Refer to the exhibit. Which three statements accurately describe this GLBP topology? (Choose three.)()
A. Router A is responsible for answering ARP requests sent to the virtual IP address.
B. If Router A becomes unavailable, Router B will forward packets sent to the virtual MAC address of Router A
C. If another router were added to this GLBP group, there would be two backup AVGs
D. Router B is in GLBP listen state.
E. Router A alternately responds to ARP requests with different virtual MAC addresses.
F. Router B will transition from blocking state to forwarding state when it becomes the AVG
查看答案
What are three security problems with Wi-Fi Protected Access (WPA)?()
A. WPA is based on the outdated IEEE 802.11i standard.
B. WPA uses RSN,which uses the same base encryption algorithm as RC4.
C. WPA requires a hardware upgrade that may not be supported by all vendors.
D. WPA uses TKIP,which uses the same base encryption algorithm as WE
E. WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.
F. WPA is susceptible to a security weakness when preshared keys are used.
Which statement is true about "full state backup" in a Cisco Unified Computing System?()
An XML file containing all details of the system, including IP address and cluster details
B. A binary file containing only service profiles, pools, and other items configured after initial configuration
C. A binary file containing all details of the system, including IP address and cluster details
D. An XML file containing only service profiles, pools, and other items configured after initial configuration
E. A text file with the NX-OS running configuration
Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()
A. Router A is the master virtual router, and Router B is the backup virtual router. When Router A fails, Router B will become the master virtual router. When Router A recovers, Router B will maintain the role of master virtual router.
B. Router A is the master virtual router, and Router B is the backup virtual router. When Router A fails, Router B will become the master virtual router. When Router A recovers, it will regain the master virtual router role.
C. Router B is the master virtual router, and Router A is the backup virtual router. When Router B fails, Router A will become the master virtual router. When Router B recovers, Router A will maintain the role of master virtual router.
D. Router B is the master virtual router, and Router A is the backup virtual router. When Router B fails, Router A will become the master virtual router. When Router B recovers, it will regain the master virtual router role.
Inaswitchedenvironment,whatdoestheIEEE802.1Qstandarddescribe?()
A. theoperationofVTP
B. amethodofVLANtrunking
C. anapproachtowirelessLANcommunication
D. theprocessforrootbridgeselection
E. VLANpruningvlan