Which two must be met before SSH can operate normally on a Cisco IOS switch? (Choose two)
Which two must be met before SSH can operate normally on a Cisco IOS switch? (Choose two)A . The switch must be running a k9 (crypto) IOS imageB . The ip domain-name command must be configured on the switchC . IP routing must be enabled on the switchD . A...
Which two actions influence the EIGRP route selection process? (Choose two)
Which two actions influence the EIGRP route selection process? (Choose two)A . The router calculates the reported distance by multiplying the delay on the exiting Interface by 256.B . The router calculates the best backup path to the destination route and assigns it as the feasible successor.C . The router...
Which prefix does Router 1 use to Host A?
Refer to the exhibit. Which prefix does Router 1 use to Host A?A . 10.10.10.0/28B . 10.10.13.0/25C . 10.10.13.144/28D . 10.10.13.208/29View AnswerAnswer: D
Which command enables a router to become a DHCP client?
Which command enables a router to become a DHCP client?A . ip address dhcpB . ip helper-addressC . ip dhcp poolD . ip dhcp clientView AnswerAnswer: A
What benefit does controller-based networking provide versus traditional networking?
What benefit does controller-based networking provide versus traditional networking?A . provides an added layer of security to protect from DDoS attacksB . combines control and data plane functionality on a single device to minimize latencyC . moves from a two-tier to a three-tier network architecture to provide maximum redundancyD ....
Which statement identifies the functionality of virtual machines?
Which statement identifies the functionality of virtual machines?A . The hypervisor communicates on Layer 3 without the need for additional resourcesB . Each hypervisor can support a single virtual machine and a single software switchC . The hypervisor can virtual physical components including CPU, memory, and storageD . Virtualized servers...
Based on the LACP neighbor status, in which mode is the SW1 port channel configured?
Refer to the exhibit. Based on the LACP neighbor status, in which mode is the SW1 port channel configured?A . passiveB . mode onC . autoD . activeView AnswerAnswer: D
Which action is taken by the phone?
A Cisco IP phone receive untagged data traffic from an attached PC . Which action is taken by the phone?A . It allows the traffic to pass through unchangedB . It drops the trafficC . It tags the traffic with the default VLAND . It tags the traffic with the...
Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)
Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)A . It drops lower-priority packets before it drops higher-priority packetsB . It can identify different flows with a high level of granularityC . It guarantees the delivery of high-priority packetsD . It can mitigate congestion by...
Which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?
Which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?A . TKIP encryptionB . SAE encryptionC . AES encryptionD . scrambled encryption keyView AnswerAnswer: B