Professional Documents
Culture Documents
Ccna Dumps
Ccna Dumps
Question # 3
Refer to the exhibit.
View Answer
Answer:
1
Questions 4
A.
ip route 10.80.65.0.255.255.248.0.10.73.65.66.1
B.
ip route 10.80.65.0.255.255.255..240 fa0/1 89
Options:
C.
ip route 10.80.65.0.255.255.248.0.10.73.65.66.171 Show Answer Buy Now
D. Answer:
ip route 10.80.65.0.0.0.224.10.80.65.0. 255
View Answer
Answer:
C
2
Answer:
Questions 5
Refer to the exhibit. To which device does Router1 send packets that are destined to host
10.10.13.165?
Options:
A.
Router2
B.
Router3
C.
3
Router4
D.
Router5
Answer:
B
Questions 6
Options:
A.
An engineer booted a new switch and applied this configuration via
Option A
the console port. Which additional configuration must be applied to
allow administrators to authenticate directly to enable privilege B.
mode via Telnet using a local username and password?
Option B
C.
Option C
D.
4
Option D 3. Configure the connection between the switches using access
ports.
Show Answer Buy Now
4. Configure Ethernet0/1 on SW1 using data and voice VLANs.
Answer:
5. Configure Ethemet0/1 on SW2 so that the Cisco proprietary
A
neighbor discovery protocol is turned off for the designated interface
Questions 7 only.
5
See the Explanation below. on sw2
Explanation: Vlan 99
Explanation: Name Available
enable do wr
conf t Questions 8
vlan 100 All physical cabling is in place. Router R4 and PCI are fully
inaccessible. R4's WAN interfaces use .4 in the last octet for each
vlan 200
subnet.
name Telephony
Configurations should ensure that connectivity is established end-to-
int e0/1 end.
switchport voice vlan 200 1 . Configure static routing to ensure RI prefers the path through R2
switchport access vlan 100 to
switchport mode access 2. Configure static routing that ensures traffic sourced from RI will
take
do wr
6
an alternate path through R3 to PCI in the event of an outage along • When Next is clicked, the lab closes and cannot be reopened.
Guidelines
• Refer to the Tasks tab to view the tasks for this lab item.
• Click Next at the bottom of the screen to submit this lab and move
Answer:
to the next question. Answer:
7
See the solution below in Explanation. backup route. For example, you can use an AD of 20 for this route.
Explanation: This type of static route is also known as a floating static route. To
create this static route, you need to enter the following
Explanation:
commands on R1’s console:
Answer:
IP connectivity and OSPF are preconfigured on all devices where Answer:
necessary. Do not make any changes to the IP addressing or OSPF.
See the Explanation below.
The company policy uses connected interfaces and next hops when
configuring static routes except for load balancing or redundancy Explanation:
without floating static. Connectivity must be established between Explanation:
subnet 172.20.20.128/25 on the Internet and the LAN at
Answer as below configuration:
192.168.0.0/24 connected to SW1:
On R2:
10
Enable Copy run start
Conf t Questions 10
On R1:
Enable
Conf t
On R2
11
D. DHCPOFFER
When a client and server are not on the same physical network,
which device is used to forward requests and replies between client
and server for DHCP?
Options:
A.
B.
DHCP server
C.
DHCPDISCOVER
Site A was recently connected to site B over a new single-mode
D. fiber path. Users at site A report Intermittent connectivity Issues
12
with applications hosted at site B. What is the reason for the Options:
problem? A.
Options:
It allows the traffic to pass through unchanged
A.
B.
Heavy usage is causing high latency.
It drops the traffic
B.
C.
An incorrect type of transceiver has been inserted into a device on
It tags the traffic with the default VLAN
the link.
D.
C.
It tags the traffic with the native VLAN
physical network errors are being transmitted between the two sites.
Show Answer Buy Now
D.
Answer:
The wrong cable type was used to make the connection.
A
Show Answer Buy Now
Explanation:
Answer:
Explanation:
B
https://www.cisco.com/c
Questions 13
/en/us/td/docs/switches/lan/catalyst2960x/software/15-
A Cisco IP phone receive untagged data traffic from an attached PC. 0_2_EX/vlan/configuration_guide/b_vlan_152ex_2960-
Which action is taken by the phone? x_cg/b_vlan_152ex_2960-x_cg_chapter_0110.pdf
13
Untagged traffic from the device attached to the Cisco IP Phone Answer:
passes through the phone unchanged, regardless of the trust state of B
the access port on the phone.
Explanation:
Questions 14
Explanation:
Which set of action satisfy the requirement for multifactor
This is an example of how two-factor authentication (2FA) works:1.
authentication?
The user logs in to the website or service with their username and
Options:
password.2. The password is validated by an authentication server
A. and, if correct, the user becomes eligible for the second factor.3. The
authentication server sends a unique code to the user’s second-factor
The user swipes a key fob, then clicks through an email link
method (such as a smartphone app).4. The user confirms their
B. identity by providing the additional authentication for their second-
The user enters a user name and password, and then clicks a factor method.
C.
The user enters a PIN into an RSA token, and then enters the
displayed RSA key on a login screen
D.
The user enters a user name and password and then re-enters the
credentials on a second screen
14
3. Configure R1 as a DHCP server for the network 10.1.3.0/24 in a
pool named TEST. Using a single command, exclude addresses 1-10
from the range. Interface Ethernet0/2 on R3 must be issued the IP
address of 10.1.3.11 via DHCP.
15
R1(config)#ntp master 1 1. Configure an LACP EtherChannel and number it as 1; configure
it between switches SW1 and SVV2 using interfaces Ethernet0/0
R2(config)#ntp server 10.1.2.1
and Ethernet0/1 on both sides. The LACP mode must match on both
Exit ends
Router#clock set 00:00:00 jan 1 2019 2 Configure the EtherChannel as a trunk link.
ip dhcp pool TEST 3. Configure the trunk link with 802.1 q tags.
network 10.1.3.0 255.255.255.0 4. Configure the native VLAN of the EtherChannel as VLAN 15.
ip dhcp exluded-address 10.1.3.1 10.1.3.10
R3(config)#int e0/3
R3(config)#int e0/2
ip address dhcp
no shut
1024
16
Show Answer Buy Now switchport trunk native vlan 15
Answer: end
Explanation: vlan 15
vlan 15 exit
17
Connectivity between four routers has been established. IP
connectivity must be configured in the order presented to complete
the implementation. No dynamic routing protocols are included.
Options:
Show Answer Buy Now
Answer:
18
Answer: ipv6 route ::/0 2001:db8:abcd::2
1.- on R3
config terminal
end
2.- on R2
config terminal
end
3.- on R2
config terminal
19
IP connectivity between the three routers is configured. OSPF Answer as below configuration:
adjacencies must be established.
on R1
1. Configure R1 and R2 Router IDs using the interface IP addresses
conf terminal
from the link that is shared between them.
interface Loopback0
2. Configure the R2 links with a max value facing R1 and R3. R2
must become the DR. R1 and R3 links facing R2 must remain with ip address 10.10.1.1 255.255.255.255
the default OSPF configuration for DR election. Verify the !
configuration after clearing the OSPF process.
interface Loopback1
3. Using a host wildcard mask, configure all three routers to
ip address 192.168.1.1 255.255.255.0
advertise their respective Loopback1 networks.
!
4. Configure the link between R1 and R3 to disable their ability to
add other OSPF routers. interface Ethernet0/0
Options: no shut
Show Answer Buy Now ip address 10.10.12.1 255.255.255.0
Explanation: no shut
20
ip address 10.10.13.1 255.255.255.0 ip address 192.168.2.2 255.255.255.0
ip ospf 1 area 0 !
! no shut
! !
--------------------------------------- no shut
! !
21
network 10.10.2.2 0.0.0.0 area 0 duplex auto
! interface Ethernet0/2
On R3 ip ospf 1 area 0
interface Loopback0 !
interface Ethernet0/1 !
no shut Questions 19
ip ospf 1 area 0
22
Options:
Three switches must be configured for Layer 2 connectivity. The
Show Answer Buy Now
company requires only the designated VLANs to be configured on
their respective switches and permitted accross any links between Answer:
switches for security purposes. Do not modify or delete VTP
Answer:
configurations.
See the Explanation below.
The network needs two user-defined VLANs configured:
Explanation:
VLAN 110: MARKETING
Explanation:
VLAN 210: FINANCE
Answer as below configuration:
1. Configure the VLANs on the designated switches and assign them
as access ports to the interfaces connected to the PCs. Sw1
2. Configure the e0/2 interfaces on Sw1 and Sw2 as 802.1q trunks enbale
with only the required VLANs permitted. config t
3. Configure the e0/3 interfaces on Sw2 and Sw3 as 802.1q trunks Vlan 210
with only the required VLANs permitted.
23
Name FINANCE Vlan 210
config t Sw1
Sw3 Sw3
24
Configure IPv4 and IPv6 connectivity between two routers. For
IPv4, use a /28 network from the 192.168.1.0/24 private range. For
IPv6, use the first /64 subnet from the 2001:0db8:aaaa::/48 subnet.
2. For the IPv4 /28 subnet, router R1 must be configured with the
first usable host address.
3. For the IPv4 /28 subnet, router R2 must be configured with the
last usable host address.
4. For the IPv6 /64 subnet, configure the routers with the IP
addressing provided from the topology. Options:
5. A ping must work between the routers on the IPv4 and IPv6 Show Answer Buy Now
address ranges.
Answer:
Answer:
25
on R1 copy running start
on R2 A.
config terminal Host that is configured for the system to send log messages
ipv6 unicast-routing B.
26
set of values that represent the processes that can generate a log Example: on a switch, any process (CDP, SNMP, etc.) can generate
message a log message. On a syslog server, the logging facility is the place
where all received messages with the same priority level are stored.
Show Answer Buy Now
Questions 22
Answer:
What role does a hypervisor provide for each virtual machine in
C
server virtualization?
Explanation: Options:
Explanation:
A.
Cisco Community – Difference between logging level and logging
infrastructure-as-a-service.
facility
B.
Post by ahmednaas
Software-as-a-service
“The logging facility command basically tells the syslog server
where to put the log message. You configure the syslog server with C.
Now, when you use the “logging facility local7” on your device, all services as a hardware controller.
messages with severity “debug” or greater should be saved in
Show Answer Buy Now
/var/adm/local7.log.”
Answer:
C
27
Explanation: on e0/0 on Sw101
Explanation: • Assign an IPv6 GUA using a unique 64-Bit interface identifier
The hypervisor creates and manages virtual machines on a host on eO/O on swi02
computer and allocates physical system resources to them.
Guidelines
Questions 23
This is a lab item in which tasks will be performed on virtual
All physical cabling is in place. A company plans to deploy 32 new devices.
sites.
• Refer to the Tasks tab to view the tasks for this lab item.
The sites will utilize both IPv4 and IPv6 networks.
• Refer to the Topology tab to access the device console(s) and
1 . Subnet 172.25.0.0/16 to meet the subnet requirements and perform the tasks.
maximize
• Console access is available for all required devices by clicking the
the number of hosts device icon or using
Using the second subnet the tab(s) above the console window.
• Assign the first usable IP address to e0/0 on Sw1O1 • All necessary preconfigurations have been applied.
• Assign the last usable IP address to e0/0 on Sw102 • Do not change the enable password or hostname for any device.
2. Subnet to meet the subnet requirements and maximize • Save your configurations to NVRAM before moving to the next
the number of hosts item.
c Using the second subnet • Click Next at the bottom of the screen to submit this lab and move
to the next question.
