What facilitates a Telnet connection between devices by entering the device name?
What facilitates a Telnet connection between devices by entering the device name?A . SNMPB . DNS lookupC . syslogD . NTPView AnswerAnswer: B
What are two similarities between UTP Cat 5e and Cat 6a cabling? (Choose two.)
What are two similarities between UTP Cat 5e and Cat 6a cabling? (Choose two.)A . Both operate at a frequency of 500 MHz.B . Both support runs of up to 55 meters.C . Both support runs of up to 100 meters.D . Both support speeds of at least 1 Gigabit.E...
What two conclusions should be made about this configuration?
Refer to the exhibit. What two conclusions should be made about this configuration? (Choose two)A . The designated port is FastEthernet 2/1B . This is a root bridgeC . The spanning-tree mode is Rapid PVST+D . The spanning-tree mode is PVST+E . The root port is FastEthernet 2/1View AnswerAnswer: C,E
What are two benefits of controller-based networking compared to traditional networking?
What are two benefits of controller-based networking compared to traditional networking?A . controller-based increases network bandwidth usage, while traditional lightens the load on the network.B . controller-based inflates software costs, while traditional decreases individual licensing costsC . Controller-based reduces network configuration complexity, while traditional increases the potential for errorsD ....
What are two benefits of controller-based networking compared to traditional networking?
What are two benefits of controller-based networking compared to traditional networking?A . controller-based increases network bandwidth usage, while traditional lightens the load on the network.B . controller-based inflates software costs, while traditional decreases individual licensing costsC . Controller-based reduces network configuration complexity, while traditional increases the potential for errorsD ....
What is a DHCP client?
What is a DHCP client?A . a host that is configured to request an IP address automaticallyB . a server that dynamically assigns IP addresses to hostsC . a workstation that requests a domain name associated with its IP addressD . a rooter that statically assigns IP addresses to hostsView...
Which implementation provides the strongest encryption combination for the wireless environment?
Which implementation provides the strongest encryption combination for the wireless environment?A . WPA2 + AESB . WPA + AESC . WEPD . WPA + TKIPView AnswerAnswer: A
Which access list must be applied?
Refer to the exhibit. An access list is required to permit traffic from any host on interface G0/0 and deny traffic from interface G/0/1. Which access list must be applied?A . ip access-list standard 99 permit 10.100.100.0 0.0.0.255 deny 192.168.0.0 0.0.255.255B . ip access-list standard 99 permit 10.100.100.0 0.0.0.255 deny...
What does a router do when configured with the default DNS lookup settings, and a URL is entered on the CLI?
What does a router do when configured with the default DNS lookup settings, and a URL is entered on the CLI?A . initiates a ping request to the URLB . prompts the user to specify the desired IP addressC . continuously attempts to resolve the URL until the command is...
Which switch becomes the root of the spanning tree for VLAN 110?
Refer to the exhibit. Which switch becomes the root of the spanning tree for VLAN 110? Switch 1 VLAN 110 C 32778 0018.184e.3c00 Switch 2 VLAN 110 C 24586 001a.e3ff.a680 Switch 3 VLAN 110 C 28682 0022.55cf.cc00 Switch 4 VLAN 110 C 64000 0e38.7363.657fA . Switch 1B . Switch 2C...