Which protocol sends an ACCEPT response code back to the client when the username and password are authenticated successfully?
Which command will provide an abstract view of a switch's system resource usage?
In what increments can the port priority be changed?
Which of the following option is used to set the secondary Root Bridge?
Which command is used to display the hardware clock?
Which NIP mode can be used when time accuracy is not of particular importance?
Which port states enables sending and receiving of data?
Which operation of the IPv6 autoconfiguration process sends a solicitation message looking for the MAC address that belongs to a specific IPv6 address?
Which step is not advisable when migrating a network to MST?
What is the purpose of the CAM and TCAM tables? (Choose two)
Review the output from the router. In the virtual MAC address 0007.b400.0102 what does the "02" represent?
What statements reflect the functional purpose of VTP? (Choose two)
Which mechanism is used to ensure STP stability by preventing an alternate port from becoming the designated port when no BPDUs are received?
Which of the following is a feature of DHCP snooping?
What is the "switchport nonegotiate" command used for?
Which part of the DORA process represents a broadcast received by every device where only the DHCP servers will process the message and perform an action?
Which of the following is a common feature between isolated and community VLANs?
Which option allows data to be sourced from a specific MAC address or specific IP address?
Which of the following DHCP snooping action is recommended for thwarting spoofing?
At which location is it inadvisable to set up the LoopGuard?
Which Cisco technology provides a method for collectively utilizing the capabilities of up to nine switches?
Which trunk type carries primary and secondary VLANs?
Which command is used to force hosts to use DHCP for address configuration?
Which of the following are the recommended practices for securing STP? (Choose three)
Which is not a function of the SPAN?
Which of the following STP timer represents the time spent in the listening and learning state?
Which feature best describes PVLANs?
Which load balancing options are available with the GLBP operation? (Choose three)
PC1 is connected to SW1 and PC3 is connected to SW2. Both are part of VLAN1. Between SW1 and SW2 is an access link that carries data for VLAN 1.Which option best describes the results of the "ping" command?
Which of the following are examples of switch attacks? (Choose two)
Refer to the exhibit. You need to capture all the traffic that is sent or received by the computer that is connected to the GigabitEthernet 0/1 port on the switch. Which actions do you need to perform? (Choose two)
You are verifying VLAN configurations and issue the "show vlan" command. Ethernet 0/2 should be part of VLAN 20, but it is not listed. What can be done to correct this?
Which SDM template type is recommended when networks consist of a large number of devices?
You want to bundle several Fast Ethernet ports into one logical EtherChannel. You decide to use LACP to negotiate an automatic bundle. Which channel group mode of operation do you need to use to enable LACP unconditionally?
Identify statements that describe how Layer 2 switches operate. (Choose two)
Refer to the command output for the "show ip arp" command. What is the HSRP group number?
You need to create an EtherChannel to bundle multiple Gigabit Ethernet ports into one logical channel. You need to use a Cisco proprietary protocol to ensure that the EtherChannel will form only if the ports are connected to another Cisco device that initiates the negotiation process. Which command do you need to use?
Which two statements are true regarding MST? (Choose two)
Which is not a step in the process of configuring NTPv4 in an IPv6 environment?
In what increments can the port ID priority be changed?
What is the default spanning-tree priority?
Which statements accurately describe the differences between end-to-end and local VLANs? (Choose two)
You are configuring VTP on the newly added switch. Which command is used to force a switch to forward advertisements that it receives and prevents the switch from affecting VLAN configurations on other devices in the network?
In which modes of operation can UDLD operate? (Choose two)
Identify the recommended practices for securing web access. (Choose two)
What VLAN verification command provides lots of informational output, including a graphical representation of the switch chassis?
How does TACACS+ provide guaranteed packet delivery?
Which of the following is not a feature of DHCP spoofing attacks?
Which code sets up the timezone to Pacific Standard Time and is offset by 8 hours from the Greenwich Mean Time?
Refer to the command output for the "show monitor" command. Which two statements regarding the provided command output are true? (Choose two)
You are in the process of verifying the configuration on one of the switches in your network. You want to ensure that STP has created an optimal path to the root bridge. You issue the "show spanning-tree" command. Which port cost should you see associated with a 100 Mbps link connected from the local switch to the root bridge?
Which configurations need to be applied in order to correctly implement wireless networking? (Choose two)
Which statement best describes IP SLA configuration?
Which statement about the configuration of DAI is true?
Which option is a benefit of TACACS+ over RADIUS?