Tag Archives: switch

Which statement is true about the switch statement?

Which statement is true about the switch statement? A. It must contain the default section. B. The break statement, at the end of each case block, is mandatory. C. Its case label literals can be changed at runtime. D. Its expression must evaluate to a single value. Correct Answer: D Explanation/Reference: http://www.dummies.com/programming/java/switch-statements-in-java/

A network engineer is trying to retrieve SNMP MIBs with RESTCONF on the Cisco switch but fails. End-to-end routing is in place. Which configuration must the engineer implement on the switch to complete?

Refer to Exhibit. A network engineer is trying to retrieve SNMP MIBs with RESTCONF on the Cisco switch but fails. End-to-end routing is in place. Which configuration must the engineer implement on the switch to complete? A. netconf-yang cisco-ia snamp-community -string Public B. snmp-server community cosco RW C. snmp-server community public RO D. netconf-yang cisco-Ia snmp-community-string Private Answer:… Read More »

After an engineer configures an EtherChannel between switch SW1 and switch SW2, this error message is logged on switch SW2:

Refer to the exhibit. After an engineer configures an EtherChannel between switch SW1 and switch SW2, this error message is logged on switch SW2: SW2# 09:45:32: %PM-4-ERR_DISABLE: channel-misconfig error detected on Gi0/0, putting Gi0/0 in err-disable state 09:45:32: %PM-4-ERR_DISABLE: channel-misconfig error detected on Gi0/1, putting Gi0/1 in err-disable state Based on the output from switch SW1 and the… Read More »

The trunk between Gig1/0/1 of switch SW2 and Gig1/0/1 of switch SW1 is not operational. Which action resolves this issue?

Refer to the exhibit. The trunk between Gig1/0/1 of switch SW2 and Gig1/0/1 of switch SW1 is not operational. Which action resolves this issue? A. Configure both interfaces to nonegotiate and ensure that the switches are in different VTP domains. B. Configure both interfaces in dynamic auto DTP mode and ensure that the switches are in the same… Read More »

These commands have been added to the configuration of a switch. Which command flags an error if it is added to this configuration?

Refer to the exhibit. These commands have been added to the configuration of a switch. Which command flags an error if it is added to this configuration? A. monitor session 1 source interface port-channel 6 B. monitor session 1 source vlan 10 C. monitor session 1 source interface FastEthemet0/1 rx D. monitor session 1 source interface port-channel 7,… Read More »

An engineer attempts to configure a trunk between switch SW1 and switch SW2 using DTP, but the trunk does not form. Which command should the engineer apply to switch SW2 to resolve this issue?

Refer to the exhibit. An engineer attempts to configure a trunk between switch SW1 and switch SW2 using DTP, but the trunk does not form. Which command should the engineer apply to switch SW2 to resolve this issue? A. switchport nonegotiate B. no switchport C. switchport mode dynamic desirable D. switchport mode access Answer: Option C. Explanation:  No… Read More »

In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one AP to another on a different access switch using a single WLC?

A. Layer 3 B. inter-xTR C. auto anchor D. fast roam Answer: Option D. Explanation:  No answer description available for this question Show AnswerDiscussion The post In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one AP to another on a different access switch using a single WLC? appeared first on… Read More »

An administrator is adding a switch to a network that is running Cisco ISE and is only for IP Phones. The phones do not have the ability to authenticate via 802.1X. Which command is needed on each switch port for authentication?

A. dot1x system-auth-control B. enable bypass-MAC C. enable network-authentication D. mab Answer: Option D. Explanation:  No answer description available for this question Show AnswerDiscussion The post An administrator is adding a switch to a network that is running Cisco ISE and is only for IP Phones. The phones do not have the ability to authenticate via 802.1X. <br>Which… Read More »

An engineer is configuring 802.1X and wants it to be transparent from the users’ point of view. The implementation should provide open authentication on the switch ports while providing strong levels of security for non-authenticated devices. Which deployment mode should be used to achieve this?

A. closed B. high-impact C. low-impact D. open Answer: Option C. Explanation:  Reference: https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptivedeployment-guide/ta- p/3641515 Show AnswerDiscussion The post An engineer is configuring 802.1X and wants it to be transparent from the users’ point of view. The implementation should provide open authentication on the switch ports while providing strong levels of security for non-authenticated devices.<br> Which deployment mode… Read More »