Which statements are true about EIGRP successor routes? (Choose two.)
Which statements are true about EIGRP successor routes? (Choose two.)A . A successor route is used by EIGRP to forward traffic to a destination.B . Successor routes are saved in the topology table to be used if the primary route fails.C . Successor routes are flagged as 'active' in the...
Which option is the benefit of implementing an intelligent DNS for a cloud computing solution?
Which option is the benefit of implementing an intelligent DNS for a cloud computing solution?A . It reduces the need for a backup data center.B . It can redirect user requests to locations that are using fewer network resources.C . It enables the ISP to maintain DNS records automatically.D ....
What OSPF command, when configured, will include all interfaces into area 0?
What OSPF command, when configured, will include all interfaces into area 0?A . network 0.0.0.0 255.255.255.255 area 0B . network 0.0.0.0 0.0.0.0 area 0C . network 255.255.255.255 0.0.0.0 area 0D . network all-interfaces area 0View AnswerAnswer: A Explanation: Example 3-1 displays OSPF with a process ID of 1 and places...
Which version of SNMP first allowed user-based access?
Which version of SNMP first allowed user-based access?A . SNMPv3 with RBACB . SNMPv3C . SNMPv1D . SNMPv2View AnswerAnswer: B
Which feature does PPP use to encapsulate multiple protocols?
Which feature does PPP use to encapsulate multiple protocols?A . NCPB . LCPC . IPCPD . IPXPView AnswerAnswer: A Explanation: PPP permits multiple network layer protocols to operate on the same communication link. For every network layer protocol used, a separate Network Control Protocol (NCP) is provided in order to...
What occurs on a Frame Relay network when the CIR is exceeded?
What occurs on a Frame Relay network when the CIR is exceeded?A . All TCP traffic is marked discard eligible.B . All UDP traffic is marked discard eligible and a BECN is sent.C . All TCP traffic is marked discard eligible and a BECN is sent.D . All traffic exceeding...
Which feature can you use to monitor traffic on a switch by replicating it to another port or ports on the same switch?
Which feature can you use to monitor traffic on a switch by replicating it to another port or ports on the same switch?A . copy run startB . tracerouteC . the ICMP Echo IP SLAD . SPANView AnswerAnswer: D Explanation: A source port, also called a monitored port, is a...
Which of these correctly describes the results of port security violation of an unknown packet?
Refer to the exhibit. Which of these correctly describes the results of port security violation of an unknown packet?A . port enabled; unknown packets dropped; no SNMP or syslog messagesB . port enabled; unknown packets dropped; SNMP or syslog messagesC . port disabled; no SNMP or syslog messagesD . port...
Which two are advantages of static routing when compared to dynamic routing? (Choose two.)
Which two are advantages of static routing when compared to dynamic routing? (Choose two.)A . Configuration complexity decreases as network size increases.B . Security increases because only the network administrator may change the routing table.C . Route summarization is computed automatically by the router.D . Routing tables adapt automatically to...
Which three of these statements regarding 802.1Q trunking are correct? (Choose three.)
Which three of these statements regarding 802.1Q trunking are correct? (Choose three.)A . 802.1Q native VLAN frames are untagged by default.B . 802.1Q trunking ports can also be secure ports.C . 802.1Q trunks can use 10 Mb/s Ethernet interfaces.D . 802.1Q trunks require full-duplex, point-to-point connectivity.E . 802.1Q trunks should...