Which "Link type" should be displayed in the output?
Why did the IP spoof feature fail to prevent the spoofed packets from being forwarded?
A company’s security policy does not allow outside computers or smart phones into their work areas. All company-provided computers are strictly controlled using 802.1X authentication on all of their switches. All computers obtain DHCP IP addresses from centralized servers and all switches have IP spoofing enabled. However, one of the computers was able to send IP spoofed packets.
Why did the IP spoof feature fail to prevent the spoofed packets from being forwarded?
Which action resolves the Layer 2 loop while maintaining backup connectivity?
Refer to the Exhibit.
In the exhibit, the enterprise is running RSTP on all switches in its network and is currently experiencing Layer 2 loops. The primary link is between switch 1 and switch 2. For redundancy, a secondary Layer 2 link is purchased from the provider. The provider uses Q-in-Q tunneling to transport the enterprise’s Layer 2 frames.
Which action resolves the Layer 2 loop while maintaining backup connectivity?
Which BGP capability must be negotiated on the BGP session for R2 to install the routes accepted by the new po
1X authentication protocol is required?
A company is deploying a new 802.1X port-based security infrastructure to allow users to access resources through wired Ethernet ports. However they recently deployed an RSA token-based system for users to connect remotely. The network administrator wants to reuse the same security
database for 802.1X port-based security.
Which 802.1X authentication protocol is required?
Based on the configuration, which option prioritizes call-sig traffic over critical traffic?
A network administrator is configuring CoS on a switch and assigns forwarding classes call-sig and critical to the same queue number per the configuration below:
class-of-service {
forwarding-classes {
class best-effort queue-num 0;
class bulk-data queue-num 1;
class critical queue-num 3;
class voice queue-num 6;
class call-sig queue-num 3;
}
}
Based on the configuration, which option prioritizes call-sig traffic over critical traffic?
Referring to the exhibit, which two statements are true? (Choose two
Which configuration allows User A and User B access to the network, but prevents User C from accessing the net
Which configuration accomplishes this goal?
What is the minimal configuration that allows LLDP-MED to autoconfigure your phone’s voice VLAN?
Refer to the Exhibit.
Referring to the exhibit, you want to configure Switch-1 to allow a user on interface ge-0/0/10 to accommodate both voice and data traffic. Your phones and your switches are LLDP-MED capable.
What is the minimal configuration that allows LLDP-MED to autoconfigure your phone’s voice VLAN?