Which two states are the port states when RSTP has converged? (Choose two.)

Which two states are the port states when RSTP has converged? (Choose two.)A . discardingB . listeningC . learningD . forwardingE . disabledView AnswerAnswer: A, D Explanation: Understanding Rapid Spanning Tree Protocol (802.1w) http://www.cisco.com/en/US/tech/tk389/tk621/technologies_white_paper09186a0080094cfa.shtml Port States There are only three port states left in RSTP that correspond to the three...

June 14, 2018 No Comments READ MORE +

Which additional information is needed to determine if a solution can be proposed to meet the financial needs of the customer?

A chief financial officer has provided current budget and business metrics that show actual operations costs of installed systems. The customer is not interested in leasing. Which additional information is needed to determine if a solution can be proposed to meet the financial needs of the customer?A . Cost per...

June 14, 2018 No Comments READ MORE +

Which identification for EPGs can you use to check zone rules?

Which identification for EPGs can you use to check zone rules?A . PcTagB . VXANC . VLAND . EPG nameView AnswerAnswer: A

June 14, 2018 No Comments READ MORE +

What must be configured prior to the first commit after factory defaults are loaded?

What must be configured prior to the first commit after factory defaults are loaded?A . root authenticationB . default gatewayC . host nameD . management servicesView AnswerAnswer: A

June 14, 2018 No Comments READ MORE +

Which two statements about using the CHAP authentication mechanism in a PPP link are true? (Choose two.)

Which two statements about using the CHAP authentication mechanism in a PPP link are true? (Choose two.)A . CHAP uses a two-way handshake.B . CHAP uses a three-way handshake.C . CHAP authentication periodically occurs after link establishment.D . CHAP authentication passwords are sent in plaintext.E . CHAP authentication is performed...

June 14, 2018 No Comments READ MORE +

Which of the following would allow SSH to function properly?

A technician logs onto a system using Telnet because SSH is unavailable. SSH is enabled on the target device, and access is allowed from all subnets. The technician discovers a critical step was missed. Which of the following would allow SSH to function properly?A . Perform file hashingB . Generate...

June 14, 2018 No Comments READ MORE +

Which protocol is the encapsulating protocol for mtrace packets?

Which protocol is the encapsulating protocol for mtrace packets?A . ICMPB . IGMPC . PIMD . GREView AnswerAnswer: B

June 14, 2018 No Comments READ MORE +

Which three items should be validated prior to installing ESXi 6.x? (Choose three.)

Which three items should be validated prior to installing ESXi 6.x? (Choose three.)A . Remote Storage has been disconnected.B . Installation media is available.C . Server hardware clock is set to UTE . Storage has been partitioned with a VMFS volume.F . Network cards have been setup to use Jumbo...

June 14, 2018 No Comments READ MORE +

Which functionality does an SVI provide?

Which functionality does an SVI provide?A . OSI Layer 2 connectivity to switchesB . remote switch administrationC . traffic routing for VLANsD . OSI Layer 3 connectivity to switchesView AnswerAnswer: C

June 14, 2018 No Comments READ MORE +

What could be a possible cause of this situation?

When adding an S Series node to a Gen 2 VxRail 240F cluster the build fails. What could be a possible cause of this situation?A . IP Pool has no more free addressesB . Hybrid and Flash nodes cannot be mixed in the same clusterC . Quanta and Dell hardware...

June 13, 2018 No Comments READ MORE +