Drag the rule on the left to match the appropriate activity on the right
DRAG DROP Drag the rule on the left to match the appropriate activity on the right. View AnswerAnswer:
What are the two main characteristic of 802.1x (choose 2)
What are the two main characteristic of 802.1x (choose 2)A . EAP messages in Ethernet frames and don't use PPPB . works only on wired connectionsC . It's created by IETFD . It's created by IEEEView AnswerAnswer: AD
What are the True regarding 802.1X. (Choose three)
What are the True regarding 802.1X. (Choose three)A . Authenticates the user itselfB . Authenticates the device itselfC . If the device does not support, allow the access automaticallyD . Cisco proprietaryE . Industry standardView AnswerAnswer: A, B, E
Which option can be used to manage traffic flows in the remote network?
While designing a wide area network, the network team wants to avoid undesired transit traffic through remote branch sites with multiple WAN connections. Which option can be used to manage traffic flows in the remote network?A . route weightingB . route taggingC . route filteringD . route leakingView AnswerAnswer: C
What to configure in BGP so that other BGP neighbours cannot influence the path of a route.
What to configure in BGP so that other BGP neighbours cannot influence the path of a route.A . Lower MEDB . Higher Local PreferenceC . Higher WeightD . Lower Router IDView AnswerAnswer: C Explanation: The BGP golden rule is that nobody can say me what is have to do with...
Which factor determines which router becomes the active HSRP device?
Refer to the exhibit. A customer wants to use HSRP as a First Hop Redundancy Protocol. Both routers are currently running and all interfaces are active. Which factor determines which router becomes the active HSRP device?A . the router with the highest MAC address for the respective groupB . the...
Port Security supports which type of port?
Port Security supports which type of port?A . IEEE 802.1Q tunnel portB . Dynamic trunkC . Port-channelD . Routed portView AnswerAnswer: A
Which L2 messaging protocol maintains VLAN configuration consistency?
Which L2 messaging protocol maintains VLAN configuration consistency?A . VTPB . STPC . LACPD . CDPView AnswerAnswer: A
Which VPN connectivity representing both Hub-and-Spokes and Spokes-to-Spokes?
Which VPN connectivity representing both Hub-and-Spokes and Spokes-to-Spokes?A . DMVPNB . IPSec VPNC . VPN RouterD . VPN hubView AnswerAnswer: A
What is one limitation of MPLS Layer 3 VPN networks?
What is one limitation of MPLS Layer 3 VPN networks?A . They require less powerful routers with limited capabilitiesB . They require the customer to control routingC . They support only IP trafficD . PE routers are underutilizedView AnswerAnswer: C