When PC-A sends traffic to PC-B, which network component is in charge of receiving the packet from PC-A verifying the IP addresses, and forwarding the packet to PC-B?

Refer to the exhibit. When PC-A sends traffic to PC-B, which network component is in charge of receiving the packet from PC-A verifying the IP addresses, and forwarding the packet to PC-B?A . Layer 2 switch B. Router C. Load balancer D. firewallView AnswerAnswer: B Explanation: PC--A and PC-B are...

November 17, 2022 No Comments READ MORE +

What is the difference regarding reliability and communication type between TCP and UDP?

What is the difference regarding reliability and communication type between TCP and UDP?A . TCP is reliable and is a connection-oriented protocol UDP is not reliable and is a connectionless protocol B. TCP is not reliable and is a connection-oriented protocol; UDP is reliable and is a connectionless protocol C....

November 17, 2022 No Comments READ MORE +

Which action does the router take as it forwards a packet through the network?

Which action does the router take as it forwards a packet through the network?A . The router replaces the original source and destination MAC addresses with the sending router MAC address as the source and neighbor MAC address as the destination B. The router encapsulates the original packet and then...

November 17, 2022 No Comments READ MORE +

Which implementation provides the strongest encryption combination for the wireless environment?

Which implementation provides the strongest encryption combination for the wireless environment?A . WPA2 + AES B. WPA + AES C. WEP D. WPA + TKIPView AnswerAnswer: A

November 17, 2022 No Comments READ MORE +

What commands are needed to add a subinterface to Ethernet0/0 on R1 to allow for VLAN 20, with IP address 10.20.20.1/24?

Refer to the exhibit. What commands are needed to add a subinterface to Ethernet0/0 on R1 to allow for VLAN 20, with IP address 10.20.20.1/24?A . R1(config)#interface ethernet0/0 R1(config)#encapsulation dot1q 20 R1(config)#ip address 10.20.20.1 255.255.255.0 B. R1(config)#interface ethernet0/0.20 R1(config)#encapsulation dot1q 20 R1(config)#ip address 10.20.20.1 255.255.255.0 C. R1(config)#interface ethernet0/0.20 R1(config)#ip address...

November 17, 2022 No Comments READ MORE +

Which two capacities of Cisco DNA Center make it more extensible? (Choose two)

Which two capacities of Cisco DNA Center make it more extensible? (Choose two)A . adapters that support all families of Cisco IOS softwareB . SDKs that support interaction with third-party network equipmentC . customized versions for small, medium, and large enterprisesD . REST APIs that allow for external applications to...

May 4, 2022 No Comments READ MORE +

Which statement identifies the functionality of virtual machines?

Which statement identifies the functionality of virtual machines?A . Virtualized servers run most efficiently when they are physically connected to a switch that is separate from the hypervisor.B . The hypervisor can virtualize physical components including CPU, memory, and storage.C . Each hypervisor can support a single virtual machine and...

May 4, 2022 No Comments READ MORE +

Which design element is a best practice when deploying an 802.11b wireless infrastructure?

Which design element is a best practice when deploying an 802.11b wireless infrastructure?A . disabling TPC so that access points can negotiate signal levels with their attached wireless devicesB . setting the maximum data rate to 54 Mbps on the Cisco Wireless LAN ControllerC . allocating nonoverlapping channels to access...

May 4, 2022 No Comments READ MORE +

Which type of security program is in place?

An email user has been lured into clicking a link in an email sent by their company’s security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?A . Physical access controlB . Social...

May 4, 2022 No Comments READ MORE +

Which set of action satisfy the requirement for multi-factor authentication?

Which set of action satisfy the requirement for multi-factor authentication?A . The user swipes a key fob, then clicks through an email link.B . The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device.C . The user enters a...

May 4, 2022 No Comments READ MORE +