Refer to the exhibit. What can be concluded about the configuration shown on R1?
Refer to the exhibit. What can be concluded about the configuration shown on R1? R1 is configured as a DHCPv4 relay agent. R1 will send a message to a local…
Refer to the exhibit. What can be concluded about the configuration shown on R1? R1 is configured as a DHCPv4 relay agent. R1 will send a message to a local…
A network administrator is configuring a new Cisco switch for remote management access. Which three items must be configured on the switch for the task? (Choose three.) IP address default…
Refer to the exhibit. A network administrator configured routers R1 and R2 as part of HSRP group 1. After the routers have been reloaded, a user on Host1 complained of…
Which two functions are performed by a WLC when using split media access control (MAC)? (Choose two.) packet acknowledgments and retransmissions frame translation to other protocols association and re-association of…
A technician is configuring a router for a small company with multiple WLANs and doesn't need the complexity of a dynamic routing protocol. What should be done or checked? Check…
Refer to the exhibit. Which three hosts will receive ARP requests from host A, assuming that port Fa0/4 on both switches is configured to carry traffic for multiple VLANs? (Choose…
A new switch is to be added to an existing network in a remote office. The network administrator does not want the technicians in the remote office to be able…
What action takes place when a frame entering a switch has a unicast destination MAC address that is not in the MAC address table? The switch resets the refresh timer…
What is the IPv6 prefix that is used for link-local addresses? FE80::/10 FF01::/8 FC00::/7 2001::/3 Explanation & Hint: The IPv6 prefix used for link-local addresses is FE80::/10. These addresses are…
A company security policy requires that all MAC addressing be dynamically learned and added to both the MAC address table and the running configuration on each switch. Which port security…
A technician is troubleshooting a slow WLAN and decides to use the split-the-traffic approach. Which two parameters would have to be configured to do this? (Choose two.) Configure the 2.4…
What is the common term given to SNMP log messages that are generated by network devices and sent to the SNMP server? traps auditing acknowledgments warnings Explanation & Hint: The…
Refer to the exhibit. All the displayed switches are Cisco 2960 switches with the same default priority and operating at the same bandwidth. Which three ports will be STP designated…
What is a method to launch a VLAN hopping attack? introducing a rogue switch and enabling trunking flooding the switch with MAC addresses sending spoofed IP addresses from the attacking…
What would be the primary reason an attacker would launch a MAC address overflow attack? so that the attacker can execute arbitrary code on the switch so that the switch…
Which command will start the process to bundle two physical interfaces to create an EtherChannel group via LACP? channel-group 2 mode auto channel-group 1 mode desirable interface port-channel 2 interface…
Which option shows a correctly configured IPv4 default static route? ip route 0.0.0.0 0.0.0.0 S0/0/0 ip route 0.0.0.0 255.0.0.0 S0/0/0 ip route 0.0.0.0 255.255.255.0 S0/0/0 ip route 0.0.0.0 255.255.255.255 S0/0/0…
Which type of static route is configured with a greater administrative distance to provide a backup route to a route learned from a dynamic routing protocol? standard static route default…
Refer to the exhibit. Router R1 has an OSPF neighbor relationship with the ISP router over the 192.168.0.32 network. The 192.168.0.36 network link should serve as a backup when the…
What protocol or technology uses source IP to destination IP as a load-balancing mechanism? EtherChannel VTP STP DTP Explanation & Hint: The protocol or technology that uses source IP to…