Which type of device can be replaced by the use of subinterfaces for VLAN routing?
Which type of device can be replaced by the use of subinterfaces for VLAN routing?A . Layer 2 bridgeB . Layer 2 switchC . Layer 3 switchD . routerView AnswerAnswer: C
What field is consist of 6 bytes in the field identification frame in IEEE 802.1Q?
What field is consist of 6 bytes in the field identification frame in IEEE 802.1Q?A . SAB . DAC . FCSView AnswerAnswer: A
Which statement about unicast frame forwarding on a switch is true?
Which statement about unicast frame forwarding on a switch is true?A . The TCAM table stores destination MAC addressesB . If the destination MAC address is unknown, the frame is flooded to every port that is configured in the same VLAN except on the port that it was received on.C...
Which two statements about VTP are true? (Choose two.)
Which two statements about VTP are true? (Choose two.)A . All switches must be configured with the same VTP domain nameB . All switches must be configured to perform trunk negotiation.C . All switches must be configured with a unique VTP domain nameD . The VTP server must have the...
Which three of these show the correct RSTP port roles for the indicated switches and interfaces?
Refer to the exhibit. Each of these four switches has been configured with a hostname, as well as being configured to run RSTP. No other configuration changes have been made. Which three of these show the correct RSTP port roles for the indicated switches and interfaces? (Choose three.)A . SwitchA,...
Which three options are benefits of using TACACS+ on a device? (Choose three)
Which three options are benefits of using TACACS+ on a device? (Choose three)A . It ensures that user activity is untraceableB . It provides a secure accounting facility on the device.C . device-administration packets are encrypted in their entirely.D . It allows the user to remotely access devices from other...
Which user-mode password has just been set?
Refer to the exhibit. Which user-mode password has just been set?A . TelnetB . AuxiliaryC . SSHD . ConsoleView AnswerAnswer: A
Which two types of information are held in the MAC address table? (Choose two)
Which two types of information are held in the MAC address table? (Choose two)A . MAC addressB . soure IP addressC . destination IP addressD . ProtocolsE . Port numbersView AnswerAnswer: AE
Which value must the device send as its username when using CHAP to authenticate with the remote peer site id:17604704 over a PPP link?
Which value must the device send as its username when using CHAP to authenticate with the remote peer site id:17604704 over a PPP link?A . The automatically generated user nameB . The local host nameC . The user name defined by the administratorD . The host name of the remote...
which IP configuration does the CIDR notation 192.168.1.1/25 refer?
which IP configuration does the CIDR notation 192.168.1.1/25 refer?A . 192.168.1.1 255.255.255.64B . 192.168.1.1 255.255.255.1C . 192.168.1.1 255.255.255.32D . 192.168.1.1 255.255.255.128E . 192.168.1.1 255.255.255.256View AnswerAnswer: D