Which IEEE mechanism is responsible for the authentication of devices when they attempt to connect to a local network?
Which IEEE mechanism is responsible for the authentication of devices when they attempt to connect to a local network?A . 802.1xB . 802.11C . 802.2xD . 802.3xView AnswerAnswer: A
Which option describes the purpose of traffic policing?
Which option describes the purpose of traffic policing?A . It prioritizes routing protocol traffic.B . It remarks traffic that is below the CIRC . It drops traffic that exceeds the CIE . It queues and then transmits traffic that exceeds the CIView AnswerAnswer: C
Which path does a router choose when it receives a packet with multiple possible paths to the destination over different routing protocols?
Which path does a router choose when it receives a packet with multiple possible paths to the destination over different routing protocols?A . the path with both the lowest administrative distance and the highest metricB . the path with the lowest administrative distanceC . the path with the lowest metricD...
which three technical services support cloud computing?
which three technical services support cloud computing?A . network-monitored power sourcesB . layer 3 network routingC . ip localizationD . redundant connectionsE . VPN connectivityF . extended SAN servicesView AnswerAnswer: DEF
Refer to the exhibit.
Refer to the exhibit. After you apply the given configuration to R1, you determine that it is failing to advertise the 172.16.10.32/27 network. Which action most likely to correct the problem.A . Enable passive interfaceB . Enable RIPv2C . Enable manual summarizationD . Enable auto summarization.View AnswerAnswer: B
What parameter can be different on ports within an EtherChannel?
What parameter can be different on ports within an EtherChannel?A . speedB . DTP negotiation settingsC . trunk encapsulationD . duplexView AnswerAnswer: B
What is the most appropriate summarization for these routes?
Refer to the exhibit. What is the most appropriate summarization for these routes?A . 10.0.0.0 /21B . 10.0.0.0 /22C . 10.0.0.0 /23D . 10.0.0.0 /24View AnswerAnswer: B
What are two statement for SSH?
What are two statement for SSH?A . use port 22B . unsecuredC . encryptedD . most common remote-access methodE . operate at transportView AnswerAnswer: AC
If the devices produced the given output, what is the cause of the EtherChannel problem?
Refer to the exhibit. If the devices produced the given output, what is the cause of the EtherChannel problem?A . There is a speed mismatch between SW1's Fa0/1 and SW2's Fa0/1 interfaces.B . There is an MTU mismatch between SW1's Fa0/1 and SW2's Fa0/1 interfacesC . There is an encapsulation...
Which three options are switchport config that can always avoid duplex mismatch error between the switches? (Choose Three.)
Which three options are switchport config that can always avoid duplex mismatch error between the switches? (Choose Three.)A . set both side on auto-negotationB . set both sides on half-duplexC . set one side auto and other side half-duplexD . set both side of connection to full-duplexE . set one...