Which statement is true when one of its virtual gateway redundancy with an AVF has failed?
Which statement is true when one of its virtual gateway redundancy with an AVF has failed?A . If an AVF has failed, one of the primary virtual forwarders in the listen state assumes responsibility for the virtual MAC address.B . If an AVF has failed, one of the secondary virtual...
Which security violation mode drops packets with unknown source addresses and increments the violation counter?
Which security violation mode drops packets with unknown source addresses and increments the violation counter?A . shutdownB . restrictC . protectD . dropE . inhibitView AnswerAnswer: B
Which VLAN range is eligible to be pruned when a network engineer enables VTP pruning on a switch?
Which VLAN range is eligible to be pruned when a network engineer enables VTP pruning on a switch?A . VLANs 1-1001B . VLANs 1-4094C . VLANs 2-1001D . VLANs 2-4094View AnswerAnswer: C Explanation: VTP pruning should only be enabled on VTP servers, all the clients in the VTP domain will...
Question about LACP priority.
Question about LACP priority.A . LACP priority is used to determine which port is used to form the EtherChannelB . LACP priority is removed from EtherChannel (don’t remember exactlyC . There was a command about LACP priorityD . LACP priority is used to determine which port is put in standby...
What is the solution to avoid the snooping database from being rebuilt after every device reboot?
A Cisco Catalyst switch that is prone to reboots continues to rebuild the DHCP snooping database. What is the solution to avoid the snooping database from being rebuilt after every device reboot?A . A DHCP snooping database agent should be configured.B . Enable DHCP snooping for all VLANs that are...
Which statement is true about unknown UDLD?
Which statement is true about unknown UDLD?A . It is not an error and it will detect a neighbor after 5 seconds.B . No issue with UDLDC . UDLD is not configured correctlyView AnswerAnswer: A
In regards to Cisco Virtual Switching System, which technology is needed between two switches for them to act as one network element and share control information and data traffic?
In regards to Cisco Virtual Switching System, which technology is needed between two switches for them to act as one network element and share control information and data traffic?A . EtherChannelB . trunkC . Virtual Switch LinkD . virtual port channelView AnswerAnswer: C
Which option is a CISCO recommended RSPAN configuration practice?
Which option is a CISCO recommended RSPAN configuration practice?A . Define RSPAN VLAN before configuring an RSPAN source and destination session.B . Assign access ports to an RSPAN VLAN like any other campus VLAD . Use a different RSPAN VLAN for each session if configuring RSPAN on multiple switches.E ....
Which configuration must be added to the new switch before it can be added to the switch stack?
A network engineer wants to add a new switch to an existing switch stack. Which configuration must be added to the new switch before it can be added to the switch stack?A . No configuration must be added.B . stack IDC . IP addressD . VLAN informationE . VTP informationView...
Which two protocols can be automatically negotiated between switches for trunking? (Choose two.)
Which two protocols can be automatically negotiated between switches for trunking? (Choose two.)A . PPPB . DTPC . ISLD . HDLCE . DLCIF . DOT1QView AnswerAnswer: CF Explanation: Switches such as the Catalyst 3550 that are capable of either 802.1Q or ISL trunking encapsulation, the switchport trunk encapsulation [dot1q |...