• Assign an IPv6 GUA using a unique 64-Bit interface identifier
28
• When Next is clicked, the lab closes and cannot be reopened. value of the fifth bit (32) to the third octet of the network address
(0), which gives you 172.25.32.0/21 as the second subnet. The
first usable IP address in this subnet is 172.25.32.1, and the last
usable IP address is 172.25.39.254.
• To assign the first usable IP address to e0/0 on Sw101, you need
to enter the following commands on the device console:
Answer: • To assign the last usable IP address to e0/0 on Sw102, you need to
enter the following commands on the device console:
Answer:
See the Explanation for the solution. Sw102#configure terminal Sw102(config)#interface e0/0
Explanation: Sw102(config-if)#ip address 172.25.39.254 255.255.248.0
Sw102(config-if)#no shutdown Sw102(config-if)#end
Explanation:
• To subnet an IPv6 GUA to meet the subnet requirements and
• To subnet 172.25.0.0/16 to meet the subnet requirements and
maximize the number of hosts, you need to determine how many
maximize the number of hosts, you need to determine how many
bits you need to borrow from the interface identifier portion of
bits you need to borrow from the host portion of the address to
the address to create enough subnets for 32 sites. Since 32 is 2^5,
create enough subnets for 32 sites. Since 32 is 2^5, you need to
you need to borrow 5 bits, which means your new prefix length
borrow 5 bits, which means your new subnet mask will be /21 or
will be /69 or ffff:ffff:ffff:fff8::/69 (assuming that your IPv6 GUA
255.255.248.0. To find the second subnet, you need to add the
has a /64 prefix by default). To find the second subnet, you need
29
to add the value of the fifth bit (32) to the fourth hextet of the An engineer must configure an OSPF neighbor relationship between
network address (0000), which gives you xxxx:xxxx:xxxx:0020::/69 router R1 and R3 The authentication configuration has been
as the second subnet (where xxxx:xxxx:xxxx is your IPv6 GUA configured and the connecting interfaces are in the same 192.168
prefix). The first and last IPv6 addresses in this subnet are 1.0/30 sublet. What are the next two steps to complete the
xxxx:xxxx:xxxx:0020::1 and xxxx:xxxx:xxxx:0027:ffff:ffff:ffff:fffe configuration? (Choose two.)
respectively. Options:
• To assign an IPv6 GUA using a unique 64-bit interface identifier on
A.
e0/0 on Sw101, you need to enter the following commands on
the device console (assuming that your IPv6 GUA prefix is configure the hello and dead timers to match on both sides
2001:db8::/64):
B.
Sw101#configure terminal Sw101(config)#interface e0/0 configure the same process ID for the router OSPF process
Sw101(config-if)#ipv6 address 2001:db8::20::1/69 Sw101(config-
C.
if)#no shutdown Sw101(config-if)#end
configure the same router ID on both routing processes
• To assign an IPv6 GUA using a unique 64-bit interface identifier on
D.
e0/0 on Sw102, you need to enter the following commands on
the device console (assuming that your IPv6 GUA prefix is Configure the interfaces as OSPF active on both sides.
2001:db8::/64):
E.
Sw102#configure terminal Sw102(config)#interface e0/0 configure both interfaces with the same area ID
Sw102(config-if)#ipv6 address 2001:db8::27::fffe/69 Sw102(config-
Show Answer Buy Now
if)#no shutdown Sw102(config-if)#end
Questions 24 Answer:
30
A, E Answer:
Questions 25 C
A. Options:
disabling TPC so that access points can negotiate signal levels with A.
their attached wireless devices. Spanning tree may fail to detect a switching loop in the network that
B. causes broadcast storms
physical proximity to one another Root port choice and spanning tree recalculation are accelerated
D. when a switch link goes down
Mbps After spanning tree converges PortFast shuts down any port that
Show Answer Buy Now receives BPDUs.
31
Show Answer Buy Now
Answer:
A
Explanation:
Explanation:
Note: To enable portfast on a trunk port you need the trunk keyword An engineer is required to verify that the network parameters are
“spanning-tree portfast trunk valid for the users wireless LAN connectivity on a /24 subnet. Drag
Questions 27 and drop the values from the left onto the network parameters on the
right. Not all values are used.
Refer to the exhibit.
32
Answer:
Options:
Show Answer Buy Now
Questions 28
Answer:
Refer to the exhibit.
33
Options:
A.
Option A
voice and data traffic Which configuration accomplishes this task? Option B
C.
Option C
D.
34
Option D Show Answer Buy Now
An engineer must configure a WLAN using the strongest encryption Many routers provide WPA2-PSK (TKIP), WPA2-PSK (AES), and
type for WPA2- PSK. Which cipher fulfills the configuration WPA2-PSK (TKIP/AES) as options. TKIP is actually an older
requirement? encryption protocol introduced with WPA to replace the very-
Options: insecure WEP encryption at the time. TKIP is actually quite similar
to WEP encryption. TKIP is no longer considered secure, and is now
A.
deprecated. In other words, you shouldn’t be using it.
WEP AES is a more secure encryption protocol introduced with WPA2
B. and it is currently the strongest encryption type for WPA2-PSK.
RC4 Questions 30
AES
D.
TKIP
35
192.168.14.4
D.
192.168.15.5
Answer:
C
Questions 31
36
multicast
E)
Options:
A.
Option A
Option C
D.
B)
37
Option D Which action must be taken to ensure that router A is elected as the
DR for OSPF area 0?
E.
Options:
Option E
A.
Show Answer Buy Now
Configure the OSPF priority on router A with the lowest value
Answer: between the three routers.
B, C B.
Questions 33
Configure router B and router C as OSPF neighbors of router A.
Refer to the exhibit.
C.
D.
Answer:
C
Questions 34
38
Answer:
D
Questions 35
B.
C.
D.
39
D.
Option D
E.
Option E
Answer:
A, C
Questions 36
Options: A.
Option A B.
Option B C.
Option C D.
40
provides wireless services to users in a building C.
Answer: D.
Explanation: E.
An endpoint is a host that acts as the source or destination of data Show Answer Buy Now
traffic flowing through a network.
Answer:
When you are at your PC, editing your CV and uploading it to a file
B, D
server, you are sitting at an endpoint.
Questions 38
Questions 37
What is a requirement when configuring or removing LAG on a
Which two network actions occur within the data plane? (Choose
WLC?
two.)
Options:
Options:
A.
A.
The Incoming and outgoing ports for traffic flow must be specified
Add or remove an 802.1Q trunking header.
If LAG Is enabled.
B.
B.
Make a configuration change from an incoming NETCONF RPC.
41
The controller must be rebooted after enabling or reconfiguring
LAG.
C.
D.
Answer:
C
Questions 39
B.
42
C.
D.
Answer:
A
Questions 40
Refer to the exhibit. Routers R1 and R3 have the default configuration The router R2
priority is set to 99 Which commands on R3 configure it as the DR
in the 10.0 4.0/24 network?
Options:
A.
B.
C.
43
R3(config)#interface Gig0/0 R3(config-if)i=ip ospf priority 1
D.
Answer:
B
Questions 41
B)
A)
44
C) Option A
B.
Option B
C.
Option C
D.
Option D
D)
Show Answer Buy Now
Answer:
D
Questions 42
Options:
All traffic enters the CPE router from interface Serial0/3 with an IP
A. address of 192 168 50 1 Web traffic from the WAN is destined for a
45
LAN network where servers are load-balanced An IP packet with a
destination address of the HTTP virtual IP of 192 1681 250 must be
forwarded Which routing table entry does the router use?
Options:
A.
B. Drag and drop the prefix lengths from the left onto the
corresponding prefixes on the right Not all prefixes are used
192.168.1.128/25 via 192.168.13.3
Options:
C.
Show Answer Buy Now
192.168.1.192/26 via 192.168.14.4
Answer:
D.
Answer:
192.168.1.224/27 via 192.168.15.5
see the answer below.
Show Answer Buy Now
Explanation:
Answer:
Explanation:
B
Questions 43
46
Options:
A.
B.
Answer:
C
Questions 45
47
B. An engineer has started to configure replacement switch SW1. To
verify part of the configuration, the engineer issued the commands
constructs a routing table based on a routing protocol
as shown and noticed that the entry for PC2 is missing. Which
C. change must be applied to SW1 so that PC1 and PC2 communicate
provides CLI access to the network device normally?
D. A)
D)
Options:
A.
48
Option A B.
B. reflection
Option B C.
C. teardrop
Option C D.
D. amplification
49
Show Answer Buy Now aggregatable global address
Answer: D.
Answer:
B
Questions 50
Questions 49 A Cisco engineer is configuring a factory-default router with these
A network engineer is installing an IPv6-only capable device. The three passwords:
client has requested that the device IP address be reachable only • The user EXEC password for console access is p4ssw0rd1
from the internal network. Which type of IPv6 address must the
• The user EXEC password for Telnet access is s3cr3t2
engineer assign?
Options: • The password for privileged EXEC mode is pnv4t3p4ss Which
command sequence must the engineer configured
A.
A)
unique local address
B.
link-local address
C.
50
D)
Options:
A.
B)
Option A
B.
Option B
C.
Option C
D.
C)
Option D
Answer:
B
Questions 51
51
Options: Questions 52
A. What is a requirement for nonoverlapping Wi-Fi channels?
configuration C.
52
Configure the ip helper-address 172.16.2.2 command under interface
Gi0/0
D.
Answer:
C
Questions 54
An engineer is configuring a new router on the network and applied
Refer to the exhibit.
this configuration. Which additional configuration allows the PC to
obtain its IP address from a DHCP server?
Options:
A.
B.
C.
53
ipv6 address 2001:DB8:0:1:C601:42FE:800F:7/64
C.
D.
Answer:
A
Questions 55
Options: B.
B.
54
integrates with a RADIUS server to enforce Layer 2 device D.
authentication rules
Custom applications are needed to configure network devices
D.
Show Answer Buy Now
correlates user activity with network events
Answer:
Show Answer Buy Now
B
Answer: Questions 57
D
Refer to the exhibit.
Questions 56
B.
C.
55
An engineer built a new L2 LACP EtherChannel between SW1 and An engineer must configure R1 for a new user account. The account
SW2 and executed these show commands to verify the work. Which must meet these requirements:
additional task allows the two switches to establish an LACP port
* It must be configured in the local database.
channel?
* The username is engineer.
Options:
* It must use the strongest password configurable. Which command
A.
must the engineer configure on the router?
Change the channel-group mode on SW2 to auto
Options:
B.
A.
Change the channel-group mode on SW1 to desirable.
R1 (config)# username engineer2 algorithm-type scrypt secret
C. test2021
56
Show Answer Buy Now Questions 60
B
Questions 59
B.
fragmenting and reassembling packets Which route must be configured on R1 so that OSPF routing is used
C. when OSPF is up. but the server is still reachable when OSPF goes
down?
making routing decisions
Options:
D.
A.
forwarding packets
ip route 10.1.1.10 255.255.255.255 172.16.2.2 100
Show Answer Buy Now
B.
Answer:
ip route 10.1.1.0 255.255.255.0 gi0/1 125
D
C.
57
ip route 10.1.1.0 255.255.255.0 172.16.2.2 100
D.
C.
D.
58
Questions 62 Answer:
Drag and drop the descriptions of AAA services from the left onto
the corresponding services on the right.
Questions 63
Answer:
59
Users on existing VLAN 100 can reach sites on the Internet. Which
action must the administrator take to establish connectivity to the
Internet for users in VLAN 200?
Options:
A.
B.
Configure the ip nat outside command on another interface for • SW1 is fully configured for all traffic
VLAN 200.
