IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNPWhich VTP mode is exclusive to VTP version 3?ITExamAnswers asked 3 years ago • CCNPRefer to the exhibit. Which STP enhancement should be configured in the network to effectively enforce the position of the root bridge?ITExamAnswers asked 3 years ago • CCNPWith 802.1X port-based authentication, what are the three specific roles for devices? (Choose three.)ITExamAnswers asked 3 years ago • CCNPWhich two types of access control lists operate at both Layer 2 and Layer 3 of the OSI model? (Choose two.)ITExamAnswers asked 3 years ago • CCNPAn administrator has noticed that the primary FlexLink link on a switch has shut down and that the standby link is now forwarding traffic. What will happen when the primary link comes back up?ITExamAnswers asked 3 years ago • CCNPWhich restriction applies to the implementation of FlexLink?ITExamAnswers asked 3 years ago • CCNPRefer to the exhibit. Which feature is configured in the displayed output?ITExamAnswers asked 3 years ago • CCNPWhat switchport port-security keyword causes MAC addresses to be added to the running configuration?ITExamAnswers asked 3 years ago • CCNPWhat three steps should be implemented in the network to mitigate a VLAN hopping attack? (Choose three.)ITExamAnswers asked 3 years ago • CCNPRefer to the exhibit. The DNS servers DNS1 and DNS2 are redundant copies so they need to communicate with each other and to the Internet. The SMTP server should not be reachable from the DNS Servers. Based on the partial configuration that is provided, what private VLANs design will be implemented?ITExamAnswers asked 3 years ago • CCNPWhat is one way to mitigate spanningtree compromises?ITExamAnswers asked 3 years ago • CCNPWhich statement best describes how traffic is handled between different port types within a primary pVLAN?ITExamAnswers asked 3 years ago • CCNPIn which location or situation is a private VLAN appropriate?ITExamAnswers asked 3 years ago • CCNPWhat switchport portsecurity keyword causes MAC addresses to be added to the running configuration?ITExamAnswers asked 3 years ago • CCNPHow does VLAN hopping cause a vulnerability in the network?ITExamAnswers asked 3 years ago • CCNP