What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared?
Refer to Exhibit. MTU has been configured on the underlying physical topology, and no MTU command has been configured on the tunnel interfaces. What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared?A . The packet arrives...
What is the result when a switch that is running PVST+ is added to this network?
Refer to the exhibit. What is the result when a switch that is running PVST+ is added to this network?A . DSW2 operates in Rapid PVST+ and the new switch operates in PVST+B . Both switches operate in the PVST+ modeC . Spanning tree is disabled automatically on the networkD...
The EtherChannel between SW2 and SW3 is not operational which action resolves this issue?
Refer to the exhibit. The EtherChannel between SW2 and SW3 is not operational which action resolves this issue?A . Configure the channel-group mode on SW2 Gi0/1 and Gi0/1 to on.B . Configure the channel-group mode on SW3 Gi0/1 to activeC . Configure the mode on SW2 Gi0/0 to trunkD ....
What does Call Admission Control require the client to send in order to reserve the bandwidth?
What does Call Admission Control require the client to send in order to reserve the bandwidth?A . SIP flow informationB . Wi-Fi multimediaC . traffic specificationD . VoIP media session awarenessView AnswerAnswer: C
Which command completes the configuration?
Refer to the Exhibit. A network engineer must configure NETCONF. After creating the configuration, the engineer gets output from the command show line, but not from show running-config. Which command completes the configuration? A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: C
Which solution do laaS service providers use to extend a Layer 2 segment across a Layer 3 network?
Which solution do laaS service providers use to extend a Layer 2 segment across a Layer 3 network?A . VLANB . VTEPC . VXLAND . VRFView AnswerAnswer: C
What is a benefit of a virtual machine when compared with a physical server?
What is a benefit of a virtual machine when compared with a physical server?A . Multiple virtual servers can be deployed on the same physical server without having to buy additional hardware.B . Virtual machines increase server processing performance.C . The CPU and RAM resources on a virtual machine cannot...
What is required to complete this task?
Refer to the Exhibit. A network engineer must configure a password expiry mechanism on the gateway router for all local passwords to expire after 60 days. What is required to complete this task?A . The password expiry mechanism is on the AAA server and must be configured there.B . Add...
Which method of account authentication does OAuth 2.0 within REST APIs?
Which method of account authentication does OAuth 2.0 within REST APIs?A . username/role combinationB . access tokensC . cookie authenticationD . basic signature workflowView AnswerAnswer: B Explanation: The most common implementations of OAuth (OAuth 2.0) use one or both of these tokens: + access token: sent like an API key,...
Which devices does Cisco DNA Center configure when deploying an IP-based access control policy?
Which devices does Cisco DNA Center configure when deploying an IP-based access control policy?A . All devices integrating with ISEB . selected individual devicesC . all devices in selected sitesD . all wired devicesView AnswerAnswer: C Explanation: When you click Deploy, Cisco DNA Center requests the Cisco Identity Services Engine...