What are two methods of mitigating MAC address flooding attacks?
What are two methods of mitigating MAC address flooding attacks? (Choose two.)
Which description correctly describes a MAC address flooding attack?
Which description correctly describes a MAC address flooding attack?
Which three WLAN statements are true?
Which three WLAN statements are true? (Choose three)
What is the most likely cause of this?
Routers R1 and R2 are configured for HSRP as shown below:
Router R1:
interface ethernet 0
ip address 20.6.2.1 255.255.255.0
standby 35 ip 20.6.2.21
standby 35 priority 100
interface ethernet 1
ip address 20.6.1.1.2 255.255.255.0
standby 34 ip 20.6.1.21
Router R2:
interface ethernet 0
ip address 20.6.2.2 255.255.255.0
standby 35 ip 20.6.2.21
interface ethernet 1
ip address 20.6.1.1.1 255.255.255.0
standby 34 ip 20.6.1.21
standby 34 priority 100
You have configured the routers R1 & R2 with HSRP. While debugging router R2 you notice very frequent HSRP group state transitions. What is the most likely cause of this?
Which three of the following network features are methods used to achieve high availability?
Which three of the following network features are methods used to achieve high availability? (Choose three)
Which statement best describes Cisco supervisor engine redundancy using Stateful Switchover?
Which statement best describes Cisco supervisor engine redundancy using Stateful Switchover?
What command would you use if you wanted to configure this?
You want to allow Router R1 to immediately become the active router if its priority is highest than the active router fails. What command would you use if you wanted to configure this?
What three tasks must a network administrator perform to properly configure Hot Standby Routing Protocol (HSRP
What three tasks must a network administrator perform to properly configure Hot Standby Routing Protocol (HSRP)? (Choose three)
Which three statements are true of a default HSRP configuration?
Which three statements are true of a default HSRP configuration? (Choose three.)
Which three protocols have been developed for IP routing redundancy to protect against first-hop router failur
Which three protocols have been developed for IP routing redundancy to protect against first-hop router failure? (Choose three.)