Which three options are needed to configure NAT on router GW so PC1 and PC2 will be able to ping 203.0.113.1?
Refer to the exhibit. Which three options are needed to configure NAT on router GW so PC1 and PC2 will be able to ping 203.0.113.1? (Choose three)A . interface Ethernet0 ip nat inside interface Ethernet1 ip nat outsideB . ip access-list standard ACL_NAT permit 10.1.1.0 0.0.0.255C . ip nat inside...
If the Link Fault alarm is connected to the minor relay and the FCS Bit Error Rate alarm is connected to the major relay, which commands will create an alarm profile called GigE with the alarms correctly mapped to the minor and major relays?
If the Link Fault alarm is connected to the minor relay and the FCS Bit Error Rate alarm is connected to the major relay, which commands will create an alarm profile called GigE with the alarms correctly mapped to the minor and major relays?A . Switch(config)#alarm profile GigE Switch(config-alarm-prof)#alarm 1 4...
Which option best describes the ProfiNET Discovery and Configuration Protocol (DCP)?
Which option best describes the ProfiNET Discovery and Configuration Protocol (DCP)?A . Can be used to override both static and dynamically (DHCP/BOOTP) assigned IP addressesB . Cannot be used to reset a device to factory defaultsC . Is only supported in Conformance Class B and C devicesD . Uses the...
What security component can be deployed to increase the defense in depth and specifically can be positioned against 'man-in-the-middle' attack?
What security component can be deployed to increase the defense in depth and specifically can be positioned against 'man-in-the-middle' attack?A . Deploy 802.1AEB . Deploy 802.1XC . Deploy 802.1QD . Deploy 802.1AXView AnswerAnswer: A
A shutdown in the cookie cutter machine was traced to a broken network cable. What are two reasons that explain why using DLR is an appropriate choice for network resiliency? (Choose two)
A shutdown in the cookie cutter machine was traced to a broken network cable. What are two reasons that explain why using DLR is an appropriate choice for network resiliency? (Choose two)A . DLR is designed for single network operation at the machine levelB . Moving to a linear topology...
Given the CIA triad elements, which ensures first that the data is encrypted and secure, second that the data is trustworthy, and third that the data is accessible by those who need it?
Given the CIA triad elements, which ensures first that the data is encrypted and secure, second that the data is trustworthy, and third that the data is accessible by those who need it?A . CIAB . ICAC . ACID . CAIView AnswerAnswer: A
Refer to the exhibit. Which lines represent an I/O connection running at a 20ms RPI?
Refer to the exhibit. Which lines represent an I/O connection running at a 20ms RPI?A . 2919, 2923, 2926B . 2920, 2926, 2929C . 2922, 2929, 2935D . 2914, 2915, 2916View AnswerAnswer: A
GigabitEthernet 1/1 and 1/2?
Refer to the exhibit. L3SW1 has a spanning-tree priority of 8192 set on VLANs 1, 300, and 301, and these VLANs are configured on and trunked between all switches. Executing the command show spanning-tree blockedports on L2SW5 results in: L2SW5# show spanning-tree blockedports Name Blocked Interfaces List -------------------- ------------------------------------ VLAN0001...