What are three reasons that an organization with multiple branch offices and roaming users might implement a Cisco VPN solution instead of point-to-point WAN links?

Correct Answer for the Question – What are three reasons that an organization with multiple branch offices and roaming users might implement a Cisco VPN solution instead of point-to-point WAN links? is given below What are three reasons that an organization with multiple branch offices and roaming users might implement a Cisco VPN solution instead of … Read more

What are three message types that will be sent to the Syslog server?

Correct Answer for the Question – What are three message types that will be sent to the Syslog server? is given below A network administrator enters the following command on a router: logging trap 3. What are three message types that will be sent to the Syslog server? (Choose three.)SHOW ANSWERS informational emergency warning critical debug … Read more

What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?

Correct Answer for the Question – What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1? is given below A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch … Read more

Which two statements are characteristics of a distance vector routing protocol?

Correct Answer for the Question – Which two statements are characteristics of a distance vector routing protocol? is given below Which two statements are characteristics of a distance vector routing protocol? (Choose two.)SHOW ANSWERS Each router has its own view of the topology. Updates are periodic and include the entire routing table. Routing updates are sent … Read more

What type of attack is when trusted sourse replace mac tables with untrusted?

Correct Answer for the Question – What type of attack is when trusted sourse replace mac tables with untrusted? is given below What type of attack is when trusted sourse replace mac tables with untrusted? DHCP snooping port snooping Correct Answer The Correct Answer for this Question is DHCP snooping Explanation The Question – What type … Read more

Which three statements about VTP features are true?

Correct Answer for the Question – Which three statements about VTP features are true? is given below Which three statements about VTP features are true? (Choose three.) VTP works at Layer 3 of the OSI model and requires that a management VLAN IP address be configured. When properly configured, VTP minimizes VLAN misconfigurations and configuration inconsistencies. … Read more

What are three benefits of implementing VLANs?

Correct Answer for the Question – What are three benefits of implementing VLANs? is given below What are three benefits of implementing VLANs? (Choose three.)SHOW ANSWERS A higher level of network security can be reached by separating sensitive data traffic from other network traffic. A more efficient use of bandwidth can be achieved allowing many physical … Read more

Which three statements about VTP features are true?

Correct Answer for the Question – Which three statements about VTP features are true? is given below Which three statements about VTP features are true? (Choose three.)SHOW ANSWERS VTP works at Layer 3 of the OSI model and requires that a management VLAN IP address be configured. When properly configured, VTP minimizes VLAN misconfigurations and configuration … Read more

Which two ACL statements, when combined, are the best for accomplishing this task?

Correct Answer for the Question – Which two ACL statements, when combined, are the best for accomplishing this task? is given below A network administrator is configuring ACLs on a Cisco router, to allow traffic from hosts on networks 192.168.146.0, 192.168.147.0, 192.168.148.0, and 192.168.149.0 only.Which two ACL statements, when combined, are the best for accomplishing this … Read more

What are two characteristics of a switch that is configured as a VTP client?

Correct Answer for the Question – What are two characteristics of a switch that is configured as a VTP client? is given below What are two characteristics of a switch that is configured as a VTP client? (Choose two.)VTP servers.SHOW ANSWERSVLAN Trunking Protocol (VTP)http://archive.networknewz.com/2004/0317.htmlVTP ModesServer Mode Once VTP is configured on a Cisco switch, the default … Read more