Question 21
Which port security method converts existing dynamically learned MAC addresses on an interface to this mode and not age out?
Question 22
An administrator just finished configuring a Dell EMC N-Series switch. After rebooting the switch, the administrator notices that all the configuration settings just entered are gone.
Which command did the administrator fail to enter?
Question 23
You need to configure OSPF on a DNOS 6 switch and have entered the following:
Switch-1(config)# ip routing
Switch-1(config)# interface vlan 20
Switch-1(config-if-vlan20)# ip address 10.1.20.1 255.255.255.0
Switch-1(config)# router ospf
Switch-1(config-router)# router-id 10.1.1.1
Based on the information referenced above, what is missing from the configuration?
Question 24
If VoIP traffic uses multiple QoS prioritization schemes, what refers to VoIP traffic?
Question 25
Refer to the Exhibit.
Switch-1(config)# radius server host 10.1.1.111
Switch-1(config-radius)# key "secretkey"
Switch-1(config-radius)# exit
Switch-1(config)# aaa authentication login "LOCAL-AUTH" local
Switch-1(config)# aaa authentication login "REMOTE-AUTH" radius local
Switch-1(config)# aaa authentication enable "REMOTE-AUTH" radius enable Switch-1(config)# aaa authentication login default tacacs local Switch-1(config)# aaa authentication enable default tacacs enable Switch-1(config)# line telnet Switch-1(config-telnet)# login authentication "REMOTE-AUTH" Switch-1(config-telnet)# exit Switch-1(config)# line ssh Switch-1(config-ssh)# login authentication default Switch-1(config)# exit Switch-1(config)# line console Switch-1(config-line)# login authentication "LOCAL-AUTH" Switch-1(config-line)# exit Which authentication method will be used if a user tries to log into the switch when accessing through SSH?
