Blistens to multicast traffic for packet forwarding
Cprovides DDoS mitigation
Drate-limits certain traffic
Correct Answer:D
Q496(none)
Which plane is centralized by an SON controller?
Amanagement-plane
Bcontrol-plane
Cdata-plane
Dservices-plane
Correct Answer:B
Q497(none)
Which access layer threat-mitigation technique provides security based on identity?
ADynamic ARP Inspection
Busing a non-default native VLAN C. 802.1x
DDHCP snooping
Correct Answer:C
Q498(none)
What are two similarities between UTP Cat 5e and Cat 6a cabling? (Choose two.)
Choose 2 — select all that apply
ABoth operate at a frequency of 500 MHz.
BBoth support runs of up to 55 meters.
CBoth support runs of up to 100 meters.
DBoth support speeds of at least 1 Gigabit.
EBoth support speeds up to 10 Gigabit.
Correct Answer:CD
Q499(none)
Refer to the exhibit. What is the metric of the route to the 192.168.10.33/28 subnet?
A84
B110 C. 128
D192
E193
Correct Answer:E
Q500(none)
What are two characteristics of the distribution layer in a three-tier network architecture? (Choose two.)
Choose 2 — select all that apply
Aserves as the network aggregation point
Bprovides a boundary between Layer 2 and Layer 3 communications
Cdesigned to meet continuous, redundant uptime requirements
Dis the backbone for the network topology
Ephysical connection point for a LAN printer
Correct Answer:AB
The distribution layer aggregates the data received from the access layer switches before it is transmitted to the core layer for routing to its final destination. In Figure 1-6, the distribution layer is the boundary between the Layer 2 domains and the Layer 3 routed network. https://www.ciscopress.com/articles/article.asp?p=2202410&seqNum=4
Q501(none)
What prevents a workstation from receiving a DHCP address?
ADTP
BSTP
CVTP
D802.10
Correct Answer:B
Q502(none)
What Is a syslog facility?
AHost that is configured for the system to send log messages
Bpassword that authenticates a Network Management System to receive log messages
Cgroup of log messages associated with the configured severity level
Dset of values that represent the processes that can generate a log message
Correct Answer:D
Q503(none)
Which communication interaction takes place when a southbound API Is used?
Abetween the SDN controller and PCs on the network
Bbetween the SON controller and switches and routers on the network
Cbetween the SON controller and services and applications on the network
Dbetween network applications and switches and routers on the network
Correct Answer:B
Q504(none)
Which port type supports the spanning-tree portfast command without additional configuration?