Which command set configures RSPAN to capture outgoing traffic from VLAN 3 on interface GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface?
Which command set configures RSPAN to capture outgoing traffic from VLAN 3 on interface GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface?A . monitor session 2 source interface gigabitethernet0/3 tx monitor session 2 filter vlan 3B . monitor session 2 source interface gigabitethernet0/3 tx monitor session 2...
Which protocol ensures that traffic is not disrupted in the event of a hardware failure?
Refer to the exhibit. An engineer is installing a new pair of routers in a redundant configuration. Which protocol ensures that traffic is not disrupted in the event of a hardware failure?A . HSRPv1B . GLBPC . VRRPD . HSRPv2View AnswerAnswer: A Explanation: The Dvirtual MAC address‖ is 0000.0c07.acXX (XX...
Which statement about TLS is accurate when using RESTCONF to write configurations on network devices?
Which statement about TLS is accurate when using RESTCONF to write configurations on network devices?A . It requires certificates for authenticationB . It is provided using NGINX acting as a proxy web serverC . It is used for HTTP and HTTPS requestsD . It is not supported on Cisco devicesView...
What is one benefit of implementing a VSS architecture?
What is one benefit of implementing a VSS architecture?A . It provides multiple points of management for redundancy and improved supportB . It uses GLBP to balance traffic between gateways.C . It provides a single point of management for improved efficiency.D . It uses a single database to manage configuration...
Which two actions can the network administrator take to minimize the possibility of typing commands incorrectly?
A network administrator is implementing a routing configuration change and enables routing debugs to track routing behavior during the change. The logging output on the terminal is interrupting the command typing process. Which two actions can the network administrator take to minimize the possibility of typing commands incorrectly? (Choose two.)A...
Drag and drop the snippets onto the blanks within the code to construct a script that configures BGP according to the topology. Not all options are used, and some options may be used twice
DRAG DROP Drag and drop the snippets onto the blanks within the code to construct a script that configures BGP according to the topology. Not all options are used, and some options may be used twice. View AnswerAnswer:
Which configuration restricts the amount of SSH that a router accepts 100 kbps?
Which configuration restricts the amount of SSH that a router accepts 100 kbps? A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: C Explanation: CoPP protects the route processor on network devices by treating route processor resources as a separate entity with its own ingress...
What do Cisco DNA southbound APIs provide?
What do Cisco DNA southbound APIs provide?A . Interface between the controller and the network devicesB . NETCONF API interface for orchestration communicationC . RESful API interface for orchestrator communicationD . Interface between the controller and the consumerView AnswerAnswer: A Explanation: The Southbound API is used to communicate with network...
What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared?
Refer to Exhibit. MTU has been configured on the underlying physical topology, and no MTU command has been configured on the tunnel interfaces. What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared?A . The packet arrives...
What is the result when a switch that is running PVST+ is added to this network?
Refer to the exhibit. What is the result when a switch that is running PVST+ is added to this network?A . DSW2 operates in Rapid PVST+ and the new switch operates in PVST+B . Both switches operate in the PVST+ modeC . Spanning tree is disabled automatically on the networkD...