Which type does a port become when it receives the best BPDU on a bridge?
Which type does a port become when it receives the best BPDU on a bridge? A. The designated port B. The backup port C. The alternate port D. The root port
Which type does a port become when it receives the best BPDU on a bridge? A. The designated port B. The backup port C. The alternate port D. The root port
When you deploy multilink PPP on your network, where must you configure the group IP Address on each device? A. in the global config B. Under serial interface C. Under the routing protocol D. Under the multilink interface
Host is able to ping a web server but it is not able to do HTTP request. A. ACL blocking port 23 B. ACL blocking All ports C. ACL blocking port 80 D. ACL blocking port 443 E. None of…
Which 3 feature are represented by A letter in AAA? (Choose Three) A. authorization B. accounting C. authentication D. accountability E. accessibility F. authority
Which value can you modify to configure a specific interface as the preferred forwarding interface? A. The interface number B. The port priority C. The VLAN priority D. The hello time
Which two statements about VTP are true? (Choose two.) A. All switches must be configured with the same VTP domain name B. All switches must be configured to perform trunk negotiation. C. All switches must be configured with a unique…
Refer to the exhibit. On R1 which routing protocol is in use on the route to 192.168.10.1? A. RIP B. OSPF C. IGRP D. EIGRP
Which Command do you enter so that R1 advertises the loopback0 interface to the BGP Peers? A. Network 172.16.1.32 mask 255.255.255.224 B. Network 172.16.1.0 0.0.0.255 C. Network 172.16.1.32 255.255.255.224 D. Network 172.16.1.33 mask 255.255.255.224 E. Network 172.16.1.32 mask 0.0.0.31 F.…
Which two options are primary responsibilities of the APIC-EM controller? (Choose two.) A. It automates network actions between different device types B. It provides robust asset management. C. It tracks license usage and Cisco IOS versions. D. It automates network…
In order to comply with new auditing standards, a security administrator must be able to correlate system security alert logs directly with the employee who triggers the alert. Which of the following should the security administrator implement in order to…