Which three valid IP addresses can the technician use for the hosts?
The network technician is planning to use the 255.255.255.224 subnet mask on the network. Which three valid IP addresses can the technician use for the hosts? (Choose three.)
What are two valid reasons for adopting IPv6 over IPv4?
The network administrator has been asked to give reasons for moving from IPv4 to IPv6. What are two valid reasons for adopting IPv6 over IPv4? (Choose two.)
What is the most appropriate summarization for these routes?
Which protocol provides a method of sharing VLAN configuration information between two Cisco switches?
Which protocol provides a method of sharing VLAN configuration information between two Cisco switches?
which layer of the OSI model is RSTP used to prevent loops?
At which layer of the OSI model is RSTP used to prevent loops?
What are two characteristics of a switch that is configured as a VTP client?
What are two characteristics of a switch that is configured as a VTP client? (Choose two.)
Which two statements are true?
A network administrator needs to configure port security on a switch. Which two statements are true? (Choose two.)
What is the cause of this failure?
Which two of these statements regarding RSTP are correct?
Which two of these statements regarding RSTP are correct? (Choose two.)
What two functions will occur when this frame is received by 2950Switch?
The following commands are executed on interface fa0/1 of 2950Switch.
2950Switch(config-if)# switchport port-security
2950Switch(config-if)# switchport port-security mac-address sticky
2950Switch(config-if)# switchport port-security maximum 1
The Ethernet frame that is shown arrives on interface fa0/1.
What two functions will occur when this frame is received by 2950Switch? (Choose two.)