Which action is taken by the phone?

A Cisco IP phone receive untagged data traffic from an attached PC. Which action is taken by the phone?A . It allows the traffic to pass through unchanged.B . It drops the traffic.C . It tags the traffic with the default VLAE . It tags the traffic with the native...

December 10, 2020 No Comments READ MORE +

Which option about JSON is true?

Which option about JSON is true?A . uses predefined tags or angle brackets (<>) to delimit markup textB . used to describe structured data that includes arraysC . used for storing informationD . similar to HTML, it is more verbose than XMLView AnswerAnswer: B Explanation: JSON data is written as...

December 10, 2020 No Comments READ MORE +

Which route does R1 select for traffic that is destined to 192 168.16.2?

Refer to the exhibit . Which route does R1 select for traffic that is destined to 192 168.16.2?A . 192.168.16.0/21B . 192.168.16.0/24C . 192.168 26.0/26D . 192.168.16.0/27View AnswerAnswer: D Explanation: The destination IP addresses match all four entries in the routing table but the 192.168.16.0/27 has the longest prefix so...

December 10, 2020 No Comments READ MORE +

When OSPF learns multiple paths to a network, how does it select a route?

When OSPF learns multiple paths to a network, how does it select a route?A . It multiple the active K value by 256 to calculate the route with the lowest metric.B . For each existing interface, it adds the metric from the source router to the destination to calculate the...

December 9, 2020 No Comments READ MORE +

What are two characteristics of a controller-based network? (Choose two)

What are two characteristics of a controller-based network? (Choose two)A . The administrator can make configuration updates from the CLC . It uses northbound and southbound APIs to communicate between architectural layers.D . It moves the control plane to a central point.E . It decentralizes the control plane, which allows...

December 9, 2020 No Comments READ MORE +

Which type of wireless encryption is used for WPA2 in pre-shared key mode?

Which type of wireless encryption is used for WPA2 in pre-shared key mode?A . TKIP with RC4B . RC4C . AES-128D . AES-256View AnswerAnswer: D Explanation: We can see in this picture we have to type 64 hexadecimal characters (256 bit) for the WPA2 passphrase so we can deduce the...

December 9, 2020 No Comments READ MORE +

Which state verifies the designated router is in the proper mode?

An engineer configured an OSPF neighbor as a designated router . Which state verifies the designated router is in the proper mode?A . ExchangeB . 2-wayC . FullD . InitView AnswerAnswer: C

December 9, 2020 No Comments READ MORE +

Which design element is a best practice when deploying an 802.11b wireless infrastructure?

Which design element is a best practice when deploying an 802.11b wireless infrastructure?A . disabling TPC so that access points can negotiate signal levels with their attached wireless devicesB . setting the maximum data rate to 54 Mbps on the Cisco Wireless LAN ControllerC . allocating nonoverlapping channels to access...

December 9, 2020 No Comments READ MORE +

What is the primary different between AAA authentication and authorization?

What is the primary different between AAA authentication and authorization?A . Authentication verifies a username and password, and authorization handles the communication between the authentication agent and the user database.B . Authentication identifies a user who is attempting to access a system, and authorization validates the users password.C . Authentication...

December 9, 2020 No Comments READ MORE +

Which set of action satisfy the requirement for multi-factor authentication?

Which set of action satisfy the requirement for multi-factor authentication?A . The user swipes a key fob, then clicks through an email link.B . The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device.C . The user enters a...

December 8, 2020 No Comments READ MORE +