Note - choose x for answer true1Refer to the exhibit. Which two conclusions can be made based on the output of the show mac address-table command. (Choose two.)x Port Fa0/6 is configured as a trunk.x Port Fa0/2 will not have the MAC address expire.Port Fa0/5 is configured for VLAN 30.VLAN 100 is connected to a hub.VLAN 20 was learned via a neighboring switch.2Refer to the exhibit. Based on the information in the exhibit, which...
Donate For Me
Sponsor
TSHOOT Chapter 3 CCNP 6.0 2012 100% - Take Assessment – TSHOOT Chapter 3 – CCNP TSHOOT: Troubleshooting and Maintaining Cisco IP Networks (Version 6.0) – Answers – 2011 – 2012
Thứ Sáu, 31 tháng 8, 2012
Note - choose x for answer true1[Picture 5]Refer to the exhibit. A network administrator used an extended ping to verify connectivity to a remote location. The ping indicated a 50 percent packet loss. What could be the cause of the problem?NAT is filtering the echo reply packets.The packet size is exceeding the MTU.An ACL is blocking the echo reply packets.An ACL is blocking the echo request packets.x Load balancing is occurring...
TSHOOT Chapter 2 CCNP 6.0 2012 100% - Take Assessment – TSHOOT Chapter 2 – CCNP TSHOOT: Troubleshooting and Maintaining Cisco IP Networks (Version 6.0) – Answers – 2011 – 2012
Thứ Sáu, 31 tháng 8, 2012
NOTE CHOOSE x FOR TRUE1What are two limitations of an ad hoc troubleshooting approach? (Choose two.)x inefficient use of time and resourcesonly applicable to physical layer problemsx difficult to transfer the job to someone elsecan only be used after a structured approach has failedrequires more technical knowledge than a structured approach2What are two facts regarding the information that is collected for baseline creation?...
TSHOOT Chapter 1 CCNP 6.0 2012 100% Take Assessment – TSHOOT Chapter 1 – CCNP TSHOOT: Troubleshooting and Maintaining Cisco IP Networks (Version 6.0) – Answers – 2011 – 2012
Thứ Sáu, 31 tháng 8, 2012
NOTE CHOOSE X FOR TRUE1What are two motivations for measuring network performance? (Choose two.)capacity planningcontrolling traffic flowdiagnosing performance problemsincreasing network securitymonitoring user activitytroubleshooting logging activity2Refer to the exhibit. A network administrator is tasked with creating a backup of the startup configuration for router R1 to a server with IP address 10.1.15.1. Which option will...
SWITCH Chapter 7 CCNP 6.0 2012 100%- Take Assessment – SWITCH Chapter 7 – CCNP SWITCH: Implementing IP Cisco Switching (Version 6.0) – Answers – 2011 – 2012
Thứ Sáu, 31 tháng 8, 2012
1. Which three statements are true about Protocol Independent Multicast (PIM) implementation on Cisco routers? (Choose three.)Bidir-PIM is suited for multicast with larger numbers of sources.In PIM-SM deployment, all routers create only (*,G) entries for the multicast groups.In PIM-DM, a multicast sender first registers with the RP, and the data stream begins to flow from sender to RP to receiver.Available network bandwidth is...
SWITCH Chapter 6 CCNP 6.0 2012 100% Take Assessment – SWITCH Chapter 6 – CCNP SWITCH: Implementing Cisco IP Switching (Version 6.0) – Answers – 2011 – 2012
Thứ Sáu, 31 tháng 8, 2012
1. Which statement is true about a local SPAN configuration? A port can act as the destination port for all SPAN sessions configured on the switch.A port can be configured to act as a source and destination port for a single SPAN session.Both Layer 2 and Layer 3 switched ports can be configured as source or destination ports for a single SPAN session.Port channel interfaces (EtherChannel) can be configured as source and...
CCNAS Final Exam CCNA Security 1.0 2012 100%-CCNAS Final Exam – CCNA Security: Implementing Network Security (Version 1.0) – Answers – 2011 – 2012
Thứ Tư, 1 tháng 8, 2012
1. What will be disabled as a result of the no service password-recovery command ?aaa new-model global configuration command.change to the configuration register.password encryption service.ability to access ROMmon.2. What occurs after RSA keys are generated on a Cisco router to prepare for secure device management?All vty ports are automatically configured for SSH to provide secure management.The general-purpose key size must...
Đăng ký:
Bài đăng (Atom)