which two types of threshold can you configure for tracking objects? (choose two.)
which two types of threshold can you configure for tracking objects? (choose two.)A . weightB . bandwidthC . MTUD . percentageE . administrative distance15F . delayView AnswerAnswer: AD
Which three authentication types does VRRP support? (Choose three)
Which three authentication types does VRRP support? (Choose three)A . Plain-textB . CHAPC . PAPD . 802.1XE . MD5F . No AuthenticationView AnswerAnswer: AEF
A question related to a MAC address output. (Choose two.)
A question related to a MAC address output. (Choose two.) A . Fa0/1 and Fa0/2 are in the same VLAC . Fa0/1 and Fa0/2 are not in the same VLAE . Fa0/1 and Fa0/3 can not communicate on the Layer 2 switch.F . Fa0/3 and Fa0/2 can communicate on the...
Which two attributes must match across the member ports, when a Layer 2 EtherChannel is configured? (Choose two.)
Which two attributes must match across the member ports, when a Layer 2 EtherChannel is configured? (Choose two.)A . switchport modeB . spanning-tree costC . spanning-tree priorityD . VLAN membershipView AnswerAnswer: AD
Which statements about RSPAN are true? (Choose two.)
Which statements about RSPAN are true? (Choose two.)A . It supports MAC adress learning.B . RSPAN VLANS can carry RSPAN traffic only.C . only one RSPAN VLAN can be configured per device.D . RSPAN VLANs are exempt from VTP pruning.E . MAC address learning is not supported.F . RSPAN uses...
What is the function of NSF?
What is the function of NSF?A . forward traffic simultaneously using both supervisorsB . forward traffic based on Cisco Express ForwardingC . provide automatic failover to back up supervisor in VSS modeD . provide nonstop forwarding in the event of failure of one of the member supervisorsView AnswerAnswer: D Explanation:...
Which two statements about the network environment are true?
Refer to the exhibit. Which two statements about the network environment are true? (Choose two.)A . The two aaaa.aaaa.aaaa MAC address entries must be from the same VLAC . Interfaces Fa0/1 and Fa0/3 cannot communicate via Layer 2 switching.D . Interfaces Fa0/1 and Fa0/2 cannot communicate via Layer 2 switching.E...
When a Layer 2 EtherChannel is configured, which statement about placement of the IP address is true?
When a Layer 2 EtherChannel is configured, which statement about placement of the IP address is true?A . The IP address is placed on the highest numbered member port.B . The IP address is placed on the port-channel logical interface.C . The IP address is placed on the lowest numbered...
What are possible Etherchannel load balancing mechanism based on layer 3?
What are possible Etherchannel load balancing mechanism based on layer 3?A . Mac sourceB . Mac source-destinationC . Ip SourceD . IP Source-destinationE . Mac destinationView AnswerAnswer: CD
What will extend a trust boundary (There is a switch interface configuration with separate voice VLAN and data VLAN to, also showing endpoint
What will extend a trust boundary (There is a switch interface configuration with separate voice VLAN and data VLAN to, also showing endpointA . Multiple Layers PCB . IP PhoneC . Access SwitchD . Distribution SwitchE . Core SwitchView AnswerAnswer: B Explanation: A Catalyst switch can detect an IP phone...