what is the maximum number of secure MAC addresses that should be set on the port?
When you enable port security on an interface that is also configured with a voice VLAN,
what is the maximum number of secure MAC addresses that should be set on the port?
what can be determined?
Which two items are most likely the cause of Switch1 not becoming the active router?
hostname Switch1
interface Vlan10
ip address 172.16.10.32 255.255.255.0
no ip redirects
standby 1 ip 172.16.10.110
standby 1 timers 1 5
standby 1 priority 130
hostname Switch2
interface Vlan10
ip address 172.16.10.33 255.255.255.0
no ip redirects
standby 1 ip 172.16.10.110
standby 1 timers 1 5
standby 1 priority 120
HSRP was implemented and configured on two switches while scheduled network
maintenance was performed.
After the two switches have finished rebooting, you notice via show commands that Switch2
is the HSRP active router. Which two items are most likely the cause of Switch1 not
becoming the active router? (Choose two.)
What is the most likely cause of this status?
hostname Switch1
interface Vlan10
ip address 172.16.10.32 255.255.255.0
no ip redirects
standby 1 ip 172.16.10.110
standby 1 timers msec 200 msec 700
standby 1 preempt
hostname Switch2
interface Vlan10
ip address 172.16.10.33 255.255.255.0
no ip redirects
standby 1 ip 172.16.10.110
standby 1 timers msec 200 msec 750
standby 1 priority 110
standby 1 preempt
hostname Switch3
interface Vlan10
ip address 172.16.10.34 255.255.255.0
no ip redirects
standby 1 ip 172.16.10.110
standby 1 timers msec 200 msec 750
standby 1 priority 150
standby 1 preempt
Refer to the exhibit. Three switches are configured for HSRP.
Switch1 remains in the HSRP listen state. What is the most likely cause of this status?
What conclusion can you infer from this information?
Three Cisco Catalyst switches have been configured with a first-hop redundancy protocol.
While reviewing some show commands, debug output, and the syslog, you discover the
following information:
Jan 9 08:00:42.623: %STANDBY-6-STATECHANGE: Standby: 49:
Vlan149 state Standby -> Active
Jan 9 08:00:56.011: %STANDBY-6-STATECHANGE: Standby: 49:
Vlan149 state Active -> Speak
Jan 9 08:01:03.011: %STANDBY-6-STATECHANGE: Standby: 49:
Vlan149 state Speak -> Standby
Jan 9 08:01:29.427: %STANDBY-6-STATECHANGE: Standby: 49:
Vlan149 state Standby -> Active
Jan 9 08:01:36.808: %STANDBY-6-STATECHANGE: Standby: 49:
Vlan149 state Active -> Speak
Jan 9 08:01:43.808: %STANDBY-6-STATECHANGE: Standby: 49:
Vlan149 state Speak -> Standby
What conclusion can you infer from this information?
what does the command aaa new-model enable?
By itself, what does the command aaa new-model enable?
Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?
You are implementing basic switch security best practices. Which of these is a tactic that you
can use to mitigate compromises from being launched through the switch?
What are three results of issuing the switchport host command?
What are three results of issuing the switchport host command? (Choose three.)
which three of these port types?
Private VLANS can be configured as which three of these port types? (Choose three.)
which configuration task must you do first?
When configuring private VLANs, which configuration task must you do first?