• The SW4 and SW9 links to SW1 have been configured
D.
• The SW4 interface Gi0/1 and Gi0/0 on SW9 have been configured
Update the NAT INSIDF RANGFS ACL
• The remaining switches have had all VLANs adde d to their
Show Answer Buy Now VLAN database
60
B)
D)
C)
Options:
A.
61
Option A A)
B.
Option B
C.
Option C
B)
D.
Option D
Answer:
C)
C
Questions 65
62
A. B.
Option A authenticator
B. C.
Option B username
C. D.
Option C password
Option D Answer:
Show Answer Buy Now D
Answer: Questions 67
Questions 66
authorized services
63
Web traffic is coming in from the WAN interface. Which route takes name on the router. Which additional command must the engineer
precedence when the router is processing traffic destined for the configure before entering the command to generate the RSA key?
LAN network at 10 0.10.0/24? Options:
Options:
A.
A.
password password
via next-hop 10.0.1.5
B.
B.
crypto key generate rsa modulus 1024
via next-hop 10 0 1.4
C.
C.
ip domain-name domain
via next-hop 10.0 1.50
D.
D.
ip ssh authentication-retries 2
via next-hop 10.0 1 100
Show Answer Buy Now
Show Answer Buy Now
Answer:
Answer:
C
A Explanation:
Questions 68
Explanation:
A network engineer is configuring a switch so that it is remotely
reachable via SSH. The engineer has already configured the host
64
https://www.cisco.com/c/en/us/solutions/small-b usiness/resource- Drag and drop the statements about networking from the left onto
center/networking/how-to-setup-network-switch.html the corresponding networking types on the right.
Questions 69
Which QoS per-hop behavior changes the value of the ToS field in
the IPv4 packet header?
Options:
A.
shaping
B.
classification
Options:
C.
Show Answer Buy Now
policing
Answer:
D.
marking
Answer:
D
Questions 70
65
Answer:
Explanation:
Explanation:
A
picture containing table Description automatically generated
Questions 71
66
A. RSA token
B.
67
Options:
A.
B.
anycast address
Options: C.
Answer: D.
Answer:
B
Questions 75
Questions 74 Options:
A.
Which type of IPv6 address is similar to a unicast address but is
assigned to multiple devices on the same network at the same time? to configure an Interface as a DHCP server
68
B.
C.
D.
D Answer:
Questions 76
Answer:
An engineer is tasked to configure a switch with port security to
ensure devices that forward unicasts multicasts and broadcasts are
unable to flood the port The port must be configured to permit only
two random MAC addresses at a time Drag and drop the required
configuration commands from the left onto the sequence on the right
Not all commands are used.
69
Explanation: transport input telnet
Explanation: B.
C.
ip ssh pubkey-chain
Diagram
D.
Description automatically generated
Questions 77 login console
E.
Refer to the exhibit.
username cisco password 0 Cisco
Answer:
B, E
Questions 78
Which two commands must be configured on router R1 to enable An engineer is configuring remote access to a router from IP subnet
the router to accept secure remote-access connections? (Choose two) 10.139.58.0/28. The domain name, crypto keys, and SSH have been
configured. Which configuration enables the traffic on the
Options:
destination router?
A.
A)
70
B) Options:
A.
Option A
B.
Option B
C.
C)
Option C
D.
Option D
D) Answer:
B
Questions 79
71
Which two spanning-tree states are bypassed on an interface running Drag and drop the threat-mitigation techniques from the left onto the
PortFast? (Choose two.) types of threat or attack they mitigate on the right.
Options:
A.
disabled
B.
listening Options:
forwarding Answer:
D. Answer:
learning
E.
blocking
72
192.168.2.0/24
C.
207.165.200.0/24
D.
192.168.1.0/24
Graphical user interface,
text, application, email Description automatically generated Show Answer Buy Now
Questions 81 Answer:
Refer to the exhibit. B
Questions 82
172.16.0.0/16
B.
73
C.
GigabitEthernet0/2
D.
GigabitEthernet0/3
Answer:
B
Questions 83
Router R1 resides in OSPF Area 0. After updating the R1 Drag and drop the functions of SNMP fault-management from the
configuration to influence the paths that it will use to direct traffic, left onto the definitions on the right.
an engineer verified that each of the four Gigabit interfaces has the Options:
same route to 10.10.0.0/16. Which interface will R1 choose to send
Show Answer Buy Now
traffic to reach the route?
Options: Answer:
A. Answer:
GigabltEthornet0/1 Explanation:
74
Traffic sourced from the loopback0 Interface is trying to connect via
ssh to the host at 10.0.1.15. What Is the next hop to the destination
address?
Options:
A.
192.168.0.7
B.
Table
192.168.0.4
Description automatically generated
C.
Questions 84
192.168.0.40
Refer to the exhibit.
D.
192.168.3.5
75
Answer: Questions 86
B What is a DHCP client?
Questions 85 Options:
VLAN DSCP It allows neighbors to share routing table information between each
C. other.
VLAN tagging D.
10.10.13.0/24
Answer:
C
Questions 90
0.0.0.0/0 D.
78
A leaf switch can be added with connections to every spine switch Spine (aggregation) switches are used to connect to all leaf switches
and are typically deployed at the end or middle of the row. Spine
Show Answer Buy Now
switches do not connect to other spine switches.
Answer: Questions 91
D
When implementing a router as a DHCP server, which two features
Explanation: must be configured'? (Choose two)
Explanation: Options:
Leaf (aggregation) switches are what provide devices access to the database agent
fabric (the network of spine and leaf switches) and are typically C.
deployed at the top of the rack. Generally, devices connect to the
address pool
leaf switches.
D.
Devices can include servers, Layer 4-7 services (firewalls and load
balancers), and WAN or Internet routers. Leaf switches do not smart-relay
connect to other leaf switches. In spine-and-leaf architecture, every
E.
leaf should connect to every spine in a full mesh.
manual bindings
79
Answer: Questions 93
C, E Which technology is appropriate for communication between an
Questions 92 SDN controller and applications running over the network?
Options:
What is the function of a hub-and-spoke WAN topology?
Options: A.
A. OpenFlow
B.
allows access restrictions to be implemented between subscriber
sites. REST API
B. C.
80
access-list 100 deny tcp host 172.16.1.33 any eq 23 access-list 100
permit ip any any
D.
A. B
access-list 100 deny tcp host 172.16.1.33 any eq 22 access-list 100 Questions 95
permit ip any any In software-defined architecture, which place handles switching for
interface GigabitEthernet0/0 ip access-group 100 in traffic through a Cisco router?
B.
Options:
A.
access-list 100 deny tcp host 172.16.1.33 any eq 22 access-list 100
permit ip any any Control
C. Management
81
C. A.
D. B.
C D.
Data plane—Handles all the data traffic. The basic functionality of a Answer:
Cisco NX-OS device is to forward packets from one interface to
D
another. The packets that are not meant for the switch itself are
called the transit packets. These packets are handled by the data Explanation:
plane Explanation:
Questions 96
Although the spanning-tree vlan 10 root primary command will
Which configuration ensures that the switch is always the root for ensure a switch will have a bridge priority value lower than other
VLAN 750? bridges introduced to the network, the spanning-tree vlan 10 priority
0 command ensures the bridge priority takes precedence over all
Options:
other priorities.
82
Questions 97
Options:
Refer to the exhibit. All routers in the network are configured R2 A.
must be the DR. After the engineer connected the devices, R1 was
Option A
elected as the DR. Which command sequence must be configure on
R2 to Be elected as the DR in the network? B.
Option B
C.
Option C
D.
Option D
83
Show Answer Buy Now Answer:
Answer: D
Questions 99
B
Questions 98 Refer to the exhibit.
B.
prompts the user to specify the desired IP address Which switch becomes the root bridge?
C. Options:
continuously attempts to resolve the URL until the command is A.
cancelled
S1
D.
B.
sends a broadcast message in an attempt to resolve the URL
S2
Show Answer Buy Now
C.
84
S3 BPDUguard
S4 Answer:
Show Answer Buy Now B
Answer: Explanation:
B Explanation:
Which spanning-tree enhancement avoids the learning and listening Spanning Tree Portfast causes layer 2 switch interfaces to enter
states and immediately places ports in the forwarding state? forwarding state immediately, bypassing the listening and learning
Options: states. It should be used on ports connected directly to end hosts like
servers or workstations. Note: If portfast isn’t enabled, DHCP
A.
timeouts can occur while STP converges, causing more problems.
BPDUfilter https://s kminhaj.wordpress.com/2015/03/04/spanning-tree-stp-rstp-
B. mst-enhancements/
PortFast
Questions 101
C. Drag and drop the SNMP manager and agent identifier commands
from the left onto the functions on the right
Backbonefast
D.
85
Options:
Show Answer Buy Now
Answer: If OSPF Is running on this network, how does Router2 handle traffic
from Site B to 10.10.13.128/25 at Site A?
Answer:
Options:
A.
B.
C.
Questions 102
It sends packets out of interface FaO/2.
Refer to the exhibit.
D.
86
It sends packets out of interface Fa0/1. D
Show Answer Buy Now Questions 104
Answer: What event has occurred if a router sends a notice level message to a
syslog server?
B
Options:
Questions 103
A.
What does physical access control regulate?
A TCP connection has been torn down
Options:
B.
A.
An ICMP connection has been built
access to spec fie networks based on business function
C.
B.
An interface line has changed status
access to servers to prevent malicious activity
D.
C.
A certificate has expired.
access :o computer networks and file systems
Show Answer Buy Now
D.
Answer:
access to networking equipment and facilities
C
Show Answer Buy Now
Questions 105
Answer:
87
How is the native VLAN secured in a network? A.
separate from other VLANs within the administrative domain Both support runs of up to 55 meters.
B. C.
give it a value in the private VLAN range Both support runs of up to 100 meters.
C. D.
configure it as a different VLAN ID on each end of the link Both support speeds up to 10 Gigabit.
Show Answer Buy Now Show Answer Buy Now
Answer: Answer:
A C, D
Questions 106 Questions 107
What are two similarities between UTP Cat 5e and Cat 6a cabling? Which 802.11 frame type is association response?
(Choose two.)
Options:
Options:
A.
88
management redundancy
B. B.
C. C.
D. D.
action service
Answer: Answer:
A C
Explanation: Questions 109
Reference: [Reference: Which two outcomes are predictable behaviors for HSRP? (Choose
https://en.wikipedia.org/wiki/802.11_Frame_Types, , ] two.)
Questions 108 Options:
89
B. Options:
The two routers negotiate one router as the active router and the A.
other as the standby router It supports numerous extensibility options including cross-domain
C. adapters and third-party SDKs.
Each router has a different IP address, both routers act as the default B.
gateway on the LAN, and traffic is load-balanced between them It supports high availability for management functions when
D. operating in cluster mode.
The two routers share a virtual IP address that is used as the default C.
gateway for devices on the LAN It enables easy autodiscovery of network elements m a brownfield
E. deployment.
The two routers share the same interface IP address and default D.
gateway traffic is load-balanced between them It is designed primarily to provide network assurance.
Show Answer Buy Now Show Answer Buy Now
Answer: Answer:
B, D A
Questions 110 Questions 111
What is an advantage of Cisco DNA Center versus traditional Drag and drop the 802.11 wireless standards from the left onto the
campus device management? matching statements on the right
90
In which two ways does a password manager reduce the chance of a
hacker stealing a users password? (Choose two.)
Options:
A.
Options: B.
Show Answer Buy Now It uses an internal firewall to protect the password repository from
unauthorized access.
Answer:
C.
Answer:
It protects against keystroke logging on a compromised device or
web site.
D.
E.
91
Answer: Explanation:
C, E Explanation:
92
configure ports as access ports Answer:
Below are the 3 cloud supporting services cloud providers provide In general, IaaS provides hardware so that an organization can
94
Answer: D.
C DNS
Explanation: Show Answer Buy Now
Explanation:
Answer:
Administrative distance is the feature used by routers to select the
A
best path when there are two or more different routes to the same
destination from different routing protocols. Administrative distance Questions 119
defines the reliability of a routing protocol. What is a function of the Cisco DNA Center Overall Health
Questions 118 Dashboard?
Options:
On workstations running Microsoft Windows, which protocol
provides the default gateway for the device? A.
DHCP It provides detailed activity logging for the 10 devices and users on
B. the network.
STP C.
95
It summarizes daily and weekly CPU usage for servers and It is flooded out every port except G0/0.
workstations in the network.
C.
Show Answer Buy Now
It drops the frame.
Answer: D.
A It forwards it out interface G0/2 only.
Questions 120
Show Answer Buy Now
Refer to the exhibit.
Answer:
B
Questions 121
96
C. D.
establishes a secure tunnel between two branch sites be a marking mechanism that identifies different flows
A.
Two)
Options:
to mitigate delays over slow links
A.
B.
builds a flat structure of DNS names for more efficient IP operations
to provide fair queuing for buffered flows
B.
C.
encrypts network Traffic as it travels across a WAN by default
to limit the bandwidth that a flow can use to
C.
97
improves security by protecting IP addresses under Fully Qualified switch(config)#spanning-tree portfast bpduguard default
Domain Names (FQDNs)
C.
D.
switch(config-if)#spanning-tree portfast trunk
enables applications to identify resources by name instead of IP
D.
address
switch(config-if)#no spanning-tree portfast
E.
Show Answer Buy Now
allows a single host name to be shared across more than one IP
address Answer:
A. B.
switch(config)#spanning-tree portfast default The Layer 2 switch floods packets to all ports except the receiving
port in the given VLAN.
B.
98
C.
D.
The Layer 2 switch forwards the packet and adds the destination
MAC address to its MAC address table
Answer:
B
Explanation:
Explanation: A network engineer must configured communication between PC A
and the File Server. To prevent interruption for any other
If the destination MAC address is not in the CAM table (unknown
destination MAC address), the switch sends the frame out all other communications, which command must be configured?
ports that are in the same VLAN as the received frame. This is Options:
called flooding. It does not flood the frame out the same port on
A.
which the frame was received.
Switch trunk allowed vlan 12
Questions 126
B.
Refer to the exhibit.
Switchport trunk allowed vlan none
99
C. SMTP
D. ARP
Switchport trunk allowed vlan remove 10-11 Show Answer Buy Now
A network engineer must back up 20 network router configurations SNMP is an application-layer protocol that provides a message
globally within a customer environment. Which protocol allows the format for communication between SNMP managers and agents.
engineer to perform this function using the Cisco IOS MIB? SNMP provides a standardized framework and a common language
Options: used for the monitoring and management of devices in a
network.The SNMP framework has three parts:+ An SNMP
A.
manager+ An SNMP agent+ A Management Information Base
CDP (MIB)The Management Information Base (MIB) is a virtual
information storage area for network management information,
B.
which consists of collections of managed objects.With SNMP, the
SNMP network administrator can send commands to multiple routers to do
the backup
C.
Questions 128
100
How does CAPWAP communicate between an access point in local Refer to the exhibit.
mode and a WLC?
Options:
A. Which route type does the routing protocol Code D represent in the
The access point must directly connect to the WLC using a copper output?
cable Options:
B. A.
The access point must not be connected to the wired network, as it internal BGP route
would create a loop
B.
C.
/24 route of a locally configured IP
The access point must be connected to the same switch as the WLC
C.
D.
statically assigned route
The access point has the ability to link to any switch in the network,
D.
assuming connectivity to the WLC
route learned through EIGRP
Show Answer Buy Now
Show Answer Buy Now
Answer:
Answer:
D
D
Questions 129
101
Questions 130 D.
Answer:
A
Questions 131
B.
C.
102
Which configuration issue is preventing the OSPF neighbor
relationship from being established between the two routers?
Options:
A.
B.
C.
D.
Answer:
D
Questions 132
103
D.
Answer:
A
Questions 133
Refer to Exhibit.
Shortly after SiteA was connected to SiteB over a new single-mode
fiber path users at SiteA report intermittent connectivity issues with
applications hosted at SiteB What is the cause of the intermittent
connectivity issue?
Options:
A.
Which action do the switches take on the trunk link?
Interface errors are incrementing
Options:
B.
A.
An incorrect SFP media type was used at SiteA
The trunk does not form and the ports go into an err-disabled status.
C.
B.
High usage is causing high latency
104
The trunk forms but the mismatched native VLANs are merged into For example with the above configuration, SW1 would send
a single broadcast domain. untagged frames for VLAN 999. SW2 receives them but would
think they are for VLAN 99 so we can say these two VLANs are
C.
merged.
The trunk does not form, but VLAN 99 and VLAN 999 are allowed
Questions 134
to traverse the link.
What is a function of TFTP in network operations?
D.
Options:
The trunk forms but VLAN 99 and VLAN 999 are in a shutdown
state. A.
Show Answer Buy Now transfers a backup configuration file from a server to a switch using
a username and password
Answer:
B.
B
transfers files between file systems on a router
Explanation:
C.
Explanation:
transfers a configuration files from a server to a router on a
The trunk still forms with mismatched native VLANs and the traffic
congested link
can actually flow between mismatched switches. But it is absolutely
necessary that the native VLANs on both ends of a trunk link match; D.
otherwise a native VLAN mismatch occurs, causing the two VLANs transfers IOS images from a server to a router for firmware upgrades
to effectively merge.
Show Answer Buy Now
105
Answer: Show Answer Buy Now
D Answer:
Explanation:
D
Explanation:
Questions 136
TFTP is mostly used (Firmware upgrade) whereby the admin have
Drag and drop the Cisco Wireless LAN Controller security settings
the IOS image on one device and uses TFTP to load the image to all
from the left onto the correct security mechanism categories on the
other devices quickly.
right.
Questions 135
SSID
B.
Options:
radio
Show Answer Buy Now
C.
Answer:
band
D.
Layer 2
106
Answer: Show Answer Buy Now
Answer:
C
Explanation:
Explanation:
IKEv1
C.
D.
Options:
A.
MD5
107
All ARP packets are dropped by the switch Telnet
B. B.
C. C.
All ingress and egress traffic is dropped because the interface is HTTP
untrusted
D.
D.
HTTPS
The switch discard all ingress ARP traffic with invalid MAC-to-IP
E.
address bindings.
TFTP
Show Answer Buy Now
Show Answer Buy Now
Answer:
Answer:
D
A, C
Questions 139
Questions 140
Which two protocols must be disabled to increase security for
management connections to a Wireless LAN Controller? (Choose Which port type supports the spanning-tree portfast command
two ) without additional configuration?
Options: Options:
A. A.
108
access ports The highest up/up physical interface IP address is selected as the
router ID.
B.
C.
Layer 3 main Interfaces
The lowest IP address is incremented by 1 and selected as the router
C.
ID.
Layer 3 suninterfaces
D.
D.
The router ID 0.0.0.0 is selected and placed in the OSPF process.
trunk ports
Show Answer Buy Now
Show Answer Buy Now
Answer:
Answer:
B
A
Questions 142
Questions 141
Which action does the router take as rt forwards a packet through the
What is the effect when loopback interfaces and the configured network?
router ID are absent during the OSPF Process configuration?
Options:
Options:
A.
A.
The router replaces the source and desinaoon labels wth the sending
No router ID is set, and the OSPF protocol does not run. router uterface label as a source and the next hop router label as a
B. desbnabon
109
B. Options:
the sending router P address as the source and the neighbor IP bridge
address as the destination
B.
C.
route
The router replaces the original source and destination MAC
C.
addresses with the sending router MAC address as the source and
neighbor MAC address as the destination autonomous
D. D.
The router encapsulates the original packet and then includes a tag lightweight
that identifies the source router MAC address and transmit
Show Answer Buy Now
transparently to the destination
110
point-to-multipoint Which action must be taken to assign a global unicast IPv6 address
on an interface that is derived from the MAC address of that
B.
interface?
point-to-point
Options:
C.
A.
broadcast
configure a stateful DHCPv6 server on the network
D.
B.
nonbroadcast
enable SLAAC on an interface
Show Answer Buy Now
C.
Answer: disable the EUI-64 bit process
C D.
Explanation:
explicitly assign a link-local address
Explanation:
Show Answer Buy Now
https://www.oreilly.com/library/view/cisco-ios-
Answer:
cookbook/0596527225/ch08s15.html
A
The Broadcast network type is the default for an OSPF enabled
ethernet interface (while Point-toPoint is the default OSPF network Questions 146
type for Serial interface with HDLC and PPP encapsulation). An organization secures its network with multi-factor authentication
Questions 145 using an authenticator app on employee smartphone. How is the
111
application secured in the case of a user’s smartphone being lost or Questions 147
stolen? What Is the path for traffic sent from one user workstation to another
Options: workstation on a separate switch In a Ihree-lter architecture model?
A. Options:
112
Options: RADIUS is most appropriate for dial authentication, but TACACS+
A. can be used for multiple types of authentication
B.
management-plane
B Answer:
Questions 149 C
113
A. Router R1 is running three different routing protocols. Which route
characteristic is used by the router to forward the packet that it
ip route 10.10.1.0 255.255.255.240 10.10.255.1
receives for destination IP 172.16.32.1?
B.
Options:
ip route 10.10.1.16 255.255.255.252 10.10.255.1
A.
C.
longest prefix
ip route 10.10.1.20 255.255.255.252 10.10.255.1
B.
D.
metric
ip route 10.10.1.20 255.255.255.254 10.10.255.1
C.
Show Answer Buy Now
cost
Answer: D.
C administrative distance
Questions 151
Show Answer Buy Now
Refer to the exhibit.
Answer:
A
Explanation:
Explanation:
114
https://learningnetwork.cisco.com/s/question/0D53i00000KszSlCAJ What are two recommendations for protecting network ports from
/ad ministrative-distance-vs-longest-match-rule being exploited when located in an office space outside of an IT
Questions 152 closer? (Choose two.)
Options:
Where does a switch maintain DHCP snooping information?
A.
Options:
enable the PortFast feature on ports
A.
B.
in the MAC address table
implement port-based authentication
B.
C.
in the CAM table
configure static ARP entries
C.
D.
in the binding database
configure ports to a fixed speed
D.
E.
in the frame forwarding database
shut down unused ports
Show Answer Buy Now
Show Answer Buy Now
Answer:
C Answer:
Questions 153 B, E
115
Questions 154 Explanation:
Which two must be met before SSH can operate normally on a Cisco Reference: [Reference:
IOS switch? (Choose two) https://www.cisco.com/c/en/us/support/docs/security-vpn/secure-shell-
Options: ssh/4145-ssh.html, , ]
Questions 155
A.
An engineer must establish a trunk link between two switches. The
The switch must be running a k9 (crypto) IOS image
neighboring switch is set to trunk or desirable mode. What action
B. should be taken?
The Ip domain-name command must be configured on the switch Options:
C. A.
D. B.
A console password must be configured on the switch configure switchport mode dynamic desirable
E. C.
Telnet must be disabled on the switch configure switchport mode dynamic auto
116
Answer: Questions 157
C Refer to the exhibit.
Questions 156
B.
B C.
117
floating static route C.
