- All Exams Instant Download
Which command provides this output?
Refer to the exhibit. Which command provides this output?A . show ip routeB . show ip interfaceC . show interfaceD . show cdp neighborView AnswerAnswer: D
Which switch in this configuration will be elected as the root bridge?
Refer to the exhibit. Which switch in this configuration will be elected as the root bridge? SW1: 0C:E0:38:00:36:75 SW2: 0C:0E:15:22:05:97 SW3: 0C:0E:15:1A:3C:9D SW4: 0C:E0:18:A1:B3:19A . SW1B . SW2C . SW3D . SW4View AnswerAnswer: C
Which mode allows access points to be managed by Cisco Wireless LAN Controllers?
Which mode allows access points to be managed by Cisco Wireless LAN Controllers?A . autonomousB . lightweightC . bridgeD . mobility expressView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/support/docs/wireless/aironet-1200-series/70278-lap-faq.html A Lightweight Access Point (LAP) is an AP that is designed to be connected to a wireless LAN (WLAN) controller (WLC). APs are “lightweight,”...
Which type of route does R1 use to reach host 10.10.13.10/32?
Refer to the exhibit. Which type of route does R1 use to reach host 10.10.13.10/32?A . floating static routeB . host routeC . default routeD . network routeView AnswerAnswer: A Explanation: From the output, we see R1 will use the entry “O 10.10.13.0/25 [110/4576] via 10.10.10.1, …” to reach host...
Which usable IP address and subnet mask combination meets this criteria?
An engineer must configure a/30 subnet between two routers. Which usable IP address and subnet mask combination meets this criteria? A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: A
Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)
Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)A . It drops lower-priority packets before it drops higher-priority packetsB . It can identify different flows with a high level of granularityC . It guarantees the delivery of high-priority packetsD . It can mitigate congestion by...
Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right
DRAG DROP Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right. View AnswerAnswer: Explanation: Double-Tagging attack: In this attack, the attacking computer generates frames with two 802.1Q tags. The first tag matches the native VLAN of the trunk...
Which two interface counters are incremented?
A frame that enters a switch fails the Frame Check Sequence. Which two interface counters are incremented? (Choose two)A . runtsB . giantsC . frameD . CRCE . input errorsView AnswerAnswer: DE Explanation: Whenever the physical transmission has problems, the receiving device might receive a frame whose bits have changed...
Which switch becomes the root bridge?
Refer to the exhibit. Which switch becomes the root bridge?A . S1B . S2C . S3D . S4View AnswerAnswer: B
Which configuration accomplishes this task?
Router R1 must send all traffic without a matching routing-table entry to 192.168.1.1. Which configuration accomplishes this task?A . R1#config t R1(config)#ip routing R1(config)#ip route default-route 192.168.1.1B . R1#config t R1(config)#ip routing R1(config)#ip route 192.168.1.1 0.0.0.0 0.0.0.0C . R1#config t R1(config)#ip routing R1(config)#ip route 0.0.0.0 0.0.0.0 192.168.1.1D . R1#config t...