Question 36
You are asked to establish interface level authentication for users connecting to your network.
You must ensure that only corporate devices, identified by MAC addresses, are allowed to connect and authenticate. Authentication must be handled by a centralized server to increase scalability. Which authentication method would satisfy this requirement?
You must ensure that only corporate devices, identified by MAC addresses, are allowed to connect and authenticate. Authentication must be handled by a centralized server to increase scalability. Which authentication method would satisfy this requirement?
Question 37
In IS-IS advertising POUs with the overload bit has which effect?
Question 38
Your company has expanded into office space across the street. The new office space has a single Ethernet connection connected to an unmanaged switch. You must sort traffic based on the IP address into different VLANs once the traffic arrives on your EX Series switches.
Which mechanism would you use to accomplish this task?
Which mechanism would you use to accomplish this task?
Question 39
Which statement is true regarding LLDP advertisements?
Question 40
Which two statements are true about PIM source-specific multicast (SSM)? (Choose two.)