A single core router provides all the routing between VLANs.
The failure of a switch block will not impact all end users.
This is a security feature that is available on all new Catalyst switches.
This is network application software that prevents the failure of a single network device.
Ability to build a routing table
Ability to aggregate multiple ports for maximum data throughput
Ability to provide power to directly-attached devices and the switch itself
Ability to have multiple forwarding paths through the switched network based on VLAN number(s)
Broadcast traffic containment
Power over Ethernet
Speed of convergence
Connect remote networks
Provide Power over Ethernet to devices
Connect users to the network
Provide data traffic security
Provide a high-speed network backbone
Alternate, root, designated, root
Designated, root, alternate, root
Alternate, designated, root, root
Designated, alternate, root, root
Any switch port will be error-disabled if it receives a BPDU.
Any trunk ports will be allowed to connect to the network immediately, rather than waiting to converge.
Any switch port that has been configured with PortFast will be error-disabled if it receives a BPDU.
Any switch port that receives a BPDU will ignore the BPDU message.
S1 will set the priority value for VLAN 10 to 0.
S2 will set the priority value for VLAN 10 to 24576.
S3 will set the priority value for VLAN 30 to 8192.
S1 will set the priority value for VLAN 20 to 24596.
MAC address of the forwarding router
MAC addresses of both the forwarding and standby routers
MAC address of the standby router
MAC address of the virtual router
GLBP allows load balancing between routers.
It is nonproprietary.
It uses a virtual router master.
It works together with VRRP.
HSRP uses active and standby routers.
It uses ICMP messages in order to assign the default gateway to hosts
It allows load balancing between a group of redundant routers.
HSRP is nonproprietary.
Spreading traffic across multiple physical WAN links
Dividing the bandwidth of a single link into separate time slots
Enabling traffic from multiple VLANs to travel over a single Layer 2 link
Creating one logical link by using multiple physical links between two LAN switches
SW1: on SW2: on
SW1: desirable SW2: desirable
SW1: auto SW2: auto trunking enabled on both switches
SW1: auto SW2: auto PortFast enabled on both switches
SW1: passive SW2: active
The interfaces that are involved need to be contiguous on the switch.
All the interfaces need to work at the same speed.
All the interfaces need to be working in the same duplex mode.
All interfaces need to be assigned to di푣erent VLANs.
The EtherChannel is down.
The port channel ID is 2.
The port channel is a Layer 3 channel.
The bundle is fully operational.
The load-balancing method used is source port to destination port.
Clustering mode must be enabled on the APs.
At least two controllers are needed to form the cluster.
The APs have to be connected on the same network segment.
The APs must all be configured to use different radio modes.
The APs must use different cluster names.
Decrease the power of the wireless transmitter.
Add another access point.
Upgrade the access point to one that can route.
Adjust the wireless NICs in the laptops to operate at 10GHz to be compatible with 802.11n.
Ad hoc mode
Sending an ARP request
Delivering a broadcast frame
Transmitting a probe request
Initiating a three-way handshake
Receiving a broadcast beacon frame
WPA2 with TKIP
WPA2 with AES
Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.
Change the authentication method on the AP.
Switch to an 802.11g AP.
Set the AP to mixed mode.
Ip ospf message-digest-key 1 md5 1C34dE
Area 1 authentication message-digest
Username OSPF password 1C34dE
Enable password 1C34dE
Area 0 authentication message-digest
R1 or R2 does not have a loopback interface that is configured yet.
The ISP has not configured a static route for the ABC Company yet.
R1 or R2 does not have a network statement for the 172.16.100.0 network.
R1 has not sent a default route down to R2 by using the default-information originate command.
Use only OSPFv3.
Use MD5 authentication.
Use the enable secret command.
When feasible, create a VPN tunnel between each OSPF neighbor adjacency.
Use the passive-interface command on LAN interfaces that are connected only to end-user devices.
Use the network command to configure the LAN network under the global routing process.
Enable the OSPFv3 routing process on the interface connected to the remote LAN.
Force DR/BDR elections to occur where required.
Restart the OPSFv3 routing process.
The local router has formed complete neighbor adjacencies, but must be in a 2WAY state for the router databases to be fully synchronized.
There is a problem with the OSPFv3 adjacency between the local router and the router that is using the neighbor ID 188.8.131.52.
The dead time must be higher than 30 for all routers to form neighbor adjacencies.
The neighbor IDs are incorrect. The interfaces must use only IPv6 addresses to ensure fully synchronized routing databases.
When the router has interfaces in diffrent areas
When the router is configured as an ABR by the network administrator
When the router has the highest router ID
When the router has an OSPF priority of 0
This network has been learned from an internal router within the same area.
This network was learned through summary LSAs from an ABR.
This network is directly connected to the interface GigabitEthernet0/0.
This network should be used to forward traffic toward external networks.
ASBRs perform all OSPF summarization.
Routes within an area are summarized by the ABR.
ABRs advertise the summarized routes into the backbone.
Type 3 and type 5 LSAs are used to propagate summarized routes by default.
Route summarization results in high network traffic and router overhead.
There are no interarea routes in the routing table for network 192.168.1.0.
The OSPF routing process is inactive.
The link to the new area is down.
The router has not established any adjacencies with other OSPF routers.
When learned routes age out
Only when necessary
Every 5 seconds via multicast
Every 30 seconds via broadcast
The packets are sent in response to hello packets.
The packets are used to discover neighbors that are connected on an interface.
The packets are sent as unicast.
The packets require confirmation.
The packets are unreliable.
B(config-router)# network 192.168.10.4 0.0.0.3 B(config--router)# network 192.168.10.8 0.0.0.3
B(config-router)# network 192.168.10.4 0.0.0.3 B(config--router)# network 192.168.10.8 0.0.0.3 B(config--router)#network 192.168.10.128 0.0.0.63
B(config--router)# network 192.168.10.4 255.255.255.248 B(config--router)# network 192.168.10.8 255.255.255.248 B(config--router)#network 192.168.10.128 255.255.255.192
B(config--router)# network 192.168.10.0 255.255.255.0 B(config--router)# network 192.168.10.4 0.0.0.3 B(con鹃닻g-router)# network 192.168.10.8 0.0.0.3 B(config--router)# network 192.168.10.64 0.0.0.63 B(config--router)# network 192.168.10.128 0.0.0.63 B(config--router)# network 192.168.10.192 0.0.0.63
B(config--router)# network 192.168.10.0 0.0.0.255
As the autonomous system number
As the number of neighbors supported by this router
As the length of time this router will wait to hear hello packets from a neighbor
As the maximum bandwidth of the fastest interface on the router
Show ip protocols
Show ip route
Transmit and receive load
There is one feasible successor to network 192.168.1.8/30.
The network 192.168.10.8/30 can be reached through 192.168.11.1.
The reported distance to network 192.168.1.0/24 is 41024256.
The neighbor 172.16.6.1 meets the feasibility condition to reach the 192.168.1.0/24 network.
Router R1 has two successors to the 172.16.3.0/24 network.
When the EIGRP domain is converged
When there is outgoing traffic toward the destination network
When there is an EIGRP message from the successor of the destination network
When the connection to the successor of the destination network fails and there is no feasible successor available
The 32-bit router ID
The IPv6 global unicast address that is configured on the interface
The all-EIGRP-routers multicast address
The interface IPv6 link-local address
The link-local addresses of neighbor routers interfaces are configured manually.
R1 has two neighbors. They connect to R1 through their S0/0/0 and S0/0/1 interfaces.
The neighbor with the link-local address FE80::5 is the first EIGRP neighbor that is learned by R1.
If R1 does not receive a hello packet from the neighbor with the link-local address FE80::5 in 2 seconds, it will declare the neighbor router is down.
10.1.1.0/24 10.1.2.0/24 10.1.3.0/24 10.1.4.0/28
On a per-packet basis
On a per-interface basis
On a per-path-load basis
On a per-destination basis
The interfaces that will use EIGRP authentication must be specified
A username and password must be configured
The keychain for EIGRP authentication must be configured on the interfaces.
The CiscoVille router requires a second keychain to function correctly when using two interfaces for EIGRP authentication.
When a router has not discovered a neighbor within three minutes
When a router has more than three active interfaces
When a network contains discontiguous network addresses
When a router has less than three active interfaces
When a network addressing scheme uses VLSM
Enable the serial interfaces of both routers.
Configure EIGRP to send periodic updates.
Configure the same hello interval between the routers.
Configure both routers with the same EIGRP process ID.
Verify the name of the TFTP server using the show hosts command.
Verify that the TFTP server is running using the tftpdnld command.
Verify that the checksum for the image is valid using the show version command.
Verify connectivity between the router and TFTP server using the ping command.
Verify that there is enough flash memory for the new Cisco IOS image using the show flash command.
The FTP server is operational.
The old IOS image file has been deleted.
There is sufficient space in flash memory.
The desired IOS image file has been downloaded to the router.
Show license all
Copy tftp: flash0
It is a key for enabling an IOS feature set.
It is a proprietary encryption algorithm.
It is a compression file type used when installing IOS 15 or an IOS upgrade.
It is a way to compress an existing IOS so that a newer IOS version can be coinstalled on a router.
The IOS will prompt the user to reboot the router.
The features in the Security package are available immediately.
The IOS will prompt the user to provide a UDI in order to activate the license.
The Evaluation Right-To-Use license for the Security technology package is activated.
License Type: ipbasek9
License Type: Permanent
License Type: Temporary
License State: Active, In Use
License State: Active, Registered
License State: On