IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNAA network engineer is configuring a Cisco switch when this message is displayed. What is the Syslog severity level of this message?IT Administrator asked 4 years ago • CCNAIn a controller-based wireless network, the WLC device may have multiple ports connected to a switch to form a bundle that provides load-balancing and redundancy. Which protocol supports the port bundle between a Cisco WLC and a Cisco switch?IT Administrator asked 4 years ago • CCNAIn a controller-based wireless network, a Cisco WLC device has four ports connected to a switch to form a bundle. This bundle will provide load-balancing and redundancy. Which two configurations must be performed on the four switch ports that connect to the WLC? (Choose two.)IT Administrator asked 4 years ago • CCNAWhat is a benefit of PortFast configured on a Cisco switch port?IT Administrator asked 4 years ago • CCNAA network administrator is configuring security for new WLANs on a Cisco 3500 series WLC. What is the default protocol used for authentication key management?IT Administrator asked 4 years ago • CCNATwo recent networking graduates from a local college have just been hired by a communication company to work on various network cabling projects throughout the state. Why would the company consider using fiber-optic cabling in long-haul networks?IT Administrator asked 4 years ago • CCNAAn employee is logging into a company account and another employee stands in such a way to see the account ID and password. Which kind of threat is this?IT Administrator asked 4 years ago • CCNAWhich wireless technology has low-power and low-data rate requirements making it popular in IoT environments?IT Administrator asked 4 years ago • CCNAWhat can an IT technician accomplish using the Manage Storage Spaces feature in Windows 8 and 10?IT Administrator asked 4 years ago • CCNAAn engineer must configure an OSPF neighbor relationship between router R1 and R3 The authentication configuration has been configured and the connecting interfaces are in the same 192.168 1.0/30 sublet. What are the next two steps to complete the configuration? (Choose two.)ITExamAnswers asked 4 years ago • CCNAWhat command would be used as part of configuring NAT or PAT to identify inside local addresses that are to be translated?IT Administrator asked 4 years ago • CCNAAn ACL is applied inbound on a router interface. The ACL consists of a single entry: access-list 101 permit udp 192.168.100.32 0.0.0.7 host 198.133.219.76 eq telnet . If a packet with a source address of 198.133.219.100, a destination address of 198.133.219.170, and a protocol of 23 is received on the interface, is the packet permitted or denied?ITExamAnswers asked 4 years ago • CCNARefer to the exhibit. The company has decided that no traffic initiating from any other existing or future network can be transmitted to the Research and Development network. Furthermore, no traffic that originates from the Research and Development network can be transmitted to any other existing or future networks in the company. The network administrator has decided that extended ACLs are better suited for these requirements. Based on the information given, what will the network administrator do?ITExamAnswers asked 4 years ago • CCNARefer to the exhibit. The company has provided IP phones to employees on the 192.168.10.0/24 network and the voice traffic will need priority over data traffic. What is the best ACL type and placement to use in this situation?IT Administrator asked 4 years ago • CCNAA technician is tasked with using ACLs to secure a router. When would the technician use the host configuration option or command?IT Administrator asked 4 years ago • CCNA