Refer to the exhibit. Switch#show etherchannel summary



Yüklə 2,03 Mb.
Pdf görüntüsü
səhifə29/39
tarix13.12.2023
ölçüsü2,03 Mb.
#174656
1   ...   25   26   27   28   29   30   31   32   ...   39
ccna new qstns 6

Answer:

Explanation
From the exhibit we learned that both the priorities of R2 and R3 are 1 so if we set a higher value 
for R1 on this segment (interface f0/0) and reset the OSPF process than R1 will take the DR role. 
================================ New Questions (added on 8th-May-2022) 
================================
Question 80
Refer to the exhibit. 


The IP address configurations must be completed on the DC-1 and HQ-1 routers based on these 
requirements. 
DC-1 Gi1/0 must be the last usable address on a /30 
DC-1 Gi1/1 must be the first usable address on a /29 
DC-1 Gi1/2 must be the last usable address on a /28 
HQ-1 Gi1/3 must be the last usable address on a /29 
Drag and drop the commands from the left onto the destination interfaces on the right. Not all 
commands are used. 
Answer:_DC-1'>Answer:
DC-1:
+ ip address 209.165.202.130 255.255.255.252 


+ ip address 192.168.4.9 255.255.255.248 
+ ip address 192.168.3.14 255.255.255.240 
HQ-1:
+ ip address 192.168.3.14 255.255.255.248 
Question 81
Refer to the exhibit. 
Which type of configuration is represented in the output? 
A. Chef 
B. JSON 
C. Ansibte 
D. Puppet 
Answer:

Explanation
Puppet resource declarations have the following syntax: 
Where: 
: is one of the numerous resource types, e.g., file 
: A arbitrary unique resource identifier across all resources of the same type (across all  <br />resources applied to a particular system)  <br /><attribute>: Resource type-specific parameters  <br /><b>Question 82</b> <br />How does TFTP operate in a network?  <br />A. relies on the well-known TCP port 20 <a href="/data-collection-analysis-and-collection-data-collection-and-an.html">to transmit data  </a><br />B. requires two separate connections for control <a href="/1-are-traffic-jams-a-problem-where-you-live.html">and data traffic  </a><br />C. uses block numbers to identify and mitigate <a href="/burst-errors.html">data-transfer errors  </a><br />D. provides <a href="/hps-dts-ei6-nbiot-a4.html">secure data transfer  </a><br /></attribute>

Yüklə 2,03 Mb.

Dostları ilə paylaş:
1   ...   25   26   27   28   29   30   31   32   ...   39




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin