You work as a network engineer for . You study the exhibit carefully.
What best describes the Cisco IOS IP SLA command and output in the exhibit?()
A.verifies which operation types have been enabled for IP SLA source
B.verifies which operation types have been enabled for IP SLA responder
C.verifies which operation types are supported in software
D.verifies enabled operation types that are not running
您可能感興趣的試卷
你可能感興趣的試題
You work as a network engineer for. You study the exhibit carefully. Which of these is true based upon the output shown in the command?()
Exhibit:
A.The port has security enabled and has shut down due to a security violation.
B.The port is operational and has reached its configured maximum allowed number of MAC addresses.
C.The port will allow access for 11 MAC addresses in addition to the 3 configured MAC addresses.
D.If the number of devices attempting to access the port exceeds 11, the port will shut down for 20 minutes, as configured.
A.PACLs can be applied in the inbound or outbound direction of a Layer 2 physical interface.
B.At Layer 2, a MAC address PACL will take precedence over any existing Layer 3 PACL.
C.When you apply a port ACL to a trunk port, the ACL filters traffic on all VLANs present on the trunk port.
D.PACLs are not supported on EtherChannel interfaces.
A.Configure the private VLAN port parameters.
B.Configure and map the secondary VLAN to the primary VLAN.
C.Disable IGMP snooping.
D.Set the VTP mode to transparent.
A.isolated
B.protected
C.private
D.associated
E.promiscuous
F.munity
A.enables PortFast
B.disables trunking
C.disables Cisco Discovery Protocol
D.enables port security
E.enables loopguard
F.disables EtherChannel
You are implementing basic switch security best practices.
Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?()
A.Make all ports private VLAN ports.
B.Place all unused ports in native VLAN 1 until needed.
C.Proactively configure unused switch ports as access ports.
D.Disable Cisco Discovery Protocol globally.
Three Cisco Catalyst switches have been configured with a first-hop redundancy protocol. While reviewing some show commands, debug output, and the syslog, you discover the following information:
What conclusion can you infer from this information?()
A.VRRP is initializing and operating correctly.
B.HSRP is not properly exchanging three hello messages.
C.VRRP is not properly exchanging three hello messages.
D.HSRP is initializing and operating correctly.
E.GLBP is not properly exchanging three hello messages.
F.GLBP is initializing and operating correctly.
You work as a network engineer for . You study the exhibit carefully. Three switches are configured for HSRP. Switch1 remains in the HSRP listen state.
What is the most likely cause of this status?()
A.this is normal operation
B.IP addressing is incorrect
C.standby group number does not match VLAN number
D.incorrect standby timers
E.incorrect priority commands
hostname Switch1
interface Vlan10
ip address 172.16.10.32 255.255.255.0
no ip redirects
standby 1 ip 172.16.10.110
standby 1 timers 1 5
standby 1 priority 130
hostname Switch2
interface Vlan10
ip address 172.16.10.33 255.255.255.0
no ip redirects
standby 1 ip 172.16.10.110
standby 1 timers 1 5
standby 1 priority 120
HSRP was implemented and configured on two switches while scheduled network maintenance was performed.
After the two switches have finished rebooting, you notice via show commands that Switch2 is the HSRP active router.
Which two items are most likely the cause of Switch1 not becoming the active router? ()
A.premption is disabled
B.standby group number does not match VLAN number
C.IP addressing is incorrect
D.IP redirect is disabled
E.incorrect standby timers
F.booting delays
You work as a network engineer for . You study the exhibit carefully. From the configuration shown,
what can be determined?()
Exhibit:
A.The remaining secure MAC addresses will be dynamically learned, converted to sticky secure MAC addresses, and added to the running configuration.
B.Since a voice VLAN is configured in this example, port security should be set for a maximum of 2.
C.The sticky addresses will only be those manually configured MAC addresses enabled with the sticky keyword.
D.A security violation will restrict the number of addresses to a maximum of 10 addresses per access VLAN and voice VLAN. The port will be shut down if more than 10 devices per VLAN attempt to access the port.
最新試題
During routine maintenance, it became necessary to shutdown G1/0/1 on DS1 and DS2. All other interface were up. During this time, DS1 became the active device for Vlan104’s HSRP group. As related to Vlan104’s HSRP group. What can be done to make the group function properly ? ()
Refer to the exhibit. What command was issued on the Layer 3 switch Sw1 between Exhibit #1 and Exhibit #2?()
Refer to the exhibit. The command switchport mode access is issued on interface FastEthernet0/13 on switch CAT1. What will be the result?()
Refer to the exhibit. What will happen when one more user is connected to interface FastEthernet 5/1? ()
What must be the same to make multiple switches part of the same Multiple Spanning Tree (MST)?()
Which statement is correct about the use of the virtual interface on a WLC ?()
Refer to the exhibit and the partial configuration of switch SW_A and SW_B. STP is configured on all switches in the network. SW_B receives this error message on the console port:00:06:34: %CDP-4-DUPLEX_MISMATCH: duplex mismatch discovered on FastEthernet0/5 (not half duplex), with SW_A FastEthernet0/4 (half duplex) , with TBA05071417(Cat6K-B) 0/4 (half duplex). What would be the possible outcome of the problem?()
Which router redundancy protocol cannot be configured for interface tracking?()
Which three statements about STP timers are true?()
Based on the show spanning-tree vlan 200 output shown in the exhibit, which two statements about the STP process for VLAN 200 are true? ()