An administrator notices that large numbers of packets are being dropped on one of the branch routers. What should be done or checked?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

An administrator notices that large numbers of packets are being dropped on one of the branch routers. What should be done or checked? Create extra static routes to the same…

Continue ReadingAn administrator notices that large numbers of packets are being dropped on one of the branch routers. What should be done or checked?

What method of wireless authentication is dependent on a RADIUS authentication server?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

What method of wireless authentication is dependent on a RADIUS authentication server? WEP WPA2 Enterprise WPA Personal WPA2 Personal Explanation & Hint: The method of wireless authentication that is dependent…

Continue ReadingWhat method of wireless authentication is dependent on a RADIUS authentication server?

A company is deploying a wireless network in the distribution facility in a Boston suburb. The warehouse is quite large and it requires multiple access points to be used. Because some of the company devices still operate at 2.4GHz, the network administrator decides to deploy the 802.11g standard. Which channel assignments on the multiple access points will make sure that the wireless channels are not overlapping?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A company is deploying a wireless network in the distribution facility in a Boston suburb. The warehouse is quite large and it requires multiple access points to be used. Because…

Continue ReadingA company is deploying a wireless network in the distribution facility in a Boston suburb. The warehouse is quite large and it requires multiple access points to be used. Because some of the company devices still operate at 2.4GHz, the network administrator decides to deploy the 802.11g standard. Which channel assignments on the multiple access points will make sure that the wireless channels are not overlapping?

A new Layer 3 switch is connected to a router and is being configured for interVLAN routing. What are three of the five steps required for the configuration? (Choose three.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:15 mins read

A new Layer 3 switch is connected to a router and is being configured for interVLAN routing. What are three of the five steps required for the configuration? (Choose three.)…

Continue ReadingA new Layer 3 switch is connected to a router and is being configured for interVLAN routing. What are three of the five steps required for the configuration? (Choose three.)

A network administrator uses the spanning-tree portfast bpduguard default global configuration command to enable BPDU guard on a switch. However, BPDU guard is not activated on all access ports. What is the cause of the issue?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

A network administrator uses the spanning-tree portfast bpduguard default global configuration command to enable BPDU guard on a switch. However, BPDU guard is not activated on all access ports. What…

Continue ReadingA network administrator uses the spanning-tree portfast bpduguard default global configuration command to enable BPDU guard on a switch. However, BPDU guard is not activated on all access ports. What is the cause of the issue?

A network administrator configures the port security feature on a switch. The security policy specifies that each access port should allow up to two MAC addresses. When the maximum number of MAC addresses is reached, a frame with the unknown source MAC address is dropped and a notification is sent to the syslog server. Which security violation mode should be configured for each access port?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A network administrator configures the port security feature on a switch. The security policy specifies that each access port should allow up to two MAC addresses. When the maximum number…

Continue ReadingA network administrator configures the port security feature on a switch. The security policy specifies that each access port should allow up to two MAC addresses. When the maximum number of MAC addresses is reached, a frame with the unknown source MAC address is dropped and a notification is sent to the syslog server. Which security violation mode should be configured for each access port?

What action takes place when the source MAC address of a frame entering a switch appears in the MAC address table associated with a different port?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

What action takes place when the source MAC address of a frame entering a switch appears in the MAC address table associated with a different port? The switch purges the…

Continue ReadingWhat action takes place when the source MAC address of a frame entering a switch appears in the MAC address table associated with a different port?

Which two types of spanning tree protocols can cause suboptimal traffic flows because they assume only one spanning-tree instance for the entire bridged network? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which two types of spanning tree protocols can cause suboptimal traffic flows because they assume only one spanning-tree instance for the entire bridged network? (Choose two.) STP Rapid PVST+ MSTP…

Continue ReadingWhich two types of spanning tree protocols can cause suboptimal traffic flows because they assume only one spanning-tree instance for the entire bridged network? (Choose two.)

A network administrator is preparing the implementation of Rapid PVST+ on a production network. How are the Rapid PVST+ link types determined on the switch interfaces?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A network administrator is preparing the implementation of Rapid PVST+ on a production network. How are the Rapid PVST+ link types determined on the switch interfaces? Link types can only…

Continue ReadingA network administrator is preparing the implementation of Rapid PVST+ on a production network. How are the Rapid PVST+ link types determined on the switch interfaces?

