What is a cause for this issue?
An access switch has been configured with an EtherChannel port. After configuring SPAN to monitor this port, the network administrator notices that not all traffic is being replicated to the management server. What is a cause for this issue?A . VLAN filters are required to ensure traffic mirrors effectively.B ....
A question about UDLD. It shows a picture of 7 times and UDLD is set to aggressive mode. The port is set to shutdown error-disabled.
A question about UDLD. It shows a picture of 7 times and UDLD is set to aggressive mode. The port is set to shutdown error-disabled.A . The port is set to shutdown because UDLD is set to aggressive mode.B . The port is set to shutdown because STC . ..View...
Which layer in the OSI model is responsible for translating frames into bits?
Which layer in the OSI model is responsible for translating frames into bits?A . Application LayerB . Presentation LayerC . Data Link LayerD . Physical LayerView AnswerAnswer: C
For what two purposes does the Ethernet protocol use physical addresses? (Choose two.)
For what two purposes does the Ethernet protocol use physical addresses? (Choose two.)A . to uniquely identify devices at Layer 2B . to allow communication with devices on a different networkC . to differentiate a Layer 2 frame from a Layer 3 packetD . to establish a priority system to...
Which of the following connector types would Sandy, a network technician, use to connect a serial cable?
Which of the following connector types would Sandy, a network technician, use to connect a serial cable?A . RJ-11B . BNCC . LCD . DB-9View AnswerAnswer: D
Which of the following protocols is used to securely connect to a multi-layer switch?
Which of the following protocols is used to securely connect to a multi-layer switch?A . HTTPB . SMTPC . SSHD . TelnetView AnswerAnswer: C
S9703 switches support dual master.
S9703 switches support dual master.A . TRUEB . FALSEView AnswerAnswer: A
Where does a switch maintain DHCP snooping information?
Where does a switch maintain DHCP snooping information?A . in the MAC address tableB . in the CAM tableC . in the DHCP binding databaseD . in the VLAN databaseView AnswerAnswer: C
Which 802.1x mode allows these actions?
A security administrator wants to profile endpoints and gain visibility into attempted authentications. Which 802.1x mode allows these actions?A . Monitor modeB . High-Security modeC . Low-impact modeD . Closed modeView AnswerAnswer: A
Drag the Network virtualization technology on the left to the correct definition on the right
DRAG DROP Drag the Network virtualization technology on the left to the correct definition on the right. View AnswerAnswer: