In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC?

In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC?A . Layer 3B . inter-xTRC . auto anchorD . fast roamView AnswerAnswer: B Explanation: A fabric edge node provides onboarding...

March 20, 2024 No Comments READ MORE +

What does the output verify?

Refer to the Exhibit. A network engineer configures a new GRE tunnel and enters the show run command. What does the output verify?A . The tunnel will be established and work as expectedB . The tunnel destination will be known via the tunnel interfaceC . The tunnel keepalive is configured...

March 20, 2024 No Comments READ MORE +

What does the output confirm?

Refer to the exhibit. An engineer configures monitoring on SW1 and enters the show command to verify operation. What does the output confirm?A . SPAN session 1 monitors activity on VLAN 50 of a remote switchB . SPAN session 2 only monitors egress traffic exiting port FastEthernet 0/14.C . SPAN...

March 20, 2024 No Comments READ MORE +

What are two differences between the RIB and the FIB? (Choose two.)

What are two differences between the RIB and the FIB? (Choose two.)A . The FIB is derived from the data plane, and the RIB is derived from the FIB.B . The RIB is a database of routing prefixes, and the FIB is the Information used to choose the egress interface...

March 19, 2024 No Comments READ MORE +

Which router is the designated router on the segment 192.168.0.0/24?

Refer the exhibit. Which router is the designated router on the segment 192.168.0.0/24?A . This segment has no designated router because it is a nonbroadcast network type.B . This segment has no designated router because it is a p2p network type.C . Router Chicago because it has a lower router...

March 19, 2024 No Comments READ MORE +

Which method of account authentication does OAuth 2.0 within REST APIs?

Which method of account authentication does OAuth 2.0 within REST APIs?A . username/role combinationB . access tokensC . cookie authenticationD . basic signature workflowView AnswerAnswer: B Explanation: The most common implementations of OAuth (OAuth 2.0) use one or both of these tokens: + access token: sent like an API key,...

March 19, 2024 No Comments READ MORE +

Which DHCP option helps lightweight APs find the IP address of a wireless LAN controller?

Which DHCP option helps lightweight APs find the IP address of a wireless LAN controller?A . Option 43B . Option 60C . Option 67D . Option 150View AnswerAnswer: A

March 19, 2024 No Comments READ MORE +

Which configuration should the engineer use?

Refer to the exhibit. The IP SLA is configured in a router. An engineer must configure an EEM applet to shut down the interface and bring it back up when there is a problem with the IP SLA. Which configuration should the engineer use? A. event manager applet EEM_IP_SLA event...

March 19, 2024 No Comments READ MORE +

How are the different versions of IGMP compatible?

How are the different versions of IGMP compatible?A . IGMPv2 is compatible only with IGMPv1.B . IGMPv2 is compatible only with IGMPv2.C . IGMPv3 is compatible only with IGMPv3.D . IGMPv3 is compatible only with IGMPv1View AnswerAnswer: A

March 19, 2024 No Comments READ MORE +

What is a characteristic of a virtual machine?

What is a characteristic of a virtual machine?A . It must be aware of other virtual machines, in order to allocate physical resources for themB . It is deployable without a hypervisor to host itC . It must run the same operating system as its hostD . It relies on...

March 18, 2024 No Comments READ MORE +