How is 802.11 traffic handled in a fabric-enabled SSID?
How is 802.11 traffic handled in a fabric-enabled SSID?A . centrally switched back to WLC where the user traffic is mapped to a VXLAN on the WLC B. converted by the AP into 802.3 and encapsulated into VXLAN C. centrally switched back to WLC where the user traffic is mapped...
Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplish task?
Refer to the exhibit. An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as the exit point. Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplish task?A . R4(config-router)bgp...
How does EIGRP differ from OSPF?
How does EIGRP differ from OSPF?A . EIGRP is more prone to routing loops than OSPF B. EIGRP supports equal or unequal path cost, and OSPF supports only equal path cost. C. EIGRP has a full map of the topology, and OSPF only knows directly connected neighbors D. EIGRP uses...
Which outbound access list, applied to the WAN interface of a router, permits all traffic except for http traffic sourced from the workstation with IP address 10.10.10.1?
Which outbound access list, applied to the WAN interface of a router, permits all traffic except for http traffic sourced from the workstation with IP address 10.10.10.1?A . ip access-list extended 200 deny tcp host 10.10.10.1 eq 80 any permit ip any any B. ip access-list extended 10 deny tcp...
Which two network problems Indicate a need to implement QoS in a campus network? (Choose two.)
Which two network problems Indicate a need to implement QoS in a campus network? (Choose two.)A . port flapping B. excess jitter C. misrouted network packets D. duplicate IP addresses E. bandwidth-related packet lossView AnswerAnswer: B,E
Which action resolves this issue?
Refer to the exhibit. An engineer attempts to create a configuration to allow the Blue VRF to leak into the global routing table, but the configuration does not function as expected. Which action resolves this issue?A . Change the access-list destination mask to a wildcard. B. Change the source network...
Which two components are supported by LISP? (Choose two.)
Which two components are supported by LISP? (Choose two.)A . Proxy ETR B. egress tunnel router C. route reflector D. HMAC algorithm E. spokeView AnswerAnswer: A,B
Which AP mode allows an engineer to scan configured channels for rogue access points?
Which AP mode allows an engineer to scan configured channels for rogue access points?A . sniffer B. monitor C. bridge D. localView AnswerAnswer: B
After a redundant route processor failure occurs on a Layer 3 device, which mechanism allows for packets to be forwarded from a neighboring router based on the most recent tables?
After a redundant route processor failure occurs on a Layer 3 device, which mechanism allows for packets to be forwarded from a neighboring router based on the most recent tables?A . BFD B. RPVST+ C. RP failover D. NSFView AnswerAnswer: D
When is an external antenna used inside a building?
When is an external antenna used inside a building?A . only when using Mobility Express B. when it provides the required coverage C. only when using 2 4 GHz D. only when using 5 GHzView AnswerAnswer: B