What can administrators determine?
Refer to the exhibits. Exhibit 1 Exhibit 2 Switch-1 and Switch-2 are configured to provide VRRP in VLAN 2. The default gateway for VLAN 2 is set to the VRRP virtual IP. Client-1 in VLAN 2 cannot ping its default…
Refer to the exhibits. Exhibit 1 Exhibit 2 Switch-1 and Switch-2 are configured to provide VRRP in VLAN 2. The default gateway for VLAN 2 is set to the VRRP virtual IP. Client-1 in VLAN 2 cannot ping its default…
Network administrators need to track when traffic matches deny entry in an ACL applied to a port. They want the alert to be sent to a syslog server that is already set up to send logs. What should administrators do…
Refer to the exhibits. Exhibit 1 Exhibit 2 In the exhibits, VLAN 20 under a device name indicates that the device is configured with that VLAN. The exhibits also indicate whether VLAN 20 is statically configured on each link, either…
Refer to the exhibits. Exhibit 1 Exhibit 2 Switch-1 has a power issue that causes it to fail. When Switch-1 comes back up, endpoints lose connectivity for a few minutes. The network administrator decides to enter this command on Switch-1:…
An AOS-Switch runs IGMP on A VLAN. What is a requirement for the switch to be a potential IGMP querier on that VLAN? A. The switch must run PIM-SM or PIM-DM on that VLAN. B. The switch must have an…
Refer to the exhibit. Switch-1 runs BGP. What should the network administrator do to permit Switch-1 to establish a neighbor relationship with Router-1? A. Configure 192.168.1.2 as a neighbor manually within the BGP context. B. Specify 192.168.1.0/30 with the network…
Refer to the exhibit. An AOS-Switch has an extended ACL that is applied to several physical interfaces. – New interfaces have been brought online. – The ACL has been applied to them as well. A network administrator sees the output…
Refer to the exhibit. A company requires distribution layer switches that can provide Layer 2 and Layer 3 redundancy. The exhibit shows the proposal for these switches. Which change to the proposal will help meet the company’s requirements? A. The…
Which benefit is provided by MD5 authentication for BGP? A. It validates that BGP messages arrive from an authorized device. B. It verifies that received BGP routes have valid next hop IP addresses. C. It enables users to authenticate to…
Refer to the exhibits. Exhibit 1. Exhibit 2. The VoIP phone connects, authenticates successfully, and is dynamically assigned to tagged VLAN 6. The endpoint connected to the phone does not authenticate but starts to send untagged traffic. How does the…