What is the first thing that should be checked in the endpoint configuration settings?

A Cisco TelePresence EX Series desktop endpoint failed to register to a Cisco VCS. The SIP status shows "Failed: 403 Forbidden" in the endpoint's web interface. What is the first thing that should be checked in the endpoint configuration settings?A . Verify that the correct SIP authentication credentials have been...

April 12, 2018 No Comments READ MORE +

Which statement is true about the show cfs merge status name command?

Which statement is true about the show cfs merge status name command?A . In a successful merge, all switches in the fabric are shown separately.B . The command shows the complete Cisco Fabric Services region database.C . The merge master is selected based on the highest sWWN in the fabric.D...

April 12, 2018 No Comments READ MORE +

What feature is required to stop multicast traffic from being broadcasted on the access layer switches?

Multicast has been configured and enabled within an Enterprise network. PIM spare-mode has been enabled on all VLANs. What feature is required to stop multicast traffic from being broadcasted on the access layer switches?A . Multicast boundary filterB . PIM Dense-ModeC . IGMP snoopingD . Dynamic ARP inspectionView AnswerAnswer: C...

April 12, 2018 No Comments READ MORE +

If a network engineer applies the command mac-address-table notification mac-move on a Cisco switch port, when is a syslog message generated?

If a network engineer applies the command mac-address-table notification mac-move on a Cisco switch port, when is a syslog message generated?A . A MAC address or host moves between different switch ports.B . A new MAC address is added to the content-addressable memory.C . A new MAC address is removed...

April 12, 2018 No Comments READ MORE +

What two virtual hardware devices can be added to a powered on VM? (Choose two.)

What two virtual hardware devices can be added to a powered on VM? (Choose two.)A . Virtual disk connected using SCSI controllerB . Virtual disk connected using IDE controllerC . Network adapterD . Serial PortView AnswerAnswer: A,C

April 12, 2018 No Comments READ MORE +

Which two switch states are valid for 802.1w? (Choose two.)

Which two switch states are valid for 802.1w? (Choose two.)A . listeningB . backupC . disabledD . learningE . discardingView AnswerAnswer: D, E Explanation: Port States There are only three port states left in RSTP that correspond to the three possible operational states. The 802.1D disabled, blocking, and listening states...

April 12, 2018 No Comments READ MORE +

Fill in the blank: The __________ is used to obtain identification and security information about network users.

Fill in the blank: The __________ is used to obtain identification and security information about network users.A . User DirectoryB . User serverC . UserCheckD . User indexView AnswerAnswer: A

April 12, 2018 No Comments READ MORE +

Which identifies both the source and destination location?

Which identifies both the source and destination location?A . IP addressB . URLC . portsD . MAC addressView AnswerAnswer: A

April 12, 2018 No Comments READ MORE +

Which three statements about the first subnet that you create are true?

You are assigned the network of 192.168.1.0/24. You want to split the network into four subnets that are all the same size. Which three statements about the first subnet that you create are true? (Choose three.)A . The subnet mask is 255.255.255.192B . The last host IP address is 192.168.164C...

April 12, 2018 No Comments READ MORE +

Which technique allows specific VLANs to be strictly permitted by the administrator?

Which technique allows specific VLANs to be strictly permitted by the administrator?A . VTP pruningB . transparent bridgingC . trunk allowed VLANsD . VLAN access-listE . L2P tunnelingView AnswerAnswer: C Explanation: By default, a trunk port sends traffic to and receives traffic from all VLANs. All VLAN IDs, 1 to...

April 12, 2018 No Comments READ MORE +