Which two QoS tools are used to guarantee minimum bandwidth to certain traffic? (Choose two)

Which two QoS tools are used to guarantee minimum bandwidth to certain traffic? (Choose two)A . FIFOB . CBWFQC . LLCD . WFQE . RSVPView AnswerAnswer: B D

September 23, 2021 No Comments READ MORE +

On workstations running Microsoft Windows, which protocol provides the default gateway for the device?

On workstations running Microsoft Windows, which protocol provides the default gateway for the device?A . STPB . DNSC . SNMPD . DHCPView AnswerAnswer: D

September 23, 2021 No Comments READ MORE +

Which two QoS tools provides congestion management? (Choose two)

Which two QoS tools provides congestion management? (Choose two)A . FRTSB . CARC . PQD . PBRE . CBWFQView AnswerAnswer: C E

September 23, 2021 No Comments READ MORE +

Router R4 is dynamically learning the path to the server. If R4 is connected to R1 via OSPF Area 20, to R2 via R2 BGP, and to R3 via EIGRP 777, which path is installed in the routing table of R4?

Refer to the exhibit. Router R4 is dynamically learning the path to the server. If R4 is connected to R1 via OSPF Area 20, to R2 via R2 BGP, and to R3 via EIGRP 777, which path is installed in the routing table of R4?A . the path through R2,...

September 22, 2021 No Comments READ MORE +

An engineer needs to add an old switch back into a network. To prevent the switch from corrupting the VLAN database which action must be taken?

An engineer needs to add an old switch back into a network. To prevent the switch from corrupting the VLAN database which action must be taken?A . Add the switch in the VTP domain with a lower revision numberB . Add the switch in the VTP domain with a higher...

September 22, 2021 No Comments READ MORE +

Which protocol does an access point use to draw power from a connected switch?

Which protocol does an access point use to draw power from a connected switch?A . Internet Group Management ProtocolB . Cisco Discovery ProtocolC . Adaptive Wireless Path ProtocolD . Neighbor Discovery ProtocolView AnswerAnswer: B

September 22, 2021 No Comments READ MORE +

Which access layer threat-mitigation technique provides security based on identity?

Which access layer threat-mitigation technique provides security based on identity?A . using a non-default native VLANB . Dynamic ARP InspectionC . DHCP snoopingD . 802.1xView AnswerAnswer: D

September 22, 2021 No Comments READ MORE +

Which command set meets the requirement?

Refer to the exhibit. An administrator must turn off the Cisco Discovery Protocol on the port configured with last usable address in the 10.0.0.0/30 subnet. Which command set meets the requirement?A . interface gi0/1 no cdp enableB . interface gi0/1 clear cdp tableC . interface gi0/0 no cdp runD ....

September 22, 2021 No Comments READ MORE +

Which command must be executed for Gi1/1 on SW1 to become a trunk port if Gi1/1 on SW2 is configured in desirable or trunk mode?

Refer to the exhibit. Which command must be executed for Gi1/1 on SW1 to become a trunk port if Gi1/1 on SW2 is configured in desirable or trunk mode?A . switchport mode trunkB . switchport mode dot1-tunnelC . switchport mode dynamic autoD . switchport mode dynamic desirableView AnswerAnswer: D

September 22, 2021 No Comments READ MORE +

What are network endpoints?

What are network endpoints?A . a threat to the network if they are compromisedB . support inter-VLAN connectivityC . act as routers to connect a user to the service prowler networkD . enforce policies for campus-wide traffic going to the internetView AnswerAnswer: A

September 22, 2021 No Comments READ MORE +