Which command set is required?
An engineer must configure HSRP group 300 on a Cisco IOS router. When the router is functional, it must be the must be the active HSRP router. The peer router has been configured using the default priority value. Which command set is required?A . standby 300 priority 110 standby 300...
Which configuration change ensures that R1 is the active gateway whenever it is in a functional state for the 172.30.110.0724 network?
Refer to the exhibit. Which configuration change ensures that R1 is the active gateway whenever it is in a functional state for the 172.30.110.0724 network?A . R2 standby 1 priority 90 standby 1 preemptB . R2 standby 1 priority 100 standby 1 preemptC . R1 standby 1 preempt R2 standby...
Drag and drop the characteristics from the left onto the routing protocols they describe on the right
DRAG DROP Drag and drop the characteristics from the left onto the routing protocols they describe on the right. View AnswerAnswer:
What is the difference between CEF and process switching?
What is the difference between CEF and process switching?A . CEF processes packets that are too complex for process switching to manage.B . CEF is more CPU-intensive than process switching.C . CEF uses the FIB and the adjacency table to make forwarding decisions, whereas process switching punts each packet.D ....
What are two considerations when using SSO as a network redundancy feature? (Choose two)
What are two considerations when using SSO as a network redundancy feature? (Choose two)A . both supervisors must be configured separatelyB . the multicast state is preserved during switchoverC . must be combined with NSF to support uninterrupted Layer 2 operationsD . must be combined with NSF to support uninterrupted...
Which method does Cisco DNA Center use to allow management of non-Cisco devices through southbound protocols?
Which method does Cisco DNA Center use to allow management of non-Cisco devices through southbound protocols?A . It creates device packs through the use of an SDKB . It uses an API call to interrogate the devices and register the returned data.C . It obtains MIBs from each vendor that...
When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?
When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?A . logging host 10.2.3.4 vrf mgmt transport tcp port 6514B . logging host 10.2.3.4 vrf mgmt transport udp port 6514C . logging host 10.2.3.4 vrf mgmt transport tcp port 514D ....
What is the structure of a JSON web token?
What is the structure of a JSON web token? A. three parts separated by dots: header payload, and signature B. header and payload C. three parts separated by dots: version header and signature D. payload and signatureView AnswerAnswer: A Explanation: JSON Web Token (JWT) is an open standard (RFC 7519)...
Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?
An engineer is troubleshooting the Ap join process using DNS. Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?A . wlcbostname.domain.comB . cisco-capwap-controller.domain.comC . ap-manager.domain.comD . primary-wlc.domain.comView AnswerAnswer: B Explanation: DNS: If you have configured your DHCP server to provide both...
In an SD-Access solution what is the role of a fabric edge node?
In an SD-Access solution what is the role of a fabric edge node?A . to connect external Layer 3- network to the SD-Access fabricB . to connect wired endpoint to the SD-Access fabricC . to advertise fabric IP address space to external networkD . to connect the fusion router to...