Which two methods are used to reduce the AP coverage area? (Choose two)

Which two methods are used to reduce the AP coverage area? (Choose two)A . Reduce AP transmit powerB . Increase minimum mandatory data rateC . Reduce channel width from 40 MHz to 20 MHzD . Enable FastlaneE . Disable 2.4 GHz and use only 5 GHzView AnswerAnswer: A B

December 2, 2021 No Comments READ MORE +

What is the calculation that is used to measure the radiated power of a signal after it has gone through the radio, antenna cable, and antenna?

What is the calculation that is used to measure the radiated power of a signal after it has gone through the radio, antenna cable, and antenna?A . dBiB . mWC . dBmD . EIRPView AnswerAnswer: D

December 1, 2021 No Comments READ MORE +

Which configuration must be applied to R1 to enable R1 to reach the server at 172.16.0.1?

Refer to the exhibit. Which configuration must be applied to R1 to enable R1 to reach the server at 172.16.0.1? A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: B

December 1, 2021 No Comments READ MORE +

A customer has completed the installation of a Wi-Fi 6 greenfield deployment at their new campus. They want to leverage Wi-Fi 6 enhanced speeds on the trusted employee WLAN. To configure the employee WLAN, which two Layer 2 security policies should be used? (Choose two)

A customer has completed the installation of a Wi-Fi 6 greenfield deployment at their new campus. They want to leverage Wi-Fi 6 enhanced speeds on the trusted employee WLAN. To configure the employee WLAN, which two Layer 2 security policies should be used? (Choose two)A . WPA (AES)B . WPA2...

December 1, 2021 No Comments READ MORE +

What happens to access interfaces where VLAN 222 is assigned?

Refer to the exhibit. What happens to access interfaces where VLAN 222 is assigned?A . They are placed into an inactive stateB . A description “RSPAN” is addedC . STP BPDU guard is enabledD . They cannot provide PoEView AnswerAnswer: A

December 1, 2021 No Comments READ MORE +

What is a characteristic of MACsec?

What is a characteristic of MACsec?A . 802.1AE provides encryption and authentication servicesB . 802.1AE is built between the host and switch using the MKA protocol, which negotiates encryption keys based on the master session key from a successful 802.1X sessionC . 802.1AE is built between the host and switch...

December 1, 2021 No Comments READ MORE +

How does EIGRP differ from OSPF?

How does EIGRP differ from OSPF?A . EIGRP is more prone to routing loops than OSPFB . EIGRP supports equal or unequal path cost, and OSPF supports only equal path cost.C . EIGRP has a full map of the topology, and OSPF only knows directly connected neighborsD . EIGRP uses...

December 1, 2021 No Comments READ MORE +

Drag and drop the solutions that comprise Cisco Cyber Threat Defense from the left onto the objectives they accomplish on the right.

Drag and drop the solutions that comprise Cisco Cyber Threat Defense from the left onto the objectives they accomplish on the right. View AnswerAnswer:

December 1, 2021 No Comments READ MORE +

Which two southbound interfaces originate from Cisco DNA Center and terminate at fabric underlay switches? (Choose two)

Which two southbound interfaces originate from Cisco DNA Center and terminate at fabric underlay switches? (Choose two)A . UDP 67: DHCPB . ICMP: DiscoveryC . TCP 23: TelnetD . UDP 162: SNMPE . UDP 6007: NetFlowView AnswerAnswer: B D

December 1, 2021 No Comments READ MORE +

What is the recommended MTU size for a Cisco SD-Access Fabric?

What is the recommended MTU size for a Cisco SD-Access Fabric?A . 4464B . 9100C . 1500D . 17914View AnswerAnswer: B

December 1, 2021 No Comments READ MORE +