D. 172.16.15.10
network route D.
B Answer:
Questions 158 C
Refer to the exhibit. Explanation:
Explanation:
OSPF uses the following criteria to select the router ID:1. Manual
configuration of the router ID (via the “router-id x.x.x.x” command
under OSPF router configuration mode).2. Highest IP address on a
What does router R1 use as its OSPF router-ID? loopback interface.3. Highest IP address on a non-loopback and
Options: active (no shutdown) interface.
A. Questions 159
10.10.1.10 When a WLAN with WPA2 PSK is configured in the Wireless LAN
Controller GUI which format is supported?
B.
Options:
10.10.10.20
118
A. B.
B. C.
C. D.
D. E.
Answer: Answer:
D C, D
Questions 160 Questions 161
Which two primary drivers support the need for network Which WPA3 enhancement protects against hackers viewing traffic
automation? (Choose two.) on the Wi-Fi network?
Options: Options:
A. A.
119
B. There is a speed mismatch
AES encryption C.
SAE encryption E.
D Answer:
Questions 162 B, E
The SW1 interface g0/1 is in the down/down state. Which two Questions 163
configurations are valid reasons for the interface conditions?(choose
Refer to Exhibit.
two)
Options:
A.
B.
How does SW2 interact with other switches in this VTP domain?
120
Options: Reference: [Reference: https://www.cisco.com/c/en/us/support/docs/lan-
Answer: D.
C static routing
Explanation: E.
dynamic routing
121
Show Answer Buy Now
Answer:
A, C
Questions 165
Answer:
Drag and drop the descriptions of file-transfer protocols from the left
onto the correct protocols on the right. Questions 166
Options: B.
Answer: C.
D.
122
Show Answer Buy Now B.
Answer: provides a direct connection for hosts from outside of the enterprise
network
D
C.
Explanation:
ensures that NAT is not required to reach the internet with private
Explanation:
range addressing
Forward time : Determines how long each of the listening and
D.
learning states last before the port begins forwarding.
enables secure communications to the internet for all external hosts
Switch(config)# [ no ] spanning-tree vlan vlan_ID forward-time
forward_timeConfigures the forward time of a VLAN. The Show Answer Buy Now
forward_time value can be from 4 to 30 seconds.
Answer:
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/
A
12-2/15-02SG/configuration/guide/config/spantree.html#56177
Questions 168
Questions 167
What is a characteristic of a SOHO network?
Which function does the range of private IPv4 addresses perform?
Options:
Options:
A.
A.
connects each switch to every other switch in the network
allows multiple companies to each use the same addresses without
conflicts B.
123
enables multiple users to share a single broadband connection C.
C. dual-homed branches
D. static routing
single-homed branches B.
124
TCP uses two-dimensional parity checks, checksums, and cyclic Show Answer Buy Now
redundancy checks and UDP uses retransmissions only.
Answer:
C.
Answer:
TCP uses checksum, parity checks, and retransmissions, and UDP
uses acknowledgements only.
D.
Answer: Explanation:
A
Questions 171
Drag and drop the IPv6 address type characteristics from the left to
the right.
Options:
125
B.
full mesh
C.
point-to-point
D.
hub-and-spoke
Answer:
C
Questions 173
Graphical user interface, application Description automatically
generated When configuring a WLAN with WPA2 PSK in the Cisco Wireless
Questions 172 LAN Controller GUI, which two formats are available to select?
(Choose two)
Which WAN topology provides a combination of simplicity quality,
Options:
and availability?
Options: A.
A. ASCII
B.
partial mesh
126
base64
C.
binary
127
D provide secure user logins to devices on the network.
Explanation: Show Answer Buy Now
Explanation: Answer:
Note : Already a statement is there in last to allow SSH Traffic for A
network 10.20.1.0 0.0.0.127, but Second statement says deny ip any
Questions 176
10.20.1.0 0.0.0.255, so how it will work once it is denied. So the
right answer is remove the --- no access-list 2699 deny ip any What is a DHCP client?
10.20.1.0 0.0.0.255. Options:
Questions 175
A.
What is a role of wireless controllers in an enterprise network? a host that is configured to request an IP address automatically
Options:
B.
A.
a server that dynamically assigns IP addresses to hosts
centralize the management of access points in an enterprise network
C.
B.
a workstation that requests a domain name associated with its IP
support standalone or controller-based architectures address
C. D.
serve as the first line of defense in an enterprise network a rooter that statically assigns IP addresses to hosts
128
Answer: Explanation:
Which virtual MAC address is used by VRRP group 1? 00-00-5E-00-01-{VRID} (in hex in internet standard bit-order)
0050.0c05.ad81 Options:
B. A.
0007.c061.bc01 Virtual machines are responsible for managing and allocating host
hardware resources
C.
B.
0000.5E00.0101
In a virtual machine environment, physical servers must run one
D.
operating system at a time.
0500.3976.6401
C.
Show Answer Buy Now
Virtual machines are the physical hardware that support a virtual
Answer: environment.
C D.
Explanation:
129
Virtual machines are operating system instances that are decoupled
from server hardware
D)
Options:
A.
Option
130
Option B.
D. object
Option C.
Answer: D.
A string
array
131
D)
Options:
A.
Option A
B.
SW1 supports connectivity for a lobby conference room and must be
secured. The engineer must limit the connectivity from PCI lo ma Option B
SW1 and SW2 network. The MAC addresses allowed must be C.
Limited to two. Which configuration secures the conference room
Option C
connectivity?
D.
A)
Option D
132
Refer to the exhibit. In the Advanced configuration, set the DTIM value to 125.
Answer:
C
A network engineer is configuring a WLAN to connect with the Questions 183
172.16.10.0/24 network on VLAN 20. The engineer wants to limit
Refer to the exhibit.
the number of devices that connect to the WLAN on the USERWL
SSID to 125. Which configuration must the engineer perform on the
WLC?
Options:
A.
B.
C.
D.
133
Options:
Show Answer Buy Now
Answer:
Answer:
134
D.
10.165 20.226
Answer:
D
Questions 185
135
LC to LC D
Show Answer Buy Now Questions 187
136
What does a switch search for in the CAM table when forwarding a A switch searches for the destination MAC address and the
frame? destination port in the CAM table when forwarding a frame. The
Options: CAM table, or content addressable memory table, is a data structure
that stores the MAC addresses of the devices connected to the
A.
switch ports and their associated VLANs. The switch uses the CAM
source MAC address and aging time table to make layer 2 forwarding decisions based on the destination
MAC address of a frame. When a frame arrives at a switch port, the
B.
switch first learns the source MAC address and the source port of
destination MAC address and flush time the frame and updates the CAM table accordingly. Then, the switch
C.
looks up the destination MAC address of the frame in the CAM
table and finds the corresponding destination port. If there is a
source MAC address and source port match, the switch forwards the frame out of that port only. If there is
D. no match, the switch floods the frame out of all ports except the
source port123.
destination MAC address and destination port
References:
Show Answer Buy Now
• 1: Why is the CAM table in a switch called CAM table and not
Answer:
MAC table even though it holds MAC addresses?
D • 2: ARP and CAM Table
Explanation: • 3: The CAM Table or MAC address Table
137
Options:
Show Answer Buy Now Table Description
automatically generated
Answer:
Questions 190
Answer:
A switch is a forwarding a frame out of an interfaces except the
interface that received the frame. What is the technical term for this
process?
Options:
A.
ARP
B.
Explanation:
CDP
Explanation:
C.
138
flooding
D.
multicast D)
Answer:
C
Options:
Questions 191
A.
Refer to the exhibit. A multivendor network exists and the company
Option A
is implementing VoIP over the network for the first time.
B.
A)
Option B
C.
Option C
B)
D.
Option D
139
B Refer to the exhibit.
Questions 192
B.
A network engineer started to configure two directly-connected
It passes unicast communication between hosts in a network routers as shown. Which command sequence must the engineer
configure on R2 so that the two routers become OSPF neighbors?
C.
A)
It transmits broadcast traffic between devices in the same VLAN
D.
140
Options:
A.
Option A
B.
Option B
C.
Options:
Option C
Show Answer Buy Now
D.
Answer:
Option D
Answer:
Show Answer Buy Now
Answer:
D
Questions 194
Drag and drop the WLAN components from the left onto the
component details on the right.
141
Questions 195 D
Refer to the exhibit. Questions 196
metric device.
B. C.
Answer:
B
Questions 198
B.
C.
SW4, because its priority is highest and its MAC address is lower Options:
Answer:
143
Answer: router-on-a-stick
Answer:
A
Questions 200
Drag and drop the configuration management terms from the left
onto the descriptions on the right. Not all terms are used.
Questions 199
full mesh
B.
Point-to-point
C. Options:
D. Answer:
144
Answer: C.
D.
Answer:
A
Questions 202
Questions 201
145
A network administrator configures an interface control re switch so Option B
that it connects to interface Gi1/0/1 on switch Cat9300-1. Which
C.
configuration must be applied to the new interface?
Option C
A)
D.
Option D
Answer:
A
C) Questions 203
D)
Options:
A.
Option A
B.
146
C.
D.
Answer:
B
Questions 204
147
D. D.
Answer: Answer:
D D
Questions 205 Questions 206
A packet from a company s branch office is destined to host Which interface IP address serves as the tunnel source for CAPWAP
172.31.0.1 at headquarters. The sending router has three possible packets from the WLC to an AP?
matches in its routing table for the packet prefixes: 172. 31.0 Options:
.0/16.72.31.0.0724. and 172.31 0 0/25. How does the router handle
A.
the packet?
Options: service
A. B.
B. C.
C. D.
148
Show Answer Buy Now B.
Answer: GetNext
C C.
Explanation: Set
Explanation: D.
149
3DES
C.
ESP
D.
TLS
E.
AES
Answer:
D, E How many objects are present in the given JSON-encoded data?
Questions 209 Options:
one
B.
four
C.
seven
150
D. D.
Answer: Answer:
B C
Questions 210 Questions 211
A Cisco engineer notices thai two OSPF neighbors are connected Which 802.11 frame type is Association Response?
using a crossover Ethernet cable. The neighbors are taking too long Options:
to become fully adjacent. Which command must be issued under the
A.
interface configuration on each router to reduce the time required for
the adjacency to reach the FULL state? management
Options: B.
A. control
ip ospf network broadcast C.
B. action
ip ospf dead-interval 40 D.
C. protected frame
ip ospf network point-to-point Show Answer Buy Now
151
Answer: Show Answer Buy Now
A Answer:
Questions 212
A
How does authentication differ from authorization? Questions 213
Options:
In a cloud-computing environment what is rapid elasticity?
A. Options:
Authentication verifies the identity of a person accessing a network, A.
and authorization determines what resource a user can access.
control and monitoring of resource consumption by the tenant
B.
B.
Authentication is used to record what resource a user accesses, and
authorization is used to determine what resources a user can access automatic adjustment of capacity based on need
C. C.
Authentication is used to determine what resources a user is allowed pooling resources in a multitenant model based on need
152
Questions 214 Which configuration on the NewSwitch side of the link meets these
A)
B)
C)
D)
Option C
D.
Option D
Answer: Explanation:
C Explanation:
Questions 215
Drag and drop the characteristic from the left onto the IPv6 address
type on the right.
Options:
Graphical
Show Answer Buy Now
user interface, application Description automatically generated
Answer: Questions 216
154
Which advantage does the network assurance capability of Cisco Show Answer Buy Now
DNA Center provide over traditional campus management?
Answer:
Options:
C
A.
