Which First Hop Redundancy Protocol maximizes uplink utilization and minimizes the amount of configuration that is necessary?
Which First Hop Redundancy Protocol maximizes uplink utilization and minimizes the amount of configuration that is necessary?A . GLBPB . HSRP v2C . VRRPD . HSRP v1View AnswerAnswer: A
What is the logging severity level?
Refer to this output. R1# *Feb 14 37:09:53.129: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1, changed state to up What is the logging severity level?A . notificationB . emergencyC . criticalD . alertView AnswerAnswer: A
Which device presents the web authentication for the WLAN?
An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy. Which device presents the web authentication for the WLAN?A . ISE serverB . RADIUS serverC . anchor WLCD . local WLCView AnswerAnswer: D
Which statement about a fabric access point is true?
Which statement about a fabric access point is true?A . It is in local mode and must be connected directly to the fabric edge switch.B . It is in local mode and must be connected directly to the fabric border nodeC . It is in FlexConnect mode and must be...
Which behavior can be expected when the HSRP version is changed from 1 to 2?
Which behavior can be expected when the HSRP version is changed from 1 to 2?A . No changes occur because the standby router is upgraded before the active router.B . No changes occur because version 1 and 2 use the same virtual MAC OUD . Each HSRP group reinitializes because...
Which reason could cause an OSPF neighborship to be in the EXSTART/EXCHANGE state?
Which reason could cause an OSPF neighborship to be in the EXSTART/EXCHANGE state?A . mismatched OSPF link costsB . mismatched OSPF network typeC . mismatched areasD . mismatched MTU sizeView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/1368412.html#neighbors
Which two mechanisms are available to secure NTP? (Choose two.)
Which two mechanisms are available to secure NTP? (Choose two.)A . IPsecB . IP prefix list-basedC . encrypted authenticationD . TACACS-based authenticationE . IP access list-basedView AnswerAnswer: CE Explanation: Reference: https://www.cisco.com/c/dam/en/us/td/docs/ios-xml/ios/bsm/configuration/xe3se/3650/bsm-xe-3se-3650-book.html
Which IP address becomes the active next hop for 192.168.102.0/24 when 192.168.101.2 fails?
Refer to the exhibit. Which IP address becomes the active next hop for 192.168.102.0/24 when 192.168.101.2 fails?A . 192.168.101.10B . 192.168.101.14C . 192.168.101.6D . 192.168.101.18View AnswerAnswer: D
Which configuration establishes EBGP connected neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP?
Refer to the exhibit. Which configuration establishes EBGP connected neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP?A . R1(config)#router bgp 1 R1(config-router)#neighbor 192.168.10.2 remote-as 2 R1(config-router)#network 10.1.1.0 mask 255.255.255.0 R2(config)#router bgp 2 R2(config-router)#neighbor 192.168.10.1 remote-as 1 R2(config-router)#network 10.2.2.0 mask 255.255.255.0B...
environments and data centers?
How does Cisco TrustSec enable more flexible access controls for dynamic networking environments and data centers?A . uses flexible NetFlowB . assigns a VLAN to the endpointC . classifies traffic based on advanced application recognitionD . classifies traffic based on the contextual identity of the endpoint rather than its IP...