broadcast,multicat, or unicast storm on one physical interface?
Which Layer 2 security feature prevents traffic on a LAN from being disrupted by a broadcast,multicat, or unicast storm on one physical interface?A . Bridge protocol Data Unit GuardB . Storm ControlC . Embedded event monitoringD . Access control listsView AnswerAnswer: B
Which three steps should you perform in sequence?
DRAG DROP You administer Windows 8 Pro computers in your company network. You discover that Sleep, Shut down and Restart are the only options available when you select the Power button as shown in the following exhibit (Click the Exhibit button.) You need to enable hibernation on the computer. Which...
Assuming hello PDU authentication has been disabled, which command re-enables the feature on a FabricPath interface?
Assuming hello PDU authentication has been disabled, which command re-enables the feature on a FabricPath interface?A . switch (config-if) # fabricpath isis authentication-type cleartextB . switch (config-if) # fabricpath isis authentication-type md5C . switch (config-if) # fabricpath isis authentication checkD . switch (config-if) # fabricpath isis hello-intervalView AnswerAnswer: C
Which two protocols are used by bridges and/or switches to prevent loops in a layer 2 network? (Choose two.)
Which two protocols are used by bridges and/or switches to prevent loops in a layer 2 network? (Choose two.)A . 802.1dB . VTPC . 802.1qD . SAPE . STPView AnswerAnswer: AE
Which command is required for root guard for Cisco device to place ID:2071948x? (Where x is the last digit ID)
Which command is required for root guard for Cisco device to place ID:2071948x? (Where x is the last digit ID)A . (config if)# spanning-tree guard rootB . (config)# spanning-tree guard rootC . (config-if)# spanning-tree root guardD . (config)# spanning-tree root guardView AnswerAnswer: A
Which of the following best describes the port on a laptop that is used to connection to an Ethernet port on a Cisco Switch?
Which of the following best describes the port on a laptop that is used to connection to an Ethernet port on a Cisco Switch?A . RJ-45B . RJ-11C . VGAD . DVIE . DB-9View AnswerAnswer: A
interface fa0/0
interface fa0/0 ip address x.x.x.33 255.255.255.224 router bgp XXX neighbor x.x.x.x remote as x.x.x.x You need to advertise the network of Int fa0/0.A . x.x.x.32 mask 255.255.255.224B . x.x.x.32 255.255.255.224C . x.x.x.32 mask 0.0.0.31D . x.x.x.33 mask 255.255.255.224View AnswerAnswer: A
Which two items can be configured during this setup process?
An engineer is configuring a new MDS switch. The switch is powered on, the customer connects to the console, and the initial setup script is started. Which two items can be configured during this setup process?A . default port-channel modeB . default port VSAN membershipC . default switch port interface...
You have been tasked to create a Layer 2 network design that uses vPC to provide resiliency and avoid loops. vPC removes Layer 2 loops while providing redundancy through which mechanism?
You have been tasked to create a Layer 2 network design that uses vPC to provide resiliency and avoid loops. vPC removes Layer 2 loops while providing redundancy through which mechanism?A . dual-active detectionB . address synchronizationC . strict forwarding rulesD . Bridge AssuranceView AnswerAnswer: C
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals. Your network contains an Active Directory domain named contoso.com. The domain contains a DNS server named Server1. All...