What does Cisco recommend when you are enabling Cisco IOS IPS?
A. Do not enable all the signatures at the same time.
B. Do not enable the ICMP signature.
C. Disable the Zone-Based Policy Firewall because it is not compatible with Cisco IOS IPS.
D. Disable CEF because it is not compatible with Cisco IOS IPS.
Which two statements are true about Unicast Reverse Path Forwarding Loose Mode? (Choose two.)
A. It is used in multihome network scenarios.
B. It can be used with BGP to mitigate DoS and DDoS.
C. It does not need to have CEF enabled.
D. It is enabled via the interface level command ip verify unicast reverse-path.
E. It cannot be used with “classification” access lists.
Which three protocols should be explicitly managed by using a CoPP policy on an Internet border router? (Choose three.)
What is true about IP Source Guard with port security?
A. Binding should be manually configured.
B. It is not supported if IEEE 802.1x port-based authentication is enabled
C. The DHCP server must support option 82, or the client is not assigned an IP address.
D. It filters based on source IP address only.
Which two commands are required to enable multicast on a router, knowing that the receivers only supports IGMPv2? (Choose Two)
A. IP PIM RP-address
B. IP PIM ssm
C. IP PIM Sparse-mode
D. IP PIM Passive
A branch router is configured with an egress QoS policy that was designed for a total number of 10 concurrent VOIP Calls. Due to Expansion, 15 VOIP Calls are now running over the link, but after the 14th call was established, all calls were affected and the voice quality was dramatically degraded. Assuming that there is enough bandwidth on the link for all of this traffic, which part of the QOS configuration should be updated due to the new traffic profile?
A. Increase the shaping rate for the priority queue.
B. Remove the policer applied on the priority queue.
C. Remove the shaper applied on the preiority queue.
D. Increase the policing rate for the priority queue.
A new Backup Connection is being deployed on a remote site router. the stability of the connection has been a concern. in order to provide more information to EIGRP Regarding this interface, You wish to incorporate the “Reliability” cost metric in the EIGRP Calculation with the command metric weights 1 0 1 0 1. What impact will this modification on the remote site router have for other existing EIGRP neighborships from the same EIGRP Domain?
A. Existing Neighbors will immediately begin using the new metric.
B. Existing Neighbors will use the new metric after clearing the EIGRP Neighbors.
C. Existing Neighbors will resync, maintaining the neighbor relationship
D. All ecisting neighbor relationships will go down
When you are troubleshooting duplex mismatches, which two errors are typically seen on the fullduplex end? (Choose two.)
B. FCS errors
C. interface resets
D. late collisions
Which two options are contained in a VTP subset advertisement? (Choose two.)
A. followers field
B. MD5 digest
C. VLAN information
D. sequence number
Which two statements are true about traffic shaping? (Choose two.)
A. Out-of-profile packets are queued.
B. It causes TCP retransmits.
C. Marking/remarking is not supported.
D. It does not respond to BECN and ForeSight Messages.
E. It uses a single/two-bucket mechanism for metering.
Which three options are features of VTP version 3? (Choose three.)
A. VTPv3 supports 8K VLANs.
B. VTPv3 supports private VLAN mapping.
C. VTPv3 allows for domain discovery.
D. VTPv3 uses a primary server concept to avoid configuration revision issues.
E. VTPv3 is not compatible with VTPv1 or VTPv2.
F. VTPv3 has a hidden password option.
Which three options are considered in the spanning-tree decision process? (Choose three.)
A. lowest root bridge ID
B. lowest path cost to root bridge
C. lowest sender bridge ID
D. highest port ID
E. highest root bridge ID
F. highest path cost to root bridge
Why would a rogue host that is running a DHCP Server on a Campus LAN network present a security risk?
A. It may allocate IP addresses from an unknown subnet to the users
B. all Multicast traffic can be sniffer y using the DHCO Multicasr capabilities
C. the CPU utilization of the first hop router can be overloaded by exploiting DHCP Relay open ports
D. A potential Man-in-the-middle Attack can be used against the clients.
Which Statement is true about TCN Propagation?
A. The originator of the TCN immediately floods this information through the network
B. the TCN propagation is a two step process
C. A TCN is generated and sent to the root bridge
D. the root bridge must flood this information throught the network
Which statement is true about loop guard?
A. Loop Guard only operates on interfaces that are considered point-to-point by the spanning tree.
B. Loop Guard only operates on root ports.
C. Loop Guard only operates on designated ports
D. Loop Guard only operates on edge ports
Which two are effects of connecting a network segment that is running 802.1D to a network segment that is running 802.1w? (Choose Two.)
A. the entire network switches to 802.1D and generates BPDUs to determine root bridfe status.
B. A migration delay of three seconds occurs when the port that is connected to the 802.1D bridge comes up
C. The entire network reconverges and a unique root briddge for the 802.1D segment, and a root bridge for the 802.1W segment, is chosen
D. the first hop 802.1w switch that is connected to the 802.1D runs entirely in 802.1D compatibility mode and converts the BPDUs to either 802.1D or 802.1W segments of the network
E. Classic 802.1D timers, Such as forward Delay and Max-age, will only be used as a backup, and will not be necessary if point-to-point links and edge prots are properly identified and set by the administrator.
Which command is used to enable Etherchannel hashing for layer 3 IP and Layer 4 Port-based CEF?
A. mpls ip cef
B. port-channel ip cef
C. mpls ip port-channel cef
D. port-channel load balance
E. mpls ip load-balance
F. ip cef etherchannel channel-id XOR L4
G. ip cef connection exchange
In 802.1s, how is the VLAN to instance mapping represented in the BPDU?
A. The VLAN to instance mapping is a normal 16-byte field in the MST BPDU.
B. The VLAN to instance mapping is a normal 12-byte field in the MST BPDU.
C. The VLAN to instance mapping is a 16-byte MD5 signature field in the MST BPDU.
D. The VLAN to instance mapping is a 12-byte MD5 signature field in the MST BPDU.
Which three combinations are valid LACP configurations that will set up a channel? (Choose three.)
Which two options does Cisco PfR use to control the entrance link selection with inbound optimization? (Choose two.)
A. Prepend extra AS hops to the BGP prefix.
B. Advertise more specific BGP prefixes (longer mask).
C. Add (prepend) one or more communities to the prefix that is advertised by BGP.
D. Have BGP dampen the prefix.