Which command can you enter to verify link speed and duplex setting on the interface?
Refer to exhibit. Which command can you enter to verify link speed and duplex setting on the interface?A . router# show protocolsB . router#show startup-configC . router#show lineD . router#show interface gig0/1View AnswerAnswer: D
Which two features can you enable on a switch to capture and analyze frames that transt an interface? (Choose two)
Which two features can you enable on a switch to capture and analyze frames that transt an interface? (Choose two)A . SNMPB . NetFlowC . IP SLAD . SPANE . RSPANView AnswerAnswer: DE
Which command can you enter to block HTTPS traffic from the whole class A private network range to a host?
Which command can you enter to block HTTPS traffic from the whole class A private network range to a host?A . R1(config)#access-list 105 deny tcp 10.1.0.0 0.0.255.255 40.0.0.2 0.0.0.0 eq 443B . R1(config)#access-list 105 deny tcp 10.1.0.0 0.0.255.255 40.0.0.2 0.0.0.0 eq 53C . R1(config)#access-list 105 deny tcp 10.0.0.0 0.255.255.255 40.0.0.2...
How do you configure a hostname?
How do you configure a hostname?A . Router(config)#hostname R1View AnswerAnswer: A
Given the output from the show ip eigrp topology command, which router is the feasible successor?
Refer to the exhibit. Given the output from the show ip eigrp topology command, which router is the feasible successor?A . 10.1.0.1 (Serial0), from 10.1.0.1, Send flag is 0x0 Composite metric is (46152000/41640000), Route is Internal Vector metric: Minimum bandwidth is 64 Kbit Total delay is 45000 Microseconds Reliability is...
Based on the output shown, what is the most likely problem?
Refer to the exhibit. All switch ports are assigned to the correct VLANs, but none of the hosts connected to SwitchA can communicate with hosts in the same VLAN connected to SwitchB. Based on the output shown, what is the most likely problem?A . The access link needs to be...
Which option is a valid IPv6 address?
Which option is a valid IPv6 address?A . 2001:0000:130F::099a::12aB . 2002:7654:A1AD:61:81AF:CCC1C . FEC0:2927:1860:W067::2A4D . 2004:1:25A4:886F::1View AnswerAnswer: D
Which two components are used to identify a neighbor in a BGP configuration? (Choose two.)
Which two components are used to identify a neighbor in a BGP configuration? (Choose two.)A . autonomous system numberB . version numberC . router IDD . subnet maskE . IP addressView AnswerAnswer: AE
Which statement about SNMPv2 is true?
Which statement about SNMPv2 is true?A . Its privacy algorithms use MD5 encryption by default.B . it requires passwords to be encrypyedC . Its authetication and privacy algorithms are enable without default values.D . It requires passwords at least eight characters en length.View AnswerAnswer: C
Which three of these statements regarding 802.1Q trunking are correct? (Choose three.)
Which three of these statements regarding 802.1Q trunking are correct? (Choose three.)A . 802.1Q native VLAN frames are untagged by default.B . 802.1Q trunking ports can also be secure ports.C . 802.1Q trunks can use 10 Mb/s Ethernet interfaces.D . 802.1Q trunks require full-duplex, point-to-point connectivity.E . 802.1Q trunks should...