Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Cisco 200-301 Dumps

Page: 1 / 107
Total 1069 questions

Cisco Certified Network Associate Questions and Answers

Question 1

Refer to the exhibit.

as

If OSPF is running on this network, how does Router 2 handle traffic from Site B to 10.10.13/25 at Site A?

Options:

A.

It sends packets out of interface Fa0/2 only.

B.

It sends packets out of interface Fa0/1 only.

C.

It cannot send packets to 10.10.13 128/25

D.

It load-balances traffic out of Fa0/1 and Fa0/2

Question 2

What are two similarities between UTP Cat 5e and Cat 6a cabling? (Choose two.)

Options:

A.

Both operate at a frequency of 500 MHz.

B.

Both support runs of up to 55 meters.

C.

Both support runs of up to 100 meters.

D.

Both support speeds of at least 1 Gigabit.

E.

Both support speeds up to 10 Gigabit.

Question 3

What is a similarity between OM3 and OM4 fiber optic cable?

Options:

A.

Both have a 50 micron core diameter

B.

Both have a 9 micron core diameter

C.

Both have a 62.5 micron core diameter

D.

Both have a 100 micron core diameter

Question 4

What is a function of a remote access VPN?

Options:

A.

used cryptographic tunneling to protect the privacy of data for multiple users simultaneously

B.

used exclusively when a user is connected to a company's internal network

C.

establishes a secure tunnel between two branch sites

D.

allows the users to access company internal network resources through a secure tunnel

Question 5

What is a recommended approach to avoid co-channel congestion while installing access points that use the 2.4 GHz frequency?

Options:

A.

different nonoverlapping channels

B.

different overlapping channels

C.

one overlapping channel

D.

one nonoverlapping channel

Question 6

Refer to the exhibit.

as

Which type of configuration is represented in the output?

Options:

A.

Ansible

B.

JSON

C.

Chef

D.

Puppet

Question 7

Which resource is able to be shared among virtual machines deployed on the same physical server?

Options:

A.

disk

B.

applications

C.

VM configuration file

D.

operating system

Question 8

Why was the RFC 1918 address space defined?

Options:

A.

conserve public IPv4 addressing

B.

preserve public IPv6 address space

C.

reduce instances of overlapping IP addresses

D.

support the NAT protocol

Question 9

Refer to the exhibit.

as

R5 is the current DR on the network, and R4 is the BDR. Their interfaces are flapping, so a network engineer wants the OSPF network to elect a different DR and BDR. Which set of configurations must the engineer implement?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Question 10

How does QoS optimize voice traffic?

Options:

A.

reducing bandwidth usage

B.

by reducing packet loss

C.

by differentiating voice and video traffic

D.

by increasing jitter

Question 11

Drag and drop the functions of DHCP from the left onto any of the positions on the right Not all functions are used

as

Options:

Question 12

Which two command sequences must you configure on switch to establish a Layer 3 EtherChannel with an open-standard protocol? (Choose two )

Options:

A.

interface GigabitEthernet0/0/1

channel-group 10 mode on

B.

interface GigabitEthernet0/0/1

channel-group 10 mode active

C.

interface GigabitEthernet0/0/1

channel-group 10 mode auto

D.

interface port-channel 10

switchport

switchport mode trunk

E.

interface port-channel 10

no switchport

ip address 172.16.0.1.255.255.255.0

Question 13

Which two functions are performed by the core layer in a three-tier architecture? (Choose two)

Options:

A.

Provide uninterrupted forwarding service.

B.

Police traffic that is sent to the edge of the network.

C.

Provide direct connectivity for end user devices.

D.

Ensure timely data transfer between layers.

E.

Inspect packets for malicious activity.

Question 14

Router R1 must send all traffic without a matching routing-table entry to 192.168.1.1. Which configuration accomplishes this task?

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 15

What is recommended for the wireless infrastructure design of an organization?

Options:

A.

group access points together to increase throughput on a given channel

B.

configure the first three access points are configured to use Channels 1, 6, and 11

C.

include a least two access points on nonoverlapping channels to support load balancing

D.

assign physically adjacent access points to the same Wi-Fi channel

Question 16

What is a benefit of using a Cisco Wireless LAN Controller?

Options:

A.

Central AP management requires more complex configurations

B.

Unique SSIDs cannot use the same authentication method

C.

It supports autonomous and lightweight APs

D.

It eliminates the need to configure each access point individually

Question 17

Which network action occurs within the data plane?

Options:

A.

compare the destination IP address to the IP routing table.

B.

run routing protocols (OSPF, EIGRP, RIP, BGP)

C.

make a configuration change from an incoming NETCONF RPC

D.

reply to an incoming ICMP echo request

Question 18

What is a characteristic of a SOHO network?

Options:

A.

connects each switch to every other switch in the network

B.

enables multiple users to share a single broadband connection

C.

provides high throughput access for 1000 or more users

D.

includes at least three tiers of devices to provide load balancing and redundancy

Question 19

What occurs to frames during the process of frame flooding?

Options:

A.

Frames are sent to every port on the switch in the same VLAN except from the originating port

B.

Frames are sent to every port on the switch that has a matching entry in the MAC address table.

C.

Frames are sent to all ports, including those that are assigned to other VLANs.

D.

Frames are sent to every port on the switch in the same VLAN.

Question 20

Refer to the exhibit.

as

How does the router manage traffic to 192.168.12.16?

Options:

A.

It selects the RIP route because it has the longest prefix inclusive of the destination address.

B.

It chooses the OSPF route because it has the longest prefix inclusive of the destination address.

C.

it load-balances traffic between all three routes

D.

It chooses the EIGRP route because it has the lowest administrative distance

Question 21

What is the difference in data transmission delivery and reliability between TCP and UDP?

Options:

A.

TCP transmits data at a higher rate and ensures packet delivery. UDP retransmits lost data to ensure applications receive the data on the remote end.

B.

UDP sets up a connection between both devices before transmitting data. TCP uses the three-way handshake to transmit data with a reliable connection.

C.

UDP is used for multicast and broadcast communication. TCP is used for unicast communication and transmits data at a higher rate with error checking.

D.

TCP requires the connection to be established before transmitting data. UDP transmits data at a higher rate without ensuring packet delivery.

Question 22

Which function does the range of private IPv4 addresses perform?

Options:

A.

allows multiple companies to each use the same addresses without conflicts

B.

provides a direct connection for hosts from outside of the enterprise network

C.

ensures that NAT is not required to reach the internet with private range addressing

D.

enables secure communications to the internet for all external hosts

Question 23

Refer to Exhibit.

as

The loopback1 interface of the Atlanta router must reach the loopback3 interface of the Washington router. Which two static host routes must be configured on the NEW York router? (Choose two)

Options:

A.

ipv6 route 2000::1/128 2012::1

B.

ipv6 route 2000::3/128 2023::3

C.

ipv6 route 2000::3/128 s0/0/0

D.

ipv6 route 2000::1/128 2012::2

E.

ipv6 route 2000::1/128 s0/0/1

Question 24

Which security program element involves installing badge readers on data-center doors to allow workers to enter and exit based on their job roles?

Options:

A.

role-based access control

B.

biometrics

C.

multifactor authentication

D.

physical access control

Question 25

Which WLC port connects to a switch to pass normal access-point traffic?

Options:

A.

redundancy

B.

console

C.

distribution system

D.

service

Question 26

What are network endpoints?

Options:

A.

act as routers to connect a user to the service prowler network

B.

a threat to the network if they are compromised

C.

support inter-VLAN connectivity

D.

enforce policies for campus-wide traffic going to the internet

Question 27

What is a DHCP client?

Options:

A.

a host that is configured to request an IP address automatically

B.

a server that dynamically assigns IP addresses to hosts

C.

a workstation that requests a domain name associated with its IP address

D.

a rooter that statically assigns IP addresses to hosts

Question 28

A port security violation has occurred on a switch port due to the maximum MAC address count being exceeded. Which command must be configured to increment the security-violation count and forward an SNMP trap?

Options:

A.

switchport port-security violation access

B.

switchport port-security violation protect

C.

switchport port-security violation restrict

D.

switchport port-security violation shutdown

Question 29

What are two improvements provided by automation for network management in an SDN environment? (Choose two)

Options:

A.

Data collection and analysis tools establish a baseline for the network

B.

Artificial intelligence identifies and prevents potential design failures.

C.

Machine learning minimizes the overall error rate when automating troubleshooting processes

D.

New devices are onboarded with minimal effort

E.

Proprietary Cisco APIs leverage multiple network management tools.

Question 30

Refer to the exhibit.

as

An administrator must turn off the Cisco Discovery Protocol on the port configured with address last usable address in the 10.0.0.0/30 subnet. Which command set meets the requirement?

Options:

A.

interface gi0/1

no cdp enable

B.

interface gi0/1

clear cdp table

C.

interface gi0/0

no cdp advertise-v2

D.

interface gi0/0

no cdp run

Question 31

What is a practice that protects a network from VLAN hopping attacks?

Options:

A.

Enable dynamic ARP inspection

B.

Configure an ACL to prevent traffic from changing VLANs

C.

Change native VLAN to an unused VLAN ID

D.

Implement port security on internet-facing VLANs

Question 32

Which technology is used to improve web traffic performance by proxy caching?

Options:

A.

WSA

B.

Firepower

C.

ASA

D.

FireSIGHT

Question 33

Which command enables a router to become a DHCP client?

