Which three circumstances can cause a GRE tunnel to be in an up/down state? (Choose three.)
Which three circumstances can cause a GRE tunnel to be in an up/down state? (Choose three.)A . The tunnel interface IP address is misconfigured.B . The tunnel interface is down.C . A valid route to the destination address is missing from the routing table.D . The tunnel address is routed...
Which component of an Ethernet frame is used to notify a host that traffic is coming?
Which component of an Ethernet frame is used to notify a host that traffic is coming?A . start of frame delimiterB . Type fieldC . Data fieldD . preambleView AnswerAnswer: D
Which command can you enter to display duplicate IP addresses that the DHCP server assigns?
Which command can you enter to display duplicate IP addresses that the DHCP server assigns?A . show ip dhcp conflict 10.0.2.12B . show ip dhcp database 10.0.2.12C . show ip dhcp server statisticsD . show ip dhcp binding 10.0.2.12View AnswerAnswer: A
Which two statements about IGP and EGP routing protocols are true? (Choose two)
Which two statements about IGP and EGP routing protocols are true? (Choose two)A . IGP routing protocols are used within internal networks.B . Service providers use EGP and BGP for intra AS routing.C . EGP routing protocols are used to connect multiple IGP networks.D . Service providers use OSPF and...
Which of the following are benefits of VLANs? (Choose three.)
Which of the following are benefits of VLANs? (Choose three.)A . They increase the size of collision domains.B . They allow logical grouping of users by function.C . They can enhance network security.D . They increase the size of broadcast domains while decreasing the number of collision domains.E . They...
Which statement about RADIUS security is true?
Which statement about RADIUS security is true?A . It supports EAP authentication for connecting to wireless networks.B . It provides encrypted multiprotocol support.C . Device-administration packets are encrypted in their entirety.D . It ensures that user activity is fully anonymous.View AnswerAnswer: A
Which command must you use to test DNS connectivity?
Which command must you use to test DNS connectivity?A . show hostsB . ipeon figC . show interfacesD . telnetView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/m/en_us/techdoc/dc/reference/cli/n5k/commands/showhosts.html
What 8-bit field exists in IP packet for QoS?
What 8-bit field exists in IP packet for QoS?A . Tos FieldB . DSCPC . IP PrecedenceD . CosView AnswerAnswer: A
Which function does traffic shaping perform?
Which function does traffic shaping perform?A . it buffers traffic without queuing itB . it queues traffic without buffering itC . it drops packets to control the output rateD . it buffers and queues excess packetsView AnswerAnswer: D
Which cause of the issue is true?
EIGRP GRE You are implementing EIGRP between the main office and branch offices. In Phase 1, you must implement and verify EIGRP configurations as mentioned in the topology. In Phase 2, your colleague is expected to do NAT and ISP configurations. Identify the issues that you are encountering during Phase...