Which statement describes one major issue that VTP can cause in an enterprise network when a new switch is introduced in the network in VTP mode server?
Which statement describes one major issue that VTP can cause in an enterprise network when a new switch is introduced in the network in VTP mode server?A . It can cause network access ports to go into err-disabled state.B . It can cause a network-wide VLAN configuration change if the...
Question about what are RADIUS server responses
Question about what are RADIUS server responsesA . AcceptB . RejectC . ChallengeD . Get PasswordE . CancelView AnswerAnswer: ABC
Which option lists the modes that are available for configuring UDLD on a Cisco switch?
Which option lists the modes that are available for configuring UDLD on a Cisco switch?A . normal and aggressiveB . active and aggressiveC . normal and activeD . normal and passiveE . normal and standbyView AnswerAnswer: A Explanation: The Cisco-proprietary UDLD protocol monitors the physical configuration of the links between...
Which three authentication methods does VRRP use? (Choose three.)
Which three authentication methods does VRRP use? (Choose three.)A . 802.1x authenticationB . Cipher authenticationC . SHA-256 authenticationD . No authenticationE . Plain text authenticationF . MD5 authenticationView AnswerAnswer: DEF
Which two statements are true about Option 82? (Choose two.)
Which two statements are true about Option 82? (Choose two.)A . Layer 2 ingressB . Layer 3 egressC . Layer 3 ingressD . Layer 2 egressE . Layer 4 egressF . Layer 4 ingressView AnswerAnswer: AB
What action will accomplish this task?
A network engineer wants to make sure that an access switch will never become a Spanning Tree root for VLAN 5. What action will accomplish this task?A . adjust STP priority to the maximum valueB . disable STP globallyC . apply root guard to all outgoing neighbor interfacesD . enable...
Which two options are advantages of deploying VTPv3? (Choose two.)
Which two options are advantages of deploying VTPv3? (Choose two.)A . It stores the VTP domain password securely as a SHA-1 hash.B . It adds an FCS field at the end of each VTP frame for consistency checkingC . It supports the propagation of private VLANs.D . It supports the...
What happens to the sticky address after copy run start and reboot?
What happens to the sticky address after copy run start and reboot?A . Sticky address are still in configuration.B . Sticky address are not in configurationC . Sticky address can be unicast or multicast addressView AnswerAnswer: A
Which two statements about error-disabled ports are true? (Choose two.)
Which two statements about error-disabled ports are true? (Choose two.)A . When a port is error-disabled, it may continue to pass management traffic.B . When a port is error-disabled, all traffic on the port stops.C . By default, error-disabled ports automatically recover once the issue is resolvedD . When a...
If StormControl is enabled on a port and the traffic reaches the configured level, which two actions can be configured to occur? (Choose two.)
If StormControl is enabled on a port and the traffic reaches the configured level, which two actions can be configured to occur? (Choose two.)A . TrapB . notify adminC . redirect trafficD . logE . shut downView AnswerAnswer: AE