Options:

A.

ip address dhcp

B.

ip helper-address

C.

ip dhcp pool

D.

ip dhcp client

Question 34

Refer to the exhibit.

as

Which password must an engineer use to enter the enable mode?

Options:

A.

adminadmin123

B.

default

C.

testing 1234

D.

cisco123

Question 35

How will Link Aggregation be Implemented on a Cisco Wireless LAN Controller?

Options:

A.

One functional physical port is needed to pass client traffic.

B.

The EthernetChannel must be configured in "mode active".

C.

When enabled, the WLC bandwidth drops to 500 Mbps.

D.

To pass client traffic, two or more ports must be configured.

Question 36

Which attribute does a router use to select the best path when two or more different routes to the same destination exist from two different routing protocols.

Options:

A.

dual algorithm

B.

metric

C.

administrative distance

D.

hop count

Question 37

Drag and drop the 802.11 wireless standards from the left onto the matching statements on the right

as

Options:

Question 38

Which type of wireless encryption is used for WPA2 in preshared key mode?

Options:

A.

TKIP with RC4

B.

RC4

C.

AES-128

D.

AES-256

Question 39

An engineer must configure the IPv6 address 2001:0db8:0000:0000:0700:0003:400F:572B on the serial0/0 interface of the HQ router and wants to compress it for easier configuration. Which command must be issued on the router interface?

Options:

A.

ipv6 address 2001:db8::700:3:400F:572B

B.

ipv6 address 2001:db8:0::700:3:4F:572B

C.

ipv6 address 2001:Odb8::7:3:4F:572B

D.

ipv6 address 2001::db8:0000::700:3:400F:572B

Question 40

Which implementation provides the strongest encryption combination for the wireless environment?

Options:

A.

WPA2 + AES

B.

WPA + AES

C.

WEP

D.

WPA + TKIP

Question 41

Drag and drop the QoS congestion management terms from the left onto the description on the right.

as

Options:

Question 42

Which virtual MAC address is used by VRRP group 1?

Options:

A.

0050.0c05.ad81

B.

0007.c061.bc01

C.

0000.5E00.0101

D.

0500.3976.6401

Question 43

Refer to the exhibit.

as

What is the next hop address for traffic that is destined to host 10.0.1.5?

Options:

A.

10.0.1.3

B.

10.0.1.50

C.

10.0.1.4

D.

Loopback D

Question 44

A network administrator must enable DHCP services between two sites. What must be configured for the router to pass DHCPDISCOVER messages on to the server?

Options:

A.

a DHCP Relay Agent

B.

DHCP Binding

C.

a DHCP Pool

D.

DHCP Snooping

Question 45

Refer to the exhibit.

as

After the election process what is the root bridge in the HQ LAN?

as

Options:

A.

Switch 1

B.

Switch 2

C.

Switch 3

D.

Switch 4

Question 46

What is a function of Wireless LAN Controller?

Options:

A.

register with a single access point that controls traffic between wired and wireless endpoints.

B.

use SSIDs to distinguish between wireless clients.

C.

send LWAPP packets to access points.

D.

monitor activity on wireless and wired LANs

Question 47

Refer to the exhibit.

as

Which type of route does R1 use to reach host 10.10.13.10/32?

Options:

A.

floating static route

B.

host route

C.

default route

D.

network route

Question 48

What is a function of the Cisco DNA Center Overall Health Dashboard?

Options:

A.

It provides a summary of the top 10 global issues.

B.

It provides detailed activity logging for the 10 devices and users on the network.

C.

It summarizes the operational status of each wireless devise on the network.

D.

It summarizes daily and weekly CPU usage for servers and workstations in the network.

Question 49

In QoS, which prioritization method is appropriate for interactive voice and video?

Options:

A.

expedited forwarding

B.

traffic policing

C.

round-robin scheduling

D.

low-latency queuing

Question 50

Refer to the exhibit.

as

An extended ACL has been configured and applied to router R2 The configuration failed to work as intended Which two

changes stop outbound traffic on TCP ports 25 and 80 to 10.0.20 0 26 from the 10.0.10 0/26 subnet while still allowing all other traffic? (Choose

two )

Options:

A.

Add a "permit ip any any" statement to the begining of ACL 101 for allowed traffic.

B.

Add a "permit ip any any" statement at the end of ACL 101 for allowed traffic

C.

The source and destination IPs must be swapped in ACL 101

D.

The ACL must be configured the Gi0/2 interface inbound on R1

E.

The ACL must be moved to the Gi0/1 interface outbound on R2

Question 51

What is a role of wireless controllers in an enterprise network?

Options:

A.

centralize the management of access points in an enterprise network

B.

support standalone or controller-based architectures

C.

serve as the first line of defense in an enterprise network

D.

provide secure user logins to devices on the network.

Question 52

Which MAC address is recognized as a VRRP virtual address?

Options:

A.

0000.5E00.010a

B.

0005.3711.0975

C.

0000.0C07.AC99

D.

0007.C070/AB01

Question 53

Which output displays a JSON data representation?

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 54

If a notice-level messaging is sent to a syslog server, which event has occurred?

Options:

A.

A network device has restarted

B.

An ARP inspection has failed

C.

A routing instance has flapped

D.

A debug operation is running

Question 55

What is the role of a firewall in an enterprise network?

Options:

A.

Forwards packets based on stateless packet inspection

B.

Processes unauthorized packets and allows passage to less secure segments of the network

C.

determines which packets are allowed to cross from unsecured to secured networks

D.

explicitly denies all packets from entering an administrative domain

Question 56

Which device performs stateful inspection of traffic?

Options:

A.

firewall

B.

switch

C.

access point

D.

wireless controller

Question 57

Which WAN access technology is preferred for a small office / home office architecture?

Options:

A.

broadband cable access

B.

frame-relay packet switching

C.

dedicated point-to-point leased line

D.

Integrated Services Digital Network switching.

Question 58

An engineer is asked to protect unused ports that are configured in the default VLAN on a switch.

Which two steps will fulfill the request? (Choose two)

Options:

A.

Configure the ports in an EtherChannel.

B.

Administratively shut down the ports

C.

Configure the port type as access and place in VLAN 99

D.

Configure the ports as trunk ports

E.

Enable the Cisco Discovery Protocol

Question 59

Which level of severity must be set to get informational syslogs?

Options:

A.

alert

B.

critical

C.

notice

D.

debug

Question 60

Drag and drop the AAA functions from the left onto the correct AAA services on the right

as

Options:

Question 61

Which interface or port on the WLC is the default for in-band device administration and communications between the controller and access points?

Options:

A.

virtual interface

B.

management interface

C.

console port

D.

service port

Question 62

Drag and drop the wireless architecture benefits from the left onto the architecture types on the right.

as

Options:

Question 63

In which circumstance would a network architect decide to implement a global unicast subnet instead of a unique local unicast subnet?

Options:

A.

when the subnet must be available only within an organization

B.

when the subnet does not need to be routable

C.

when the addresses on the subnet must be equivalent to private IPv4 addresses

D.

when the subnet must be routable over the internet

Question 64

Which IPv6 address range is suitable for anycast addresses for distributed services such DHCP or DNS?

Options:

A.

FF00:1/12

B.

2001:db8:0234:ca3e::1/128

C.

2002:db84:3f37:ca98:be05:8/64

D.

FE80::1/10

Question 65

Refer to the exhibit.

as

A network engineer must provide configured IP addressing details to investigate a firewall rule Issue. Which subnet and mask Identify what is configured on the en0 interface?

Options:

A.

10.8.0.0/16

B.

10.8.64.0/18

C.

10.8.128.0/19

D.

10.8.138.0/24

Question 66

What is the MAC address used with VRRP as a virtual address?

Options:

A.

00-00-0C-07-AD-89

B.

00-00-5E-00-01-0a

C.

00-07-C0-70-AB-01

D.

00-C6-41-93-90-91

Question 67

What is a reason to implement LAG on a Cisco WLC?

Options:

A.

Increase the available throughput on the link.

B.

Increase security by encrypting management frames

C.

Allow for stateful failover between WLCs

D.

Enable the connected switch ports to use different Layer 2 configurations

Question 68

Refer to the exhibit.

as

A network engineer executes the show ip route command on router D. What is the next hop to network 192.168 1 0/24 and why?

Options:

A.

The next hop is 10.0.2.1 because it uses distance vector routing

B.

The next hop is 10.0.2.1 because it is a link-state routing protocol

C.

The next hop is 10.0.0.1 because it has a better administrative distance

D.

The next hop is 10.0.0.1 because it has a higher metric.

Question 69

Which encryption method is used by WPA3?

Options:

A.

PSK

B.

TKIP

C.

SAE

D.

AES

Question 70

What is a function of MAC address learning?

Options:

A.

It is enabled by default on all VLANs and interfaces

B.

It increases the potential for MAC address flooding.

C.

It is disabled by default on all interfaces connected to trunks

D.

lt increases security on the management VLAN

Question 71

A router received three destination prefixes:10.0.0/18, and 10.0.0/24. When the show ip route command is executed, which output does it return?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 72

as

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 73

After a recent security breach and a RADIUS failure, an engineer must secure the console port of each enterprise router with a local username and password. Which configuration must the engineer apply to accomplish this task?

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 74

An on-site service desk technician must verify the IP address and DNS server information on a users Windows computer. Which command must the technician enter at the command prompt on the user's computer?

Options:

A.

ipconfig /all

B.

ifconfig -a

C.

show interface

D.

netstat -r

Question 75

Which is a fact related to FTP?

Options:

A.

It uses block numbers to identify and mitigate data-transfer errors

B.

It always operates without user authentication

C.

It relies on the well-known UDP port 69.

D.

It uses two separate connections for control and data traffic

Question 76

A network architect is deciding whether to implement Cisco autonomous access points or lightweight access points. Which fact about firmware updates must the architect consider? Unlike lightweight access points, which require

Options:

A.

Unlike lightweight access points, which require redundant WLCs to support firmware upgrades, autonomous access points require only one WLC.

B.

Unlike autonomous access points, lightweight access points store a complete copy of the current firmware for backup.

C.

Unlike lightweight access points, autonomous access points can recover automatically from a corrupt firmware update.

D.

Unlike autonomous access points, lightweight access points require a WLC to implement remote firmware updates.

Question 77

Refer to the exhibit.

as

Which prefix did router R1 learn from internal EIGRP?

Options:

A.

192.168.10/24

B.

192.168.3.0/24

C.

192.168.2.0/24

D.

172.16 1.0/24

Question 78

Refer to the exhibit An IPv6 address must be obtained automatically on the LAN interface on R1 Which command must be implemented to accomplish the task?

as

Options:

A.

Ipv6 address 2001:dbB:d8d2:1008:4343:61:0010::/64

B.

Ipv6 address autoconfig

C.

Ipv6 address fe80::/10

D.

Ipv6 address dhcp

Question 79

An engineer is installing a new wireless printer with a static IP address on the Wi-Fi network. Which feature must be enabled and configured to prevent connection issues with the printer?

Options:

A.

client exclusion

B.

passive client

C.

DHCP address assignment

D.

static IP tunneling

Question 80

Refer to the exhibit.

as

PC A is communicating with another device at IP address 10.227.225.255. Through which router does router Y route the traffic?

Options:

A.

router A

B.

router B

C.

router C

D.

router D

Question 81

What determines the sequence in which materials are planned during the material requirements planning (MRP) run?

Options:

A.

The control parameters of the MRP run

B.

The creation date of the materials

C.

The low-level code of the materials

D.

The replenishment lead time of the materials

Question 82

Which interface IP address serves as the tunnel source for CAPWAP packets from the WLC to an AP?

Options:

A.

service

B.

trunk

C.

AP-manager

D.

virtual AP connection

Question 83

Which cable type must be used when connecting a router and switch together using these criteria?

• Pins 1 and 2 are receivers and pins 3 and 6 are transmitters

• Auto detection MDi-X is unavailable

Options:

A.

straight-through

B.

rollover

C.

crossover

D.

console

Question 84

Refer to the exhibit.

as

Host A switch interface is configured in VLAN 2. Host D sends a unicast packet destined for the IP address of host A.

as

What does the switch do when it receives the frame from host D?

Options:

A.

It creates a broadcast storm.

B.

It drops the frame from the MAC table of the switch.

C.

It shuts down the source port and places It In err-disable mode.

D.

It floods the frame out of every port except the source port.

Question 85

What is a benefit for external users who consume public cloud resources?

Options:

A.

implemented over a dedicated WAN

B.

located in the same data center as the users

C.

all hosted on physical servers

D.

accessed over the Internet

Question 86

Refer to the exhibit.

as

An administrator received a call from a branch office regarding poor application performance hosted at the headquarters. Ethernet 1 is connected between Router1 and the LAN switch. What identifies the issue?

Options:

A.

The QoS policy is dropping traffic.

B.

There is a duplex mismatch.

C.

The link is over utilized.

D.

The MTU is not set to the default value.

Question 87

Refer to the exhibit.

as

A Cisco engineer creates a new WLAN called lantest. Which two actions must be performed so that only high-speed 2.4-Ghz clients connect? (Choose two.)

Options:

A.

Enable the Broadcast SSID option

B.

Enable the Status option.

C.

Set the Radio Policy option to 802 11g Only.

D.

Set the Radio Policy option to 802.11a Only.

E.

Set the Interface/Interface Group(G) to an interface other than guest

Question 88

Which IPsec encryption mode is appropriate when the destination of a packet differs from the security termination point?

Options:

A.

tunnel

B.

transport

C.

aggressive

D.

main

Question 89

A network engineer must configure an access list on a new Cisco IOS router. The access list must deny HTTP traffic to network 10.125.128.32/27 from the 192.168.240.0/20 network, but it must allow the 192.168.240.0/20 network to reach the rest of the 10.0.0.0/8 network. Which configuration must the engineer apply?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 90

What is a difference between an IPv6 multicast address and an IPv6 anycast address?

Options:

A.

A packet sent to an IPv6 multicast address is delivered to one or more destinations at once, but a packet sent to an IPv6 anycast address is routed to the closest interface with that address.

B.

An IPv6 multicast address uses the prefix 2002::/15 and forwards to one destination, and an IPv6 anycast address uses the prefix ff00::/8 and forwards to any destination in a group.

C.

IPv6 multicast addresses are used to transition from IPv4 to IPv6, and IPv6 anycast addresses are used for address aggregation in an IPv6-only environment.

D.

An IPv6 multicast address is assigned to numerous interfaces within a subnet, but an IPv6 anycast address is used for a predefined group of nodes in an all-IPv6 routers group.

Question 91

What is the function of a controller in a software-defined network?

Options:

A.

multicast replication at the hardware level

B.

forwarding packets

C.

fragmenting and reassembling packets

D.

setting packet-handling policies

Question 92

Refer to the exhibit.

as

A network engineer started to configure two directly-connected routers as shown. Which command sequence must the engineer configure on R2 so that the two routers become OSPF neighbors?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 93

What must be considered before deploying virtual machines?

Options:

A.

location of the virtual machines within the data center environment

B.

whether to leverage VSM to map multiple virtual processors to two or more virtual machines

C.

resource limitations, such as the number of CPU cores and the amount of memory

D.

support for physical peripherals, such as monitors, keyboards, and mice

Question 94

Refer to the exhibit.

as

A network engineer is configuring a WLAN to connect with the 172.16.10.0/24 network on VLAN 20. The engineer wants to limit the number of devices that connect to the WLAN on the USERWL SSID to 125. Which configuration must the engineer perform on the WLC?

Options:

A.

In the Management Software activation configuration, set the Clients value to 125.

B.

In the Controller IPv6 configuration, set the Throttle value to 125.

C.

In the WLAN configuration, set the Maximum Allowed Clients value to 125.

D.

In the Advanced configuration, set the DTIM value to 125.

Question 95

as

Options:

Question 96

What are two differences between WPA2 and WPA3 wireless security? (Choose two.)

Options:

A.

WPA3 um AES for stronger protection than WPA2 which uses SAE

B.

WPA2 uses 1 M-bit key encryption and WPA3 requires 256-brt key encryption

C.

WPA3 uses AES for stronger protection than WPA2 which uses TKIP WPA3 uses

D.

SAE tor stronger protection than WPA2 which uses AES

E.

WPA2 uses 12B-M key encryption and WPA3 supports 128 bit and 192 bit key encryption

Question 97

Which capability does TFTP provide?

Options:

A.

loads configuration files on systems without data storage devices

B.

provides authentication for data communications over a private data network

C.

provides encryption mechanisms for file transfer across a WAN

D.

provides secure file access within the LAN

Question 98

What are two advantages of implementing a controller-based architecture instead of a traditional network architecture? (Choose two.)

Options:

A.

It allows for seamless connectivity to virtual machines.

B.

It supports complex and high-scale IP addressing schemes.

C.

It enables configuration task automation.

D.

It provides increased scalability and management options.

E.

It increases security against denial-of-service attacks.

Question 99

What is the temporary state that switch ports always enter immediately after the boot process when Rapid PVST+ is used?

Options:

A.

discarding

B.

listening

C.

forwarding

D.

learning

Question 100

What is a function of Cisco Advanced Malware Protection for a Next-Generation IPS?

Options:

A.

authorizing potentially compromised wireless traffic

B.

inspecting specific files and file types for malware

C.

authenticating end users

D.

URL filtering

Question 101

How is noise defined in Wi-Fi?

Options:

A.

ratio of signal-to-noise rating supplied by the wireless device

B.

signals from other Wi-Fi networks that interfere with the local signal

C.

measured difference between the desired Wi-Fi signal and an interfering Wi-Fi signal

D.

any interference that is not Wi-Fi traffic that degrades the desired signal

Question 102

Which type of IPv4 address type helps to conserve the globally unique address classes?

Options:

A.

multicast

B.

private

C.

loopback

D.

public

Question 103

What is the role of the root port in a switched network?

Options:

A.

It replaces the designated port when the designated port fails

B.

B. It is the best path to the root from a nonroot switch.

C.

It replaces the designated port when the root port fails.

D.

It is administratively disabled until a failover occurs.

Question 104

Refer to the exhibit.

When router R1 receives a packet with destination IP address 10.56.0 62. through which interface does it route the packet?

Options:

A.

Null0

B.

VIan58

C.

Vlan60

D.

VIan59

Question 105

Refer to the exhibit.

as

A network administrator must permit traffic from the 10.10.0.0/24 subnet to the WAN on interlace Seria10. What is the effect of the configuration as the administrator applies the command?

Options:

A.

The permit command fails and returns an error code.

B.

The router accepts all incoming traffic to Seria10 with the last octet of the source IP set to 0.

C.

The sourced traffic from IP range 10.0.0.0 -10.0.0.255 is allowed on Seria10.

D.

The router fails to apply the access list to the interface.

Question 106

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

as

Options:

Question 107

Drag and drop the REST API call method for HTTP from the left onto the action they perform on the right.

as

Options:

Question 108

Which action implements physical access control as part of the security program of an organization1?

Options:

A.

backing up syslogs at a remote location

B.

configuring a password for the console port

C.

configuring enable passwords on network devices

D.

setting up IP cameras to monitor key infrastructure

Question 109

Refer to the exhibit.

as

A network engineer must configure router R1 with a host route to the server. Which command must the engineer configure?

Options:

A.

R1(conftg)#lp route 10.10.10.0 255.255.255.0 192.168.0.2

B.

R1(Config)#lp route 10.10.10.10 265.255.255.255 192 168.0.2

C.

R1(config)#ip route 192.168.0.2 255.255.255.255 10.10.10.10

D.

R1(config)3|p route 0.0.0.0 0.0 0.0 192 168.0.2

Question 110

What should a network administrator consider when deciding to implement automation?

Options:

A.

Automated systems may have difficulty expanding network changes at scale.

B.

Network automation typically is limited to the configuration and management of virtual devices within a network.

C.

Network automation typically increases enterprise management operating costs.

D.

Manual changes frequently lead to configuration errors and inconsistencies.

Question 111

Which WAN topology has the highest degree of reliability?

Options:

A.

full mesh

B.

Point-to-point

C.

hub-and-spoke

D.

router-on-a-stick

Question 112

What is a purpose of traffic shaping?

Options:

A.

It enables dynamic flow identification.

B.

It enables policy-based routing.

C.

It provides best-effort service.

D.

It limits bandwidth usage.

Question 113

Refer to the exhibit.

as

Which configuration establishes a Layer 2 LACP EtherChannel when applied to both switches?

Options:

A.

Interface range G1/1 – 1/3 switchport mode trunk channel-group 1 mode active no shutdown

B.

Interface range G1/1 – 1/3 switchport mode access channel-group 1 mode passive no shutdown

C.

Interface range G1/1 – 1/3 switchport mode trunk

channel-group 1 mode desirable

no shutdown

D.

Interface range G1/1 – 1/3 switchport mode access channel-group 1 mode on no shutdown

Question 114

What are two characteristics of a small office / home office connection environment? (Choose two.)

Options:

A.

It requires 10Gb ports on all uplinks.

B.

It supports between 50 and 100 users.

C.

It supports between 1 and 50 users.

D.

It requires a core, distribution, and access layer architecture.

E.

A router port connects to a broadband connection.

Question 115

What is the difference between an IPv6 link-local address and a unique local address?

Options:

A.

The scope of an IPv6 link-local address is limited to a loopback address, and an IPv6 unique local address is limited to a directly attached interface.

B.

The scope of an IPv6 link-local address can be used throughout a company site or network, but an IPv6 unique local address is limited to a loopback address.

C.

The scope of an IPv6 link-local address is global, but the scope of an IPv6 unique local address is limited to a loopback address.

D.

The scope of an IPv6 link-local address is limited to a directly attached interface, but an IPv6 unique local address is used throughout a company site or network.

Question 116

When the LAG configuration is updated on a Cisco WLC which additional task must be performed when changes are complete?

Options:

A.

Flush all MAC addresses from the WLC

B.

Re-associate the WLC with the access point.

C.

Re-enable the WLC interfaces

D.

Reboot the WLC

Question 117

A packet from a company s branch office is destined to host 172.31.0.1 at headquarters. The sending router has three possible matches in its routing table for the packet prefixes: 172. 31.0 .0/16.72.31.0.0724. and 172.31 0 0/25. How does the router handle the packet?

Options:

A.

It sends the traffic via prefix 172.31.0.0/16

B.

It sends the traffic via the default gateway 0.0.0.070.

C.

It sends the traffic via prefix 172.31.0.0/24

D.

It sends the traffic via prefix 172.31.0.0/25

Question 118

Which port type does a lightweight AP use to connect to the wired network when it is configured in local mode?

Options:

A.

EtherChannel

B.

LAG

C.

trunk

D.

access

Question 119

Which two VPN technologies are recommended by Cisco for multiple branch offices and large-scale deployments? (Choose two.)

Options:

A.

site-to-site VPN

B.

IDMVPN

C.

IGETVPN

D.

IPsec remote access

E.

clientless VPN

Question 120

Refer to the exhibit.

as

Refer to the exhibit. The IPv6 address for the LAN segment on router R1 must be configured using the EUI-64 format. When configured which ipv6 address is produced by the router?

Options:

A.

2001:db8:1a44:41a4:C801:BEFF:FE4A:1

B.

2001:db8:1a44:41a4:C081:BFFF:FE4A:1

C.

2001:db8:1a44:41a4:4562:098F:FE36:1

D.

2001:db8:1a44:41a4:C800:BAFE:FF00:1

Question 121

What is a function of a Layer 3 switch?

Options:

A.

move frames between endpoints limited to IP addresses

B.

transmit broadcast traffic when operating in Layer 3 mode exclusively

C.

forward Ethernet frames between VLANs using only MAC addresses

D.

flood broadcast traffic within a VLAN

Question 122

A Cisco IP phone receive untagged data traffic from an attached PC. Which action is taken by the phone?

Options:

A.

It allows the traffic to pass through unchanged

B.

It drops the traffic

C.

It tags the traffic with the default VLAN

D.

It tags the traffic with the native VLAN

Question 123

An engineer must configure an OSPF neighbor relationship between router R1 and R3 The authentication configuration has been configured and the connecting interfaces are in the same 192.168 1.0/30 sublet. What are the next two steps to complete the configuration? (Choose two.)

Options:

A.

configure the hello and dead timers to match on both sides

B.

configure the same process ID for the router OSPF process

C.

configure the same router ID on both routing processes

D.

Configure the interfaces as OSPF active on both sides.

E.

configure both interfaces with the same area ID

Question 124

Refer to the exhibit.

as

For security reasons, automatic neighbor discovery must be disabled on the R5 Gi0/1 interface. These tasks must be completed:

• Disable all neighbor discovery methods on R5 interface GiO/1.

• Permit neighbor discovery on R5 interface GiO/2.

• Verify there are no dynamically learned neighbors on R5 interface Gi0/1.

• Display the IP address of R6*s interface Gi0/2.

Which configuration must be used?

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 125

An engineer requires a scratch interface to actively attempt to establish a trunk link with a neighbor switch. What command must be configured?

Options:

A.

switchport mode trunk

B.

switchport mode dynamic desirable

C.

switchport mode dynamic auto

D.

switchport nonegotiate

Question 126

Drag and drop to the characteristics of networking from the left onto the correct networking types on the right.

as

Options:

Question 127

ION NO: 149

Which function does an SNMP agent perform?

Options:

A.

it sends information about MIB variables in response to requests from the NMS

B.

it requests information from remote network nodes about catastrophic system events.

C.

it manages routing between Layer 3 devices in a network

D.

it coordinates user authentication between a network device and a TACACS+ or RADIUS server

Question 128

How does the dynamically-learned MAC address feature function?

Options:

A.

The CAM table is empty until ingress traffic arrives at each port

B.

Switches dynamically learn MAC addresses of each connecting CAM table.

C.

The ports are restricted and learn up to a maximum of 10 dynamically-learned addresses

D.

It requires a minimum number of secure MAC addresses to be filled dynamically

Question 129

Which set of action satisfy the requirement for multifactor authentication?

Options:

A.

The user swipes a key fob, then clicks through an email link

B.

The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device

C.

The user enters a PIN into an RSA token, and then enters the displayed RSA key on a login screen

D.

The user enters a user name and password and then re-enters the credentials on a second screen

Question 130

Refer to Exhibit.

as

How does SW2 interact with other switches in this VTP domain?

Options:

A.

It processes VTP updates from any VTP clients on the network on its access ports.

B.

It receives updates from all VTP servers and forwards all locally configured VLANs out all trunk ports

C.

It forwards only the VTP advertisements that it receives on its trunk ports.

D.

It transmits and processes VTP updates from any VTP Clients on the network on its trunk ports

Question 131

How does CAPWAP communicate between an access point in local mode and a WLC?

Options:

A.

The access point must directly connect to the WLC using a copper cable

B.

The access point must not be connected to the wired network, as it would create a loop

C.

The access point must be connected to the same switch as the WLC

D.

The access point has the ability to link to any switch in the network, assuming connectivity to the WLC

Question 132

Using direct sequence spread spectrum, which three 2.4-GHz channels are used to limit collisions?

Options:

A.

1,6,11

B.

1,5,10

C.

1,2,3

D.

5,6,7

Question 133

Refer to the exhibit.

as

Router R2 is configured with multiple routes to reach network 10 1.1 0/24 from router R1. What protocol is chosen by router R2 to reach the destination network 10.1 1 0/24?

Options:

A.

eBGP

B.

static

C.

OSPF

D.

EIGRP

Question 134

Which two outcomes are predictable behaviors for HSRP? (Choose two)

Options:

A.

The two routers share a virtual IP address that is used as the default gateway for devices on the LAN.

B.

