An engineer is configuring data and voice services to pass through the same port. The designated switch interface fastethernet0/1 must transmit packets using the same priority for data when they are received from the access port of the IP phone. Which configuration must be used?
Ainterface fastethernet0/1 switchport priority extend cos 7
QUESTION 506 Which mode must be set for APs to communicate to a Wireless LAN Controller using the Control and Provisioning of Wireless Access Points (CAPWAP) protocol? A. bridge B. route C. autonomous D. lightweight Correct Answer: D Section: (none) Explanation Explanation/Reference:
Q507(none)
What are two benefits of FHRPs? (Choose two.)
Choose 2 — select all that apply
AThey prevent (oops in the Layer 2 network.
BThey allow encrypted traffic.
CThey are able to bundle muftlple ports to increase bandwidth
DThey enable automatic failover of the default gateway.
EThey allow multiple devices lo serve as a single virtual gateway for clients in the network
Correct Answer:DE
Q508(none)
What are two characteristics of an SSID? (Choose Two)
Choose 2 — select all that apply
AIt can be hidden or broadcast in a WLAN
BIt uniquely identifies an access point in a WLAN
CIt uniquely identifies a client in a WLAN
DIt is at most 32 characters long.
EIT provides secured access to a WLAN
Correct Answer:AD
Q509(none)
In QoS, which prioritization method is appropriate for interactive voice and video?
Aexpedited forwarding
Btraffic policing
Cround-robin scheduling D. low-latency queuing
Correct Answer:D
Q510(none)
Refer to the exhibit. Which change to the configuration on Switch allows the two switches to establish an GtherChannel?
AChange the protocol to EtherChannel mode on.
BChange the LACP mode to active
CChange the LACP mode to desirable
DChange the protocol to PAqP and use auto mode
Correct Answer:B
Q511(none)
What Is the path for traffic sent from one user workstation to another workstation on a separate switch In a Ihree-lter architecture model? A. access – core – distribution – access
Baccess – distribution – distribution – access
Caccess – core – access
Daccess -distribution – core – distribution – access
Correct Answer:D
Q512(none)
How does WPA3 improve security?
AIt uses SAE for authentication.
BIt uses a 4-way handshake for authentication.
CIt uses RC4 for encryption.
DIt uses TKIP for encryption.
Correct Answer:A
Q513(none)
Where does wireless authentication happen?
ASSID
Bradio
Cband
DLayer 2
Correct Answer:D
Q514(none)
How are the switches in a spine-and-leaf topology interconnected?
AEach leaf switch is connected to one of the spine switches.
BEach leaf switch is connected to two spine switches, making a loop.
CEach leaf switch is connected to each spine switch.
DEach leaf switch is connected to a central leaf switch, then uplinked to a core spine switch.
Correct Answer:C
Q515(none)
What are two characteristics of a public cloud Implementation? (Choose two.)
Choose 2 — select all that apply
AIt is owned and maintained by one party, but it is shared among multiple organizations.
BIt enables an organization to fully customize how It deploys network resources.
CIt provides services that are accessed over the Internet.
DIt Is a data center on the public Internet that maintains cloud services for only one company.
EIt supports network resources from a centralized third-party provider and privately-owned virtual resources