Which First Hop Redundancy Protocol maximizes uplink utilization and minimizes the amount of configuration that is necessary?

Which First Hop Redundancy Protocol maximizes uplink utilization and minimizes the amount of configuration that is necessary?A . GLBPB . HSRP v2C . VRRPD . HSRP v1View AnswerAnswer: A

October 6, 2020 No Comments READ MORE +

Based on the configuration in this WLAN security setting, which method can a client use to authenticate to the network?

Refer to the exhibit. Based on the configuration in this WLAN security setting, which method can a client use to authenticate to the network?A . text stringB . username and passwordC . RADIUS tokenD . certificateView AnswerAnswer: A

October 6, 2020 No Comments READ MORE +

Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?

Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?A . SSLB . Cisco TrustSecC . MACsecD . IPsecView AnswerAnswer: C

October 5, 2020 No Comments READ MORE +

Which QoS component alters a packet to change the way that traffic is treated in the network?

Which QoS component alters a packet to change the way that traffic is treated in the network?A . policingB . classificationC . markingD . shapingView AnswerAnswer: C

October 5, 2020 No Comments READ MORE +

Which statement about TLS is true when using RESTCONF to write configurations on network devices?

Which statement about TLS is true when using RESTCONF to write configurations on network devices?A . It is used for HTTP and HTTPS requests.B . It requires certificates for authentication.C . It is provided using NGINX acting as a proxy web server.D . It is not supported on Cisco devices.View...

October 5, 2020 No Comments READ MORE +

Which command ensures that SW3 receives frames only from VLAN 50?

Refer to the exhibit. VLANs 50 and 60 exist on the trunk links between all switches. All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server. Which command ensures that SW3 receives frames only from VLAN 50?A . SW1(config)#vtp mode transparentB . SW3(config)#vtp mode...

October 5, 2020 No Comments READ MORE +

What are two common sources of interference for Wi-Fi networks? (Choose two.)

What are two common sources of interference for Wi-Fi networks? (Choose two.)A . LED lightsB . radarC . fire alarmD . conventional ovenE . rogue APView AnswerAnswer: BE

October 5, 2020 No Comments READ MORE +

Which configuration accomplishes this task?

The login method is configured on the VTY lines of a router with these parameters. - The first method for authentication is TACACS - If TACACS is unavailable, login is allowed without any provided credentials Which configuration accomplishes this task? A ) B) C) D) A . Option AB ....

October 5, 2020 No Comments READ MORE +

Which LISP infrastructure device provides connectivity between non-LISP sites and LISP sites by receiving non-LISP traffic with a LISP site destination?

Which LISP infrastructure device provides connectivity between non-LISP sites and LISP sites by receiving non-LISP traffic with a LISP site destination?A . PITRB . map resolverC . map serverD . PETRView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Data_Center/DCI/5­0/LISPmobility/DCI_LISP_Host_Mobility/LISPmobile_2.html

October 5, 2020 No Comments READ MORE +

What is the difference between a RIB and a FIB?

What is the difference between a RIB and a FIB?A . The FIB is populated based on RIB content.B . The RIB maintains a minor image of the FID . The RIB is used to make IP source prefix-based switching decisions.E . The FIB is where all IP routing information...

October 4, 2020 No Comments READ MORE +