The two routers negotiate one router as the active router and the other as the standby router

C.

Each router has a different IP address both routers act as the default gateway on the LAN, and traffic is load balanced between them.

D The two routers synchronize configurations to provide consistent packet forwarding

D.

The two routed share the same IP address, and default gateway traffic is load-balanced between them

Question 135

With REST API, which standard HTTP header tells a server which media type is expected by the client?

Options:

A.

Accept-Encoding: gzip. deflate

B.

Accept-Patch: text/example; charset=utf-8

C.

Content-Type: application/json; charset=utf-8

D.

Accept: application/json

Question 136

What is a characteristic of spine-and-leaf architecture?

Options:

A.

Each device is separated by the same number of hops

B.

It provides variable latency

C.

It provides greater predictability on STP blocked ports.

D.

Each link between leaf switches allows for higher bandwidth.

Question 137

Which 802.11 frame type is indicated by a probe response after a client sends a probe request?

Options:

A.

action

B.

management

C.

control

D.

data

Question 138

R1 has learned route 10.10.10.0/24 via numerous routing protocols. Which route is installed?

Options:

A.

route with the lowest cost

B.

route with the next hop that has the highest IP

C.

route with the shortest prefix length

D.

route with the lowest administrative distance

Question 139

An administrator must secure the WLC from receiving spoofed association requests. Which steps must be taken to configure the WLC to restrict the requests and force the user to wait 10 ms to retry an association request?

Options:

A.

Enable Security Association Teardown Protection and set the SA Query timeout to 10

B.

Enable MAC filtering and set the SA Query timeout to 10

C.

Enable 802.1x Layer 2 security and set me Comeback timer to 10

D.

Enable the Protected Management Frame service and set the Comeback timer to 10

Question 140

Refer to the exhibit.

as

Between which zones do wireless users expect to experience intermittent connectivity?

Options:

A.

between zones 1 and 2

B.

between zones 2 and 5

C.

between zones 3 and 4

D.

between zones 3 and 6

Question 141

Drag and drop the TCP/IP protocols from the left onto the transmission protocols on the right

as

Options:

Question 142

Drag and drop the application protocols from the left onto the transport protocols that it uses on the right

as

Options:

Question 143

Which unified access point mode continues to serve wireless clients after losing connectivity to the Cisco Wireless LAN Controller?

Options:

A.

sniffer

B.

mesh

C.

flexconnect

D.

local

Question 144

What is a similarly between 1000BASE-LX and 1000BASE-T standards?

Options:

A.

Both use the same data-link header and trailer formats

B.

Both cable types support LP connectors

C.

Both cable types support Rj-45 connectors

D.

Both support up to 550 meters between nodes

Question 145

Drag and drop the lightweight access point operation modes from the left onto the descriptions on the right

as

Options:

Question 146

Refer to the exhibit.

as

Which configuration issue is preventing the OSPF neighbor relationship from being established between the two routers?

Options:

A.

R2 is using the passive-interface default command

B.

R1 has an incorrect network command for interface Gi1/0

C.

R2 should have its network command in area 1

D.

R1 interface Gil/0 has a larger MTU size

Question 147

A router running EIGRP has learned the same route from two different paths. Which parameter does the router use to select the best path?

Options:

A.

cost

B.

adminstrative distance

C.

metric

D.

as-path

Question 148

What are two benefits of network automation? (Choose two)

Options:

A.

reduced operational costs

B.

reduced hardware footprint

C.

faster changes with more reliable results

D.

fewer network failures

E.

increased network security

Question 149

Refer to the exhibit.

as

An engineer booted a new switch and applied this configuration via the console port. Which additional configuration must be applied to allow administrators to authenticate directly to enable privilege mode via Telnet using a local username and password?

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 150

Which IPv6 address type provides communication between subnets and is unable to route on the Internet?

Options:

A.

global unicast

B.

unique local

C.

link-local

D.

multicast

Question 151

Refer to Exhibit.

as

An engineer is configuring the NEW York router to reach the Lo1 interface of the Atlanta router using interface Se0/0/0 as the primary path. Which two commands must be configured on the New York router so that it can reach the Lo1 interface of the Atlanta router via Washington when the link between New York and Atlanta goes down? (Choose two)

Options:

A.

ipv6 router 2000::1/128 2012::1

B.

ipv6 router 2000::1/128 2012::1 5

C.

ipv6 router 2000::1/128 2012::2

D.

ipv6 router 2000::1/128 2023::2 5

E.

ipv6 router 2000::1/128 2023::3 5

Question 152

Refer to me exhibit.

as

Which action is taken by the router when a packet is sourced from 10.10.10.2 and destined for 10.10.10.16?

Options:

A.

It uses a route that is similar to the destination address

B.

It discards the packets.

C.

It floods packets to all learned next hops.

D.

It Queues the packets waiting for the route to be learned.

Question 153

How does a Cisco Unified Wireless network respond to Wi-Fi channel overlap?

Options:

A.

It alternates automatically between 2.4 GHz and 5 GHz on adjacent access points

B.

It allows the administrator to assign channels on a per-device or per-interface basis.

C.

It segregates devices from different manufacturers onto different channels.

D.

It analyzes client load and background noise and dynamically assigns a channel.

Question 154

Which result occurs when PortFast is enabled on an interface that is connected to another switch?

Options:

A.

Spanning tree may fail to detect a switching loop in the network that causes broadcast storms

B.

VTP is allowed to propagate VLAN configuration information from switch to switch automatically.

C.

Root port choice and spanning tree recalculation are accelerated when a switch link goes down

D.

After spanning tree converges PortFast shuts down any port that receives BPDUs.

Question 155

Which function is performed by DHCP snooping?

Options:

A.

propagates VLAN information between switches

B.

listens to multicast traffic for packet forwarding

C.

provides DDoS mitigation

D.

rate-limits certain traffic

Question 156

Refer to the exhibit.

as

The default-information originate command is configured under the R1 OSPF configuration After testing workstations on VLAN 20 at Site B cannot reach a DNS server on the Internet Which action corrects the configuration issue?

Options:

A.

Add the default-information originate command onR2

B.

Configure the ip route 0.0.0.0 0.0.0.0 10.10.10.18 command on R1

C.

Configure the ip route 0.0.0.0 0.0.0.0 10.10.10.2 command on R2

D.

Add the always keyword to the default-information originate command on R1

Question 157

How do AAA operations compare regarding user identification, user services and access control?

Options:

A.

Authorization provides access control and authentication tracks user services

B.

Authentication identifies users and accounting tracks user services

C.

Accounting tracks user services, and authentication provides access control

D.

Authorization identifies users and authentication provides access control

Question 158

Which two must be met before SSH can operate normally on a Cisco IOS switch? (Choose two)

Options:

A.

The switch must be running a k9 (crypto) IOS image

B.

The Ip domain-name command must be configured on the switch

C.

IP routing must be enabled on the switch

D.

A console password must be configured on the switch

E.

Telnet must be disabled on the switch

Question 159

Refer to the exhibit.

as

How does router R1 handle traffic to 192.168.10.16?

Options:

A.

It selects the IS-IS route because it has the shortest prefix inclusive of the destination address.

B.

It selects the EIGRP route because it has the lowest administrative distance.

C.

It selects the OSPF route because it has the lowest cost.

D.

It selects the RIP route because it has the longest prefix inclusive of the destination address.

Question 160

Which goal is achieved by the implementation of private IPv4 addressing on a network?

Options:

A.

provides an added level of protection against Internet exposure

B.

provides a reduction in size of the forwarding table on network routers

C.

allows communication across the Internet to other private networks

D.

allows servers and workstations to communicate across public network boundaries

Question 161

Which action is taken by a switch port enabled for PoE power classification override?

Options:

A.

When a powered device begins drawing power from a PoE switch port a syslog message is generated

B.

As power usage on a PoE switch port is checked data flow to the connected device is temporarily paused

C.

If a switch determines that a device is using less than the minimum configured power it assumes the device has failed and disconnects

D.

Should a monitored port exceeds the maximum administrative value for power, the port is shutdown and err-disabled

Question 162

Which plane is centralized by an SDN controller?

Options:

A.

management-plane

B.

control-plane

C.

data-plane

D.

services-plane

Question 163

Refer to the exhibit.

as

Drag and drop the networking parameters from the left onto the correct values on the right.

as

Options:

Question 164

Refer to the exhibit.

as

An engineer must configure GigabitEthernet1/1 to accommodate voice and data traffic Which configuration accomplishes this task?

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 165

A network engineer must configure the router R1 GigabitEthernet1/1 interface to connect to the router R2 GigabitEthernet1/1 interface. For the configuration to be applied the engineer must compress the address 2001:0db8:0000:0000:0500:000a:400F:583B. Which command must be issued on the interface?

Options:

A.

ipv6 address 2001:0db8::5: a: 4F 583B

B.

ipv6 address 2001:db8::500:a:400F:583B

C.

ipv6 address 2001 db8:0::500:a:4F:583B

D.

ipv6 address 2001::db8:0000::500:a:400F:583B

Question 166

Drag the descriptions of IP protocol transmissions from the left onto the IP traffic types on the right.

as

Options:

Question 167

Which communication interaction takes place when a southbound API Is used?

