...

October 31, 2022 No Comments READ MORE +

Which explanation of this behavior is true?

Refer to the exhibit. An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24. The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router However, the router can still ping hosts on the 209.165.200.0/24 subnet. Which explanation...

October 31, 2022 No Comments READ MORE +