part1

1

part1
10問 • 1年前1
  • Mahmoud
  • 通報

    問題一覧

  • 1

    Which of the following statements best describe why WRED is useful for networks where the majority of traffic uses TCP? (Select 2 choices.)

    A. TCP sources reduce traffic flow when congestion occurs., D. TCP packets that are dropped must be retransmitted.

  • 2

    Which of the following best describes authentication? (Select the best answer.)

    the process of verifying a user's identity

  • 3

    A REST API query returns the following output: *1d": 12345, "Fname": "John", "Iname": "Doe", "group": { "role": "Receivables", "read-only": [ "Accounting Folder * "Sales Folder" Which of the following statements is true? (Select the best answer.)

    The value of the Iname key is a text value

  • 4

    Which of the following codes from the output of the show ip route command indicates that the route is a default route? (Select the best answer.)

    *

  • 5

    Which of the following terms best describes an Ethernet frame that exceeds 1,518 bytes and has a bad FCS value? (Select the best answer.)

    a giant

  • 6

    Which of the following is a valid HSRP version 2 virtual MAC address? (Select the best answer.)

    0000.0C9F.FOOA

  • 7

    Which of the following Cisco management solutions supports Cisco SDA? (Select the best answer.)

    Cisco DNA Center

  • 8

    Which of the following APis are typically used to enable communication between an SDN controller and the application plane? (Select 2 choices.)

    REST, OSGi

  • 9

    Which of the following Layer 2 attacks uses the MAC address of another known host on the network in order to bypass port security measures? (Select the best answer.)

    MAC spoofing

  • 10

    You are configuring security on a new WLAN by using the WLC GUI. Which of the following security settings are you most likely to configure by using the Layer 3 Security dropdown list box on the Layer 3 tab? (Select the best answer.)

    VPN Pass- Through

  • VLANs CCNA2

    VLANs CCNA2

    Mahmoud · 25問 · 1年前

    VLANs CCNA2

    VLANs CCNA2

    25問 • 1年前
    Mahmoud

    switching concepts

    switching concepts

    Mahmoud · 21問 · 1年前

    switching concepts

    switching concepts

    21問 • 1年前
    Mahmoud

    VLAN ROUTING

    VLAN ROUTING

    Mahmoud · 25問 · 1年前

    VLAN ROUTING

    VLAN ROUTING

    25問 • 1年前
    Mahmoud

    STP

    STP

    Mahmoud · 21問 · 1年前

    STP

    STP

    21問 • 1年前
    Mahmoud

    問題一覧

  • 1

    Which of the following statements best describe why WRED is useful for networks where the majority of traffic uses TCP? (Select 2 choices.)

    A. TCP sources reduce traffic flow when congestion occurs., D. TCP packets that are dropped must be retransmitted.

  • 2

    Which of the following best describes authentication? (Select the best answer.)

    the process of verifying a user's identity

  • 3

    A REST API query returns the following output: *1d": 12345, "Fname": "John", "Iname": "Doe", "group": { "role": "Receivables", "read-only": [ "Accounting Folder * "Sales Folder" Which of the following statements is true? (Select the best answer.)

    The value of the Iname key is a text value

  • 4

    Which of the following codes from the output of the show ip route command indicates that the route is a default route? (Select the best answer.)

    *

  • 5

    Which of the following terms best describes an Ethernet frame that exceeds 1,518 bytes and has a bad FCS value? (Select the best answer.)

    a giant

  • 6

    Which of the following is a valid HSRP version 2 virtual MAC address? (Select the best answer.)

    0000.0C9F.FOOA

  • 7

    Which of the following Cisco management solutions supports Cisco SDA? (Select the best answer.)

    Cisco DNA Center

  • 8

    Which of the following APis are typically used to enable communication between an SDN controller and the application plane? (Select 2 choices.)

    REST, OSGi

  • 9

    Which of the following Layer 2 attacks uses the MAC address of another known host on the network in order to bypass port security measures? (Select the best answer.)

    MAC spoofing

  • 10

    You are configuring security on a new WLAN by using the WLC GUI. Which of the following security settings are you most likely to configure by using the Layer 3 Security dropdown list box on the Layer 3 tab? (Select the best answer.)

    VPN Pass- Through