Which command prevents passwords from being stored in the configuration as plaintext on a router or switch?
Which command prevents passwords from being stored in the configuration as plaintext on a router or switch?A . enable secretB . service password-encryptionC . username Cisco password encryptD . enable passwordView AnswerAnswer: B
Which API is used in controller-based architectures to interact with edge devices?
Which API is used in controller-based architectures to interact with edge devices?A . overlayB . northboundC . underlayD . southboundView AnswerAnswer: D
What is the expected behavior for the traffic flow for route 10.10.13.0/25?
Refer to the exhibit. An engineer is bringing up a new circuit to the MPLS provider on the Gi0/1 interface of Router1.The new circuit uses eBGP and teams the route to VLAN25 from the BGP path . What is the expected behavior for the traffic flow for route 10.10.13.0/25?A ....
Which prefix does Router 1 use to Host A?
Refer to the exhibit. Which prefix does Router 1 use to Host A?A . 10.10.10.0/28B . 10.10.13.0/25C . 10.10.13.144/28D . 10.10.13.208/29View AnswerAnswer: D
How does the router manage traffic to 192.168.12.16?
Refer to the exhibit . How does the router manage traffic to 192.168.12.16?A . It selects RIP route because it has the longest prefix inclusive of the destination addressB . It chooses the EIGRP route because it has the lowest administrative distanceC . It load-balances traffic between all three routesD...
Which command must be configured on the Cisco devices so that the topology of the network can be mapped?
A network engineer must create a diagram of a multivendor network. Which command must be configured on the Cisco devices so that the topology of the network can be mapped?A . Device(config)#lldp runB . Device(config)#cdp runC . Device(config)# cdp enableD . Device(config)# flow-sampler-map topologyView AnswerAnswer: A
which statement identifies the functionality of virtual machines?
which statement identifies the functionality of virtual machines?A . The hypervisor communicates on Layer 3 without the need for additional resourcesB . Each hypervisor can support a single virtual machine and a single software switchC . The hypervisor can virtual physical components including CPU,memory,and storageD . Virtualized servers run most...
Which action is taken by the phone?
A Cisco IP phone receive untagged data traffic from an attached PC . Which action is taken by the phone?A . It allows the traffic to pass through unchangedB . It drops the trafficC . It tags the traffic with the default VLAND . It tags the traffic with the...
Which option about JSON is true?
Which option about JSON is true?A . uses predefined tags or angle brackets () to delimit markup textB . used to describe structured data that includes arraysC . used for storing informationD . similar to HTML, it is more verbose than XMLView AnswerAnswer: B
Which mode must be used to configure EtherChannel between two switches without using a negotiation protocol?
Which mode must be used to configure EtherChannel between two switches without using a negotiation protocol?A . onB . autoC . activeD . desirableView AnswerAnswer: A