Chris Bryant's CCNA Study Guide Vol1 - Chris Bryant
Chris Bryant's CCNA Study Guide Vol1 - Chris Bryant
Chris Bryant's CCNA Study Guide Vol1 - Chris Bryant
ch7Full description
Descripción completa
Full description
Networking basics
Full description
Cisco CCNA Lab GuideFull description
Cisco CCNA Lab Guide
My Case Study completed at the end of CCNA semester 2.Full description
My Case Study completed at the end of CCNA semester 2.Full description
This book is designed to provide information about the CCNA Security Implementing Cisco Network Security (IINS) 210-260 exam. Every effort has been made to make this book as complete and as accura...
CISCOFull description
Descripción completa
CCNA Job Interview Preparation Guide
Full description
Full description
jazz guitar study guideDescripción completa
What are three benefits of implementing VSS in a network? (Choose three.) three.) -Single management point -Neighbors see the VSS as a single switch -Interchassis stateful failover A network network administrator administrator is designing a network with redundancy redundancy features such such SSO with with NSF. What protocol is should the administrator avoid while designing the routing topology? RIP What are two characteristics of the StackWise technology? (Choose two.) -Multiple switches can create an EtherChannel connection. -Unites multiple access switches in the same rack. What is considered a best practice for an optimal redundant network? Access switches switches should should have have redundant redundant connections connections to to redundant redundant distribution distribution switches. switches. What is the main purpose of implementing Cisco NSF? to continue forwarding IP packets following an RP switchover Which one of the following features provides the fastest failover for supervisor or route processor redundancy? SSO When using RPR, what two events can trigger a switchover from the active to the standby Supervisor Engine? (Choose two.) -clock synchronization failure between the Supervisor Engines. -an RP or SP crash on the active Supervisor Engine What are three characteristics of the VSS technology? (Choose three.) -VSS combines a pair of physical switches sw itches into a virtual switch. -Once the VSS is formed, only the control plan of one of the member's is active. -VSS increases system bandwidth capacity. Which three redundancy modes are supported by Catalyst 6500 Series switches? (Choose three.) -Route Processor Redundancy (RPR) -Single Router Mode with Stateful Switchover (SRM with SSO) -Nonstop Forwarding (NSF) with SSO What is the expected failover time for SSO mode for Layer 2 switching on the Catalyst 4500 family of switches? Subsecond Which command can be used to verify StackWise configuration to include their stack number, stack role, MAC address, hardware priority, hardware version and current state? show switch
To display configuration and status information for a VSS, which show command can be used? show switch virutal Which one is NOT a valid supervisor redundancy mode? NSF Which two technologies can be used to reduce the number of logical network devices and simplify Layer 2 and Layer 3 network toplogies? (Choose two.) VSS Which supervisor redundancy mode offers the fastest failover time? SSO How should unused ports on a switch be configured in order to prevent VLAN hopping attacks? Configure them as access ports and associate them with an unused VLAN. What are two purposes for an attacker launching a MAC table flood? (Choose two.) -to initiate a denial of service (DoS) attack -to capture data from the network A network administrator is tasked with protecting a server farm by implementing private VLANs. Each server should only be allowed to communicate with the default gateway. Which type of pVLAN should be configured on the switch port that connects to a server? isolated What is one way to mitigate spanningtree compromises? Statically configure the primary and backup root bridge. How does MAC address flooding cause a vulnerability in the network? The CAM table will be full, causing legitimate frames to be forwarded out all ports within the VLAN and allowing unauthorized users to capture data. What can be used to mitigate MAC table flooding attacks? port security