Based on this interface configuration, what is the expected state of OSPF adjacency?

Based on this interface configuration, what is the expected state of OSPF adjacency? A . 2WAY/DROTHER on both routersB . not establishedC . FULL on both routersD . FULL/BDR on R1 and FULL/BDR on R2View AnswerAnswer: B

September 17, 2020 No Comments READ MORE +

Which function does a fabric edge node perform in an SD-Access deployment?

Which function does a fabric edge node perform in an SD-Access deployment?A . Connects endpoints to the fabric and forwards their traffic.B . Encapsulates end-user data traffic into LISD . Connects the SD-Access fabric to another fabric or external Layer 3 networks.E . Provides reachability between border nodes in the...

September 17, 2020 No Comments READ MORE +

Which behavior can be expected when the HSRP version is changed from 1 to 2?

Which behavior can be expected when the HSRP version is changed from 1 to 2?A . No changes occur because the standby router is upgraded before the active router.B . No changes occur because version 1 and 2 use the same virtual MAC OUD . Each HSRP group reinitializes because...

August 2, 2020 No Comments READ MORE +

If a VRRP master router fails, which router is selected as the new master router?

If a VRRP master router fails, which router is selected as the new master router?A . router with the lowest priorityB . router with the highest priorityC . router with the highest loopback addressD . router with the lowest loopback addressView AnswerAnswer: B

August 1, 2020 No Comments READ MORE +

Which device presents the web authentication for the WLAN?

An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy. Which device presents the web authentication for the WLAN?A . ISE serverB . RADIUS serverC . anchor WLCD . local WLCView AnswerAnswer: D

August 1, 2020 No Comments READ MORE +

Which two protocols are used with YANG data models? (Choose two.)

Which two protocols are used with YANG data models? (Choose two.)A . TLSB . RESTCONFC . SSHD . NETCONFE . HTTPSView AnswerAnswer: BD

August 1, 2020 No Comments READ MORE +

In OSPF, which LSA type is responsible for pointing to the ASBR router?

In OSPF, which LSA type is responsible for pointing to the ASBR router?A . type 1B . type 2C . type 3D . type 4View AnswerAnswer: D

July 31, 2020 No Comments READ MORE +

Which First Hop Redundancy Protocol maximizes uplink utilization and minimizes the amount of configuration that is necessary?

Which First Hop Redundancy Protocol maximizes uplink utilization and minimizes the amount of configuration that is necessary?A . GLBPB . HSRP v2C . VRRPD . HSRP v1View AnswerAnswer: A

July 31, 2020 No Comments READ MORE +

Which configuration accomplishes this task?

The login method is configured on the VTY lines of a router with these parameters. - The first method for authentication is TACACS - If TACACS is unavailable, login is allowed without any provided credentials Which configuration accomplishes this task? A ) B) C) D) A . Option AB ....

July 31, 2020 1 Comment READ MORE +

Drag and drop the descriptions from the left onto the correct QoS components on the right

DRAG DROP Drag and drop the descriptions from the left onto the correct QoS components on the right. View AnswerAnswer:

July 31, 2020 No Comments READ MORE +