Which two statements about data VLANs on access ports are true? (Choose two)
Which two statements about data VLANs on access ports are true? (Choose two)A . They can be configured as trunk portsB . Two or more VLANs can be configured on the interfaceC . 802.1Q encapsulation must be configured on the interfaceD . Exactly one VLAN can be configured on the...
Where in the controller is this information found?
During an upgrade, the wireless infrastructure has seen a few access points join and then drop off the network. After further investigation, it appears the access points may have an IOS code version that is causing issues. Where in the controller is this information found?A . GUI > Wireless >...
How should you complete the relevant Transact-SOL statement? To answer?
Notify the sales person who places an order whether or not the order was completed. You must add the following constraints to the SalesHistory table: - a constraint on the SaleID column that allows the field to be used as a record identifier - a constant that uses the ProductID...
If a bridge port is in the non-designated state, which two statements about spanning-tree operations on this port are true? (Choose two.)
If a bridge port is in the non-designated state, which two statements about spanning-tree operations on this port are true? (Choose two.)A . This port is in the Forwarding state.B . This port sends BPDUs on the attached link.C . This port has the lowest cost to the root bridge.D...
Which of the following network troubleshooting methodology steps should Joe have performed FIRST?
A technician, Joe, visits a site that has reported a network down emergency. He immediately reboots the switches and the router since the network is down. Which of the following network troubleshooting methodology steps should Joe have performed FIRST?A . Determine if anything has changedB . Once a theory is...
Which of the following tasks are on the critical path?
There are four parallel paths on a network diagram. The summary duration of each path is below: A, C, G: 10 weeks A, B, F: 8 weeks D, E, H: 12 weeks D, B, F: 7 weeks Which of the following tasks are on the critical path?A . A, C,...
Which four actions should you perform in sequence?
DRAG DROP You have a deployment of System Center Configuration Manager (Current Branch). You configure hybrid mobile device management (MDM). You need to ensure that you can manage Apple iOS devices by using Configuration Manager. Which four actions should you perform in sequence? To answer, move the appropriate actions to...
The ________ command, included with OpenLDAP, will generate password hashes suitable for use in slapd.conf. (Enter the command with no options or parameters)
The ________ command, included with OpenLDAP, will generate password hashes suitable for use in slapd.conf. (Enter the command with no options or parameters)View AnswerAnswer: slappasswd
A network administrator is configuring AES encryption for the ISAKMP policy on an IOS router. Which two configurations are valid? (Choose two.)
A network administrator is configuring AES encryption for the ISAKMP policy on an IOS router. Which two configurations are valid? (Choose two.)A . crypto isakmp policy 10 encryption aes 254B . crypto isakmp policy 10 encryption aes 192C . crypto isakmp policy 10 encryption aes 256D . crypto isakmp policy...
When using multiple SSIDs on a lightweight AP, how does the traffic of each SSID reach the 802.3 network?
When using multiple SSIDs on a lightweight AP, how does the traffic of each SSID reach the 802.3 network?A . provide routing between them at the core so that the SSIDs can reach the internetB . configure 802.11q trunking on the Ethernet switch port that is connected to the APC...