What is a major difference between PVST and PVST+?
What is a major difference between PVST and PVST+?
What is most commonly used to prevent hackers from flooding a port with MAC-addresses?
What is most commonly used to prevent hackers from flooding a port with MAC-addresses?
What is true about this configuration?
What access-list entry may need to be added in order to get traceroute to work?
Traceroute does not work on Host A (a Unix workstation) to the Internet. Currently, there is an inbound access-list applied to the serial interface on Router 1 that says “access-list 101 permit tcp any any”. What access-list entry may need to be added in order to get traceroute to work?
how many total mask value entries are required in the Ternary Content Addressable Memory (TCAM) table?
Existing ACEs in the VACL:
set security acl ip Control_Access permit host 10.1.1.100
security acl ip Control_Access deny 10.1.1.0 255.255.255.0 set security acl ip Control_Access permit host 172.16.84.99 set security acl ip Control_Access deny 172.16.84.0 255.255.255.128
Additional ACEs to the VACL: set security acl ip Control_Access permit host 172.16.82.3 set security acl ip Control_Access deny host 172.17.10.44
set security acl ip Control_Access permit host 192.168.99.150 set security acl ip Control_Access deny host 192.168.250.1
A VLAN Access Control List has been configured with the four entries shown above. After the addition of the next four entries, how many total mask value entries are required in the Ternary Content Addressable Memory (TCAM) table?
What command is used send pseudowire traffic over an MPLS-TE tunnel?
What command is used send pseudowire traffic over an MPLS-TE tunnel?
What must the administrator do to ensure this always occurs?
After OSPF is defined on a broadcast medium, the network administrator now wants a specific router to act as the Designated Router (DR) for a particular segment. What must the administrator do to ensure this always occurs?
Can this behavior be changed?
Every time a typing mistake is made at the exec prompt of a router, the message from the router indicates a lookup is being performed. Also, there is a waiting period of several seconds before the next command can be typed. Can this behavior be changed?
What steps can the administrator take to ensure that the “debug” will not.require too much CPU, or
A network administrator is using debug commands to check the performance of a network. What steps can the administrator take to ensure that the “debug” will not
require too much CPU, or at least that she will not have to reboot the router to disable debug? (multiple answer)
What CE router will become the root bridge for VLAN 10?
Click the Exhibit button. CE1 and CE2 are routers connected through PE1 and PE2 using 802.1q VLAN 10 as shown in the diagram. PE1 and PE2 have provisioned one pseudowire for CE1 and CE2 on the 802.1q sub-interfaces of VLAN 10. CE1 can ping CE2 and vice versa. Suppose both CE1 and CE2 enable an IEEE standard-based Spanning Tree protocol for VLAN 10 and both use the default bridge priority. The interface CE1 connected to the provider edge router has a lower MAC address than that of CE2. What CE router will become the root bridge for VLAN 10?