What two conclusions should be made about this configuration?

Refer to the exhibit. What two conclusions should be made about this configuration? (Choose two)A . The designated port is FastEthernet 2/1B . This is a root bridgeC . The spanning-tree mode is Rapid PVST+D . The spanning-tree mode is PVST+E . The root port is FastEthernet 2/1View AnswerAnswer: CE

January 31, 2024 No Comments READ MORE +

Which command provides this output?

Refer to the exhibit. Which command provides this output?A . show ip routeB . show ip interfaceC . show interfaceD . show cdp neighborView AnswerAnswer: D

January 31, 2024 No Comments READ MORE +

Which type of security program is in place?

An email user has been lured into clicking a link in an email sent by their company's security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?A . Physical access controlB . Social...

January 31, 2024 No Comments READ MORE +

Which command prevents passwords from being stored in the configuration as plain text on a router or switch?

Which command prevents passwords from being stored in the configuration as plain text on a router or switch?A . enable secretB . service password-encryptionC . username Cisco password encryptD . enable passwordView AnswerAnswer: B

January 31, 2024 No Comments READ MORE +

How do TCP and UDP differ in the way that they establish a connection between two endpoints?

How do TCP and UDP differ in the way that they establish a connection between two endpoints?A . TCP uses synchronization packets, and UDP uses acknowledgment packets.B . UDP uses SYN, SYN ACK and FIN bits in the frame header while TCP uses SYN, SYN ACK and ACK bitsC ....

January 31, 2024 No Comments READ MORE +

Which function does the range of private IPv4 addresses perform?

Which function does the range of private IPv4 addresses perform?A . allows multiple companies to each use the same addresses without conflictsB . provides a direct connection for hosts from outside of the enterprise networkC . ensures that NAT is not required to reach the internet with private range addressingD...

January 31, 2024 No Comments READ MORE +

Which MAC address is recognized as a VRRP virtual address?

Which MAC address is recognized as a VRRP virtual address?A . 0000.5E00.010aB . 0005.3711.0975C . 0000.0C07.AC99D . 0007.C070/AB01View AnswerAnswer: A Explanation: With VRRP, the virtual router’s MAC address is 0000.5E00.01xx , in which xx is the VRRP group.

January 30, 2024 No Comments READ MORE +

Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)

Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)A . It drops lower-priority packets before it drops higher-priority packetsB . It can identify different flows with a high level of granularityC . It guarantees the delivery of high-priority packetsD . It can mitigate congestion by...

January 30, 2024 No Comments READ MORE +

Which network allows devices to communicate without the need to access the Internet?

Which network allows devices to communicate without the need to access the Internet?A . 1729.0.0/16B . 172.28.0.0/16C . 192.0.0.0/8D . 209.165.201.0/24View AnswerAnswer: B Explanation: The private ranges of each class of IPv4 are listed below: Class A private IP address ranges from 10.0.0.0 to 10.255.255.255 Class B private IP address...

January 30, 2024 No Comments READ MORE +

Which outcome is expected when PC_A sends data to PC_B?

Refer to the exhibit. Which outcome is expected when PC_A sends data to PC_B?A . The switch rewrites the source and destination MAC addresses with its own.B . The source MAC address is changed.C . The source and destination MAC addresses remain the same.D . The destination MAC address is...

January 29, 2024 No Comments READ MORE +