What set of commands will properly configure the Core router?
Refer to the exhibit. The network associate is configuring OSPF on the Core router. All the connections to the branches should be participating in OSPF. The link to the ISP should NOT participate in OSPF and should only be advertised as the default route. What set of commands will properly...
Which protocol supports sharing the VLAN configuration between two or more switches?
Which protocol supports sharing the VLAN configuration between two or more switches?A . multicastB . STPC . VTPD . split-horizonView AnswerAnswer: C Explanation: “VTP allows a network manager to configure a switch so that it will propagate VLAN configurations to other switches in the network” VTP minimizes misconfigurations and configuration...
Which two statistics appear in show frame-relay map output? (Choose two.)
Which two statistics appear in show frame-relay map output? (Choose two.)A . the number of BECN packets that are received by the routerB . the value of the local DLCIC . the number of FECN packets that are received by the routerD . the status of the PVC that is...
What command is used to verify the DLCI destination address in a Frame Relay static configuration?
What command is used to verify the DLCI destination address in a Frame Relay static configuration?A . show frame-relay pvcB . show frame-relay lmiC . show frame-relay mapD . show frame relay end-to-endView AnswerAnswer: C Explanation: Cisco Frame Relay Configurations http://www.ciscopress.com/articles/article.asp?p=170741&seqNum=9 show frame-relay map The show frame-relay map privileged EXEC...
Which of the following are required to solve this?
It has become necessary to configure an existing serial interface to accept a second Frame Relay virtual circuit. Which of the following are required to solve this? (Choose three)A . configure static frame relay map entries for each subinterface network.B . remove the ip address from the physical interfaceC ....
Which two statements about the OSPF Router ID are true? (Choose two.)
Which two statements about the OSPF Router ID are true? (Choose two.) A. It identifies the source of a Type 1 LSA. B. It should be the same on all routers in an OSPF routing instance. C. By default, the lowest IP address on the router becomes the OSPF Router...
Which Layer 2 protocol encapsulation type supports synchronous and asynchronous circuits and has built-in security mechanisms?
Which Layer 2 protocol encapsulation type supports synchronous and asynchronous circuits and has built-in security mechanisms?A . HDLCB . PPPD . 25E . Frame RelayView AnswerAnswer: B Explanation: High-Level Data Link Control (HDLC) - HDLC is the default encapsulation type on point-to-point, dedicated links, and circuit-switched connections. It is used...
What is a valid HSRP virtual MAC address?
What is a valid HSRP virtual MAC address?A . 0000.5E00.01A3B . 0007.B400.AE01C . 0000.0C07.AC15D . 0007.5E00.B301View AnswerAnswer: C Explanation: Hot Standby Router Protocol Features and Functionality http://www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a0080094a91.shtml HSRP Addressing In most cases when you configure routers to be part of an HSRP group, they listen for the HSRP MAC address...
Given the output shown from this Cisco Catalyst 2950, what is the reason that interface FastEthernet 0/10 is not the root port for VLAN 2?
Refer to the exhibit. Given the output shown from this Cisco Catalyst 2950, what is the reason that interface FastEthernet 0/10 is not the root port for VLAN 2?A . This switch has more than one interface connected to the root network segment in VLAN 2.B . This switch is...
Which protocol is an open standard protocol framework that is commonly used in VPNs, to provide secure end-to-end communications?
Which protocol is an open standard protocol framework that is commonly used in VPNs, to provide secure end-to-end communications?A . RSAB . L2TPC . IPsecD . PPTPView AnswerAnswer: C Explanation: Internet Protocol Security (IPsec) is a technology protocol suite for securing Internet Protocol (IP) communications by authenticating and/or encrypting each...