According to the command output also shown in the exhibit, how will SwitchA handle this frame?
Refer to the exhibit. SwitchA receives the frame with the addressing shown in the exhibit. According to the command output also shown in the exhibit, how will SwitchA handle this frame?A . It will drop the frame.B . It will forward the frame out port Fa0/6 only.C . It will...
On a Cisco switch, which protocol determines if an attached VoIP phone is from Cisco or from another vendor?
On a Cisco switch, which protocol determines if an attached VoIP phone is from Cisco or from another vendor?A . RTPB . TCPC . CDPD . UDPView AnswerAnswer: C Explanation: The Cisco Unified IP Phone uses CDP to communicate information such as auxiliary VLAN ID, per port power management details,...
Which IOS command is used to initiate a login into a VTY port on a remote router?
Which IOS command is used to initiate a login into a VTY port on a remote router?A . router# loginB . router# telnetC . router# traceD . router# pingE . router(config)# line vty 0 5F . router(config-line)# loginView AnswerAnswer: B Explanation: VTY ports are telnet ports hence command B will...
Which address could be assigned to the FastEthernet interface on RouterA?
Refer to the exhibit. The internetwork is using subnets of the address 192.168.1.0 with a subnet mask of 255.255.255.224. The routing protocol in use is RIP version 1. Which address could be assigned to the FastEthernet interface on RouterA?A . 192.168.1.31B . 192.168.1.64C . 192.168.1.127D . 192.168.1.190E . 192.168.1.192View AnswerAnswer:...
What two operations will the switch perform when it receives this frame?
Refer to the exhibit. The MAC address table is shown in its entirety. The Ethernet frame that is shown arrives at the switch. What two operations will the switch perform when it receives this frame? (Choose two.)A . The switch will not forward a frame with this destination MAC address.B...
What should be part of a comprehensive network security plan?
What should be part of a comprehensive network security plan?A . Allow users to develop their own approach to network security.B . Physically secure network equipment from potential access by unauthorized individuals.C . Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten.D...
What should be part of a comprehensive network security plan?
What should be part of a comprehensive network security plan?A . Allow users to develop their own approach to network security.B . Physically secure network equipment from potential access by unauthorized individuals.C . Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten.D...
Which two statements describe characteristics of IPv6 unicast addressing? (Choose two.)
Which two statements describe characteristics of IPv6 unicast addressing? (Choose two.)A . Global addresses start with 2000::/3.B . Link-local addresses start with FE00:/12.C . Link-local addresses start with FF00::/10.D . There is only one loopback address and it is ::1.E . If a global address is assigned to an interface,...
Which statement about IPv6 is true?
Which statement about IPv6 is true?A . Addresses are not hierarchical and are assigned at random.B . Only one IPv6 address can exist on a given interface.C . There are 2.7 billion addresses available.D . Broadcasts have been eliminated and replaced with multicasts.View AnswerAnswer: D Explanation: http://technet.microsoft.com/en-us/library/cc757359(v=ws.10).aspx IPv6 has three...
Which command, issued from router RTA, would be the most useful for troubleshooting this problem?
Refer to the exhibit. A person is trying to send a file from a host on Network A of the JAX Company to a server on Network Z of the XYZ Company. The file transfer fails. The host on Network A can communicate with other hosts on Network A. Which...