Refer to the exhibit. Which trunk link will not forward any traffic after the root bridge election process is complete?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

Refer to the exhibit. Which trunk link will not forward any traffic after the root bridge election process is complete? Trunk1 Trunk2 Trunk3 Trunk4 Explanation & Hint: Because the path…

Continue ReadingRefer to the exhibit. Which trunk link will not forward any traffic after the root bridge election process is complete?

Refer to the exhibit. After attempting to enter the configuration that is shown in router RTA, an administrator receives an error and users on VLAN 20 report that they are unable to reach users on VLAN 30. What is causing the problem?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Refer to the exhibit. After attempting to enter the configuration that is shown in router RTA, an administrator receives an error and users on VLAN 20 report that they are…

Continue ReadingRefer to the exhibit. After attempting to enter the configuration that is shown in router RTA, an administrator receives an error and users on VLAN 20 report that they are unable to reach users on VLAN 30. What is causing the problem?

Which two statements are characteristics of routed ports on a multilayer switch? (Choose two.)​

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which two statements are characteristics of routed ports on a multilayer switch? (Choose two.)​ In a switched network, they are mostly configured between switches at the core and distribution layers.…

Continue ReadingWhich two statements are characteristics of routed ports on a multilayer switch? (Choose two.)​

A static route has been configured on a router. However, the destination network no longer exists. What should an administrator do to remove the static route from the routing table?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A static route has been configured on a router. However, the destination network no longer exists. What should an administrator do to remove the static route from the routing table?…

Continue ReadingA static route has been configured on a router. However, the destination network no longer exists. What should an administrator do to remove the static route from the routing table?

Refer to the exhibit. What is the metric to forward a data packet with the IPv6 destination address 2001:DB8:ACAD:E:240:BFF:FED4:9DD2?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Refer to the exhibit. What is the metric to forward a data packet with the IPv6 destination address 2001:DB8:ACAD:E:240:BFF:FED4:9DD2? 90 128 2170112 2681856 2682112 3193856 Explanation: The IPv6 destination address…

Continue ReadingRefer to the exhibit. What is the metric to forward a data packet with the IPv6 destination address 2001:DB8:ACAD:E:240:BFF:FED4:9DD2?

Refer to the exhibit. Which route was configured as a static route to a specific network using the next-hop address?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Refer to the exhibit. Which route was configured as a static route to a specific network using the next-hop address? S 0.0.0.0/0 [1/0] via 10.16.2.2 S 10.17.2.0/24 is directly connected,…

Continue ReadingRefer to the exhibit. Which route was configured as a static route to a specific network using the next-hop address?

Compared with dynamic routes, what are two advantages of using static routes on a router? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

Compared with dynamic routes, what are two advantages of using static routes on a router? (Choose two.) They automatically switch the path to the destination network when the topology changes.…

Continue ReadingCompared with dynamic routes, what are two advantages of using static routes on a router? (Choose two.)

A network administrator is configuring a WLAN. Why would the administrator disable the broadcast feature for the SSID?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A network administrator is configuring a WLAN. Why would the administrator disable the broadcast feature for the SSID? to reduce the risk of interference by external devices such as microwave…

Continue ReadingA network administrator is configuring a WLAN. Why would the administrator disable the broadcast feature for the SSID?

Match the DHCP message types to the order of the DHCPv4 process. (Not all options are used.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Match the DHCP message types to the order of the DHCPv4 process. (Not all options are used.) Answers Explanation & Hints: The broadcast DHCPDISCOVER message finds DHCPv4 servers on the…

Continue ReadingMatch the DHCP message types to the order of the DHCPv4 process. (Not all options are used.)

Refer to the exhibit. How is a frame sent from PCA forwarded to PCC if the MAC address table on switch SW1 is empty?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Refer to the exhibit. How is a frame sent from PCA forwarded to PCC if the MAC address table on switch SW1 is empty? SW1 forwards the frame directly to…

Continue ReadingRefer to the exhibit. How is a frame sent from PCA forwarded to PCC if the MAC address table on switch SW1 is empty?