Which action do the switches take on the trunk link?
Refer to Exhibit . Which action do the switches take on the trunk link?A . The trunk does not form and the ports go into an err-disabled status.B . The trunk forms but the mismatched native VLANs are merged into a single broadcast domain.C . The trunk does not form,...
Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)
Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)A . It drops lower-priority packets before it drops higher-priority packets.B . It can identify different flows with a high level of granularity.C . It guarantees the delivery of high-priority packets.D . It can mitigate congestion by...
Which two capacities of Cisco DNA Center make it more extensible? (Choose two)
Which two capacities of Cisco DNA Center make it more extensible? (Choose two)A . adapters that support all families of Cisco IOS softwareB . SDKs that support interaction with third-party network equipmentC . customized versions for small, medium, and large enterprisesD . REST APIs that allow for external applications to...
Which attribute does a router use to select the best path when two or more different routes to the same destination exist from two different routing protocols?
Which attribute does a router use to select the best path when two or more different routes to the same destination exist from two different routing protocols?A . dual algorithmB . metricC . administrative distanceD . hop countView AnswerAnswer: C Explanation: Administrative distance is the feature used by routers to...
Which configuration is needed to generate an RSA key for SSH on a router?
Which configuration is needed to generate an RSA key for SSH on a router?A . Configure the version of SSC . Configure VTY access.D . Create a user with a password.E . Assign a DNS domain name.View AnswerAnswer: D Explanation: In order to generate an RSA key for SSH, we...
What is the effect of this configuration?
Refer to the exhibit . What is the effect of this configuration?A . The switch port interface trust state becomes untrusted.B . The switch port remains administratively down until the interface is connected to another switch.C . Dynamic ARP inspection is disabled because the ARP ACL is missing.D . The...
Which set of action satisfy the requirement for multi-factor authentication?
Which set of action satisfy the requirement for multi-factor authentication?A . The user swipes a key fob, then clicks through an email link.B . The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device.C . The user enters a...
What is the primary effect of the spanning-tree portfast command?
What is the primary effect of the spanning-tree portfast command?A . It enables BPDU messagesB . It minimizes spanning-tree convergence timeC . It immediately puts the port into the forwarding state when the switch is reloadedD . It immediately enables the port in the listening stateView AnswerAnswer: B Explanation: #comment-49349
Which command prevents passwords from being stored in the configuration as plaintext on a router or switch?
Which command prevents passwords from being stored in the configuration as plaintext on a router or switch?A . enable secretB . service password-encryptionC . username Cisco password encryptD . enable passwordView AnswerAnswer: B
Which two must be met before SSH can operate normally on a Cisco IOS switch? (Choose two)
Which two must be met before SSH can operate normally on a Cisco IOS switch? (Choose two)A . The switch must be running a k9 (crypto) IOS image.B . The ip domain-name command must be configured on the switch.C . IP routing must be enabled on the switch.D . A...