- All Exams Instant Download
Where does the configuration reside when a helper address is configured to support DHCP?
Where does the configuration reside when a helper address is configured to support DHCP?A . on the switch trunk interface.B . on the router closest to the client.C . on the router closest to the server.D . on every router along the path.View AnswerAnswer: B
Given the output shown from this Cisco Catalyst 2950, what is the reason that interface FastEthernet 0/10 is not the root port for VLAN 2?
Refer to the exhibit. Given the output shown from this Cisco Catalyst 2950, what is the reason that interface FastEthernet 0/10 is not the root port for VLAN 2?A . This switch has more than one interface connected to the root network segment in VLAN 2.B . This switch is...
attack successful?
Recently several employees were victims of a phishing email that appeared to originate from the company president. The email claimed the employees would be disciplined if they did not click on a malicious link in the message. Which of the following principles of social engineering made this attack successful?A ....
Which option lists the modes that are available for configuring UDLD on a Cisco switch?
Which option lists the modes that are available for configuring UDLD on a Cisco switch?A . normal and aggressiveB . active and aggressiveC . normal and activeD . normal and passiveE . normal and standbyView AnswerAnswer: A Explanation: The Cisco-proprietary UDLD protocol monitors the physical configuration of the links between...
What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?
What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?A . lowest port MAC addressB . port priority number and MAC address.C . VTP revision numberD . highest port priority number.E . path costView AnswerAnswer: E
Which CLI command is used to move epsilon to a new node?
Which CLI command is used to move epsilon to a new node?A . storage failover takeoverB . cluster setupC . cluster identity modifyD . cluster modifyView AnswerAnswer: D
Which NTP type designates a router without an external reefrence clock as an authoritative time source?
Which NTP type designates a router without an external reefrence clock as an authoritative time source?A . serverB . peerC . masterD . clientView AnswerAnswer: C
Which statement is correct in this scenario?
You want to support multiple tenants with duplicate IP addresses for your storage system. Which statement is correct in this scenario?A . You must use different ports on your controller.B . You must create additional VLANs to use multiple tenants.C . You cannot support multiple tenants on your storage system.D...
Is this partner potentially violating the law and Avaya's anti-bribery policy?
Avaya set up a branch in South Asia's emerging markets. The company recruited partners engaged in promoting government markets and selling products and services. During the contact process, the partners gave the two government officials $230 USD each. Although these amounts did not guarantee government projects, they establish a relationship...
Which GET VPN component maintains security policies?
Which GET VPN component maintains security policies?A . PB . PEC . GDOID . group memberE . key serverF . CEView AnswerAnswer: E