Questions 217
Cisco DNA Center correlates information from different
NO: 346
management protocols to obtain insights, and traditional campus
management requires manual analysis. What must a network administrator consider when deciding whether
to configure a new wireless network with APs in autonomous mode
B.
or APs running in cloud-based mode?
Cisco DNA Center handles management tasks at the controller to
Options:
reduce the load on infrastructure devices, and traditional campus
management uses the data backbone. A.
155
D. TCP encourages out-of-order packet delivery, and UDP prevents re-
ordering.
Autonomous mode APs are easy to deploy and automate than APs in
cloud-based mode. Show Answer Buy Now
B.
TCP uses error detection for packets, and UDP uses error recovery.
156
Options:
A.
B.
Configure the switchport trunk allowed vlan 300 command on A packet sourced from 10.10.10.1 is destined for 10.10.8.14. What
interface Fa0/2 on SW1. is the subnet mask of the destination route?
C. Options:
Configure the switchport trunk allowtd vlan add 300 command on 255.255.255.240
SW1 port-channel 1
C.
Show Answer Buy Now
255.255.255.248
Answer:
D.
B
255.255.255.252
Questions 220
Show Answer Buy Now
Refer to the exhibit.
Answer:
157
B A.
D.
B) Option D
Answer:
C) B
Questions 222
158
B. The P2P blocking action option is disabled on the WLC.
C. A.
D. B.
B D.
Answer:
A
Questions 224
Drag and drop the Ansible terms from the left onto the right.
159
Answer:
Options:
Show Answer Buy Now
LAG
B.
EtherChannel
C.
160
trunk
D.
access
Answer:
C
Questions 226
Which two values does router R1 use to identify valid routes for the
R3 loopback address 1.1.1.3/32? (Choose two.)
Options:
A.
B.
highest metric
161
C. A.
D. B.
E. C.
Answer: policing
162
rate of AF31, AF21, and AF11. This means that R1 is limiting the interface Gi0/0
rate of traffic flow for these three traffic classes .
ipv6 address 2001:db8:1:AFFF::/64 eui-64
References:
C.
• : Cisco CCNA Certification Guide - Chapter 16: Quality of Service interface Gi0/1
(QoS)
ipv6 address
• : Cisco IOS Quality of Service Solutions Configuration Guide -
2001:db8:0F1B:FCCB:ACCE:FCED:ABCD:FA00:/127
Configuring Class-Based Policing
D.
Questions 228
interface Gi0/0
Refer to the exhibit. IPv6 must be implemented on R1 to the ISP
The uplink between R1 and the ISP must be configured with a ipv6 address 2001:db8:0:AFFF::/64 eui-64
manual assignment, and the LAN interface must be self-provisioned
E.
Both connections must use the applicable IPv6 networks Which two
configurations must be applied to R1? (Choose two.) interface Gi0/0
163
What are two disadvantages of a full-mesh topology? (Choose two.) Options:
Options: A.
164
Show Answer Buy Now
Answer:
C
Questions 232
165
Answer:
A
Questions 233
Options:
Show Answer Buy Now
Router OldR is replacing another router on the network with the
intention of having OldR and R2 exchange routes_ After the Answer:
engineer applied the initial OSPF Answer:
configuration: the routes were still missing on both devices. Which C
command sequence must be issued before the clear IP ospf process
Questions 234
command is entered to enable the neighbor relationship?
Drag and drop the characteristic from the left onto the IPv6 address
type on the right.
166
Options: D.
Answer:
D
Explanation:
Answer: Explanation:
B.
REST API
C.
SOAP API
167
B.
Text
Description automatically generated
C.
Switch AccSw2 has just been added to the network along with PC2. All
VLANs have been implemented on AccSw2. How must the ports on
AccSw2 be configured to establish Layer 2 connectivity between PC1
and PC2?
Options:
Text
A. Description automatically generated
D.
Text Description
automatically generated
168
Text Description
automatically generated
Show Answer
Answer:
A
Questions 2
Refer to the exhibit. The Router1 routing table has multiple methods to reach 10.10.10.0/24
as shown. The default Administrative Distance is used. Drag and drop
the network conditions from the left onto the routing methods that
Router1 uses on the right.
169
Options: Options:
Answer: Answer:
Answer: Answer:
Questions 3 Questions 4
Drag and drop the use cases for device-management technologies from
Configure IPv4 and IPv6 connectivity between two routers. For
the left onto the corresponding.
IPv4, use a /28 network from the 192.168.1.0/24 private range. For
IPv6, use the first /64 subnet from the 2001:0db8:aaaa::/48 subnet.
2. For the IPv4 /28 subnet, router R1 must be configured with the
first usable host address.
170
3. For the IPv4 /28 subnet, router R2 must be configured with the Answer:
last usable host address.
Answer:
4. For the IPv6 /64 subnet, configure the routers with the IP
addressing provided from the topology. See the Explanation below.
5. A ping must work between the routers on the IPv4 and IPv6
Explanation:
address ranges.
Explanation:
on R1
config terminal
ipv6 unicast-routing
inter eth0/1
not shut
end
Options:
copy running start
Show Answer Buy Now
on R2
171
config terminal
ipv6 unicast-routing
inter eth0/1
not shut
end
---------------------
172
to the R1 Loopback address sourced from R3. Do not use NVI NAT See the Explanation below.
configuration.
Explanation:
2. Configure R1 as an NTP server and R2 as a client, not as a peer,
using the IP address of the R1 Ethernet0/2 interface. Set the clock on Explanation:
the NTP server for midnight on January 1, 2019.
Answer as below configuration:
3. Configure R1 as a DHCP server for the network 10.1.3.0/24 in a
conf t
pool named TEST. Using a single command, exclude addresses 1-10
from the range. Interface Ethernet0/2 on R3 must be issued the IP R1(config)#ntp master 1
address of 10.1.3.11 via DHCP. R2(config)#ntp server 10.1.2.1
4. Configure SSH connectivity from R1 to R3, while excluding Exit
access via other remote connection protocols. Access for user root
Router#clock set 00:00:00 jan 1 2019
and password Cisco must be set on router R3 using RSA and 1024
bits. Verify connectivity using an SSH session from router R1 using ip dhcp pool TEST
a destination address of 10.1.3.11. Do NOT modify console access
network 10.1.3.0 255.255.255.0
or line numbers to accomplish this task.
ip dhcp exluded-address 10.1.3.1 10.1.3.10
Options:
R3(config)#int e0/3
Show Answer Buy Now
R3(config)#int e0/2
Answer:
ip address dhcp
Answer: no shut
Explanation:
Explanation:
B.
default
C.
testing 1234
174
2. Configure the R2 links with a max value facing R1 and R3. R2
must become the DR. R1 and R3 links facing R2 must remain with
the default OSPF configuration for DR election. Verify the
configuration after clearing the OSPF process.
Options:
Answer:
Answer:
Explanation:
IP connectivity between the three routers is configured. OSPF
adjacencies must be established. Explanation:
1. Configure R1 and R2 Router IDs using the interface IP addresses Answer as below configuration:
from the link that is shared between them.
on R1
175
conf terminal duplex auto
interface Loopback0 !
! router-id 10.10.12.1
! !
no shut ---------------------------------------
interface Ethernet0/1 !
ip ospf 1 area 0 !
176
interface Ethernet0/0 !
interface Ethernet0/2 !
177
interface Ethernet0/2
no shut
ip ospf 1 area 0
duplex auto
router ospf 1
!
Questions 8
178
IP connectivity and OSPF are preconfigured on all devices where
necessary. Do not make any changes to the IP addressing or OSPF.
The company policy uses connected interfaces and next hops when
configuring static routes except for load balancing or redundancy
without floating static. Connectivity must be established between
subnet 172.20.20.128/25 on the Internet and the LAN at
192.168.0.0/24 connected to SW1:
Answer: On R1
On R2: Or
180
Questions 9
Drag and drop the network protocols from the left onto the correct
transport services on the right.
Options:
Answer:
Options:
Answer: Explanation:
Explanation:
Answer:
Questions 10
181
RADIUS server
D.
Answer:
B
Graphical
user interface, application Description automatically generated Questions 12
Questions 11 Physical connectivity is implemented between the two Layer 2
Which device controls the forwarding of authentication requests for switches, and the network connectivity between them must be
182
Answer as below configuration:
On SW1:
conf terminal
vlan 15
exit
exit
interface port-channel 1
vlan 15
Explanation:
183
exit 1 . Configure static routing to ensure RI prefers the path through R2
to
interface range eth0/0 - 1
reach only PCI on R4's LAN
channel-group 1 mode active
2. Configure static routing that ensures traffic sourced from RI will
exit
take
interface port-channel 1
an alternate path through R3 to PCI in the event of an outage along
switchport trunk encapsulation dot1q
the primary path
switchport mode trunk
3. Configure default routes on RI and R3 to the Internet using the
switchport trunk native vlan 15 least number of hops
end Guidelines
copy run start This is a lab item in which tasks will be performed on virtual
Questions 13 devices.
All physical cabling is in place. Router R4 and PCI are fully • Refer to the Tasks tab to view the tasks for this lab item.
configured and • Refer to the Topology tab to access the device console(s) and
inaccessible. R4's WAN interfaces use .4 in the last octet for each perform the tasks.
subnet. • Console access is available for all required devices by clicking the
Configurations should ensure that connectivity is established end-to- device icon or using
end. the tab(s) above the console window.
184
• Do not change the enable password or hostname for any device. Show Answer Buy Now
Explanation:
185
• To configure static routing on R1 that ensures that traffic sourced these default routes, you need to enter the following commands
from R1 will take an alternate path through R3 to PC1 in the event on each router’s console:
of an outage along the primary path, you need to create another
static route for the host 10.0.0.100/8 with a next-hop address of On R1: R1#configure terminal R1(config)#ip route 0.0.0.0 0.0.0.0
40.0.0.2, which is the IP address of R3’s interface connected to R1. 10.0.0.4 R1(config)#end
You also need to assign a higher AD to this route than the AD of On R3: R3#configure terminal R3(config)#ip route 0.0.0.0 0.0.0.0
the primary route, so that it has a lower preference and acts as a 50.0.0.4 R3(config)#end
backup route. For example, you can use an AD of 20 for this route.
Questions 14
This type of static route is also known as a floating static route. To
create this static route, you need to enter the following What is a function of a remote access VPN?
commands on R1’s console:
Options:
186
allows the users to access company internal network resources Answer:
through a secure tunnel
Answer:
Questions 15
Drag and drop the SNMP manager and agent identifier commands Questions 16
from the left onto the functions on the right
Connectivity between four routers has been established. IP
connectivity must be configured in the order presented to complete
the implementation. No dynamic routing protocols are included.
187
Answer:
Explanation:
Explanation:
1.- on R3
config terminal
end
2.- on R2
config terminal
Answer: 3.- on R2
188
config terminal input errors
end Answer:
copy running start
D, E
Questions 17
Explanation:
A frame that enters a switch fails the Frame Check Sequence. Which
two interface counters are incremented? (Choose two) Explanation:
A.
device might receive a frame whose bits have changed values. These
frames do not pass the error detection logic as implemented in the
runts FCS field in the Ethernet trailer. The receiving device discards the
B. frame and counts it as some kind of input error.
giants Cisco switches list this error as a CRC error. Cyclic redundancy
check (CRC) is a term related to how the FCS math detects an error.
C.
The “input errors” includes runts, giants, no buffer, CRC, frame,
frame
overrun, and ignored counts.
D.
The output below show the interface counters with the “show
CRC interface s0/0/0” command:
E.
189
1. Configure VLAN 100 named Compute and VLAN 200 named
Telephony where required for each task.
