Which PAgP mode combination prevents an EtherChannel from forming?
Which PAgP mode combination prevents an EtherChannel from forming?A . auto/desirableB . desirable/desirableC . desirable/autoD . auto/autoView AnswerAnswer: D Explanation: Reference: https://www.omnisecu.com/cisco-certified-network-associate-ccna/etherchannel-pagp-andlacp-modes.php
Which protocol does REST API rely on to secure the communication channel?
Which protocol does REST API rely on to secure the communication channel?A . HTTPB . SSHC . HTTPSD . TCPView AnswerAnswer: C
Which feature allows the legacy clients to connect while still allowing other clients to use fast transition based on their OUIs?
An engineer configures a WLAN with fast transition enabled. Some legacy clients fail to connect to this WLAN. Which feature allows the legacy clients to connect while still allowing other clients to use fast transition based on their OUIs?A . over the DSB . 802.11kC . adaptive RD . 802.11vView...
Which type of antenna do the radiation patterns present?
Refer to the exhibit. Which type of antenna do the radiation patterns present?A . YagiB . patchC . omnidirectionalD . dipoleView AnswerAnswer: B Explanation: Reference: https://www.cisco.com/c/en/us/products/collateral/wireless/aironet-antennasaccessories/prod_white_paper0900aecd806a1a3e.html
of messages to its default port?
When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?A . logging host 10.2.3.4 vrf mgmt transport tcp port 514B . logging host 10.2.3.4 vrf mgmt transport udp port 514C . logging host 10.2.3.4 vrf mgmt transport tcp port 6514D ....
Which statement about TLS is true when using RESTCONF to write configurations on network devices?
Which statement about TLS is true when using RESTCONF to write configurations on network devices?A . It is used for HTTP and HTTPS requests.B . It requires certificates for authentication.C . It is provided using NGINX acting as a proxy web server.D . It is not supported on Cisco devices.View...
Based on the configuration in this WLAN security setting, which method can a client use to authenticate to the network?
Refer to the exhibit. Based on the configuration in this WLAN security setting, which method can a client use to authenticate to the network?A . text stringB . username and passwordC . RADIUS tokenD . certificateView AnswerAnswer: A
Which two actions can the network administrator take to minimize the possibility of typing commands incorrectly?
A network administrator is implementing a routing configuration change and enables routing debugs to track routing behavior during the change. The logging output on the terminal is interrupting the command typing process. Which two actions can the network administrator take to minimize the possibility of typing commands incorrectly? (Choose two.)A...
Which method creates an EEM applet policy that is registered with EEM and runs on demand or manually?
Which method creates an EEM applet policy that is registered with EEM and runs on demand or manually?A . event manager applet ondemand event none action 1.0 syslog priority critical msg ‘This is a message from ondemand’B . event manager applet ondemand action 1.0 syslog priority critical msg ‘This is...
Which two pieces of information are necessary to compute SNR? (Choose two.)
Which two pieces of information are necessary to compute SNR? (Choose two.)A . transmit powerB . noise floorC . EIRPD . RSSIE . antenna gainView AnswerAnswer: BD Explanation: Reference: https://community.cisco.com/t5/wireless-mobility-documents/snr-rssi-eirp-and-free-spacepath-loss/ta-p/3128478