A) facilitates communication between the controller and the applications
B) reports device errors to a controller
C) generates statistics for network hardware and traffic
D) communicates between the controller and the physical network hardware
Correct Answer
verified
Multiple Choice
A) whether the NTP peer is statically configured
B) the IP address of the peer to which the clock is synchronized
C) the configured NTP servers
D) whether the clock is synchronized
E) the NTP version number of the peer
Correct Answer
verified
Multiple Choice
A) Show ip DHCP database.
B) Show ip DHCP pool.
C) Show ip DHCP binding.
D) Show ip DHCP server statistic.
Correct Answer
verified
Multiple Choice
A) It ensures that data will be forwarded by RouterB.
B) It provides stability for the OSPF process on RouterB.
C) It specifies that the router ID for RouterB should be 10.0.0.1.
D) It decreases the metric for routes that are advertised from RouterB.
E) It indicates that RouterB should be elected the DR for the LAN.
Correct Answer
verified
Multiple Choice
A) The EtherChannel must be configured in "mode active".
B) When enabled, the WLC bandwidth drops to 500 Mbps.
C) To pass client traffic, two or more ports must be configured.
D) One functional physical port is needed to pass client traffic.
Correct Answer
verified
Multiple Choice
A) 10.10.10.0/28
B) 10.10.13.0/25
C) 10.10.13.144/28
D) 10.10.13.208/29
Correct Answer
verified
Multiple Choice
A) CBWFQ
B) FRTS
C) CAR
D) PBR
E) PQ
Correct Answer
verified
Multiple Choice
A) Change the maximum paths to 2
B) Change the configuration so they both have the same feasible distance
C) Change the variance for the path that has a feasible distance of 3072 to 2
D) Change the IP addresses so both paths have the same source IP address
Correct Answer
verified
Multiple Choice
A) default route
B) network route
C) host route
D) floating static route
Correct Answer
verified
Multiple Choice
A) The phone and a workstation that is connected to the phone do not have VLAN connectivity.
B) The phone sends and receives data in VLAN 50, but a workstation connected to the phone sends and receives data in VLAN 1.
C) The phone sends and receives data in VLAN 50, but a workstation connected to the phone has no VLAN connected.
D) The phone and a workstation that is connected to the phone send and receive data in VLAN 50.
Correct Answer
verified
Multiple Choice
A) Ipv6 route 2000::1/128 2012::1
B) Ipv6 route 2000::1/128 2012::1 5
C) Ipv6 route 2000::1/128 2012::2
D) Ipv6 route 2000::1/128 2023::2 5
E) Ipv6 route 2000::1/128 2023::3 5
Correct Answer
verified
Multiple Choice
A) TCP uses the three-way handshake, and UDP does not guarantee message delivery.
B) TCP uses synchronization packets, and UDP uses acknowledgment packets.
C) UDP provides reliable message transfer, and TCP is a connectionless protocol.
D) UDP uses SYN, SYN ACK, and FIN bits in the frame header while TCP uses SYN, SYN ACK, and ACK bits.
Correct Answer
verified
Multiple Choice
A) infrastructure-as-a-service
B) Software-as-a-service
C) control and distribution of physical resources
D) services as a hardware controller
Correct Answer
verified
Multiple Choice
A) to be a marking mechanism that identifies different flows
B) to provide fair queuing for buffered flows
C) to mitigate delays over slow links
D) to limit the bandwidth that a flow can use
Correct Answer
verified
Multiple Choice
A) switchport port-security violation access
B) switchport port-security violation protect
C) switchport port-security violation restrict
D) switchport port-security violation shutdown
Correct Answer
verified
Multiple Choice
A) enable dynamic MAC address learning
B) implement static MAC addressing
C) enable sticky MAC addressing
D) implement auto MAC address learning
Correct Answer
verified
Multiple Choice
A) The user enters a user name and password, and then re-enters the credentials on a second screen.
B) The user swipes a key fob, then clicks through an email link.
C) The user enter a user name and password, and then clicks a notification in an authentication app on a mobile device.
D) The user enters a PIN into an RSA token, and then enters the displayed RSA key on a login screen.
Correct Answer
verified
Multiple Choice
A) learned MAC addresses are deleted after five minutes of inactivity
B) the interface is error-disabled if packets arrive from a new unknown source address
C) it has dynamically learned two secure MAC addresses
D) it has dynamically learned three secure MAC addresses
E) the security violation counter increments if packets arrive from a new unknown source address
Correct Answer
verified
Multiple Choice
A) ipv6 route 2000::3/128 s0/0/0
B) ipv6 route 2000::1/128 s0/0/1
C) ipv6 route 2000::1/128 2012::1
D) ipv6 route 2000::1/128 2012::2
E) ipv6 route 2000::3/128 2023::3
Correct Answer
verified
Multiple Choice
A) The switch port remains administratively down until the interface is connected to another switch.
B) Dynamic ARP Inspection is disabled because the ARP ACL is missing.
C) The switch port interface trust state becomes untrusted.
D) The switch port remains down until it is configured to trust or untrust incoming packets.
Correct Answer
verified
Showing 141 - 160 of 411
Related Exams