190
Show Answer Buy Now switchport access vlan 100
Explanation: Vlan 99
enable do wr
Questions 19
conf t
name Compute
vlan 200
name Telephony
int e0/1
191
R5 is the current DR on the network, and R4 is the BDR. Their Option
interfaces are flapping, so a network engineer wants the OSPF
B.
network to elect a different DR and BDR. Which set of
configurations must the engineer implement? Option
A) C.
Option
D.
B) Option
Answer:
C)
D
Questions 20
Options:
A.
Options: relay agent information
A.
192
B.
database agent
C.
address pool
D.
smart-relay
Answer:
C, E
Questions 21
Options:
A.
Option A
193
B. Ethernet0/1 on both sides. The LACP mode must match on both
ends.
Option B
2. Configure the EtherChanneI as a trunk link.
C.
3. Configure the trunk link with 802. Iq tags.
Option C
4. Configure VLAN 'MONITORING' as the untagged VLAN of the
D.
EtherChannel.
Option D
==================
Show Answer Buy Now
Guidelines
Answer:
This is a lab item in which tasks will be performed on virtual
A devices.
• Refer to the Tasks tab to view the tasks for this lab item.
Questions 22
• Refer to the Topology tab to access the device console(s) and
Physical connectivity is implemented between the two Layer 2
perform the tasks.
switches,
• Console access is available for all required devices by clicking the
and the network connectivity between them must be configured.
device icon or using
I . Configure an LACP EtherChanneI and number it as 44; configure
the tab(s) above the console window.
it
• All necessary preconfigurations have been applied.
between switches SWI and SW2 using interfaces EthernetO/O and
• Do not change the enable password or hostname for any device.
194
• Save your configurations to NVRAM before moving to the next
item.
• Click Next at the bottom of the screen to submit this lab and move
to the next question.
Options:
Answer:
195
Answer: channel44 and set the LACP mode to active on both ends. The
LACP mode must match on both ends for the EtherChannel to
196
When configuring a WLAN with WPA2 PSK in the Cisco Wireless Explanation:
LAN Controller GUI, which two formats are available to select?
Reference: [Reference:
(Choose two)
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-
Options: 4/configuration/guides/consolidated/b_cg74_CONSOLIDATED/b_cg74_CO
NSOLIDATED_chapter_01010001.html, , , , ]
A.
Questions 24
ASCII
Which WAN topology provides a combination of simplicity quality,
B.
and availability?
base64
Options:
C.
A.
binary
partial mesh
D.
B.
decimal
full mesh
E.
C.
hexadecimal
point-to-point
Show Answer Buy Now
D.
Answer: hub-and-spoke
197
Answer: allows a single host name to be shared across more than one IP
address
C
Show Answer Buy Now
Questions 25
Answer:
What are two roles of Domain Name Services (DNS)? (Choose
Two) D, E
Options: Questions 26
A. Which switch technology establishes a network connection
builds a flat structure of DNS names for more efficient IP operations immediately when it is plugged in?
B. Options:
C. PortFast
198
Show Answer Buy Now C.
D.
A
GRE
Explanation:
Show Answer Buy Now
Explanation:
Answer:
PortFast is useful to connect hosts and switches to a switch. Access
layer switches are more frequently “plugged in” and “plugged out” B
than distribution or core layer switches. Also, this feature’s target is
Questions 28
just to minimize STP convergence time.
Questions 27 What criteria is used first during me root port selection process?
A. B.
B. C.
199
D. model
B Answer:
Questions 29 C, D
Which two components are needed to create an Ansible script that Questions 30
configures a VLAN on a switch? (Choose two.)
An engineer must configure Interswitch VLAN communication
Options: between a Cisco switch and a third-party switch. Which action
should be taken?
A.
Options:
cookbook
A.
B.
configure IEEE 802.1p
task
B.
C.
configure IEEE 802.1q
playbook
C.
D.
configure ISL
200
D. D.
configure DSCP enables secure communications to the internet for all external hosts
Answer: Answer:
B A
Questions 31 Questions 32
Which function does the range of private IPv4 addresses perform? What are two improvements provided by automation for network
management in an SDN environment? (Choose two)
Options:
Options:
A.
A.
allows multiple companies to each use the same addresses without
conflicts Data collection and analysis tools establish a baseline for the
network
B.
B.
provides a direct connection for hosts from outside of the enterprise
network Artificial intelligence identifies and prevents potential design
failures.
C.
C.
ensures that NAT is not required to reach the internet with private
range addressing
201
Machine learning minimizes the overall error rate when automating
troubleshooting processes
D.
E.
Options:
Answer:
A.
B, E
show ip route
Questions 33
B.
Refer to the exhibit.
show ip interface
C.
show interface
D.
202
Show Answer Buy Now F.
Options: Explanation:
A. Explanation:
outside global NAT use four types of addresses:* Inside local address – The IP
B. address assigned to a host on the inside network. The address is
usually not an IP address assigned by the Internet Network
outsdwde local Information Center (InterNIC) or service provider.This address is
C. likely to be an RFC 1918 private address.* Inside global address – A
legitimate IP address assigned by the InterNIC or service provider
inside global
that represents one or more inside local IP addresses to the outside
D. world.* Outside local address – The IP address of an outside host as
it is known to the hosts on the inside network.* Outside global
insride local
address – The IP address assigned to a host on the outside network.
E. The owner of the host assigns this address.
outside public Questions 35
203
Refer to the exhibit. Answer:
Explanation:
Explanation:
A network administrator must permit SSH access to remotely Note : Already a statement is there in last to allow SSH Traffic for
manage routers in a network. The operations team resides on the network 10.20.1.0 0.0.0.127, but Second statement says deny ip any
10.20.1.0/25 network. Which command will accomplish this task? 10.20.1.0 0.0.0.255, so how it will work once it is denied. So the
Options: right answer is remove the --- no access-list 2699 deny ip any
10.20.1.0 0.0.0.255.
A.
Questions 36
access-list 2699 permit udp 10.20.1.0 0.0.0.255
Which two functions are performed by the core layer in a three-tier
B.
architecture? (Choose two)
no access-list 2699 deny tcp any 10.20.1.0 0.0.0.127 eq 22 Options:
C.
A.
access-list 2699 permit tcp any 10.20.1.0 0.0.0.255 eq 22
Provide uninterrupted forwarding service.
D.
B.
no access-list 2699 deny ip any 10.20.1.0 0.0.0.255
Police traffic that is sent to the edge of the network.
Show Answer Buy Now
C.
204
Provide direct connectivity for end user devices. Drag and drop the SNMP components from the left onto the
descriptions on the right.
D.
E.
Answer: Options:
Explanation: Answer:
Explanation:
Answer:
Cisco is very clear about the purpose of this layer. Its only role is to
forward traffic, the fastest it can. Here you don’t apply any policy, Questions 38
as you must try to reduce the load of the core so it can focus on Drag and drop the 802.11 wireless standards from the left onto the
routing. matching statements on the right
https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Campus
/campover.html#wp708831
Questions 37
205
Which 802.11 frame type is association response?
Options:
A.
management
B.
protected frame
Options: C.
Answer: D.
action
Answer:
Show Answer Buy Now
Answer:
Explanation:
Reference: [Reference:
https://en.wikipedia.org/wiki/802.11_Frame_Types, , ]
Questions 39
206
Questions 40
Drag and drop the threat-mitigation techniques from the left onto the
types of threat or attack they mitigate on the right.
Answer:
In this attack, the attacking computer generates frames with two
Answer: 802.1Q tags. The first tag matches the native VLAN of the trunk
port (VLAN 10 in this case), and the second matches the VLAN of a
Explanation: host it wants to attack (VLAN 20).When the packet from the
attacker reaches Switch A, Switch A only sees the first VLAN 10
Explanation:
and it matches with its native VLAN 10 so this VLAN tag is
removed. Switch A forwards the frame out all links with the same
native VLAN 10. Switch B receives the frame with an tag of VLAN
20 so it removes this tag and forwards out to the Victim
207
computer.Note: This attack only works if the trunk (between two What is the next hop address for traffic that is destined to host
switches) has the same native VLAN as the attacker.To mitigate this 10.0.1.5?
type of attack, you can use VLAN access control lists (VACLs,
Options:
which applies to all traffic within a VLAN. We can use VACL to
drop attacker traffic to specific victims/servers) or implement A.
Private VLANs.ARP attack (like ARP poisoning/spoofing) is a type 10.0.1.3
of attack in which a malicious actor sends falsified ARP messages
B.
over a local area network as ARP allows a gratuitous reply from a
host even if an ARP request was not received. This results in the 10.0.1.50
linking of an attacker’s MAC address with the IP address of a
C.
legitimate computer or server on the network. This is an attack based
on ARP which is at Layer 2.Dynamic ARP inspection (DAI) is a 10.0.1.4
security feature that validates ARP packets in a network which can
D.
be used to mitigate this type of attack.
Loopback D
Questions 41
Show Answer Buy Now
Refer to the exhibit.
Answer:
Questions 42
208
Options: A.
DHCP snooping D.
Show Answer Buy Now assign physically adjacent access points to the same Wi-Fi channel
C Answer:
Questions 43 B
209
Options: Central AP management requires more complex configurations
A. B.
B. C.
C. D.
dns-server Answer:
Show Answer Buy Now
D
Answer:
Questions 46
A Refer to the exhibit.
Questions 45
Options:
A.
210
Options:
A.
Switch 1
B.
Switch 2
C.
Switch 3
D.
Switch 4
Answer:
Which switch becomes the root of the spanning tree for VLAN 110? B
Questions 47
Which configuration ensures that the switch is always the root for
VLAN 750?
Options:
211
A. 0 command ensures the bridge priority takes precedence over all
other priorities.
Switch(config)#spanning-tree vlan 750 priority 38003685
Questions 48
B.
Drag and drop the WLAN components from the left onto the correct
Switch(config)#spanning-tree vlan 750 root primary
descriptions on the right.
C.
D.
Options:
Answer:
Show Answer Buy Now
D
Answer:
Explanation:
Explanation:
212
Answer: A.
SW1
B.
SW2
C.
SW3
D.
Questions 49
SW4
Refer to the exhibit.
Show Answer Buy Now
Answer:
Options:
213
Options:
A.
read
B.
update
Options: C.
create
Show Answer Buy Now
D.
Answer:
delete
Answer:
Show Answer Buy Now
Answer:
Explanation:
Explanation:
214
used to retrieve resources. This is the method used for read D
operations (the R in CRUD).
Questions 53
https:// hub.packtpub.com/crud-operations-rest/
Questions 52 What is a recommended approach to avoid co-channel congestion
while installing access points that use the 2.4 GHz frequency?
What does physical access control regulate?
Options:
Options:
A.
A.
different nonoverlapping channels
access to spec fie networks based on business function
B.
B.
different overlapping channels
access to servers to prevent malicious activity
C.
C.
one overlapping channel
access :o computer networks and file systems
D.
D.
one nonoverlapping channel
access to networking equipment and facilities
Show Answer Buy Now
Show Answer Buy Now
Answer:
Answer:
A
215
Questions 54 Which two encoding methods are supported by REST APIs?
A. YAML
overlay B.
B. JSON
northbound C.
C. EBCDIC
underlay D.
D. SGML
southbound E.
D Answer:
Questions 55 B, E
216
Explanation: 200
Explanation: B.
Reference: [Reference: D.
