A question on EtherChannel misconfiguration.......
A question on EtherChannel misconfiguration.......A . Enable this feature by using the spanning-tree etherchannel guard misconfig global configuration command.B . Spanning Tree portfast feature must be disabled per interface basisC . This command is not available in Cisco SwitchesD . Enable this feature by using the (config-if)# spanning-tree etherchannel guard...
Which command creates a login authentication method named "login" that will primarily use RADIUS and fail over to the local user database?
Which command creates a login authentication method named "login" that will primarily use RADIUS and fail over to the local user database?A . (config)# aaa authentication login default radius localB . (config)# aaa authentication login login radius localC . (config)# aaa authentication login default local radiusD . (config)# aaa authentication...
A question about LLDP TLVs with two choices. (Choose two.)
A question about LLDP TLVs with two choices. (Choose two.)A . System descriptionB . System nameView AnswerAnswer: AB Explanation: The switch supports these basic management TLVs. These are mandatory LLDP TLVs. • Port description TLV • System name TLV • System description • System capabilities TLV • Management address TLV
How can the traffic that is mirrored out the GigabitEthernet0/48 port be limited to only traffic that is received or transmitted in VLAN 10 on the GigabitEthernet0/1 port?
Refer to the exhibit. How can the traffic that is mirrored out the GigabitEthernet0/48 port be limited to only traffic that is received or transmitted in VLAN 10 on the GigabitEthernet0/1 port?A . Change the configuration for GigabitEthernet0/48 so that it is a member of VLAN 10.B . Add an...
Which enhancement to a spanning-tree design prevents unnecessary traffic from crossing the extended LAN segment?
A network engineer is extending a LAN segment between two geographically separated data centers. Which enhancement to a spanning-tree design prevents unnecessary traffic from crossing the extended LAN segment?A . Modify the spanning-tree priorities to dictate the traffic flow.B . Create a Layer 3 transit VLAN to segment the traffic...
Which two restrictions of the port security feature are true? (Choose two.)
Which two restrictions of the port security feature are true? (Choose two.)A . It is not supported on destination SPAN ports.B . It is not supported on EtherChannel port-channel interfaces.C . Static port MAC address assignments are not supported.D . A single device can learn a maximum of three stick...
What do subordinate switches in a switch stack keep?
What do subordinate switches in a switch stack keep?A . Subordinate switches keep their own spanning trees for each VLAN that they support.B . Subordinate switches keep entire VLAN databaseC . Store running config all the switchesView AnswerAnswer: A
A question about spanning-tree port-priority.
A question about spanning-tree port-priority.A . 128B . 129C . 127D . 4096View AnswerAnswer: A Explanation: 128 default port Priority
Which two statements about default FHRP behavior are true? (Choose two.)
Which two statements about default FHRP behavior are true? (Choose two.)A . A backup GLBP active virtual gateway can become active only if the current active virtual gateway fails.B . Preemption is enabled by default.C . Unless specifically Configured, the priority of an HSRP router is 200.D . A standby...
Which two statements can be derived from the output of the show standby command?
Refer to the exhibit. Which two statements can be derived from the output of the show standby command? (Choose two)A . R2 Fa1/0 regains mastership when the link comes back upB . R2 becomes the active router after the hold time expiresC . if Fa0/0 is shut down, the HSRP...