Which of the following are benefits of VLANs? (Choose three.)
Which of the following are benefits of VLANs? (Choose three.)A . They increase the size of collision domains.B . They allow logical grouping of users by function.C . They can enhance network security.D . They increase the size of broadcast domains while decreasing the number of collision domains.E . They...
Which type of address is the public IP address of a NAT device?
Which type of address is the public IP address of a NAT device?A . outside publicB . inside localC . inside globalD . inside publicE . outside globalF . outside localView AnswerAnswer: C
Which of the following are the valid numbers of standard ACL (choose two)
Which of the following are the valid numbers of standard ACL (choose two)A . 50B . 1550C . 150D . 1250E . 2050View AnswerAnswer: AB
What is the purpose of the POST operation on a router?
What is the purpose of the POST operation on a router?A . determine whether additional hardware has been addedB . locate an IOS image for bootingC . enable a TFTP serverD . set the configuration registerView AnswerAnswer: A
Which network address and subnet mask meet this requirement?
You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the max number of subnets. Which network address and subnet mask meet this requirement?A . 192.168.252.8 255.255.255.248B . 192.168.252.8 255.255.255.252C . 192.168.252.16 255.255.255.240D ....
Which statement about VLAN configuration is true?
Which statement about VLAN configuration is true?A . The switch must be in VTP server or transparent mode before you can configure a VLANB . The switch must be in config-vlan mode before you configure an extended VLANC . Dynamic inter-VLAN routing is supported on VLAN2 through VLAN 4064D ....
Describe the best way to troubleshoot and isolate a network problem?
Describe the best way to troubleshoot and isolate a network problem?A . Create an action planB . Implement an action planC . Gather factsD . Change on variable at a timeView AnswerAnswer: C
How to verify SSH connections was secured?
How to verify SSH connections was secured?A . ssh -v 1 -l admin IPB . ssh -v 2 -l admin IPC . ssh -l admin IPView AnswerAnswer: B
Which action can you take to correct the problem?
Afar you apply the given configuration to R1, you notice that it failed to enable OSPF Which action can you take to correct the problem?A . Configure a loopback interface on R1B . Enable IPv6 unicast routing on R1.C . Configure an IPv4 address on interface F0/0.D . Configure an...
Which logging command can enable administrators to correlate syslog messages with millisecond precision?
Which logging command can enable administrators to correlate syslog messages with millisecond precision?A . no logging consoleB . logging buffered 4C . no logging monitorD . service timestamps log datetime msecE . logging host 10.2.0.21View AnswerAnswer: D