Welcome, Guest
You have to register before you can post on our site.

Username
  

Password
  





Search Forums

(Advanced Search)

Latest Threads
QID:AND84
Forum: Answer this question
Last Post: help_desk
4 hours ago
» Replies: 1
» Views: 24
CML YAML Files - Not work...
Forum: CCNP ENCOR 350-401 Forum
Last Post: help_desk
10-11-2025, 12:15 PM
» Replies: 1
» Views: 180
Passed ENSARI - My Recomm...
Forum: CCNP ENARSI 300-410 Forum
Last Post: chewosaurus
10-06-2025, 02:26 PM
» Replies: 1
» Views: 963
How2Pass 200-201 CBROPS C...
Forum: Cybersecurity Associate - CBROPS 200-201 Forum
Last Post: forumsupport
10-05-2025, 06:32 PM
» Replies: 0
» Views: 153
CCNP 300-101 Questions
Forum: General Discussion
Last Post: ncc16ncc
10-03-2025, 10:31 AM
» Replies: 6
» Views: 21,878
Missing pka file 802.1Q T...
Forum: Answer this question
Last Post: help_desk
09-29-2025, 11:36 AM
» Replies: 1
» Views: 605
IPv4 and IPv6 Assignment ...
Forum: Answer this question
Last Post: help_desk
09-29-2025, 11:21 AM
» Replies: 1
» Views: 603
PBR and Redistribution Si...
Forum: CCNP ENARSI 300-410 Forum
Last Post: greaterzen1
09-24-2025, 04:47 PM
» Replies: 0
» Views: 959
QID:AND69
Forum: Answer this question
Last Post: help_desk
09-24-2025, 11:18 AM
» Replies: 1
» Views: 1,317
QID:AND38
Forum: Answer this question
Last Post: help_desk
09-24-2025, 11:12 AM
» Replies: 2
» Views: 1,523

 
  QID:AND46
Posted by: JamesJones - 09-21-2025, 01:55 AM - Forum: Answer this question - Replies (1)

Drag and Drop

The answers provided (in my opinion) are wrong. Some are correct, but some are incorrect.

This should be the correct responses:

Restoration of service → 1. The network management system launches a preconfigured script to restore functionality.
Problem resolution → 2. The administrator can manually intervene at the source of the fault.
Fault detection → 3. The system identifies performance degradation or service interruption.
Event correlation and aggregation → 4. The system groups alarms from related issues.
Fault diagnosis and isolation → 5. The system reports on the source of the issue.

Please verify and respond. Thanks

Print this item

  QID:AAN1030
Posted by: JamesJones - 09-20-2025, 11:32 PM - Forum: Answer this question - Replies (1)

Was marked wrong for answering "Enable Status and select data from the Interface/Interface Group drop-down list.

Correct answer said to be "Enable Broadcast SSID..."

But the explanation goes on to say "We must enable the WLAN (check the Status box)" which is what I answered.

Please confirm the correct answer thanks!

Print this item

  QID:AN1056
Posted by: JamesJones - 09-20-2025, 09:39 PM - Forum: Answer this question - Replies (1)

[font='Segoe Sans', 'Segoe UI', 'Segoe UI Web (West European)', -apple-system, BlinkMacSystemFont, Roboto, 'Helvetica Neue', sans-serif]What is the term used to describe a method of connecting multiple switches in a network to allow traffic to flow between them, typically used for larger networks to increase bandwidth?[/font]

Answer says "trunk" I believe that is WRONG, and the answer should be LAG

Here is why:

• LAG and EtherChannel are closely related; both refer to bundling multiple physical links between switches to increase bandwidth and provide redundancy.
• EtherChannel is Cisco’s proprietary implementation of LAG.
• Trunk is used to carry multiple VLANs between switches, but doesn’t inherently increase bandwidth.
• Access refers to ports that connect end devices and carry traffic for a single VLAN—unrelated to inter-switch bandwidth.

Thanks

Print this item

  QID:AN1036
Posted by: JamesJones - 09-20-2025, 09:22 PM - Forum: Answer this question - No Replies

I was marked wrong for answering "increases network security against man-in-the-middle attacks and discourages denial of service attacks."

However, the Explanation describes what I answered above, about denial of service (not brute force attacks).

Can you please verify the correct answer to this question?

Thanks!

Print this item

  AR450
Posted by: chewosaurus - 09-17-2025, 02:04 PM - Forum: CCNP ENARSI 300-410 Forum - Replies (1)

The green answer is wrong because

"eigrp stub summary" advertises only summaries and suppresses connected routes, so R1 won’t learn R2’s loopback /128s.

Correct: configure "eigrp stub connected summary" on R2 so the connected loopbacks are advertised.

Thanks

Print this item

  QID:AN732
Posted by: JamesJones - 09-13-2025, 08:01 PM - Forum: Answer this question - Replies (3)

What are two differences between WPA2 and WPA3 wireless security? 

I was marked "wrong" for answering "WPA3 uses SAE for stronger protection than WPA2, which uses AES"

Are you saying this is incorrect??

Thanks for verifying

Print this item

  AN177
Posted by: JamesJones - 09-08-2025, 12:09 AM - Forum: Answer this question - Replies (1)

Question AN177 about lldp port-description my answer was that it needs to be under the interface (config-if)#lldp port-description, and it marked me as "wrong". The answer says it should be executed globallt (config)#lldp port-description

My digging says this is done on the interface. Please advise

Thanks!

Print this item

  AN247
Posted by: JamesJones - 09-02-2025, 12:12 AM - Forum: Answer this question - Replies (1)

What is recommended for the wireless infrastructure design of an organization?

  • A. group access points together to increase throughput on a given channel
  • B. configure the first three access points are configured to use Channels 1, 6, and 11
  • C. include a least two access points on nonoverlapping channels to support load balancing
  • D. assign physically adjacent access points to the same Wi-Fi channel

Answer: B

Your test says, "group access points together to increase throughput on a given channel."

Please confirm which is the correct answer. Thanks!

Print this item

  QID:AN328
Posted by: JamesJones - 09-01-2025, 10:05 PM - Forum: Answer this question - Replies (1)

QID:AN328 What are two characteristics of the distribution layer in a three-tier network architecture? (Choose two.)

  • provides a boundary between Layer 2 and Layer 3 communications serves as the network aggregation pointdesigned to meet continuous, redundant uptime requirementsis the backbone for the network topologyphysical connection point for a LAN printer

However, your test says the answers are:
 " provides a boundary between Layer 2 and Layer 3 communications" (no problem with this answer)
 " designed to meet continuous, redundant uptime requirements" (this does not look accurate, and describes what I would think is the Core layer, in a three-tier network)

Please confirm.

When I search this question online, I see your answer does not match what others..

Thanks!

Print this item

  AR515
Posted by: chewosaurus - 08-26-2025, 03:14 PM - Forum: CCNP ENARSI 300-410 Forum - Replies (1)

Me again, I believe this one is also wrong


[*]Main reason current answer is wrong: It configures MD5 message-digest when the interface shows cryptographic (key-chain) auth.
[*]Secondary reason: Even if it had used key-chain auth, it points to a key chain called Cisco which doesn’t exist. The correct chain is ospf with key 1


Thanks

Print this item