Options:

A.

between the SDN controller and PCs on the network

B.

between the SON controller and switches and routers on the network

C.

between the SON controller and services and applications on the network

D.

between network applications and switches and routers on the network

Question 168

An engineer configures interface Gi1/0 on the company PE router to connect to an ISP Neighbor discovery is disabled

as

Which action is necessary to complete the configuration if the ISP uses third-party network devices?

Options:

A.

Enable LLDP globally

B.

Disable autonegotiation

C.

Disable Cisco Discovery Protocol on the interface

D.

Enable LLDP-MED on the ISP device

Question 169

Which protocol does an access point use to draw power from a connected switch?

Options:

A.

Internet Group Management Protocol

B.

Adaptive Wireless Path Protocol

C.

Cisco Discovery Protocol

D.

Neighbor Discovery Protocol

Question 170

Refer to the exhibit.

as

Which IPv6 configuration is required for R17 to successfully ping the WAN interface on R18?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 171

When a WPA2-PSK WLAN is configured in the wireless LAN Controller, what is the minimum number of characters that in ASCll format?

Options:

A.

6

B.

8

C.

12

D.

18

Question 172

A network administrator enabled port security on a switch interface connected to a printer. What is the next configuration action in order to allow the port to learn the MAC address of the printer and insert it into the table automatically?

Options:

A.

enable dynamic MAC address learning

B.

implement static MAC addressing.

C.

enable sticky MAC addressing

D.

implement auto MAC address learning

Question 173

Refer to the exhibit.

as

The nip server 192.168.0.3 command has been configured on router 1 to make it an NTP client of router 2. Which command must be configured on router 2 so that it operates in server-only mode and relies only on its internal clock?

Options:

A.

Router2(config)#ntp passive

B.

Router2(config)#ntp server 172.17.0.1

C.

Router2(config)#ntp master 4

D.

Router2(config)#ntp server 192.168.0.2

Question 174

What are two reasons that cause late collisions to increment on an Ethernet interface? (Choose two)

Options:

A.

when the sending device waits 15 seconds before sending the frame again

B.

when the cable length limits are exceeded

C.

when one side of the connection is configured for half-duplex

D.

when Carrier Sense Multiple Access/Collision Detection is used

E.

when a collision occurs after the 32nd byte of a frame has been transmitted

Question 175

Refer to Exhibit.

as

Which action do the switches take on the trunk link?

Options:

A.

The trunk does not form and the ports go into an err-disabled status.

B.

The trunk forms but the mismatched native VLANs are merged into a single broadcast domain.

C.

The trunk does not form, but VLAN 99 and VLAN 999 are allowed to traverse the link.

D.

The trunk forms but VLAN 99 and VLAN 999 are in a shutdown state.

Question 176

Refer to the exhibit.

as

An administrator must configure interfaces Gi1/1 and Gi1/3 on switch SW11 PC-1 and PC-2 must be placed in the Data VLAN and Phone-1 must be placed in the Voice VLAN Which configuration meets these requirements?

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 177

Refer to the exhibit.

as

Which route type is configured to reach the internet?

Options:

A.

host route

B.

default route

C.

floating static route

D.

network route

Question 178

Refer to the exhibit.

as

Only four switches are participating in the VLAN spanning-tree process.

Branch-1 priority 614440

Branch-2: priority 39082416

Branch-3: priority 0

Branch-4: root primary

Which switch becomes the permanent root bridge for VLAN 5?

Options:

A.

Branch-1

B.

Branch-2

C.

Branch-3

D.

Branch-4

Question 179

When deploying syslog, which severity level logs informational message?

Options:

A.

0

B.

2

C.

4

D.

6

Question 180

Refer to the exhibit.

as

An engineer is bringing up a new circuit to the MPLS provider on the Gi0/1 interface of Router1 The new circuit uses eBGP and teams the route to VLAN25 from the BGP path What s the expected behavior for the traffic flow for route 10.10.13.0/25?

Options:

A.

Traffic to 10.10.13.0.25 is load balanced out of multiple interfaces

B.

Route 10.10.13.0/25 is updated in the routing table as being learned from interface Gi0/1.

C.

Traffic to 10.10.13.0/25 is asymmeteical

D.

Route 10.10.13.0/25 learned via the GiO/0 interface remains in the routing table

Question 181

as

as

as

IP connectivity and OSPF are preconfigured on all devices where necessary. Do not make any changes to the IP addressing or OSPF. The company policy uses connected interfaces and next hops when configuring static routes except for load balancing or redundancy without floating static. Connectivity must be established between subnet 172.20.20.128/25 on the Internet and the LAN at 192.168.0.0/24 connected to SW1:

1. Configure reachability to the switch SW1 LAN subnet in router R2.

2. Configure default reachability to the Internet subnet in router R1.

3. Configure a single static route in router R2 to reach to the Internet subnet considering both redundant links between routers R1 and R2. A default route is NOT allowed in router R2.

4. Configure a static route in router R1 toward the switch SW1 LAN subnet where the primary link must be through Ethernet0/1. and the backup link must be through Ethernet0/2 using a floating route. Use the minimal administrative distance value when required.

Options:

Question 182

Connectivity between four routers has been established. IP connectivity must be configured in the order presented to complete the implementation. No dynamic routing protocols are included.

1. Configure static routing using host routes to establish connectivity from router R3 to the router R1 Loopback address using the source IP of 209.165.200.230.

2. Configure an IPv4 default route on router R2 destined for router R4.

3. Configure an IPv6 default router on router R2 destined for router R4.

asas

Options:

Question 183

as

as

Connectivity between three routers has been established, and IP services must be configured jn the order presented to complete the implementation Tasks assigned include configuration of NAT, NTP, DHCP, and SSH services.

1. All traffic sent from R3 to the R1 Loopback address must be configured for NAT on R2. All source addresses must be translated from R3 to the IP address of Ethernet0/0 on R2, while using only a standard access list named NAT To verify, a ping must be successful to the R1 Loopback address sourced from R3. Do not use NVI NAT configuration.

2. Configure R1 as an NTP server and R2 as a client, not as a peer, using the IP address of the R1 Ethernet0/2 interface. Set the clock on the NTP server for midnight on January 1, 2019.

3. Configure R1 as a DHCP server for the network 10.1.3.0/24 in a pool named TEST. Using a single command, exclude addresses 1-10 from the range. Interface Ethernet0/2 on R3 must be issued the IP address of 10.1.3.11 via DHCP.

4. Configure SSH connectivity from R1 to R3, while excluding access via other remote connection protocols. Access for user root and password Cisco must be set on router R3 using RSA and 1024 bits. Verify connectivity using an SSH session from router R1 using a destination address of 10.1.3.11. Do NOT modify console access or line numbers to accomplish this task.

Options:

Question 184

as

All physical cabling between the two switches is installed. Configure the network connectivity between the switches using the designated VLANs and interfaces.

1. Configure VLAN 100 named Compute and VLAN 200 named Telephony where required for each task.

2. Configure Ethernet0/1 on SW2 to use the existing VLAN named Available.

3. Configure the connection between the switches using access ports.

4. Configure Ethernet0/1 on SW1 using data and voice VLANs.

5. Configure Ethemet0/1 on SW2 so that the Cisco proprietary neighbor discovery protocol is turned off for the designated interface only.

as

Options:

Question 185

An engineer must configure a core router with a floating static default route to the backup router at 10.200.0.2. Which command meets the requirements?

Options:

A.

ip route 0.0.0.0 0.0.0.0 10.200.0.2 1

B.

Ip route 0.0.0.0 0.0.0.0 10.200.0.2 floating

C.

ip route 0.0.0.0 0.0.0.0 10.200.0.2

D.

Ip route 0.0.0.0 0.0.0.0 10.200.0.2 10

Question 186

A HCP pool has been created with the name CONTROL. The pool uses the next to last usable IP address as the default gateway for the DHCP clients. The server is located at 172.16 32.15. What is the step in the process for clients on the 192.168.52.0/24 subnet to reach the DHCP server?

Options:

A.

ip forward-protocol udp 137

B.

ip default-network 192.168.52.253

C.

ip helper-address 172.16.32.15

D.

ip default-gateway 192.168.52.253

Question 187

as

Refer to the exhibit. How will the device handle a packet destined to IP address 100.100.100.100?

Options:

A.

If will choose the route with the longest match.

O 100.100.100.100'32 (110/21) via 192.168.1.1. 00:05:57. EmernetO/1.

B.

It will always prefer the static route over dynamic routes and choose the route

S 100.100.0.0/16(1/0] via 192.168.4.1.

C.

It will choose the route with the highest metric.

D 100.100.100.0/24 (90/435200) via 192.168.2.1. 00:00:13. EthernetO/2.

D.

It will choose the route with the lowest metric,

R 100.0.0.0/8 [120/2] via 192.168.3.1. 00:00:13. EthernetO/3.

Question 188

All physical cabling is in place. Router R4 and PCI are fully configured and

inaccessible. R4's WAN interfaces use .4 in the last octet for each subnet.

Configurations should ensure that connectivity is established end-to-end.

1 . Configure static routing to ensure RI prefers the path through R2 to

reach only PCI on R4's LAN

2. Configure static routing that ensures traffic sourced from RI will take

an alternate path through R3 to PCI in the event of an outage along

the primary path

3. Configure default routes on RI and R3 to the Internet using the least number of hops

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using

the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

as

Options:

Question 189

as

Three switches must be configured for Layer 2 connectivity. The company requires only the designated VLANs to be configured on their respective switches and permitted accross any links between switches for security purposes. Do not modify or delete VTP configurations.

