Which usable IP address and subnet mask combination meets this criteria?
An engineer must configure a/30 subnet between two routers. Which usable IP address and subnet mask combination meets this criteria? A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: A
Which command prevents passwords from being stored in the configuration as plain text on a router or switch?
Which command prevents passwords from being stored in the configuration as plain text on a router or switch?A . enable secretB . service password-encryptionC . username Cisco password encryptD . enable passwordView AnswerAnswer: B
Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)
Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)A . It drops lower-priority packets before it drops higher-priority packetsB . It can identify different flows with a high level of granularityC . It guarantees the delivery of high-priority packetsD . It can mitigate congestion by...
Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)
Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)A . It drops lower-priority packets before it drops higher-priority packetsB . It can identify different flows with a high level of granularityC . It guarantees the delivery of high-priority packetsD . It can mitigate congestion by...
Which command accomplishes this task?
Refer to the exhibit. The network administrator wants VLAN 67 traffic to be untagged between Switch 1 and Switch 2 while all other VLANs are to remain tagged. Which command accomplishes this task?A . switchport access vlan 67B . switchport trunk allowed vlan 67C . switchport private-vlan association host 67D...
Which command entered on a switch configured with Rapid PVST* listens and learns for a specific time period?
Which command entered on a switch configured with Rapid PVST* listens and learns for a specific time period?A . switch(config)#spanning-tree vlan 1 max-age 6B . switch(config)#spanning-tree vlan 1 hello-time 10C . switch(config)#spanning-tree vlan 1 priority 4096D . switch(config)#spanning-tree vlan 1 forward-time 20View AnswerAnswer: D Explanation: Forward time: Determines how long...
Which two outcomes are predictable behaviors for HSRP? (Choose two.)
Which two outcomes are predictable behaviors for HSRP? (Choose two.)A . The two routers synchronize configurations to provide consistent packet forwardingB . The two routers negotiate one router as the active router and the other as the standby routerC . Each router has a different IP address, both routers act...
Which type of attack can be mitigated by dynamic ARP inspection?
Which type of attack can be mitigated by dynamic ARP inspection?A . wormB . malwareC . DDoSD . man-in-the-middleView AnswerAnswer: D
What is a benefit of using a Cisco Wireless LAN Controller?
What is a benefit of using a Cisco Wireless LAN Controller?A . Central AP management requires more complex configurationsB . Unique SSIDs cannot use the same authentication methodC . It supports autonomous and lightweight APsD . It eliminates the need to configure each access point individuallyView AnswerAnswer: D
What two conclusions should be made about this configuration?
Refer to the exhibit. What two conclusions should be made about this configuration? (Choose two)A . The designated port is FastEthernet 2/1B . This is a root bridgeC . The spanning-tree mode is Rapid PVST+D . The spanning-tree mode is PVST+E . The root port is FastEthernet 2/1View AnswerAnswer: CE