When configuring a WLAN with WPA2 PSK in the Cisco Wireless LAN Controller GUI, which two formats are available to select? (Choose two)
When configuring a WLAN with WPA2 PSK in the Cisco Wireless LAN Controller GUI, which two formats are available to select? (Choose two)A . ASCIIB . base64C . binaryD . decimalE . hexadecimalView AnswerAnswer: A E Explanation: When configuring a WLAN with WPA2 Preshared Key (PSK), we can choose the...
Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)
Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)A . It drops lower-priority packets before it drops higher-priority packetsB . It can identify different flows with a high level of granularityC . It guarantees the delivery of high-priority packetsD . It can mitigate congestion by...
What is the default behavior of a Layer 2 switch when a frame with an unknown destination MAC address is received?
What is the default behavior of a Layer 2 switch when a frame with an unknown destination MAC address is received?A . The Layer 2 switch drops the received frameB . The Layer 2 switch floods packets to all ports except the receiving port in the given VLANC . The...
When a site-to-site VPN is used, which protocol is responsible for the transport of user data?
When a site-to-site VPN is used, which protocol is responsible for the transport of user data?A . IKEv2B . IKEv1C . IPsecD . MD5View AnswerAnswer: C Explanation: A site-to-site VPN allows offices in multiple fixed locations to establish secure connections with each other over a public network such as the...
How does SW2 interact with other switches in this VTP domain?
Refer to Exhibit. How does SW2 interact with other switches in this VTP domain?A . It processes VTP updates from any VTP clients on the network on its access portsB . It receives updates from all VTP servers and forwards all locally configured VLANs out all trunk portsC . It...
Which option about JSON is true?
Which option about JSON is true?A . uses predefined tags or angle brackets (<>) to delimit markup textB . used to describe structured data that includes arraysC . used for storing informationD . similar to HTML, it is more verbose than XMLView AnswerAnswer: B Explanation: JSON data is written as...
Which route does R1 select for traffic that is destined to 192 168.16.2?
Refer to the exhibit. Which route does R1 select for traffic that is destined to 192 168.16.2?A . 192.168.16.0/21B . 192.168.16.0/24C . 192.168 26.0/26D . 192.168.16.0/27View AnswerAnswer: D Explanation: The destination IP addresses match all four entries in the routing table but the 192.168.16.0/27 has the longest prefix so it...
Which three are characteristics of an IPv6 anycast address? (Choose three)
Which three are characteristics of an IPv6 anycast address? (Choose three)A . one-to-many communication modelB . one-to-nearest communication modelC . any-to-many communication modelD . a unique IPv6 address for each device in the groupE . the same address for multiple devices in the groupF . delivery of packets to the...
Which set of action satisfy the requirement for multifactor authentication?
Which set of action satisfy the requirement for multifactor authentication?A . The user swipes a key fob, then clicks through an email linkB . The user enters a user name and password, and then clicks a notification in an authentication app on a mobile deviceC . The user enters a...
Which network allows devices to communicate without the need to access the Internet?
Which network allows devices to communicate without the need to access the Internet?A . 172.9.0.0/16B . 172.28.0.0/16C . 192.0.0.0/8D . 209.165.201.0/24View AnswerAnswer: B Explanation: This question asks about the private ranges of IPv4 addresses. The private ranges of each class of IPv4 are listed below: Class A private IP address...