Which IPv6 address type provides communication between subnets and cannot route on the Internet?

Which IPv6 address type provides communication between subnets and cannot route on the Internet?A . global unicastB . unique localC . link-localD . multicastView AnswerAnswer: B Explanation: A IPv6 Unique Local Address is an IPv6 address in the block FC00::/7. It is the approximate IPv6 counterpart of the IPv4 private...

February 24, 2022 No Comments READ MORE +

Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)

Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)A . It drops lower-priority packets before it drops higher-priority packets.B . It can identify different flows with a high level of granularity.C . It guarantees the delivery of high-priority packets.D . It can mitigate congestion by...

February 24, 2022 No Comments READ MORE +

What is the primary different between AAA authentication and authorization?

What is the primary different between AAA authentication and authorization?A . Authentication verifies a username and password, and authorization handles the communication between the authentication agent and the user database.B . Authentication identifies a user who is attempting to access a system, and authorization validates the users password.C . Authentication...

February 24, 2022 No Comments READ MORE +

Which password must an engineer use to enter the enable mode?

Refer to the exhibit. Which password must an engineer use to enter the enable mode?A . adminadmin123B . defaultC . testing1234D . cisco123View AnswerAnswer: C Explanation: If neither the enable password command nor the enable secret command is configured, and if there is a line password configured for the console,...

February 24, 2022 No Comments READ MORE +

What is the administrative distance of the route that will be installed in the routing table?

Router A learns the same route from two different neighbors, one of the neighbor routers is an OSPF neighbor and the other is an EIGRP neighbor. What is the administrative distance of the route that will be installed in the routing table?A . 20B . 90C . 110D . 115View...

February 24, 2022 No Comments READ MORE +

What are two characteristics of a controller-based network? (Choose two)

What are two characteristics of a controller-based network? (Choose two)A . The administrator can make configuration updates from the CLC . It uses northbound and southbound APIs to communicate between architectural layers.D . It moves the control plane to a central point.E . It decentralizes the control plane, which allows...

February 24, 2022 No Comments READ MORE +

Which command is used to specify the delay time in seconds for LLDP to initialize on any interface?

Which command is used to specify the delay time in seconds for LLDP to initialize on any interface?A . lldp timerB . lldo holdtimtC . lldp reinitD . lldp tlv-selectView AnswerAnswer: C Explanation: + lldp holdtime seconds: Specify the amount of time a receiving device should hold the information from...

February 24, 2022 No Comments READ MORE +

How does SW2 interact with other switches in this VTP domain?

Refer to Exhibit. How does SW2 interact with other switches in this VTP domain?A . It processes VTP updates from any VTP clients on the network on its access ports.B . It receives updates from all VTP servers and forwards all locally configured VLANs out all trunk ports.C . It...

February 24, 2022 No Comments READ MORE +

If OSPF is running on this network, how does Router 2 handle traffic from Site B to 10.10.13.128/25 at Site A?

Refer to the exhibit. If OSPF is running on this network, how does Router 2 handle traffic from Site B to 10.10.13.128/25 at Site A?A . It sends packets out of interface Fa0/2 only.B . It sends packets out of interface Fa0/1 only.C . It cannot send packets to 10.10.13.128/25.D...

February 24, 2022 No Comments READ MORE +

When a site-to-site VPN is used, which protocol is responsible for the transport of user data?

When a site-to-site VPN is used, which protocol is responsible for the transport of user data?A . IKEv2B . IKEv1C . IPsecD . MD5View AnswerAnswer: C Explanation: A site-to-site VPN allows offices in multiple fixed locations to establish secure connections with each other over a public network such as the...

February 24, 2022 No Comments READ MORE +