Which criteria is used to define an extended MAC ACL filter?
- A . Destination MAC address and Ethernet frame type
- B . Ethernet frame type and frame size
- C . Destination TCP port number and source MAC addres
- D . Source and destination MAC addresses
Which subnet mask provides only two valid IP addresses that can be assigned to hosts?
- A . 255.255.255.248
- B . 255.255.255.254
- C . 255.255.255.252
- D . 255.255.255.256
What is the Organizationally Unique Identifier (OUI) in the MAC address 00:C4:4F:23:AF:4A?
- A . 00:C4:4F
- B . 00:C4:4F:23
- C . 23:AF:4A
- D . 4F:23:AF:4A
Which OS10 command is used to enable LLDP transmit on the management interface 1/1/1?
- A . # lldp open
- B . # lldp transmit
- C . # lldp enable
- D . # lldp start
A Dell EMC Networking N-Series switch is configured on a port channel with LACP using the interfaces Te1/0/1 and Te1/0/2.
How is the egress traffic distributed among the interfaces?
- A . Traffic overflow will be sent to the second interface
- B . Interfaces will be used in active/passive
- C . Load balanced per packet using round robin
- D . Load balanced using a hash function
Which address is an IPv4 Broadcast address?
- A . 10.0.0.255/16
- B . 172.16.255.0/23
- C . 192.168.0.3/30
- D . 224.0.0.3/8
What accurately describes the Network Time Protocol (NTP)?
- A . Implemented on a Dell EMC Network OS 6.
- B . Time synchronization algorithms do not account for clock drift
- C . Client synchronizes among a set of distributed time servers.
- D . Client makes sudden changes in time to keep synchronized.
A technician configures RIP on a new N-Series switch to connect to an existing switch that runs RIP. The routing table is not populating even after the network statements are added.
What is a possible cause of this issue?
- A . The existing switch has not been configured with the command “hostroutesaccept”.
- B . The new switch’s interface is in the wrong subnet to form a RIP relationship.
- C . The “ip helper-address” command has not been configured on the existing switch.
- D . The other switch is not a root bridge and cannot form an RIP relationship.
Refer to the output shown:
Which two statements describe the state of configuration of interfaces gi1/0/1-24? (Choose two.)
- A . The interfaces are administratively Down.
- B . Spanning tree is NOT blocking any interfaces.
- C . The interfaces have negotiated to mode trunk.
- D . The interfaces are in access mode VLAN 1.
- E . The interfaces are administratively Up.
What is the correct sequence of steps that occur in the communications between the client and server to obtain an IP address from a DHCP server?
Which field of the 802.3 frame is used by network interface cards to synchronize their receivers?
- A . Start frame delimiter
- B . Preamble
- C . Cyclic redundancy check
- D . Frame check sequence
What is the aggregated lanes’ maximum speed rating for a QSFP28 transceiver?
- A . 4 Gbps
- B . 40 Gbps
- C . 112 Gbps
- D . 128 Gbps
Which topology is considered a best practice when stacking switches?
- A . Ring
- B . Cascade
- C . Serial
- D . Daisy-chain
A network administrator created three VLANs on an Ethernet switch.
How many broadcast domains are created by the switch?
- A . 1
- B . 2
- C . 3
- D . 4
A client must connect a printer located on a public area on an X1000. The client is concerned someone will use the printer Ethernet cable to gain unauthorized network access.
Which configuration will help prevent unauthorized accesses?
- A . Enable Port Security with Classic Lock mode
- B . Enable Protected Port on the port connected to the printer
- C . Enable Port Security with Dynamic Lock mode
- D . Enable DHCP Snooping on the printer VLAN