Which EtherChannel mode must be configured on the switch to allow the WLC to connect?
To increase total throughput and redundancy on the links between the wireless controller and switch, the customer enabled LAG on the wireless controller. Which EtherChannel mode must be configured on the switch to allow the WLC to connect?A . ActiveB . PassiveC . OnD . AutoView AnswerAnswer: C Explanation: Reference:...
Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?
Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?A . SSLB . Cisco TrustSecC . MACsecD . IPsecView AnswerAnswer: C
Which command ensures that SW3 receives frames only from VLAN 50?
Refer to the exhibit. VLANs 50 and 60 exist on the trunk links between all switches. All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server. Which command ensures that SW3 receives frames only from VLAN 50?A . SW1(config)#vtp mode transparentB . SW3(config)#vtp mode...
Which LISP infrastructure device provides connectivity between non-LISP sites and LISP sites by receiving non-LISP traffic with a LISP site destination?
Which LISP infrastructure device provides connectivity between non-LISP sites and LISP sites by receiving non-LISP traffic with a LISP site destination?A . PITRB . map resolverC . map serverD . PETRView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Data_Center/DCI/50/LISPmobility/DCI_LISP_Host_Mobility/LISPmobile_2.html
Which protocol does REST API rely on to secure the communication channel?
Which protocol does REST API rely on to secure the communication channel?A . HTTPB . SSHC . HTTPSD . TCPView AnswerAnswer: C
What is a benefit of data modeling languages like YANG?
What is a benefit of data modeling languages like YANG?A . They create more secure and efficient SNMP OIDs.B . They provide a standardized data structure, which results in configuration scalability and consistency.C . They enable programmers to change or write their own applications within the device operating system.D ....
environments and data centers?
How does Cisco TrustSec enable more flexible access controls for dynamic networking environments and data centers?A . uses flexible NetFlowB . assigns a VLAN to the endpointC . classifies traffic based on advanced application recognitionD . classifies traffic based on the contextual identity of the endpoint rather than its IP...
Which feature allows the legacy clients to connect while still allowing other clients to use fast transition based on their OUIs?
An engineer configures a WLAN with fast transition enabled. Some legacy clients fail to connect to this WLAN. Which feature allows the legacy clients to connect while still allowing other clients to use fast transition based on their OUIs?A . over the DSB . 802.11kC . adaptive RD . 802.11vView...
If a VRRP master router fails, which router is selected as the new master router?
If a VRRP master router fails, which router is selected as the new master router?A . router with the lowest priorityB . router with the highest priorityC . router with the highest loopback addressD . router with the lowest loopback addressView AnswerAnswer: B
Which IP SLA operation requires the IP SLA responder to be configured on the remote end?
Which IP SLA operation requires the IP SLA responder to be configured on the remote end?A . UDP jitterB . ICMP jitterC . TCP connectD . ICMP echoView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/122/46sg/configuration/guide/Wrapper-46SG/swipsla.pdf