Which Layer 2 enhancement can be used to eliminate this delay?
A network engineer is trying to deploy a PC on a network. The engineer observes that when the PC is connected to the network, it takes 30 to 60 seconds for the PC to see any activity on the network interface card. Which Layer 2 enhancement can be used to...
Which VTP mode is needed to configure an extended VLAN, when a switch is configured to use VTP versions 1 or 2?
Which VTP mode is needed to configure an extended VLAN, when a switch is configured to use VTP versions 1 or 2?A . transparentB . clientC . serverD . Extended VLANs are only supported in version 3 and not in versions 1 or 2View AnswerAnswer: A
Which command is needed to enable DHCP snooping if a switchport is connected to a DHCP server?
Which command is needed to enable DHCP snooping if a switchport is connected to a DHCP server?A . ip dhcp snooping trustB . ip dhcp snoopingC . ip dhcp trustD . ip dhcp snooping informationView AnswerAnswer: A Explanation: When configuring DHCP snooping, follow these guidelines: DHCP snooping is not active...
Which option is a benefit of using VSS?
Which option is a benefit of using VSS?A . reduces costB . simplifies configurationC . provides two independent supervisors with two different control planesD . removes the need for a First Hop Redundancy ProtocolView AnswerAnswer: D Explanation: First Hop Redundancy Protocols (FHRPs) such as VRRP and HSRP were designed to...
Which technology is it using?
In a Virtual Switching System, DSW1 and DSW2 need to communicate with each other to determine the role. Which technology is it using?A . STPB . RSPANC . VSL Protocol (Virtual Switch Link)D . LACPView AnswerAnswer: C
Which two statements about the VLAN database are true? (Choose two.)
Which two statements about the VLAN database are true? (Choose two.)A . VLAN information is stored in the running configurationB . It supports VLANs 1 to 1001C . If the switch is in VTP transparent mode, the VLAN can be configured if it is in VLAN database mode.D . It...
Which state by default for port security is set in a switch?
Which state by default for port security is set in a switch?A . enableB . disableC . onD . offView AnswerAnswer: B
Which statement describes the result of configuring SPAN on a Cisco device?
Which statement describes the result of configuring SPAN on a Cisco device?A . SPAN doubles traffic internally.B . SPAN halves the capacity of the source portC . SPAN blocks for normal use on one additional port for each configured source port.D . If not carefully planned, SPAN can lead to...
In which two locations should the Spanning Tree protocol root guard feature be implemented?
Refer to the exhibit. A network engineer deployed an older switch with the same spanning-tree priority as the existing root, which caused a network outage. In which two locations should the Spanning Tree protocol root guard feature be implemented? (Choose two.)A . On the designated root switch downlinks to the...
What happens if a switch with dhcp snooping and ip source guard enabled globally, what does the switch do when it receives a packet with option 82?
What happens if a switch with dhcp snooping and ip source guard enabled globally, what does the switch do when it receives a packet with option 82?A . DropB . Remove 82 and forwardC . ProxyD . NAView AnswerAnswer: B