Which type of an attack is considered MAC poisoning?

Which type of an attack is considered MAC poisoning?A . Duplicating the MAC address of a legitimate device so frames are forwarded to the incorrect portB . Host imitating a trunk port by using tagging and trunking protocolsC . Flooding MAC addresses to the switch to fill its CAM table,...

April 10, 2024 No Comments READ MORE +

Which three statements are true about MLAG? (Select 3)

Which three statements are true about MLAG? (Select 3)A . The peer-link performs the synchronization of FDB and other data.B . The backup link is used to prevent split-brain scenarios.C . No VLANs can be configured in the peer-link for MLAG switches.D . The peer-link can let MLAG switches be...

April 10, 2024 No Comments READ MORE +

What is true about Dell N1100 Series switches?

What is true about Dell N1100 Series switches?A . They contain 6x 100 Gig interfaces.B . They are Open Networking switches.C . They accept static routes.D . They are suitable for core layer deployment.View AnswerAnswer: B

April 10, 2024 No Comments READ MORE +

Which recommended switch port mode should the interconnecting switch ports be configured?

Refer to the Exhibit. A network administrator needs to configure the switches to allow traffic to communicate from Host 1 to Host 2. Which recommended switch port mode should the interconnecting switch ports be configured?A . AccessB . TrunkC . VLAN StackingD . HybridView AnswerAnswer: B

April 9, 2024 No Comments READ MORE +

Which commands should a network administrator use to configure a RADIUS server on a Dell EMC N-Series switch?

Which commands should a network administrator use to configure a RADIUS server on a Dell EMC N-Series switch?A . Switch-1(config)# radius 10.1.1.111 Switch-1(config-radius)# name RADIUS-Server Switch-1(config-radius)# key secretkeyB . Switch-1(config)# radius server auth 10.1.1.111 Switch-l(config-radius)# name RADIUS-Server Switch-1(config-radius)# key "secretkey"C . Switch-1(config)# radius auth 10.1.1.111 Switch-1(config-radius)# name "RADIUS- Server" Switch-1(config-radius)#...

April 9, 2024 No Comments READ MORE +

How many untagged VLANs are allowed on a switchport mode trunk interface?

How many untagged VLANs are allowed on a switchport mode trunk interface?A . 0B . 1C . 128D . 4096View AnswerAnswer: B

April 9, 2024 No Comments READ MORE +

Based on the graphic, which command should be used on the Dell EMC N-Series Layer 2 switch to allow both client computers to receive a dynamic IP address?

Based on the graphic, which command should be used on the Dell EMC N-Series Layer 2 switch to allow both client computers to receive a dynamic IP address? A . Console(config)# ip redirectsB . Console(config)# service dhcpC . Console(config)# ip helper-address 192.168.100.250D . Console(config)# service-policy in dhcp_250View AnswerAnswer: C

April 9, 2024 No Comments READ MORE +

What additional steps need to be performed?

When setting up VoIP, you decide that you want to use LLDP. LLDP is enabled by default and LLDP Transmit Management Information and Notification modes are enabled. What additional steps need to be performed?A . Enable ISDP and enable LLDP-MED confignotificationB . Disable ISDP and enable LLDP-MED confignotificationC . Enable...

April 9, 2024 No Comments READ MORE +

In a PoE environment, which IEEE protocol does a device use to request a power class?

In a PoE environment, which IEEE protocol does a device use to request a power class?A . ISDPB . LACPC . LLDPD . CDPView AnswerAnswer: C

April 8, 2024 No Comments READ MORE +

Which Layer 2 network protocol is used for automatic configuration of switch VLANs and dynamically manages VLAN membership on trunk ports?

Which Layer 2 network protocol is used for automatic configuration of switch VLANs and dynamically manages VLAN membership on trunk ports?A . MSTPB . PVSTC . RSTPD . GVRPView AnswerAnswer: D

April 8, 2024 No Comments READ MORE +