In which CLI configuration mode can you configure the hostname of a device?

In which CLI configuration mode can you configure the hostname of a device?A . line modeB . interface modeC . global modeD . router modeView AnswerAnswer: C

May 8, 2018 No Comments READ MORE +

Which one of these is a valid HSRP Virtual Mac Address?

Which one of these is a valid HSRP Virtual Mac Address?A . 0000.0C07.AC15B . 0000.5E00.01A3C . 0007.B400.AE01D . 0007.5E00.B301View AnswerAnswer: A

May 8, 2018 No Comments READ MORE +

When an interface is configured with PortFast BPDU guard, how does the interface respond when it receives a BPDU?

When an interface is configured with PortFast BPDU guard, how does the interface respond when it receives a BPDU?A . It continues operating normally.B . It goes into a down/down state.C . It becomes the root bridge for the configured VLAE . It goes into an errdisable state.View AnswerAnswer: D

May 8, 2018 No Comments READ MORE +

Which two statements about UDP are true? (Choose two)

Which two statements about UDP are true? (Choose two)A . It can transmit data at a rate higher than the path capacityB . It uses a three-way handshake to ensure that traffic is transmitted properlyC . It guarantees packet deliveryD . it includes protection against duplicate packetsE . it can...

May 8, 2018 No Comments READ MORE +

Which three of these statements are true?

Refer to the exhibit. The output that is shown is generated at a switch. Which three of these statements are true? (Choose three.)A . All ports will be in a state of discarding, learning, or forwarding.B . Thirty VLANs have been configured on this switch.C . The bridge priority is...

May 7, 2018 No Comments READ MORE +

Which feature facilitate the tagging of a specific VLAN?

Which feature facilitate the tagging of a specific VLAN?A . RoutingB . HairpinningC . EncapsulationD . SwitchingView AnswerAnswer: C

May 7, 2018 No Comments READ MORE +

What should be part of a comprehensive network security plan?

What should be part of a comprehensive network security plan?A . Allow users to develop their own approach to network security.B . Physically secure network equipment from potential access by unauthorized individualsC . Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten.D...

May 7, 2018 No Comments READ MORE +

Which command is used to show the interface status of a router?

Which command is used to show the interface status of a router?A . show interface statusB . show ip interface briefC . show ip routeD . show interfaceView AnswerAnswer: B

May 6, 2018 No Comments READ MORE +

If primary and secondary root switches with priority 16384 both experience catastrophic losses, which tertiary switch can take over?

If primary and secondary root switches with priority 16384 both experience catastrophic losses, which tertiary switch can take over?A . a switch with priority 20480B . a switch with priority 8192C . a switch with priority 4096D . a switch with priority 12288View AnswerAnswer: A

May 5, 2018 No Comments READ MORE +

What does split horizon prevent?

What does split horizon prevent?A . routing loops, link stateB . routing loops, distance vectorC . switching loops, STPD . switching loops, VTPView AnswerAnswer: B

May 5, 2018 No Comments READ MORE +