Which configuration when applied to switch A accomplishes this task?

Refer to the exhibit. A network engineer must block access for all computers on VLAN 20 to the web server via HTTP. All other computers must be able to access the web server. Which configuration when applied to switch A accomplishes this task? A) B) C) D) A . Option...

February 5, 2021 No Comments READ MORE +

Which two actions influence the EIGRP route selection process? (Choose two)

Which two actions influence the EIGRP route selection process? (Choose two)A . The router calculates the reported distance by multiplying the delay on the exiting Interface by 256.B . The router calculates the best backup path to the destination route and assigns it as the feasible successor.C . The router...

February 5, 2021 No Comments READ MORE +

Which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?

Which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?A . TKIP encryptionB . SAE encryptionC . AES encryptionD . scrambled encryption keyView AnswerAnswer: B

February 5, 2021 No Comments READ MORE +

Based on the LACP neighbor status, in which mode is the SW1 port channel configured?

Refer to the exhibit. Based on the LACP neighbor status, in which mode is the SW1 port channel configured?A . passiveB . mode onC . autoD . activeView AnswerAnswer: D

February 5, 2021 No Comments READ MORE +

Which usable IP address and subnet mask combination meets this criteria?

An engineer must configure a /30 subnet between two routers. Which usable IP address and subnet mask combination meets this criteria?A . interface e0/0 description to HQ-A370:98968 ip address 10.2.1.3 255.255.255.252B . interface e0/0 description to HQ-A370:98968 ip address 192.168.1.1 255.255.255.248C . interface e0/0 description to HQ-A370:98968 ip address 172.16.1.4...

February 5, 2021 No Comments READ MORE +

Which function does an SNMP agent perform?

Which function does an SNMP agent perform?A . It manages routing between Layer 3 devices in a network,B . It coordinates user authentication between a network device and a TACACS+ or RADIUS server.C . It sends information about MIB variables in response to requests from the NME . It requests...

February 5, 2021 No Comments READ MORE +

Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)

Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)A . It drops lower-priority packets before it drops higher-priority packetsB . It can identify different flows with a high level of granularityC . It guarantees the delivery of high-priority packetsD . It can mitigate congestion by...

February 5, 2021 No Comments READ MORE +

When configuring IPv6 on an interface, which two IPv6 multicast groups are joined? (choose two)

When configuring IPv6 on an interface, which two IPv6 multicast groups are joined? (choose two)A . 2000::/3B . 2000::5C . FC00::/7D . FF02::1E . FF02::2View AnswerAnswer: DE Explanation: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6/configuration/xe-3s/ipv6-xe-36s-book/ip6-multicast.html

February 4, 2021 No Comments READ MORE +

Which action corrects the configuration issue?

Refer to the exhibit. The default-information originate command is configured under the R1 OSPF configuration. After testing, workstation on VLAN 20 at Site B cannot reach a DNS server on the Internet. Which action corrects the configuration issue?A . Add the default-information originate command on R2B . Add the always...

February 4, 2021 No Comments READ MORE +

What benefit does controller-based networking provide versus traditional networking?

What benefit does controller-based networking provide versus traditional networking?A . provides an added layer of security to protect from DDoS attacksB . combines control and data plane functionality on a single device to minimize latencyC . moves from a two-tier to a three-tier network architecture to provide maximum redundancyD ....

February 4, 2021 No Comments READ MORE +