Where does the configuration reside when a helper address is configured to support DHCP?

Where does the configuration reside when a helper address is configured to support DHCP?A . on the switch trunk interface.B . on the router closest to the client.C . on the router closest to the server.D . on every router along the path.View AnswerAnswer: B

January 13, 2018No CommentsREAD MORE +

Given the output shown from this Cisco Catalyst 2950, what is the reason that interface FastEthernet 0/10 is not the root port for VLAN 2?

Refer to the exhibit. Given the output shown from this Cisco Catalyst 2950, what is the reason that interface FastEthernet 0/10 is not the root port for VLAN 2?A . This switch has more than one interface connected to the root network segment in VLAN 2.B . This switch is...

January 13, 2018No CommentsREAD MORE +

attack successful?

Recently several employees were victims of a phishing email that appeared to originate from the company president. The email claimed the employees would be disciplined if they did not click on a malicious link in the message. Which of the following principles of social engineering made this attack successful?A ....

January 13, 2018No CommentsREAD MORE +

Which option lists the modes that are available for configuring UDLD on a Cisco switch?

Which option lists the modes that are available for configuring UDLD on a Cisco switch?A . normal and aggressiveB . active and aggressiveC . normal and activeD . normal and passiveE . normal and standbyView AnswerAnswer: A Explanation: The Cisco-proprietary UDLD protocol monitors the physical configuration of the links between...

January 13, 2018No CommentsREAD MORE +

What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?

What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?A . lowest port MAC addressB . port priority number and MAC address.C . VTP revision numberD . highest port priority number.E . path costView AnswerAnswer: E

January 13, 2018No CommentsREAD MORE +

Which CLI command is used to move epsilon to a new node?

Which CLI command is used to move epsilon to a new node?A . storage failover takeoverB . cluster setupC . cluster identity modifyD . cluster modifyView AnswerAnswer: D

January 13, 2018No CommentsREAD MORE +

Which NTP type designates a router without an external reefrence clock as an authoritative time source?

Which NTP type designates a router without an external reefrence clock as an authoritative time source?A . serverB . peerC . masterD . clientView AnswerAnswer: C

January 13, 2018No CommentsREAD MORE +

Which statement is correct in this scenario?

You want to support multiple tenants with duplicate IP addresses for your storage system. Which statement is correct in this scenario?A . You must use different ports on your controller.B . You must create additional VLANs to use multiple tenants.C . You cannot support multiple tenants on your storage system.D...

January 13, 2018No CommentsREAD MORE +

Which GET VPN component maintains security policies?

Which GET VPN component maintains security policies?A . PB . PEC . GDOID . group memberE . key serverF . CEView AnswerAnswer: E

January 13, 2018No CommentsREAD MORE +