최신 200-301 무료덤프 - Cisco Certified Network Associate
Which syslog severity level is considered the most severe and results in the system being considered unusable?
정답: C
Refer to the exhibit An IPv6 address must be obtained automatically on the LAN interface on R1 Which command must be implemented to accomplish the task?
정답: A
Refer to the exhibit.
Which command configures a floating static route to provide a backup to the primary link?
Which command configures a floating static route to provide a backup to the primary link?
정답: A
Refer to the exhibit.
All interfaces are in the same VLAN. All switches are configured with the default STP priorities. During the STP electronics, which switch becomes the root bridge?
All interfaces are in the same VLAN. All switches are configured with the default STP priorities. During the STP electronics, which switch becomes the root bridge?
정답: C
Physical connectivity is implemented between the two Layer 2 switches, and the network connectivity between them must be configured
1. Configure an LACP EtherChannel and number it as 1; configure it between switches SW1 and SVV2 using interfaces Ethernet0/0 and Ethernet0/1 on both sides. The LACP mode must match on both ends
2 Configure the EtherChannel as a trunk link.
3. Configure the trunk link with 802.1 q tags.
4. Configure the native VLAN of the EtherChannel as VLAN 15.
1. Configure an LACP EtherChannel and number it as 1; configure it between switches SW1 and SVV2 using interfaces Ethernet0/0 and Ethernet0/1 on both sides. The LACP mode must match on both ends
2 Configure the EtherChannel as a trunk link.
3. Configure the trunk link with 802.1 q tags.
4. Configure the native VLAN of the EtherChannel as VLAN 15.
정답:
See the Explanation below.
Explanation:
Answer as below configuration:
On SW1:
conf terminal
vlan 15
exit
interface range eth0/0 - 1
channel-group 1 mode active
exit
interface port-channel 1
switchport trunk encapsulation dot1q
switchport mode trunk
switchport trunk native vlan 15
end
copy run start
on SW2:
conf terminal
vlan 15
exit
interface range eth0/0 - 1
channel-group 1 mode active
exit
interface port-channel 1
switchport trunk encapsulation dot1q
switchport mode trunk
switchport trunk native vlan 15
end
copy run start
Explanation:
Answer as below configuration:
On SW1:
conf terminal
vlan 15
exit
interface range eth0/0 - 1
channel-group 1 mode active
exit
interface port-channel 1
switchport trunk encapsulation dot1q
switchport mode trunk
switchport trunk native vlan 15
end
copy run start
on SW2:
conf terminal
vlan 15
exit
interface range eth0/0 - 1
channel-group 1 mode active
exit
interface port-channel 1
switchport trunk encapsulation dot1q
switchport mode trunk
switchport trunk native vlan 15
end
copy run start
Refer to the exhibit.
What does the host do when using the IPv4 Preferred function?
What does the host do when using the IPv4 Preferred function?
정답: D
What is the purpose of using First Hop Redundancy Protocol in a specific subnet?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Which two outcomes are predictable behaviors for HSRP? (Choose two)
정답: A,D
Refer to the exhibit.
How many JSON objects are presented?
How many JSON objects are presented?
정답: A
Drag and drop the AAA features from the left onto the corresponding AAA security services on the right. Not all options are used.
정답:
Explanation:
Which QoS queuing method discards or marks packets that exceed the desired bit rate of traffic flow?
정답: C
Which command entered on a switch configured with Rapid PVST* listens and learns for a specific time period?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Drag and drop to the characteristics of networking from the left onto the correct networking types on the right.
정답:
Explanation:
What are two characteristics of the distribution layer in a three-tier network architecture? (Choose two.)
정답: B,C
Which 802.11 frame type is indicated by a probe response after a client sends a probe request?
정답: D
What is the temporary state that switch ports always enter immediately after the boot process when Rapid PVST+ is used?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
What are two characteristics of an SSID? (Choose Two)
정답: A,E
Which access layer threat-mitigation technique provides security based on identity?
정답: A
Refer to the exhibit.
If the network environment is operating normally, which type of device must be connected to interface FastEthernet 0/1?
If the network environment is operating normally, which type of device must be connected to interface FastEthernet 0/1?
정답: A