The network needs two user-defined VLANs configured:

VLAN 110: MARKETING

VLAN 210: FINANCE

1. Configure the VLANs on the designated switches and assign them as access ports to the interfaces connected to the PCs.

2. Configure the e0/2 interfaces on Sw1 and Sw2 as 802.1q trunks with only the required VLANs permitted.

3. Configure the e0/3 interfaces on Sw2 and Sw3 as 802.1q trunks with only the required VLANs permitted.

as

Options:

Question 190

as

as

IP connectivity between the three routers is configured. OSPF adjacencies must be established.

1. Configure R1 and R2 Router IDs using the interface IP addresses from the link that is shared between them.

2. Configure the R2 links with a max value facing R1 and R3. R2 must become the DR. R1 and R3 links facing R2 must remain with the default OSPF configuration for DR election. Verify the configuration after clearing the OSPF process.

3. Using a host wildcard mask, configure all three routers to advertise their respective Loopback1 networks.

4. Configure the link between R1 and R3 to disable their ability to add other OSPF routers.

Options:

Question 191

as

Refer to the exhibit. IPv6 is being Implemented within the enterprise. The command Ipv6 unlcast-routing is configure. Interlace GlgO/0 on R1 must be configured to provide a dynamic assignment using the assigned IPv6 block Which command accomplishes this task?

Options:

A.

ipv6 address 2001:DB8:FFFF:FCF3::1/64

B.

ipv6 address autoconfig 2001:DB8:FFFF:FCF2::/64

C.

ipv6 address 2001:DB8:FFFF:FCF3::/64 eui-64

D.

ipv6 address 2001:DB8:FFFF:FCF3::/64 link-local

Question 192

as

Refer to the exhibit. Which type of JSON data is shown?

Options:

A.

sequence

B.

string

C.

object

D.

Boolean

Question 193

Which CRUD operation corresponds to me HTTP GET method?

Options:

A.

delete

B.

create

C.

update

D.

read

Question 194

What is the RFC 4627 default encoding for JSON text?

Options:

A.

UCS-2

B.

UTF-8

C.

Hex

D.

GB18030

Question 195

as

Refer to the exhibit. A packet sourced from 10.10.10.32 is destined tot the Internet. What is the administrative distance for the destination route? A. 0

B. 1

C. 2

D. 32

Options:

Question 196

Drag and drop the TCP and UDP characteristics from the left onto the supporting protocols on the right. Not all options are used.

as

Options:

Question 197

All physical cabling is in place. A company plans to deploy 32 new sites.

The sites will utilize both IPv4 and IPv6 networks.

1 . Subnet 172.25.0.0/16 to meet the subnet requirements and maximize

the number of hosts

Using the second subnet

• Assign the first usable IP address to e0/0 on Sw1O1

• Assign the last usable IP address to e0/0 on Sw102

2. Subnet to meet the subnet requirements and maximize

the number of hosts

c Using the second subnet

• Assign an IPv6 GUA using a unique 64-Bit interface identifier

on e0/0 on Sw101

• Assign an IPv6 GUA using a unique 64-Bit interface identifier

on eO/O on swi02

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using

the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

as

Options:

Question 198

as

Refer to the exhibit. An engineer is creating a secure preshared key based SSID using WPA2 for a wireless network running on 2.4 GHz and 5 GHz. Which two tasks must the engineer perform to complete the process? (Choose two.)

Options:

A.

Select the 802.1 x option for Auth Key Management.

B.

Select the WPA Policy option.

C.

Select the PSK option for Auth Key Management.

D.

Select the AES option for Auth Key Management.

E.

Select the AES (CCMP128) option for WPA2/WPA3 Encryption.

Question 199

Which solution is appropriate when mitigating password attacks where the attacker was able to sniff the clear-text password of the system administrator?

Options:

A.

next-generation firewall to keep stateful packet inspection

B.

multifactor authentication using two separate authentication sources

C.

ACL to restrict incoming Telnet sessions "admin" accounts

D.

IPS with a btock list of known attack vectors

Question 200

Physical connectivity is implemented between the two Layer 2 switches, and the network connectivity between them must be configured

1. Configure an LACP EtherChannel and number it as 1; configure it between switches SW1 and SVV2 using interfaces Ethernet0/0 and Ethernet0/1 on both sides. The LACP mode must match on both ends

2 Configure the EtherChannel as a trunk link.

3. Configure the trunk link with 802.1 q tags.

4. Configure the native VLAN of the EtherChannel as VLAN 15.

asas

Options:

Question 201

What is the main difference between traditional networks and controller-based networking?

Options:

A.

Controller-based networks increase TCO for the company, and traditional networks require less investment.

B.

Controller-based networks provide a framework for Innovation, and traditional networks create efficiency.

C.

Controller-based networks are open for application requests, and traditional networks operate manually.

D.

Controller-based networks are a closed ecosystem, and traditional networks take advantage of programmability.

Question 202

Which alternative to password authentication Is Implemented to allow enterprise devices to log in to the corporate network?

Options:

A.

magic links

B.

one-time passwords

C.

digital certificates

D.

90-day renewal policies

Question 203

Which WLC management connection type is vulnerable to man-in-the-middIe attacks?

Options:

A.

Telnet

B.

console

C.

HTTPS

D.

SSH

Question 204

A network engineer is configuring a new router at a branch office. The router is connected to an upstream WAN network that allows the branch to communicate with the head office. The central time server with IP address 172.24.54.8 is located behind a firewall at the head office. Which command must the engineer configure so that the software clock of the new router synchronizes with the time server?

Options:

A.

ntp master 172.24.54.8

B.

ntp client 172.24.54.8

C.

ntp peer 172.24.54.8

D.

ntp server 172.24.54.8

Question 205

as

Refer to the exhibit. A network administrator is configuring a router for user access via SSH. The service-password encryption command has been issued. The configuration must meet these requirements:

• Create the username as CCUser.

• Create the password as NA!2Scc.

• Encrypt the user password.

What must be configured to meet the requirements?

Options:

A.

username CCUser privies 10 password NA!2Scc

B.

username CCUser password NA!2Scc enable password level 5 NA!2$cc

C.

username CCUser secret NA!2Scc

D.

username CCUser privilege 15 password NA!2Scc enable secret 0 NA!2$cc

Question 206

Configure IPv4 and IPv6 connectivity between two routers. For IPv4, use a /28 network from the 192.168.1.0/24 private range. For IPv6, use the first /64 subnet from the 2001:0db8:aaaa::/48 subnet.

1. Using Ethernet0/1 on routers R1 and R2, configure the next usable/28 from the 192.168.1.0/24 range. The network 192.168.1.0/28 is unavailable.

2. For the IPv4 /28 subnet, router R1 must be configured with the first usable host address.

3. For the IPv4 /28 subnet, router R2 must be configured with the last usable host address.

4. For the IPv6 /64 subnet, configure the routers with the IP addressing provided from the topology.

5. A ping must work between the routers on the IPv4 and IPv6 address ranges.

asas

Options:

Question 207

Refer to the exhibit. The user has connectivity to devices on network 192.168.3 0/24 but cannot reach users on the network 10.10.1.0724.

What is the first step to verify connectivity?

as

Options:

A.

Is the internet reachable?

B.

Is the default gateway reachable?

C.

Is the DNS server reachable?

Question 208

as

Refer to the exhibit. A network engineer updates the existing configuration on interface fastethernet1/1 switch SW1. It must establish an EtherChannel by using the same group designation with another vendor switch. Which configuration must be performed to complete the process?

Options:

A.

interface port-channel 2

channel-group 2 mode desirable

B.

interface fasteinernet 1/1

channel-group 2 mode active

C.

interface fasteinernet 1/1

channel-group 2 mode on

D.

interface port-channel 2

channel-group 2 mode auto

Question 209

Physical connectivity is implemented between the two Layer 2 switches,

and the network connectivity between them must be configured.

I . Configure an LACP EtherChanneI and number it as 44; configure it

between switches SWI and SW2 using interfaces EthernetO/O and

Ethernet0/1 on both sides. The LACP mode must match on both ends.

2. Configure the EtherChanneI as a trunk link.

3. Configure the trunk link with 802. Iq tags.

4. Configure VLAN 'MONITORING' as the untagged VLAN of the

EtherChannel.

==================

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using

the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

as

Options:

Question 210

What are two lacts that differentiate optical-fiber cabling from copper cabling? (Choose two.)

Options:

A.

It is less expensive when purchasing patch cables.

B.

It has a greater sensitivity to changes in temperature and moisture.

C.

It provides greater throughput options.

D.

It carries signals for longer distances.

E.

It carries electrical current further distances for PoE devices.

Question 211

A network administrator wants the syslog server to filter incoming messages into different files based on their Importance. Which filtering criteria must be used?

Options:

A.

level

B.

message body

C.

process ID

D.

facility

Question 212

Refer to the exhibit.

as

How should the configuration be updated to allow PC1 and PC2 access to the Internet?

Options:

A.

Modify the configured number of the second access list.

B.

Add either the ip nat {inside|outside} command under both interfaces.

C.

Remove the overload keyword from the ip nat inside source command.

D.

Change the ip nat inside source command to use interface GigabitEthernet0/0.

Question 213

Refer to the exhibit.

as

Packets received by the router from BGP enter via a serial interface at 209 165 201 1 Each route is present within the routing table Which interface is used to forward traffic with a destination IP of 10.1.1.19?

