A hospital is deploying a new ICX 7650 stack to support high-bandwidth medical imaging devices. The administrator needs to ensure that if the active stack controller fails, the standby controller takes over with minimal interruption. Which command is essential to configure this behavior?
Q2
An engineer observes that an ICX 7150 switch, which was previously manageable, is no longer responding to SSH or web GUI requests after a recent configuration change. The only access available is via the console port. The `show running-config` output reveals no obvious errors in the IP configuration. What is the most likely cause of the management access failure?
Q3
A financial services company requires that its ICX 7750 core switch be upgraded during a very short maintenance window. To minimize downtime, the network architect wants to pre-download the new FastIron image to the switch ahead of time. Which command should be used to copy the new firmware image from a TFTP server to the switch's secondary flash partition without immediately activating it?
Q4
A network administrator at a university campus is trying to recover a forgotten enable password on a standalone ICX 7250 switch. They have console access and have rebooted the switch. What is the correct procedure to bypass the password check during the boot process?
Q5
True or False: When configuring a standard, static Link Aggregation Group (LAG) on an ICX switch, the LACP protocol is actively used to negotiate the link bundling with the connected device.
Q6Multiple answers
A network team is deploying 802.1X port-based authentication in a mixed-vendor environment. They want to ensure that if a user successfully authenticates on an ICX switch port, the RADIUS server can assign them to a specific VLAN for their user role. Which two RADIUS attributes are commonly used to achieve this dynamic VLAN assignment? (Select TWO).
Q7
A retail company is setting up a new warehouse using ICX 7150-C12P compact switches. To prevent unauthorized devices from connecting and gaining network access, the administrator implements port security with a `mac-address-table static` entry and the `port-security maximum 1` command on an interface. What happens when a second, unknown device is connected to this secured port?
Q8
A consultant is reviewing the Spanning Tree Protocol (STP) configuration on a campus network. They notice that a specific access layer switch unexpectedly becomes the root bridge for a VLAN, causing suboptimal traffic paths. To prevent this switch from ever becoming the root bridge, which STP feature should be enabled on its designated ports that connect to the distribution layer? ```mermaid graph TD subgraph Core/Distribution Core1[ICX 7750 - Root] Core2[ICX 7750 - Secondary] end subgraph Access Layer Acc1[ICX 7250] Acc2[ICX 7250 - Rogue Root] Acc3[ICX 7150] end Core1 -- "Trunk" --> Acc1 Core2 -- "Trunk" --> Acc1 Core1 -- "Trunk" --> Acc2 Core2 -- "Trunk" --> Acc2 Core1 -- "Trunk" --> Acc3 Core2 -- "Trunk" --> Acc3 ```
Q9
A systems administrator is configuring a new ICX 7450 switch. They need to set up a syslog server to collect critical event logs. The command `logging __________` is used to specify the destination for these logs. What should be entered in the blank to send logs to a server with the IP address 192.168.10.25?
Q10
A university is deploying RUCKUS access points that require PoE+ (802.3at) power. An ICX 7150-48PF switch is selected. According to the product specifications, what is the total PoE power budget available on this specific switch model?