Which type of device can be replaced by the use of subinterfaces for VLAN routing?

Which type of device can be replaced by the use of subinterfaces for VLAN routing?A . Layer 2 bridgeB . Layer 2 switchC . Layer 3 switchD . routerView AnswerAnswer: C

September 26, 2018 No Comments READ MORE +

What field is consist of 6 bytes in the field identification frame in IEEE 802.1Q?

What field is consist of 6 bytes in the field identification frame in IEEE 802.1Q?A . SAB . DAC . FCSView AnswerAnswer: A

September 25, 2018 No Comments READ MORE +

Which statement about unicast frame forwarding on a switch is true?

Which statement about unicast frame forwarding on a switch is true?A . The TCAM table stores destination MAC addressesB . If the destination MAC address is unknown, the frame is flooded to every port that is configured in the same VLAN except on the port that it was received on.C...

September 25, 2018 No Comments READ MORE +

Which two statements about VTP are true? (Choose two.)

Which two statements about VTP are true? (Choose two.)A . All switches must be configured with the same VTP domain nameB . All switches must be configured to perform trunk negotiation.C . All switches must be configured with a unique VTP domain nameD . The VTP server must have the...

September 24, 2018 No Comments READ MORE +

Which three of these show the correct RSTP port roles for the indicated switches and interfaces?

Refer to the exhibit. Each of these four switches has been configured with a hostname, as well as being configured to run RSTP. No other configuration changes have been made. Which three of these show the correct RSTP port roles for the indicated switches and interfaces? (Choose three.)A . SwitchA,...

September 24, 2018 No Comments READ MORE +

Which three options are benefits of using TACACS+ on a device? (Choose three)

Which three options are benefits of using TACACS+ on a device? (Choose three)A . It ensures that user activity is untraceableB . It provides a secure accounting facility on the device.C . device-administration packets are encrypted in their entirely.D . It allows the user to remotely access devices from other...

September 23, 2018 No Comments READ MORE +

Which user-mode password has just been set?

Refer to the exhibit. Which user-mode password has just been set?A . TelnetB . AuxiliaryC . SSHD . ConsoleView AnswerAnswer: A

September 22, 2018 No Comments READ MORE +

Which two types of information are held in the MAC address table? (Choose two)

Which two types of information are held in the MAC address table? (Choose two)A . MAC addressB . soure IP addressC . destination IP addressD . ProtocolsE . Port numbersView AnswerAnswer: AE

September 20, 2018 No Comments READ MORE +

Which value must the device send as its username when using CHAP to authenticate with the remote peer site id:17604704 over a PPP link?

Which value must the device send as its username when using CHAP to authenticate with the remote peer site id:17604704 over a PPP link?A . The automatically generated user nameB . The local host nameC . The user name defined by the administratorD . The host name of the remote...

September 20, 2018 No Comments READ MORE +

which IP configuration does the CIDR notation 192.168.1.1/25 refer?

which IP configuration does the CIDR notation 192.168.1.1/25 refer?A . 192.168.1.1 255.255.255.64B . 192.168.1.1 255.255.255.1C . 192.168.1.1 255.255.255.32D . 192.168.1.1 255.255.255.128E . 192.168.1.1 255.255.255.256View AnswerAnswer: D

September 19, 2018 No Comments READ MORE +