Which three benefits are of VLANs?
Which three benefits are of VLANs? (Choose three.)
Select the three valid LMI extension.
Select the three valid LMI extension.
What two things can be done to allow communications between the hosts?
Workstation A has been assigned an IP address of 192.0.2.24/28. Workstation B has been assigned an IP address of 192.0.2.100/28. The two workstations are connected with a straight-through cable.
Attempts to ping between the hosts are unsuccessful. What two things can be done to allow communications between the hosts? (Choose two.)
Select the 3 best answers describing operation and configuration of Frame-Relay Inverse ARP.
Select the 3 best answers describing operation and configuration of Frame-Relay Inverse ARP.
Which command is used to load a configuration from a TFTP seiver and merge the configuration into RAM?
Which command is used to load a configuration from a TFTP seiver and merge the configuration into RAM?
What is the role of Forwarding Equivalence Class (FEC) in MPLS?
What is the role of Forwarding Equivalence Class (FEC) in MPLS?
What is the most likely reason for this?
A company implements video conferencing over IP on their Ethernet LAN. The users notice that the network slows down, and the video either stutters or fails completely. What is the most likely reason for this?
Which of the following HSRP interface configurations will always result in the R2 becoming the primary?
Assume two routers on the same subnet, R1 and R2, both configured for HSRP. R1 has a priority of 120. Which of the following HSRP interface configurations will always result in the R2 becoming the primary?
What is preventing the router from pinging remote devices?
Your ISP has given you the address 223.5.14.6/29 to assign to your router’s interface. They have also given you the default gateway address of 223.5.14.7. After you have configured the address, the router is unable to ping any remote devices. What is preventing the router from pinging remote devices?
Which of the following IOS commands can detect whether the SQL slammer virus propagates in your networks?
Which of the following IOS commands can detect whether the SQL slammer virus propagates in your networks?