IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: CCNPWhat two additional features does a Layer 3 switch offer compared with a Layer 2 switch? (Choose two.)ITExamAnswers asked 3 years ago • CCNPWhat type of signal requires little extra bandwidth because data is being sent at a relatively low bit rate?ITExamAnswers asked 3 years ago • CCNPNetwork users complain that the network is running very slowly. Upon investigation, a network technician discovers CPU spikes and exhausted memory resources on all the network devices. Also, numerous syslog messages are being generated that note continuous MAC address relearning. What is the most likely cause of the problem?ITExamAnswers asked 3 years ago • CCNPWhat protocol is used by puppet masters to push configuration code to puppet agents?ITExamAnswers asked 3 years ago • CCNPIn which type of deployment is the Chef server hosted in the cloud?ITExamAnswers asked 4 years ago • CCNPA wireless network engineer who is new to the Cisco lightweight architecture is becoming familiar with common baselines for the APs in the company. One particular AP shows no clients attached, but shows 30% channel utilization on the 2.4 GHz channel and 0% channel utilization on the 5 GHz channel. What is the issue, if any?ITExamAnswers asked 3 years ago • CCNPWhich three protocols are components in the operation of 802.1x? (Choose three.)ITExamAnswers asked 3 years ago • CCNPA wireless engineer is deploying an autonomous Cisco access point. What must be configured on the access point to enable remote management?ITExamAnswers asked 3 years ago • CCNPHow will user traffic be forwarded between two laptops that are both connected to the same lightweight access point in a large enterprise topology?ITExamAnswers asked 3 years ago • CCNPWhat are two benefits of using SNMP traps? (Choose two.)ITExamAnswers asked 4 years ago • CCNPA network administrator has noticed an unusual amount of traffic being received on a switch port that is connected to a college classroom computer. Which tool would the administrator use to make the suspicious traffic available for analysis at the college data center?ITExamAnswers asked 3 years ago • CCNPRefer to the exhibit. All the displayed switches are Cisco 2960 switches with the same default priority and operating at the same bandwidth. Which three ports will be STP designated ports? (Choose three.)ITExamAnswers asked 4 years ago • CCNPCisco has created a security framework to help protect networks from ever-evolving cybersecurity threats. What is the term given to a system that provides tools, such as breach detection, tracking, analysis, and surgical remediation, that organizations can use when advanced malware has slipped past other defenses?ITExamAnswers asked 3 years ago • CCNPWhat are two reasons for creating an OSPE network with multiple areas? (Choose two.)ITExamAnswers asked 3 years ago • CCNPWhat is a solution to mitigate the MST misconfiguration with improper VLAN assignment to the IST?ITExamAnswers asked 3 years ago • CCNP