-
Refer to the exhibit.
What is the configuration an example of? ()
https://assets.asklib.com/images/image2/2018073015220049716.jpg
A . GLBP weighting
B . default AVF and AVG configuration
C . GLBP MD5 authentication
D . GLBP text authentication
E . GLBP timer manipulatio
-
Refer to the exhibit. The output that is shown is generated at a switch. Which three of these statements are true? ()
A . All ports will be in a state of discarding, learning, or forwarding.
B . Thirty VLANs have been configured on this switch.
C . The bridge priority is lower than the default value for spanning tree.
D . All interfaces that are shown are on shared media.
E . All designated ports are in a forwarding state.
F . The switch must be the root bridge for all VLANs on this switch.
-
Refer to the exhibit. When deploying an MSFC and an FWSM, which statement is correct?()https://assets.asklib.com/images/image2/2018072609055419681.jpg
A . Proper placement depends on the VLAN assignment.
B . Place it outside the firewall.
C . Place it inside the firewall to make design and management easier.
D . Place it inside the firewall with multiple context modes connecting to all configured contexts.
-
Refer to the exhibit.
https://assets.asklib.com/images/image2/2018073016070377463.png
Which three statements describe the steps that are required to configure an IPsec site-to-site VPN using a GRE tunnel?()
A . The command access-list 110 permit gre must be configured to specify which traffic will be encrypted.
B . The command access-list 110 permit ip must be configured to specify which hosts can use the tunnel.
C . The tunnel destination 172.17.63.18 command must be configured on the Tunnel0 interface.
D . The tunnel mode gre command must be configured on the Tunnel0 interface.
E . The tunnel source Ethernet1 command must be configured on the Tunnel0 interface.
F . The tunnel source Tunnel0 command must be configured on the Tunnel0 interface.
-
Refer to the exhibit. Looking at the topology diagram and the partial router configurations shown, which statement is true? ()https://assets.asklib.com/images/image2/2018073016254049258.jpg
A . The NProuter has two OSPF neighbors in the "Full" adjacency state
B . The NProuter serial0/0 interface has the OSPF dead timer set to 10 seconds
C . The NProuter serial0/0 interface has been configured with an OSPF network type of "pointtopoint"
D . The 10.1.1.1 and 10.1.1.2 routers are not using the default OSPF dead and hello timers setting
E . The "Mismatched" error is caus ed by the expiration of the OSPF timer
-
Refer to the exhibit. Which configuration would correctly enable Host A to acquire an IP address from the DHCP server that is located at 10.1.2.10/24? ()https://assets.asklib.com/images/image2/201807301525026565.jpg
A . ASw1(config)# interface range FastEthernet 0/1 - 24 ASw1(config - if - range)# ip forward - protocol udp 67 ASw1(config - if - range)# ip forward - protocol udp 68
B . ASw1(config)# interface range FastEthernet 0/1 - 24 ASw1(config - if - range)# ip helper - address 10.1.2.10
C . RTA(config)# interface fastethernet0/0 RTA(config -if)# ip forward- protocol udp 67 RTA(config - if)# ip forwar d- protocol udp 68
D . RTA(config)# interface fastethernet0/1 RTA(config -if)# ip forward- protocol udp 67 RTA(config -if)# ip forward- protocol udp 68
E . RTA(config)# interface fastethernet0/0 RTA(config - if)# ip helper - address 10.1.2.10
F . RTA(config)# in terface fastethernet0/1 RTA(config - if)# ip helper - address 10.1.2.10
-
Refer to the exhibit. Look at the command output. What would be the most probable reason for this port-ID mismatch?()https://assets.asklib.com/images/image2/2018072409172527062.jpg
A . spanning-tree misconfiguration
B . speed mismatch configuration
C . cabling problem
D . configuration problem
-
Refer to the exhibit. An administrator pings the default gateway at 10.10.10.1 and sees the output as shown. At which OSI layer is the problem?()https://assets.asklib.com/images/image2/2018072409560147847.jpg
A . data link layer
B . application layer
C . access layer
D . session layer
E . network layer
-
Refer to the exhibit.
