How was spanning-tree configured on this interface?

Refer to the Exhibit. How was spanning-tree configured on this interface?A . By entering the command spanning-tree portfast trunk in the interface configuration mode.B . By entering the command spanning-tree portfast in the interface configuration modeC . By entering the command spanning-tree mst1 vlan 10,20,30,40 in the global configuration modeD...

February 5, 2024 No Comments READ MORE +

Which command ensures that SW3 receives frames only from VLAN 50?

Refer to exhibit. VLANs 50 and 60 exist on the trunk links between all switches All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server. Which command ensures that SW3 receives frames only from VLAN 50?A . SW1 (config)#vtp pruningB . SW3(config)#vtp mode transparentC...

February 5, 2024 No Comments READ MORE +

Which command on router1 causes it to take over the forwarding role when it return to service?

Refer to the exhibit. Router 1 is currently operating as the HSRP primary with a priority of 110 router1 fails and router2 take over the forwarding role. Which command on router1 causes it to take over the forwarding role when it return to service?A . standby 2 priorityB . standby...

February 5, 2024 No Comments READ MORE +

What is one fact about Cisco SD-Access wireless network deployments?

What is one fact about Cisco SD-Access wireless network deployments?A . The access point is part of the fabric underlayB . The WLC is part of the fabric underlayC . The access point is part the fabric overlayD . The wireless client is part of the fabric overlayView AnswerAnswer: C

February 5, 2024 No Comments READ MORE +

Which cisco DNA center application is responsible for group-based accesss control permissions?

Which cisco DNA center application is responsible for group-based accesss control permissions?A . DesignB . ProvisionC . AssuranceD . PolicyView AnswerAnswer: D

February 4, 2024 No Comments READ MORE +

Which single security feature is recommended to provide Network Access Control in the enterprise?

Refer to the Exhibit. Which single security feature is recommended to provide Network Access Control in the enterprise?A . MABB . 802.1XC . WebAuthD . port security sticky MACView AnswerAnswer: B

February 4, 2024 No Comments READ MORE +

What is required for a virtual machine to run?

What is required for a virtual machine to run?A . a Type 1 hypervisor and a host operating systemB . a hypervisor and physical server hardwareC . only a Type 1 hypervisorD . only a Type 2 hypervisorView AnswerAnswer: B

February 4, 2024 No Comments READ MORE +

What Is a Type 2 hypervisor?

What Is a Type 2 hypervisor?A . installed as an application on an already installed operating systemB . runs directly on a physical server and includes its own operating systemC . supports over-allocation of physical resourcesD . also referred to as a "bare metal hypervisor" because it sits directly on...

February 4, 2024 No Comments READ MORE +

Which two operational models enable an AP to scan one or more wireless channels for rouge access points and at the same time provide wireless services to clients? (Choose two.)

Which two operational models enable an AP to scan one or more wireless channels for rouge access points and at the same time provide wireless services to clients? (Choose two.)A . Rouge detectorB . SnifferC . FlexConnectD . LocalE . MonitorView AnswerAnswer: D, E

February 4, 2024 No Comments READ MORE +

Which command set accomplishes this requirement?

Refer to the exhibit. External users require HTTP connectivity to an internal company web server that is listening on TCP port 8080. Which command set accomplishes this requirement? A) B) C) D) A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: B

February 4, 2024 No Comments READ MORE +