Welcome, Guest |
You have to register before you can post on our site.
|
Latest Threads |
QID:AND84
Forum: Answer this question
Last Post: help_desk
4 hours ago
» Replies: 1
» Views: 24
|
CML YAML Files - Not work...
Forum: CCNP ENCOR 350-401 Forum
Last Post: help_desk
10-11-2025, 12:15 PM
» Replies: 1
» Views: 180
|
Passed ENSARI - My Recomm...
Forum: CCNP ENARSI 300-410 Forum
Last Post: chewosaurus
10-06-2025, 02:26 PM
» Replies: 1
» Views: 963
|
How2Pass 200-201 CBROPS C...
Forum: Cybersecurity Associate - CBROPS 200-201 Forum
Last Post: forumsupport
10-05-2025, 06:32 PM
» Replies: 0
» Views: 153
|
CCNP 300-101 Questions
Forum: General Discussion
Last Post: ncc16ncc
10-03-2025, 10:31 AM
» Replies: 6
» Views: 21,878
|
Missing pka file 802.1Q T...
Forum: Answer this question
Last Post: help_desk
09-29-2025, 11:36 AM
» Replies: 1
» Views: 605
|
IPv4 and IPv6 Assignment ...
Forum: Answer this question
Last Post: help_desk
09-29-2025, 11:21 AM
» Replies: 1
» Views: 603
|
PBR and Redistribution Si...
Forum: CCNP ENARSI 300-410 Forum
Last Post: greaterzen1
09-24-2025, 04:47 PM
» Replies: 0
» Views: 959
|
QID:AND69
Forum: Answer this question
Last Post: help_desk
09-24-2025, 11:18 AM
» Replies: 1
» Views: 1,317
|
QID:AND38
Forum: Answer this question
Last Post: help_desk
09-24-2025, 11:12 AM
» Replies: 2
» Views: 1,523
|
|
|
QID:AND46 |
Posted by: JamesJones - 09-21-2025, 01:55 AM - Forum: Answer this question
- Replies (1)
|
 |
Drag and Drop
The answers provided (in my opinion) are wrong. Some are correct, but some are incorrect.
This should be the correct responses:
Restoration of service → 1. The network management system launches a preconfigured script to restore functionality.
Problem resolution → 2. The administrator can manually intervene at the source of the fault.
Fault detection → 3. The system identifies performance degradation or service interruption.
Event correlation and aggregation → 4. The system groups alarms from related issues.
Fault diagnosis and isolation → 5. The system reports on the source of the issue.
Please verify and respond. Thanks
|
|
|
QID:AAN1030 |
Posted by: JamesJones - 09-20-2025, 11:32 PM - Forum: Answer this question
- Replies (1)
|
 |
Was marked wrong for answering "Enable Status and select data from the Interface/Interface Group drop-down list.
Correct answer said to be "Enable Broadcast SSID..."
But the explanation goes on to say "We must enable the WLAN (check the Status box)" which is what I answered.
Please confirm the correct answer thanks!
|
|
|
QID:AN1056 |
Posted by: JamesJones - 09-20-2025, 09:39 PM - Forum: Answer this question
- Replies (1)
|
 |
[font='Segoe Sans', 'Segoe UI', 'Segoe UI Web (West European)', -apple-system, BlinkMacSystemFont, Roboto, 'Helvetica Neue', sans-serif]What is the term used to describe a method of connecting multiple switches in a network to allow traffic to flow between them, typically used for larger networks to increase bandwidth?[/font]
Answer says "trunk" I believe that is WRONG, and the answer should be LAG
Here is why:
• LAG and EtherChannel are closely related; both refer to bundling multiple physical links between switches to increase bandwidth and provide redundancy.
• EtherChannel is Cisco’s proprietary implementation of LAG.
• Trunk is used to carry multiple VLANs between switches, but doesn’t inherently increase bandwidth.
• Access refers to ports that connect end devices and carry traffic for a single VLAN—unrelated to inter-switch bandwidth.
Thanks
|
|
|
QID:AN1036 |
Posted by: JamesJones - 09-20-2025, 09:22 PM - Forum: Answer this question
- No Replies
|
 |
I was marked wrong for answering "increases network security against man-in-the-middle attacks and discourages denial of service attacks."
However, the Explanation describes what I answered above, about denial of service (not brute force attacks).
Can you please verify the correct answer to this question?
Thanks!
|
|
|
AR450 |
Posted by: chewosaurus - 09-17-2025, 02:04 PM - Forum: CCNP ENARSI 300-410 Forum
- Replies (1)
|
 |
The green answer is wrong because
"eigrp stub summary" advertises only summaries and suppresses connected routes, so R1 won’t learn R2’s loopback /128s.
Correct: configure "eigrp stub connected summary" on R2 so the connected loopbacks are advertised.
Thanks
|
|
|
QID:AN732 |
Posted by: JamesJones - 09-13-2025, 08:01 PM - Forum: Answer this question
- Replies (3)
|
 |
What are two differences between WPA2 and WPA3 wireless security?
I was marked "wrong" for answering "WPA3 uses SAE for stronger protection than WPA2, which uses AES"
Are you saying this is incorrect??
Thanks for verifying
|
|
|
AN177 |
Posted by: JamesJones - 09-08-2025, 12:09 AM - Forum: Answer this question
- Replies (1)
|
 |
Question AN177 about lldp port-description my answer was that it needs to be under the interface (config-if)#lldp port-description, and it marked me as "wrong". The answer says it should be executed globallt (config)#lldp port-description
My digging says this is done on the interface. Please advise
Thanks!
|
|
|
AN247 |
Posted by: JamesJones - 09-02-2025, 12:12 AM - Forum: Answer this question
- Replies (1)
|
 |
What is recommended for the wireless infrastructure design of an organization? - A. group access points together to increase throughput on a given channel
- B. configure the first three access points are configured to use Channels 1, 6, and 11
- C. include a least two access points on nonoverlapping channels to support load balancing
- D. assign physically adjacent access points to the same Wi-Fi channel
Answer: B
Your test says, "group access points together to increase throughput on a given channel."
Please confirm which is the correct answer. Thanks!
|
|
|
QID:AN328 |
Posted by: JamesJones - 09-01-2025, 10:05 PM - Forum: Answer this question
- Replies (1)
|
 |
QID:AN328 What are two characteristics of the distribution layer in a three-tier network architecture? (Choose two.) - provides a boundary between Layer 2 and Layer 3 communications serves as the network aggregation pointdesigned to meet continuous, redundant uptime requirementsis the backbone for the network topologyphysical connection point for a LAN printer
However, your test says the answers are:
" provides a boundary between Layer 2 and Layer 3 communications" (no problem with this answer)
" designed to meet continuous, redundant uptime requirements" (this does not look accurate, and describes what I would think is the Core layer, in a three-tier network)
Please confirm.
When I search this question online, I see your answer does not match what others..
Thanks!
|
|
|
AR515 |
Posted by: chewosaurus - 08-26-2025, 03:14 PM - Forum: CCNP ENARSI 300-410 Forum
- Replies (1)
|
 |
Me again, I believe this one is also wrong
[*]Main reason current answer is wrong: It configures MD5 message-digest when the interface shows cryptographic (key-chain) auth.
[*]Secondary reason: Even if it had used key-chain auth, it points to a key chain called Cisco which doesn’t exist. The correct chain is ospf with key 1
Thanks
|
|
|
|