Which behavior can be expected when the HSRP version is changed from 1 to 2?
Which behavior can be expected when the HSRP version is changed from 1 to 2?A . No changes occur because the standby router is upgraded before the active router.B . No changes occur because version 1 and 2 use the same virtual MAC OUD . Each HSRP group reinitializes because...
environments and data centers?
How does Cisco TrustSec enable more flexible access controls for dynamic networking environments and data centers?A . uses flexible NetFlowB . assigns a VLAN to the endpointC . classifies traffic based on advanced application recognitionD . classifies traffic based on the contextual identity of the endpoint rather than its IP...
In a dual-stack network with two dual-stack NetFlow collectors, how many flow exporters are needed per network device in the flexible NetFlow configuration?
A network is being migrated from IPv4 to IPv6 using a dual-stack approach. Network management is already 100%Pv6 enabled. In a dual-stack network with two dual-stack NetFlow collectors, how many flow exporters are needed per network device in the flexible NetFlow configuration?A . 1B . 2C . 4D . 8View...
Which device presents the web authentication for the WLAN?
An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy. Which device presents the web authentication for the WLAN?A . ISE serverB . RADIUS serverC . anchor WLCD . local WLCView AnswerAnswer: D
Which IP SLA operation requires the IP SLA responder to be configured on the remote end?
Which IP SLA operation requires the IP SLA responder to be configured on the remote end?A . UDP jitterB . ICMP jitterC . TCP connectD . ICMP echoView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/122/46sg/configuration/guide/Wrapper-46SG/swipsla.pdf
Which feature does Cisco TrustSec use to provide scalable, secure communication throughout a network?
Which feature does Cisco TrustSec use to provide scalable, secure communication throughout a network?A . security group tag ACL assigned to each port on a switchB . security group tag number assigned to each user on a switchC . security group tag number assigned to each port on a networkD...
Which command should be entered on the ports that are connected to Link2 to resolve the issue?
Refer to the exhibit. Link1 is a copper connection and Link2 is a fiber connection. The fiber port must be the primary port for all forwarding. The output of the show spanning-tree command on SW2 shows that the fiber port is blocked by spanning tree. An engineer enters the spanning-tree...
Which two mechanisms are available to secure NTP? (Choose two.)
Which two mechanisms are available to secure NTP? (Choose two.)A . IPsecB . IP prefix list-basedC . encrypted authenticationD . TACACS-based authenticationE . IP access list-basedView AnswerAnswer: CE Explanation: Reference: https://www.cisco.com/c/dam/en/us/td/docs/ios-xml/ios/bsm/configuration/xe3se/3650/bsm-xe-3se-3650-book.html
Which PAgP mode combination prevents an EtherChannel from forming?
Which PAgP mode combination prevents an EtherChannel from forming?A . auto/desirableB . desirable/desirableC . desirable/autoD . auto/autoView AnswerAnswer: D Explanation: Reference: https://www.omnisecu.com/cisco-certified-network-associate-ccna/etherchannel-pagp-andlacp-modes.php
In OSPF, which LSA type is responsible for pointing to the ASBR router?
In OSPF, which LSA type is responsible for pointing to the ASBR router?A . type 1B . type 2C . type 3D . type 4View AnswerAnswer: D