How does SW2 interact with other switches in this VTP domain?

Refer to Exhibit. How does SW2 interact with other switches in this VTP domain?A . It processes VTP updates from any VTP clients on the network on its access ports.B . It receives updates from all VTP servers and forwards all locally configured VLANs out all trunk ports.C . It...

May 3, 2022 No Comments READ MORE +

In Which way does a spine-and-leaf architecture allow for scalability in a network when additional access ports are required?

In Which way does a spine-and-leaf architecture allow for scalability in a network when additional access ports are required?A . A spine switch and a leaf switch can be added with redundant connections between them.B . A spine switch can be added with at least 40 GB uplinks.C . A...

May 3, 2022 No Comments READ MORE +

Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)

Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)A . It drops lower-priority packets before it drops higher-priority packets.B . It can identify different flows with a high level of granularity.C . It guarantees the delivery of high-priority packets.D . It can mitigate congestion by...

May 3, 2022 No Comments READ MORE +

Which mode must be used to configure EtherChannel between two switches without using a negotiation protocol?

Which mode must be used to configure EtherChannel between two switches without using a negotiation protocol?A . onB . autoC . activeD . desirableView AnswerAnswer: A Explanation: The Static Persistence (or “on” mode) bundles the links unconditionally and no negotiation protocol is used. In this mode, neither PAgP nor LACP...

May 2, 2022 No Comments READ MORE +

Which configuration is needed to generate an RSA key for SSH on a router?

Which configuration is needed to generate an RSA key for SSH on a router?A . Configure the version of SSC . Configure VTY access.D . Create a user with a password.E . Assign a DNS domain name.View AnswerAnswer: D Explanation: In order to generate an RSA key for SSH, we...

May 2, 2022 No Comments READ MORE +

Which state verifies the designated router is in the proper mode?

An engineer configured an OSPF neighbor as a designated router. Which state verifies the designated router is in the proper mode?A . ExchangeB . 2-wayC . FullD . InitView AnswerAnswer: C

May 2, 2022 No Comments READ MORE +

Which type of route does R1 use to reach host 10.10.13.10/32?

Refer to the exhibit. Which type of route does R1 use to reach host 10.10.13.10/32?A . floating static routeB . host routeC . default routeD . network routeView AnswerAnswer: D Explanation: From the output, we see R1 will use the entry "O 10.10.13.0/25 [110/4576] via 10.10.10.1, ..." to reach host...

May 2, 2022 No Comments READ MORE +

What does router R1 use as its OSPF router-ID?

Refer to the exhibit. What does router R1 use as its OSPF router-ID?A . 10.10.1.10B . 10.10.10.20C . 172.16.15.10D . 192.168.0.1View AnswerAnswer: C Explanation: OSPF uses the following criteria to select the router ID:

May 1, 2022 No Comments READ MORE +

Which action do the switches take on the trunk link?

Refer to Exhibit. Which action do the switches take on the trunk link?A . The trunk does not form and the ports go into an err-disabled status.B . The trunk forms but the mismatched native VLANs are merged into a single broadcast domain.C . The trunk does not form, but...

May 1, 2022 No Comments READ MORE +

What are two characteristics of a controller-based network? (Choose two)

What are two characteristics of a controller-based network? (Choose two)A . The administrator can make configuration updates from the CLC . It uses northbound and southbound APIs to communicate between architectural layers.D . It moves the control plane to a central point.E . It decentralizes the control plane, which allows...

May 1, 2022 No Comments READ MORE +