Refer to the exhibit.
See OneNote!
What is the result when a switch that is running PVST+ is added to this network?
A. DSW2 operates in Rapid PVST+ and the new switch operates in PVST+
B. Both switches operate in the PVST+ mode
C. Spanning tree is disabled automatically on the network
D. Both switches operate in the Rapid PVST+ mode.
A. DSW2 operates in Rapid PVST+ and the new switch operates in PVST+
MAke is Gocar
Model is Zoom
Features are:
A. Make”:’Gocar, “Model’: “Zoom”, “Features”: [“Power Windows”, “Manual Dnve”, “Auto AC”]}
B. ‘Make “: “Gocar1, “Model”: “Zoom”, “Features”: [“Power Windows”, “Manual Drive”, “Auto AC”]
C. {“Make”: Gocar, “Model”: Zoom, “Features”: Power Windows, Manual Drive, Auto AC}
D. (“Make”:[ “Gocar”, “Model”: “Zoom”], Features”: [“Power Windows”, “Manual Drive”, “Auto AC”]}
A. Make”:’Gocar, “Model’: “Zoom”, “Features”: [“Power Windows”, “Manual Dnve”, “Auto AC”]}
A. syslog level errors and less severity messages
B. syslog level errors messages
C. all syslog levels messages
D. syslog level errors and greater severity messages
D. syslog level errors and greater severity messages
A. The MAC address table is contained in CAM ACL and QoS information is stored in TCAM
B. The MAC address table supports partial matches. TCAM requires an exact match
C. Router prefix lookups happens in CAM. MAC address table lookups happen in TCAM.
D. TCAM is used to make Layer 2 forwarding decisions CAM is used to build routing tables
A. The MAC address table is contained in CAM ACL and QoS information is stored in TCAM
A. ICMP: Discovery B. UDP 67: DHCP C. TCP 23: Telnet D. UDP 6007: NetFlow E. UDP 162: SNMP
A. ICMP: Discovery
D. UDP 6007: NetFlow
A. to run a mapping system that manages endpoint to network device relationships
B. to implement policies and communicate with networks outside the fabric
C. to connect external Layer 3 networks to the SD Access fabric.
D. to connect APs and wireless endpoints to the SD-Access fabric
A. to run a mapping system that manages endpoint to network device relationships
A. RPVST+
B. NSF
C. BFD
D. RP failover
B. NSF
A. All devices reload after detecting loss of connection to Cisco DNA Center
B. Already connected users are unaffected, but new users cannot connect
C. User connectivity is unaffected.
D. Cisco DNA Center is unable to collect monitoring data in Assurance.
E. Users lose connectivity
C. User connectivity is unaffected.
D. Cisco DNA Center is unable to collect monitoring data in Assurance.
A. time zone
B. hop count
C. stratum
D. latency
C. stratum
A. only required at the network perimeter
B. required in each layer of the network
C. filters traffic using Layer 3 and Layer 4 information only
D. provides intrusion prevention
D. provides intrusion prevention
A. proxy ETR B. egress tunnel router C. route reflector D. HMAC algorithm E. spoke
A. proxy ETR
B. egress tunnel router
A. Remove UNII-2 and Extended UNII-2 channels from the 5 Ghz channel list
B. Restore the OCA default settings because this automatically avoids channel interference
C. Disable DFS channels to prevent interference writ) Doppler radar
D. Enable DFS channels because they are immune to radar interference
E. Configure channels on the UNII-2 and the Extended UNII-2 sub-bands of the 5 Ghz band only
A. Remove UNII-2 and Extended UNII-2 channels from the 5 Ghz channel list
C. Disable DFS channels to prevent interference writ) Doppler radar
A. Para-virtualization guest servers are unaware of one another
B. Para-virtualization allows direct access between the guest OS and the hypervisor
C. Para-virtualization allows the host hardware to be directly accessed
D. Para-virtualization lacks support for containers
C. Para-virtualization allows the host hardware to be directly accessed
A. VLAN
B. VTEP
C. VXLAN
D. VRF
C. VXLAN
A. GLBP
B. VRRP version 2
C. VRRP version 3
D. HSRP version 2
C. VRRP version 3
A. dBw
B. dBm
C. mW
D. dBi
C. mW
A. 802.1AE provides encryption and authentication services
B. 802.1AE is bult between the host and switch using the MKA protocol, which negotiates encryption keys based on the master session key from a successful 802.1X session
C. 802.1AE is bult between the host and switch using the MKA protocol using keys generated via the Diffie-Hellman algorithm (anonymous encryption mode)
D. 802.1AE is negotiated using Cisco AnyConnect NAM and the SAP protocol
B. 802.1AE is bult between the host and switch using the MKA protocol, which negotiates encryption keys based on the master session key from a successful 802 1X session
A. STP BPDU guard is enabled
B. A description “RSPAN” is added
C. They are placed into an inactive state
D. They cannot provide PoE
C. They are placed into an inactive state
C. vNIC
A. OVA
D. VMX
B. VMDK
A. OVA is a zip file connecting a virtual machine configuration file and a virtual disk.
B. VMDK is a file containing a virtual machine disk drive.
C. vNIC is a configuration file containing settings for a virtual machine such as a guest OS.
D. VMX is a component of a virtual machine responsible for sending packets to the hypervisor.
= applied on traffic to convey Information to a downstream device
= distinguish traffic types
= Permits traffic to pass through the device while retaining DSCP/COS values
= process used to buffer traffic that exceeds a predefined rate.
C. Trust
A. Marking
D. Shaping
B. Classification
A. Marking = applied on traffic to convey Information to a downstream device
B. Classification = distinguish traffic types
C. Trust = Permits traffic to pass through the device while retaining DSCP/COS values
D. Shaping = process used to buffer traffic that exceeds a predefined rate.
New question about vEdge dashboard not associated with vSmart.
Answer: A misconfig on the port number once the IP was correct.
New Question About Switch Stack
Answer:
9 SW - 3850
8 SW - 2960X
4 SW - 2960S/SF
A. GigabitEthemet0/1 and GigabitEthernet0/1.40
B. only GigabitEthernet0/1
C. only GigabttEthernet0/0
D. Gigabit Ethernet0/0 and GigabitEthemet0/1
A. GigabitEthemet0/1 and GigabitEthernet0/1.40
A. The border node is required for communication between fabric and nonfabric devices.
B. Fabric endpoints are connected directly to the border node
C. Traffic within the fabric always goes through the control plane node
D. The control plane node has the full RLOC-to-EID mapping database
E. The border node has the full RLOC-to-EID mapping database
A. The border node is required for communication between fabric and nonfabric devices.
D. The control plane node has the full RLOC-to-EID mapping database