Which protocols use a central server to authenticate users?
Which protocols use a central server to authenticate users?A . ARP and IMAPB . RADIUS and ARPC . TACACS+ and IMAPD . TACACS+ and RADIUSView AnswerAnswer: D
How has OSPF been configured?
Refer to the output: How has OSPF been configured?A . For network type broadcastB . With a dead-timer mismatchC . For network type point-to-pointD . With a Peer-to-Peer LSA learning of type 7 LSAsView AnswerAnswer: C
Which command shows active telnet sessions on Dell N-Series switches?
Which command shows active telnet sessions on Dell N-Series switches?A . Show hostsB . Show sessionsC . Show users accountsD . Show line telnetView AnswerAnswer: B
Which Border Gateway Protocol (BGP) version supports IPv6?
Which Border Gateway Protocol (BGP) version supports IPv6?A . BGPngB . BGPv2C . BGPv3D . BGPv4View AnswerAnswer: D
What is the size of the ICMP header?
What is the size of the ICMP header?A . 8 bitsB . 8 bytesC . 16 bitsD . 16 bytesView AnswerAnswer: B
In IPv6 addressing, what refers to four binary characters?
In IPv6 addressing, what refers to four binary characters?A . ByteB . BitC . NibbleD . BlockView AnswerAnswer: C
If all networks must be made to logically start with the lowest numbered network and end with the largest numbered network, which subnet mask achieves this design?
You recently joined a company as a junior-level network administrator. You have been tasked with designing the IPv4 scheme for five networks that will be used for training classrooms. These networks need to support no more than 28 devices each. Due to the existing network design, the senior-level network administrator...
Which command should be used to check the cable length?
A technician implements a new copper connection to Gi2/0/20. Which command should be used to check the cable length?A . test tdr copper-length gigabitethernet 2/0/20B . test copper-length tdr gigabitethernet 2/0/20C . test tdr copper-port gigabitethernet 2/0/20D . test copper-port tdr gigabitethernet 2/0/20View AnswerAnswer: D
How will RIP treat packets that have exceeded the default maximum hop count?
How will RIP treat packets that have exceeded the default maximum hop count?A . RIP will return the traffic back to the last hop and retransmit via another path.B . RIP will consider the destination subnet to be reachable.C . RIP will place traffic in a buffer until the hop...
Which management issue is the result?
A technician has one stack of three N3024. The technician removes the master unit without powering off the stack. This unit is reconfigured with new IP address in the same Layer 2 network. Which management issue is the result?A . A duplicate MAC addressB . A duplicate IP addressC ....