If the native VLAN on a trunk is different on each end of the link, what is a potential consequence?
If the native VLAN on a trunk is different on each end of the link, what is a potential consequence?A . The interface on both switches may shut downB . STP loops may occurC . The switch with the higher native VLAN may shut downD . The interface with the...
Which route or routes will the router install in the routing table?
A router has learned three possible routes that could be used to reach a destination network. One route is from EIGRP and has a composite metric of 20514560. Another route is from OSPF with a metric of 782. The last is from RIPv2 and has a metric of 4. Which...
What should you do?
Your network contains an Active Directory forest. The forest contains two domains named litwarenc.com and contoso.com. The contoso.com domain contains two domains controllers named LON-DC01 and LON-DC02. The domain controllers are located in a site named London that is associated to a subnet of 192.168.10.0/24 You discover that LON-DC02 is...
Which of the following should the technician do FIRST to reconnect the server to the network?
After a server outage, a technician discovers that a physically damaged fiber cable appears to be the problem. After replacing the cable, the server will still not connect to the network. Upon inspecting the cable at the server end, the technician discovers light can be seen through one of the...
Which two statements about Cisco VCS Addressing Zones are true? (Choose two.)
Which two statements about Cisco VCS Addressing Zones are true? (Choose two.)A . They can be local to the Cisco VCS or can be remote.B . A zone is a collection of endpoints that share the same dialing behavior and bandwidth settings.C . They consist of traversal and nontraversal zones.D...
What should you do?
HOTSPOT You are developing an HTML5 web application for displaying encyclopedia entries. Each encyclopedia entry has an associated image that is referred to in the entry. You need to display the image by using the correct semantic markup. What should you do? (To answer, select the appropriate options from the...
Which three actions should you perform in sequence?
DRAG DROP You administer desktop computers that run Windows 8 Enterprise and are members of an Active Directory domain. A new security policy states that all traffic between computers in the research department must be encrypted and authenticated by using Kerberos V5. You need to configure the requested traffic authentication...
What should you identify?
Your network contains a perimeter network and an internal network. The internal network contains an Active Directory Federation Services (AD FS) 2.1 infrastructure. The infrastructure uses Active Directory as the attribute store. You plan to deploy a federation server proxy to a server named Server2 in the perimeter network. You...
What should you configure?
Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is configured as shown in the following table. You plan to schedule a complete backup of Server1 by...
Which two statements describe overlay functionality in the Cisco ACI? (Choose two.)
Which two statements describe overlay functionality in the Cisco ACI? (Choose two.)A . Forwarding is not limited to or constrained by the encapsulation type or encapsulation network.B . Forwarding is limited to and constrained by the encapsulation type of encapsulation network.C . External identifiers are not local to the leaf...