IT Questions Bank Refer to the exhibit. A network administrator has deployed QoS and has configured the network to mark traffic on the VoIP phones as well as the Layer 2 and Layer 3 switches. Where should initial marking occur to establish the trust boundary?ITExamAnswers asked 4 years agoWhich component of the ACI architecture translates application policies into network programming?ITExamAnswers asked 4 years agoA user reports that when the corporate web page URL is entered on a web browser, an error message indicates that the page cannot be displayed. The help-desk technician asks the user to enter the IP address of the web server to see if the page can be displayed. Which troubleshooting method is being used by the technician?ITExamAnswers asked 4 years agoAn ACL is applied inbound on a router interface. The ACL consists of a single entry: access-list 210 permit tcp 172.18.20.0 0.0.0.31 172.18.20.32 0.0.0.31 eq ftp . If a packet with a source address of 172.18.20.14, a destination address of 172.18.20.40, and a protocol of 21 is received on the interface, is the packet permitted or denied?ITExamAnswers asked 4 years agoWhich two scenarios would result in a duplex mismatch? (Choose two.)ITExamAnswers asked 4 years agoWhat is a characteristic of the two-tier spine-leaf topology of the Cisco ACI fabric architecture?ITExamAnswers asked 4 years agoAn administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 172.20.0.0 255.255.252.0. What wildcard mask would the administrator use in the OSPF network statement?ITExamAnswers asked 4 years agoA company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use packet sniffers?ITExamAnswers asked 4 years agoA company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use applications such as John the Ripper,THC Hydra, RainbowCrack, and Medusa?IT Administrator asked 4 years agoWhat command would be used as part of configuring NAT or PAT to display information about NAT configuration parameters and the number of addresses in the pool?ITExamAnswers asked 4 years agoWhat are two characteristics of video traffic? (Choose two.)ITExamAnswers asked 4 years agoWhat command would be used as part of configuring NAT or PAT to clear dynamic entries before the timeout has expired?ITExamAnswers asked 4 years agoA company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use debuggers?ITExamAnswers asked 4 years agoWhich public WAN access technology utilizes copper telephone lines to provide access to subscribers that are multiplexed into a single T3 link connection?ITExamAnswers asked 4 years agoWhich type of OSPF packet is used by a router to discover neighbor routers and establish neighbor adjacency?ITExamAnswers asked 4 years ago