How many times has IP SLA been executed successfully on R1?
What is the HSRP priority of R2?
What is the unique device identifier of R1?
CORE2 has been configured to send its configuration file to the TFTP Server every five minutes. What is the IP address of the TFTP server?
This is a rogue switch connected to CORE1. You know that the switch runs vendor neutral link layer discovery protocol. To which port is the rogue switch connected?
What is the severity level for buffer logging on R1?
Which switch was elected root bridge for VLAN 20?
If you wanted to configure Swi as Spanning-tree root bridge for VLAN 10 and Sw_2 as Spanning-tree root bridge for VLAN 20, which commands would you use? (Choose two.)
Which device is causing network connectivity issues?
The security team updated your vulnerability scanner with current plug-ins. The result after running a non-credentialed scan of the network shows an increase in reported vulnerabilities. A custom application running on several hosts is reported as vulnerable. The security team suspects a false positive. What action should the security team take first?
Which two commands would you issue on Core_Rtr_A to resolve the network connectivity issues? (Choose two.)
You are the network administrator of a company. Router A is connected to four different routers through different interfaces. The exhibit shows the output of the show ip route command issued on the network router. Which router interface would be used to forward a packet with a destination IP address of 192.168.10.1?
Which field in an ethernet frame is 7 bytes long and is responsible for synchronization?
What are the default administrative distances of RIP and OSPF?
You need to enable the 802.1x standard in the network shown in the exhibit. Which devices or device is considered an authenticator?
You are the network administrator for your company. You decide to implement Enhanced Interior Gateway Routing Protocol (EIGRP) as the routing protocol on the network. You need to configure EIGRP for Autonomous System (AS) 5 and advertise the network 192.168.10.0, which is directly connected to the router on interface Fa0/0. Which set of commands should you use?
- A. Router(config)# router eigrp 5 Router(config-router)# interface fa0/0 Router(config-if)# network 192.168.10.0 eigrp 5
Based on the information provided in the exhibit, what is the Spanning Tree port role for interface Gi0/1 on Core Sw_A. assuming that you are running the default Per-VLAN Spanning Tree Protocol Plus (PVST+)?
Which three statements are true about enabling port-security? (Choose three.)
You have made changes to the running configuration of the Cisco switch. You need to save the current configuration to the NVRAM and verify that the changes made to the current configuration have been actually saved in the NVRAM. Which two commands will help you complete the task? (Choose two.)
Inter-vlan routing has been configured on the network shown in the exhibit. Which IP address should you configure on PC1 as the default gateway?
Which Cisco router runs IOS XE and can be deployed as a virtual machine in a data center?
Which address type can be used to send a message from one device to a group of devices that subscribe to the information?
You are the network administrator for your company. You have enabled port security on a Cisco 2960 switch on the network. You manually added some secured Media Access Control (MAC) addresses on the secured port. You want to remove one of the secured MAC addresses from the address table. Which Cisco 105 command would you use to remove the MAC address?
You manage a network with multiple Cisco routers and switches. You receive a new product activation key (PAK) for the routers. You need to install the licenses on each router. What should you do?
You issue the show logging command on your router, and you see the output shown in the exhibit. Where will messages with a severity of informational be logged? (Choose two.)
The exhibit displays a sample network diagram. In this network, Host A is able to communicate with Host C, but it is not able to communicate with Host B. You are using the Open System Interconnect (051)-layered model approach for troubleshooting the problem. You replace the cable connecting Switch A to Host B with a known working cable. Which 051 layer should you troubleshoot next to solve the problem?
You are configuring the network with the topology shown in the exhibit. The relevant output from each switch is also shown in the exhibit. You discover that the switches do not create an etherchannel group. What should you do?
What is the name of the router that an ISP uses to connect to a customer site and form the edge of a tunnel in Multiprotocol Label Switching (MPLS)?
Which command should you use to verify the interfaces that have been configured on a router and are included in the RIP routing process? (Choose two.)
You manage the network shown in the exhibit. Which interface or interfaces should be designated as the monitored ports for a SPAN session?
About Individual Course:
|Learning Style||Self-Paced Learning|
|Course Duration||1 Hour|