Q81. What is the function of NSF?

A. forward traffic simultaneously using both supervisors

B. forward traffic based on Cisco Express Forwarding

C. provide automatic failover to back up supervisor in VSS mode

D. provide nonstop forwarding in the event of failure of one of the member supervisors

Answer: D

Q82. A network engineer configures port security and 802.1x on the same interface. Which option describes what this configuration allows?

A. It allows port security to secure the MAC address that 802.1x authenticates.

B. It allows port security to secure the IP address that 802.1x authenticates.

C. It allows 802.1x to secure the MAC address that port security authenticates.

D. It allows 802.1x to secure the IP address that port security authenticates.

Answer: A

Q83. When you design a switched network using VTPv2, how many VLANs can be used to carry user traffic?

A. 1000

B. 1001

C. 1024

D. 2048

E. 4095

F. 4096

Answer: B

Q84. After the implementation of several different types of switches from different vendors, a network engineer notices that directly connected devices that use Cisco Discovery Protocol are not visible. Which vendor-neutral protocol could be used to resolve this issue?

A. Local Area Mobility

B. Link Layer Discovery Protocol

C. NetFlow

D. Directed Response Protocol

Answer: B

Q85. In a Cisco switch, what is the default period of time after which a MAC address ages out and is discarded?

A. 100 seconds

B. 180 seconds

C. 300 seconds

D. 600 seconds

Answer: C

Q86. A DHCP configured router is connected directly to a switch that has been provisioned with DHCP snooping. IP Source Guard with the ip verify source port-security command is configured under the interfaces that connect to all DHCP clients on the switch. However, clients are not receiving an IP address via the DHCP server. Which option is the cause of this issue?

A. The DHCP server does not support information option 82.

B. The DHCP client interfaces have storm control configured.

C. Static DHCP bindings are not configured on the switch.

D. DHCP snooping must be enabled on all VLANs, even if they are not utilized for dynamic address allocation.

Answer: A

Q87. Which command does a network engineer use to verify the spanning-tree status for VLAN 10?

A. switch# show spanning-tree vlan 10

B. switch# show spanning-tree bridge

C. switch# show spanning-tree brief

D. switch# show spanning-tree summary

E. switch# show spanning-tree vlan 10 brief

Answer: A

Q88. Which command creates a login authentication method named "login" that will primarily use RADIUS and fail over to the local user database?

A. (config)# aaa authentication login default radius local

B. (config)# aaa authentication login login radius local

C. (config)# aaa authentication login default local radius

D. (config)# aaa authentication login radius local

Answer: B