Options:

A.

F0/4

B.

F0/0

C.

F0/1

D.

F0/3

Question 214

Refer to the exhibit.

as

An engineer assumes a configuration task from a peer Router A must establish an OSPF neighbor relationship with neighbor 172 1 1 1 The output displays the status of the adjacency after 2 hours. What is the next step in the configuration process for the routers to establish an adjacency?

Options:

A.

Configure router A to use the same MTU size as router B.

B.

Set the router B OSPF ID to a nonhost address.

C.

Configure a point-to-point link between router A and router B.

D.

Set the router B OSPF ID to the same value as its IP address

Question 215

Refer to the exhibit.

as

The DHCP server and clients are connected to the same switch. What is the next step to complete the DHCP configuration to allow clients on VLAN 1 to receive addresses from the DHCP server?

Options:

A.

Configure the ip dhcp snooping trust command on the interlace that is connected to the DHCP client.

B.

Configure the ip dhcp relay information option command on the interface that is connected to the DHCP client.

C.

Configure the ip dhcp snooping trust command on the interface that is connected to the DHCP server.

D.

Configure the Ip dhcp relay information option command on the interface that is connected to the DHCP server.

Question 216

R1 as an NTP server must have:

• NTP authentication enabled

• NTP packets sourced from Interface loopback 0

• NTP stratum 2

• NTP packets only permitted to client IP 209.165 200 225

How should R1 be configured?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 217

Refer to the exhibit.

as

Switch A is newly configured. All VLANs are present in the VLAN database. The IP phone and PC A on Gi0/1 must be configured for the appropriate VLANs to establish connectivity between the PCs. Which command set fulfills the requirement?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 218

What provides centralized control of authentication and roaming In an enterprise network?

Options:

A.

a lightweight access point

B.

a firewall

C.

a wireless LAN controller

D.

a LAN switch

Question 219

What causes a port to be placed in the err-disabled state?

Options:

A.

nothing plugged into the port

B.

link flapping

C.

shutdown command issued on the port

D.

latency

Question 220

A network engineer must implement an IPv6 configuration on the vlan 2000 interface to create a routable locally-unique unicast address that is blocked from being advertised to the internet. Which configuration must the engineer apply?

Options:

A.

interface vlan 2000

ipv6 address ffc0:0000:aaaa::1234:2343/64

B.

interface vlan 2000

Ipv6 address fc00:0000:aaaa:a15d:1234:2343:8aca/64

C.

interface vlan 2000

ipv6 address fe80;0000:aaaa::1234:2343/64

D.

interface vlan 2000

ipv6 address fd00::1234:2343/64

Question 221

Which WLC management connection type is vulnerable to man-in-the-middle attacks?

Options:

A.

SSH

B.

HTTPS

C.

Telnet

D.

console

Question 222

Refer to the exhibit.

as

An engineer is configuring the HO router. Which IPv6 address configuration must be applied to the router fa0'1 interface for the router to assign a unique 64-brt IPv6 address to Itself?

Options:

A.

ipv6 address 2001:DB8:0:1:C601:42FF:FE0F:7/64

B.

ipv6 address 2001:DB8:0:1:C601:42FE:800F:7/64

C.

ipv6 address 2001 :DB8:0:1:FFFF:C601:420F:7/64

D.

iov6 address 2001 :DB8:0:1:FE80:C601:420F:7/64

Question 223

Which two spanning-tree states are bypassed on an interface running PortFast? (Choose two.)

Options:

A.

disabled

B.

listening

C.

forwarding

D.

learning

E.

blocking

Question 224

Refer to the exhibit.

as

Which two commands must be configured on router R1 to enable the router to accept secure remote-access connections? (Choose two)

Options:

A.

transport input telnet

B.

crypto key generate rsa

C.

ip ssh pubkey-chain

D.

login console

E.

username cisco password 0 Cisco

Question 225

Refer to the exhibit.

as

All VLANs are present in the VLAN database. Which command sequence must be applied to complete the configuration?

Options:

A.

Interface FastEthernet0/1 switchport trunk native vlan 10 switchport trunk allowed vlan 10,15

B.

Interface FastEthernet0/1 switchport mode trunk switchport trunk allowed vlan 10,15

C.

interface FastEthernet0/1 switchport mode access switchport voice vlan 10

D.

Interface FastEthernet0/1 switchport trunk allowed vlan add 10 vlan 10 private-vlan isolated

Question 226

Refer to the exhibit.

as

A static route must be configured on R14 to forward traffic for the 172 21 34 0/25 network that resides on R86 Which command must be used to fulfill the request?

Options:

A.

ip route 172.21.34.0 255.255.255.192 10.73.65.65

B.

ip route 172.21.34.0 255.255.255.0 10.73.65.65

C.

ip route 172.21.34.0 255.255.128.0 10.73.65.64

D.

ip route 172.21.34.0 255.255.255.128 10.73.65.66

Question 227

Which characteristic differentiates the concept of authentication from authorization and accounting?

Options:

A.

user-activity logging

B.

service limitations

C.

consumption-based billing

D.

identity verification

Question 228

Which protocol uses the SSL?

Options:

A.

HTTP

B.

SSH

C.

HTTPS

D.

Telnet

Question 229

A network engineer is configuring a switch so that it is remotely reachable via SSH. The engineer has already configured the host name on the router. Which additional command must the engineer configure before entering the command to generate the RSA key?

Options:

A.

password password

B.

crypto key generate rsa modulus 1024

C.

ip domain-name domain

D.

ip ssh authentication-retries 2

Question 230

Refer to the exhibit.

as

What is a reason for poor performance on the network interface?

Options:

A.

The interface is receiving excessive broadcast traffic.

B.

The cable connection between the two devices is faulty.

C.

The interface is operating at a different speed than the connected device.

D.

The bandwidth setting of the interface is misconfigured

Question 231

Refer to the exhibit.

as

Users need to connect to the wireless network with IEEE 802. 11r-compatible devices. The connection must be maintained as users travel between floors or to other areas in the building What must be the configuration of the connection?

Options:

A.

Select the WPA Policy option with the CCKM option.

B.

Disable AES encryption.

C.

Enable Fast Transition and select the FT 802.1x option.

D.

Enable Fast Transition and select the FT PSK option.

Question 232

What is the purpose of the ip address dhcp command?

Options:

A.

to configure an Interface as a DHCP server

B.

to configure an interface as a DHCP helper

C.

to configure an interface as a DHCP relay

D.

to configure an interface as a DHCP client

Question 233

What is a function of a Next-Generation IPS?

Options:

A.

makes forwarding decisions based on learned MAC addresses

B.

serves as a controller within a controller-based network

C.

integrates with a RADIUS server to enforce Layer 2 device authentication rules

D.

correlates user activity with network events

Question 234

Refer to the exhibit.

as

Which configuration enables DHCP addressing for hosts connected to interface FastEthernetO/1 on router R4?

Options:

A.

interface FastEthernet0/0

ip helper-address 10.0.1.1

i

access-list 100 permit udp host 10.0.1.1 eq bootps host 10.148.2.1

B.

interface FastEthernot0/1

ip helper-address 10.0.1.1

!

access-list 100 permit tcp host 10.0.1.1 eq 67 host 10.148.2.1

C.

interface FastEthernetO/0

ip helper-address 10.0.1.1

I

access-list 100 permit host 10.0.1.1 host 10.148.2.1 eq bootps

D.

interface FastEthernet0/1

ip helper-address 10.0.1.1

!

access-list 100 permit udp host 10.0.1.1 eq bootps host 10.148.2.1

Question 235

Refer to the exhibit.

as

Which command must be issued to enable a floating static default route on router A?

Options:

A.

lp route 0.0.0.0 0.0.0.0 192.168.1.2

B.

ip default-gateway 192.168.2.1

C.

ip route 0.0.0.0 0.0.0.0 192.168.2.1 10

D.

ip route 0.0.0.0 0.0.0.0 192.168.1.2 10

Question 236

Refer to the exhibit.

as

Which two commands must be added to update the configuration of router R1 so that it accepts only encrypted connections? (Choose two )

Options:

A.

username CNAC secret R!41!4319115@

B.

ip ssh version 2

C.

line vty 0 4

D.

crypto key generate rsa 1024

E.

transport input ssh

Question 237

What is a requirement for nonoverlapping Wi-Fi channels?

Options:

A.

different security settings

B.

discontinuous frequency ranges

C.

different transmission speeds

D.

unique SSIDs

Question 238

Refer to the exhibit.

as

Which minimum configuration items are needed to enable Secure Shell version 2 access to R15?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 239

Refer to the exhibit.

as

Site A was recently connected to site B over a new single-mode fiber path. Users at site A report Intermittent connectivity Issues with applications hosted at site B. What is the reason for the problem?

Options:

A.

Heavy usage is causing high latency.

B.

An incorrect type of transceiver has been inserted into a device on the link.

C.

physical network errors are being transmitted between the two sites.

D.

The wrong cable type was used to make the connection.

Question 240

Refer to the exhibit.

as

Which command configures OSPF on the point-to-point link between routers R1 and R2?

Options:

A.

router-id 10.0.0.15

B.

neighbor 10.1.2.0 cost 180

C.

ipospf priority 100

D.

network 10.0.0.0 0.0.0.255 area 0

Page: 1 / 107
Total 1069 questions