which IP addresses would be assigned to the interfaces with point-to-point PVCs?
In the Frame Relay network, which IP addresses would be assigned to the interfaces with point-to-point PVCs?A . DLCI 16 192.168.10.1/24 DLCI 17 192.168.10.1/24 DLCI 99 192.168.10.2/24 DLCI 28 192.168.10.3/24B . DLCI 16 192.168.10.1 /24 DLCI 17 192.168.11.1/24 DLCI 99 192.168.12.1/24 DLCI 28 192.168.13.1/24C . DLCI 16 192.168.10.1/24 DLCI 17...
Which version of spanning tree is appropriate to meet the company policy?
To follow the Layer 2 switching guidelines, a network engineer decides to create a separate spanning tree for every group of 10 VLANs. Which version of spanning tree is appropriate to meet the company policy?A . MSTB . PVST+C . RSTPD . RPVST+E . STPView AnswerAnswer: A
Which two deployment options can the administrator choose for these users?
Scenario: A Citrix Administrator needs to deploy a new version of Receiver to 10 users who are onsite as visitors and use personal BYOD laptops that run an older version of Receiver. The users only require a base installation of Receiver with NO customizations; however, they will need to have...
Which common issue causes intermittent DMVPN tunnel flaps?
Which common issue causes intermittent DMVPN tunnel flaps?A . a routing neighbor reachability issueB . a suboptimal routing tableC . interface bandwidth congestionD . that the GRE tunnel to hub router is not encryptedView AnswerAnswer: A Explanation: DMVPN Tunnel Flaps Intermittently Problem DMVPN tunnel flaps intermittently. Solution When DMVPN tunnels...
Which EIGRP feature allows the use of leak maps?
Which EIGRP feature allows the use of leak maps?A . StubB . NeighborC . Offset-listD . Address-familyView AnswerAnswer: A
Which description of a retrospective malware detection is true?
Which description of a retrospective malware detection is true?A . You use Wireshark to identify the malware source.B . You use historical information from one or more sources to identify the affected host or file.C . You use information from a network analyzer to identify the malware source.D . You...
What is the effect of adding the user to the role?
HOTSPOT You have an Office 365 subscription. A user adds an external user to the Team Site Visitors role for a team site. What is the effect of adding the user to the role? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth...
Which one of the following is an objective of Phase A of the TOGAF ADM?
Which one of the following is an objective of Phase A of the TOGAF ADM?A . To allocate the resources needed to implement the architecture projectB . To define the framework that is going to be used to develop the enterprise architectureC . To define an IT Strategy that maps...
Which of the following cables is MOST likely to be terminated into a patch panel?
Which of the following cables is MOST likely to be terminated into a patch panel?A . SerialB . RG-6C . RG-59D . CAT6View AnswerAnswer: D
Which two statements are true about inter VLAN routing in the topology that is shown in the exhibit?
Refer to the exhibit. Which two statements are true about inter VLAN routing in the topology that is shown in the exhibit? (Choose two.)A . Host E and host F use the same IP gateway address.B . Router1 and Switch2 should be connected via a crossover cable.C . Router1 will...