Which protocol establishes an optimal path to the root in a wireless mesh network? ()
https://assets.asklib.com/images/image2/2018073011454335678.jpg
A . Adaptive Wireless Path (AWP)
B . WLAN Quality of Service (WQoS)
C . Lightweight Access Point Protocol (LWAPP)
D . 802.1Q WLAN trunking protocol
E . Layer 2 Roaming (IAPP)
-
Refer to the exibit. Three cisco 2950 switches are set to their default priority settings.During the spanning-tree process,which switch will be elected as the root bridge?()https://assets.asklib.com/images/image2/2018072314082137678.jpg
A . Switch3
B . Switch4
C . Switch2
D . Switch1
-
Refer to the exhibit.
https://assets.asklib.com/images/image2/2018072608430379107.jpg
Which of the following is an advantage of device clustering utilizing Virtual Port Channels (vPC)?()
A . A logical star topology provides a loop free environment so that all links will be used forwardtraffic
B . Enhanced EtherChannel hashing load balancing using the vPC peer link internal to the VPC
C . The control plane functions of the Nexus switches are merged to hide the use of virtualization
D . Neighboring devices connect on a Layer 3 MEC for improved packet forwarding
-
Refer to the exhibit.
How will interface FastEthernnet0/1 respond when an 802.1x-enabled client connects to the port? ()
https://assets.asklib.com/images/image2/2018073011005317862.jpg
A . The switch will uniquely authorize the client by using the client MAC address.
B . The switch will cause the port to remain in the unauthorized state, ignoring all attempts by the client to authenticate.
C . The switch port will disable 802.1x port-based authentication and cause the port to transition to the authorized state without any further authentication exchange.
D . The switch port will enable 802.1x port-based authentication and begin relaying authentication messages between the client and the authentication server.
-
Refer to the exhibit. What is the configuration an example of?()
A . enabling modular QoS over Frame Relay
B . enabling Real-Time Transport Protocol (RTP) header compression
C . enabling distributed compressed Transmission Control Protocol
D . enabling latency and jitter reduction for Transmission Control traffic
E . enabling TCP header compressio
-
During an abandonment or drill,the first person to arrive at the survival craft should().
A . pass out food and water to personnel
B . open the doors and start the sprinkler system
C . activate the emergency release handle
D . open the doors and prepare the craft for boarding
-
Refer to the exhibit. At the end of an RSTP election process, which access layer switch port will assume the discarding role?()https://assets.asklib.com/images/image2/2018072317314615527.jpg
A . Switch3, port fa0/1
B . Switch3, port fa0/12
C . Switch4, port fa0/11
D . Switch4, port fa0/2
E . Switch3, port Gi0/1
F . Switch3, port Gi0/2
-
Refer to the exhibit. Host A has sent an ARP message to the default gateway IP address10.10.10.1. Which statement is true?()https://assets.asklib.com/images/image2/2018072614534380870.jpg
A . DSw1 will reply with the MAC address of the next AVF
B . DSw2 will reply with the MAC address of the next AVF
C . Because of the invalid timers that are configured, DSw1 will not reply
D . Because of the invalid timers that are configured, DSw2 will not reply
E . DSw1 will reply with the IP address of the next AVF
F . DSw2 will reply with the IP address of the next AVF
-
Refer to the exhibit. Look at the command output. What can you use to prevent this behavior? ()https://assets.asklib.com/images/image2/2018072317480043501.jpg
A . UDLD (UniDirectional Link Detection)
B . spanning-tree loopguard
C . VTP mode transparent
D . switchport mode desirable
-
Refer to the exhibit. Look at the command output. What would be the most probable reason for this port-ID mismatch?()https://assets.asklib.com/images/image2/2018072317451781682.jpg
A . spanning-tree misconfiguration
B . speed mismatch configuration
C . cabling problem
D . configuration problem
-
8. In the sentence “…population are being added to at both ends,” the words “both ends” refer to both __________.
-
An old bus ground to a halt at the bus stop.
-
The term “boy” is potentially insulting if you use it to refer to an ( ) male.
-
The term “boy” is potentially insulting if you use it to refer to an ( ) male.
-
It takes Ruby an hour to go to classes at the college everyday.
A.Right.
B.Wrong.
C.Doesn't Say.
-
Refer to the exhibit. When running OSPF, What would cause router A not to form an adjacency with router B?()
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/67e52e69e1cc511a71a60a5d0c35c68a.jpg' />
A.The loopback addresses are on different subnets
B.The value of the dead timers on the router are different
C.Route summarization is enabled on both routers
D.The process indentifier on router A is different than the process identifier on router B