Which of the following is causing this issue?

A technician is troubleshooting a wired device on the network. The technician notices that the link light on the NIC does not illuminate. After testing the device on a different RJ-45 port, the device connects successfully. Which of the following is causing this issue?A . EMIB . RFIC . Cross-talkD...

September 22, 2018 No Comments READ MORE +

Which of the following DNS records could be a glue record?

Which of the following DNS records could be a glue record?A . ns1.labA198.51.100.53B . labNS198.51.100.53C . ns1.labNS198.51.100.53D . ns1.A198.51.100.53E . ns1.labGLUE198.51.100.53View AnswerAnswer: A

September 22, 2018 No Comments READ MORE +

Which segment protocol provides fast and predictable convergence (typically within 50 ms) in Layer 2 Ethernet ring topologies?

Which segment protocol provides fast and predictable convergence (typically within 50 ms) in Layer 2 Ethernet ring topologies?A . Spanning Tree ProtocolB . Flex LinksC . Resilient Ethernet ProtocolD . Spatial Reuse ProtocolE . Resilient Packet RingView AnswerAnswer: C

September 22, 2018 No Comments READ MORE +

What should you do?

DRAG DROP You are developing a web page for runners who register for a race. The page includes a slider control that allows users to enter their age. You have the following requirements: • All runners must enter their age. • Applications must not be accepted from runners less than...

September 22, 2018 No Comments READ MORE +

Which of the following is not an indicator in the disk information monitoring of eSight?

Which of the following is not an indicator in the disk information monitoring of eSight?A . Disk nameB . Health statusC . Installation statusD . Hard disk usageView AnswerAnswer: D

September 22, 2018 No Comments READ MORE +

Which statement provides the best definition of malware?

Which statement provides the best definition of malware?A . Malware is unwanted software that is harmful or destructive.B . Malware is software used by nation states to commit cyber crimes.C . Malware is a collection of worms, viruses, and Trojan horses that is distributed as a single package.D . Malware...

September 22, 2018 No Comments READ MORE +

Which two statements about 802.1 x authentications with EAP are true? (Choose two)

Which two statements about 802.1 x authentications with EAP are true? (Choose two)A . The supplicant and authenticator server send a one-time password to the authenticatorB . The authenticator server translates frames from the supplicant into a RADIUS messageC . The authenticator can cache the username and password from the...

September 22, 2018 No Comments READ MORE +

Since the AS-PATH attribute cannot be function within the AS, it is specified that the BGP router will not advertise any updates from the IBGP peer to its IBGP peers.

Since the AS-PATH attribute cannot be function within the AS, it is specified that the BGP router will not advertise any updates from the IBGP peer to its IBGP peers.A . TrueB . FalseView AnswerAnswer: A

September 22, 2018 No Comments READ MORE +

Within Cisco Unified ICM, which process handles communication between the router and peripheral gateway components?

Within Cisco Unified ICM, which process handles communication between the router and peripheral gateway components?A . dbagentB . opcsC . ccagentD . mdsView AnswerAnswer: C

September 22, 2018 No Comments READ MORE +

Which configuration on the HSRP neighboring device ensures that it becomes the active HSRP device in the event that port fa1/1 on Switch_A goes down?

Refer to the exhibit. Which configuration on the HSRP neighboring device ensures that it becomes the active HSRP device in the event that port fa1/1 on Switch_A goes down?A . Switch_B(config-if)#ip address 10.10.10.2 255.255.255.0 Switch_B(config-if)#standby 1 priority 200 Switch_B(config-if)#standby 1 preempt Switch_B(config-if)#standby 1 ip 10.10.10.10 Switch_B(config-if)#standby 1 track interface fa...

September 22, 2018 No Comments READ MORE +