Which option is the minimum number of bindings that the DHCP snooping database can store?

Which option is the minimum number of bindings that the DHCP snooping database can store?A . 1000 bindingsB . 2000 bindingsC . 5000 bindingsD . 8000 bindingsView AnswerAnswer: D

August 31, 2018 No Comments READ MORE +

Select and Place:

Select and Place: View AnswerAnswer:

August 30, 2018 No Comments READ MORE +

Which option is the minimum frame size for an 802.1Q frame?

Which option is the minimum frame size for an 802.1Q frame?A . 64 bytesB . 68 bytesC . 1518 bytesD . 1522 bytesView AnswerAnswer: B

August 29, 2018 No Comments READ MORE +

What two commands can you apply on the interfaces?

Your manager asked you to make every port on your switch bypass the normal spanning-tree timers which includes your uplink to other switches. What two commands can you apply on the interfaces? (Choose two.)A . spanning-tree portfastB . spanning-tree portfast defaultC . spanning-tree portfast accessD . spanning-tree portfast trunkE ....

August 28, 2018 No Comments READ MORE +

Which two statements about native VLANs are true? (Choose two.)

Which two statements about native VLANs are true? (Choose two.)A . VLAN 1 and VLAN 1001 are native VLANs by default.B . The native VLAN is untagged over trunks.C . The native VLAN can be changed on a per port basis.D . Only one VLAN can be the native VLAN...

August 28, 2018 No Comments READ MORE +

A question about port security violation occur in which two circumstances? (Choose two.)

A question about port security violation occur in which two circumstances? (Choose two.)A . When a port with secure MAC address attempt to use a different port in same VLAC . When the same MAC addresses enters a port more than once.D . When the CAM table overflows with dynamically...

August 27, 2018 No Comments READ MORE +

On which layer does IP source guard provide filtering to prevent a malicious host from impersonating the IP address of a legitimate host?

On which layer does IP source guard provide filtering to prevent a malicious host from impersonating the IP address of a legitimate host?A . Layer 1B . Layer 2C . Layer 3D . Layer 7View AnswerAnswer: B

August 27, 2018 No Comments READ MORE +

Why would the switch be considered as a root bridge?

Refer to the exhibit. Why would the switch be considered as a root bridge?A . The bridge priority is 1 and all ports are forwarding.B . The switch priority for VLAN 1 and the macro specifies "This Bridge is the root".C . The bridge priority is 128.19 and all ports...

August 26, 2018 No Comments READ MORE +

What action should a network admin take to enable VTP pruning on an entire management domain?

What action should a network admin take to enable VTP pruning on an entire management domain?A . Enable VTP pruning on any client switch in the domain.B . Enable VTP pruning on every switch in the domain.C . Enable VTP pruning on any switch in the management domainD . Enable...

August 25, 2018 No Comments READ MORE +

Where does the VLAN information get saved to?

Where does the VLAN information get saved to?A . The information is saved to the vlan.dat file.B . The information is saved to the running configuration file.C . The information is saved to the vlan.txt file.D . The information is saved to the vlan.conf file.View AnswerAnswer: A

August 24, 2018 No Comments READ MORE +