Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)
Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)A . It drops lower-priority packets before it drops higher-priority packets.B . It can identify different flows with a high level of granularity.C . It guarantees the delivery of high-priority packets.D . It can mitigate congestion by...
Which two actions influence the EIGRP route selection process? (Choose two)
Which two actions influence the EIGRP route selection process? (Choose two) A. The router calculates the reported distance by multiplying the delay on the exiting Interface by 256. B. The router calculates the best backup path to the destination route and assigns it as the feasible successor. C. The router...
Which action is taken by the phone?
A Cisco IP phone receive untagged data traffic from an attached PC. Which action is taken by the phone?A . It allows the traffic to pass through unchanged.B . It drops the traffic.C . It tags the traffic with the default VLAE . It tags the traffic with the native...
Which option about JSON is true?
Which option about JSON is true?A . uses predefined tags or angle brackets (<>) to delimit markup textB . used to describe structured data that includes arraysC . used for storing informationD . similar to HTML, it is more verbose than XMLView AnswerAnswer: B Explanation: JSON data is written as...
Which route does R1 select for traffic that is destined to 192 168.16.2?
Refer to the exhibit . Which route does R1 select for traffic that is destined to 192 168.16.2?A . 192.168.16.0/21B . 192.168.16.0/24C . 192.168 26.0/26D . 192.168.16.0/27View AnswerAnswer: D Explanation: The destination IP addresses match all four entries in the routing table but the 192.168.16.0/27 has the longest prefix so...
When OSPF learns multiple paths to a network, how does it select a route?
When OSPF learns multiple paths to a network, how does it select a route?A . It multiple the active K value by 256 to calculate the route with the lowest metric.B . For each existing interface, it adds the metric from the source router to the destination to calculate the...
What are two characteristics of a controller-based network? (Choose two)
What are two characteristics of a controller-based network? (Choose two)A . The administrator can make configuration updates from the CLC . It uses northbound and southbound APIs to communicate between architectural layers.D . It moves the control plane to a central point.E . It decentralizes the control plane, which allows...
Which type of wireless encryption is used for WPA2 in pre-shared key mode?
Which type of wireless encryption is used for WPA2 in pre-shared key mode?A . TKIP with RC4B . RC4C . AES-128D . AES-256View AnswerAnswer: D Explanation: We can see in this picture we have to type 64 hexadecimal characters (256 bit) for the WPA2 passphrase so we can deduce the...
Which state verifies the designated router is in the proper mode?
An engineer configured an OSPF neighbor as a designated router . Which state verifies the designated router is in the proper mode?A . ExchangeB . 2-wayC . FullD . InitView AnswerAnswer: C
Which design element is a best practice when deploying an 802.11b wireless infrastructure?
Which design element is a best practice when deploying an 802.11b wireless infrastructure?A . disabling TPC so that access points can negotiate signal levels with their attached wireless devicesB . setting the maximum data rate to 54 Mbps on the Cisco Wireless LAN ControllerC . allocating nonoverlapping channels to access...