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus1000 500
/sw/5_x/rest_api_config/b_Cisco_N1KV_VMware_REST_API_Config_5x/b
Show Answer Buy Now
_Cisco_N1KV_VMware_REST_API_Config_5x_chapter_010.pdf, , The
Application Policy Infrastructure Controller (APIC) REST API is a Answer:
programmatic interface that uses REST architecture. The API accepts and
returns HTTP (not enabled by default) or HTTPS messages that contain A
JavaScript Object Notation (JSON) or Extensible Markup Language (XML)
documents., , ]
Questions 57
Options:
A.
217
After running the code in the exhibit, which step reduces the amount D
of data that the NETCONF server returns to the NETCONF client,
to only the interface's configuration? Questions 58
Options: In which two ways does a password manager reduce the chance of a
hacker stealing a users password? (Choose two.)
A.
Options:
Use the Ixml library to parse the data returned by the NETCONF
server for the interface's configuration. A.
Show Answer Buy Now It stores the password repository on the local workstation with built-
in antivirus and anti-malware functionality
Answer:
E.
218
It encourages users to create stronger passwords. user awareness
Answer: Answer:
C, E D
Questions 59 Explanation:
An email user has been lured into clicking a link in an email sent by Explanation:
their company's security organization. The webpage that opens
This is a training program which simulates an attack, not a real
reports that it was safe but the link could have contained malicious
attack (as it says “The webpage that opens reports that it was safe”)
code. Which type of security program is in place?
so we believed it should be called a “user awareness”
Options: program.Therefore the best answer here should be “user awareness”.
A. This is the definition of“User awareness” from CCNA 200- 301
Offical Cert Guide Book:“User awareness: All users should be made
Physical access control aware of the need for data confidentiality to protect corporate
B. information, as well as their own credentials and personal
information. They should also be made aware of potential threats,
Social engineering attack
schemes to mislead, and proper procedures to report security
C. incidents. ” Note: Physical access control means infrastructure
locations, such as network closets and data centers, should remain
brute force attack
securely locked.
D.
Questions 60
219
What is a characteristic of a SOHO network? Options:
Options: A.
B. The Layer 2 switch floods packets to all ports except the receiving
port in the given VLAN.
enables multiple users to share a single broadband connection
C.
C.
The Layer 2 switch sends a copy of a packet to CPU for destination
provides high throughput access for 1000 or more users
MAC address learning.
D.
D.
includes at least three tiers of devices to provide load balancing and
The Layer 2 switch forwards the packet and adds the destination
redundancy
MAC address to its MAC address table
Show Answer Buy Now
Show Answer Buy Now
Answer:
Answer:
B
B
Questions 61
Explanation:
What is the default behavior of a Layer 2 switch when a frame with
an unknown destination MAC address is received? Explanation:
220
If the destination MAC address is not in the CAM table (unknown Answer:
destination MAC address), the switch sends the frame out all other
ports that are in the same VLAN as the received frame. This is
B
called flooding. It does not flood the frame out the same port on
Explanation:
which the frame was received.
Questions 62 Explanation:
wireless access point How do TCP and UDP differ in the way they provide reliability for
B. delivery of packets?
firewall
Options:
C. A.
wireless LAN controller TCP is a connectionless protocol that does not provide reliable
delivery of data, UDP is a connection-oriented protocol that uses
D.
sequencing to provide reliable delivery.
router B.
Show Answer Buy Now
221
TCP does not guarantee delivery or error checking to ensure that
there is no corruption of data UDP provides message
acknowledgement and retransmits data if lost.
C.
D.
A.
Answer:
It sends packets out of interface Fa0/2 only.
C
B.
Questions 64
It sends packets out of interface Fa0/1 only.
Refer to the exhibit.
C.
D.
222
It load-balances traffic out of Fa0/1 and Fa0/2
Answer:
Explanation:
Options:
Explanation:
Show Answer Buy Now
Router2 does not have an entry for the subnet 10.10.13.128/25. It
only has an entry for 10.10.13.0/25, which ranges from 10.10.13.0 to Answer:
10.10.13.127.
Answer:
https://study-ccna.com/administrative-distance-metric/
Questions 65
Drag and drop the DNS lookup components from the left onto the
functions on the right.
Explanation:
223
Explanation: password
Answer:
Diagram Questions 67
Description automatically generated
Refer to the exhibit.
Questions 66
Options:
A.
authorized services
An engineer is configuring an EtherChannel using LACP between
B. Switches 1 and 2 Which configuration must be applied so that only
C.
Options:
username A.
224
Swrtch2(config-if)#channel-group 1 mode passive
B.
C.
Questions 68 C.
D.
225
R1(config)#ip route 192.168.20.0 255.255.255.0 192.168.30.2
Answer:
Questions 69
Drag and drop the functions of DHCP from the left onto any of the Answer:
positions on the right Not all functions are used
Explanation:
Explanation:
Options:
Graphical user interface,
Show Answer Buy Now text, application, email Description automatically generated
Answer: Questions 70
226
Refer to the exhibit. Configure router B and router C as OSPF neighbors of router A.
C.
D.
Answer:
Questions 71
Which action must be taken to ensure that router A is elected as the Which action is taken by the data plane within a network device?
DR for OSPF area 0?
Options:
Options:
A.
A.
forwards traffic to the next hop
Configure the OSPF priority on router A with the lowest value
B.
between the three routers.
constructs a routing table based on a routing protocol
B.
227
C. multicast address
D. link-local address
looks up an egress interface in the forwarding information base Show Answer Buy Now
228
Telnet switchport trunk allowed vlan add 104
D.
C
switchport trunk allowed vlan 104
Questions 74
Show Answer Buy Now
Refer to the exhibit.
Answer:
Questions 75
Options: A.
A. SYIM flood
B. reflection
229
C. D.
teardrop SSH
amplification Answer:
Show Answer Buy Now
D
Answer:
Questions 77
A Which interface mode must be configured to connect the lightweight
APs in a centralized architecture?
Questions 76
Options:
Which protocol is used for secure remote CLI access?
A.
Options:
WLAN dynamic
A.
B.
HTTPS
management
B.
C.
HTTP
trunk
C.
D.
Telnet
230
access An individual IPv6 unicast address is supported on a single interface
on one node but an IPv6 anycast address is assigned to a group of
Show Answer Buy Now
interfaces on multiple nodes.
Answer: D.
A. C
B.
231
A) Option C
D.
Option D
B)
Show Answer Buy Now
Answer:
C)
A
Questions 80
Drag and drop the TCP or UDP details from the left onto their
D)
corresponding protocols on the right.
Options:
A.
Option A Options:
B. Show Answer Buy Now
Option B
Answer:
C.
232
C.
D.
Answer:
via next-hop 10.0 1 100
Questions 81
Show Answer Buy Now
Refer to the exhibit.
Answer:
Questions 82
Web traffic is coming in from the WAN interface. Which route takes vlan 2000 interface to create a routable locally-unique unicast
precedence when the router is processing traffic destined for the address that is blocked from being advertised to the internet. Which
Options: Options:
A.
A.
B.
via next-hop 10 0 1.4
233
interface vlan 2000 • The password for privileged EXEC mode is pnv4t3p4ss Which
command sequence must the engineer configured
Ipv6 address fc00:0000:aaaa:a15d:1234:2343:8aca/64
A)
C.
D.
Answer:
Questions 83
234
Show Answer Buy Now
Answer:
Questions 84
Options:
A.
Option A
B.
C.
enough addresses for the number of assigned hosts and anticipates
no more than 10% growth for now hosts. Which configuration script
Option C must be used?
D. A)
Option D
235
D)
B)
Options:
C)
A.
Option A
236
B. A.
Option C B.
Option D C.
D.
C
int range g0/0-1 channel-group 10 mode auto
Questions 85
E.
Refer to the exhibit.
int range g0/0-1 channel-group 10 mode on
Answer:
Which two commands when used together create port channel 10? A, C
(Choose two.)
Questions 86
Options:
237
Refer to the exhibit. C.
D.
Answer:
Questions 87
An engineer built a new L2 LACP EtherChannel between SW1 and Refer to the exhibit.
SW2 and executed these show commands to verify the work. Which
additional task allows the two switches to establish an LACP port
channel?
Options:
A.
B.
238
D.
queuing drops
Answer:
Questions 88
Options: A.
A. user-activity logging
B. service limitations
C.
a duplex incompatibility
C. consumption-based billing
D.
a speed conflict
239
identity verification
D
D)
Questions 89
Options:
A.
Option A
B.
Which two configurations must the engineer apply on this network
Option B
so that R1 becomes the DR? (Choose two.)
C.
A)
Option C
D.
B)
240
Option D travel between floors or to other areas in the building What must be
the configuration of the connection?
E.
Options:
Option E
A.
Show Answer Buy Now
Select the WPA Policy option with the CCKM option.
Answer:
B.
B, C
Disable AES encryption.
Questions 90 C.
Refer to the exhibit. Enable Fast Transition and select the FT 802.1x option.
D.
Answer:
Questions 91
Users need to connect to the wireless network with IEEE 802. 11r-
compatible devices. The connection must be maintained as users Refer to the exhibit.
241
There is an interface type mismatch
Answer:
Questions 92
Options:
A.
C. 10.1.1.19?
D. A.
242
F0/4
B.
F0/0
C.
F0/1
D.
Options:
F0/3
Show Answer Buy Now
Show Answer Buy Now
Answer:
Answer:
Answer:
B
Questions 93
Drag and drop the characteristics of networking from the left onto
the networking types on the right.
Questions 94
243
Refer to the exhibit.
D)
Options:
An engineer has started to configure replacement switch SW1. To A.
verify part of the configuration, the engineer issued the commands
as shown and noticed that the entry for PC2 is missing. Which Option A
Option C
D.
B)
Option D
C) Answer:
244
Questions 95 router ospf 1
OSPF must be configured between routers R1 and R2. Which OSPF network 192.168.1.1 0.0.0.0 area 0
configuration must be applied to router R1 to avoid a DR/BDR
interface e1/1
election?
ip address 192.168.1.1 255.255.255.252
Options:
ip ospf cost 0
A.
D.
router ospf 1
router ospf 1
network 192.168.1.1 0.0.0.0 area 0
network 192.168.1.1 0.0.0.0 area 0
interface e1/1
hello interval 15
ip address 192.168.1.1 255.255.255.252
interface e1/1
ip ospf network broadcast
Ip address 192.168.1.1 255.255.255.252
B.
Show Answer Buy Now
router ospf 1
interface e1/1 B
ip address 192.168.1.1 255.255.255.252 Questions 96
ip ospf network point-to-point An engineer is configuring remote access to a router from IP subnet
C. 10.139.58.0/28. The domain name, crypto keys, and SSH have been
245
configured. Which configuration enables the traffic on the
destination router?
A)
Options:
A.
Option A
B)
B.
Option B
C.
Option C
C) D.
Option D
Answer:
D) B
Questions 97
246
What is one reason to implement LAG on a Cisco WLC?
Options:
A.
B.
Which command configures OSPF on the point-to-point link
to provide link redundancy and load balancing between routers R1 and R2?
C. Options:
to allow for stateful and link-state failover A.
D. router-id 10.0.0.15
B D.
247
Answer: A.
D GigabitEthernet0/0
B.
Questions 99
GigabltEthornet0/1
Refer to the exhibit.
C.
GigabitEthernet0/2
D.
GigabitEthernet0/3
Answer:
Questions 100
Router R1 resides in OSPF Area 0. After updating the R1 Refer to the exhibit.
configuration to influence the paths that it will use to direct traffic,
an engineer verified that each of the four Gigabit interfaces has the
same route to 10.10.0.0/16. Which interface will R1 choose to send
traffic to reach the route?
Options:
248
The router has been configured with a supernet to accommodate the
requirement for 380 users on a subnet The requirement already
considers 30% future growth. Which configuration verifies the IP
subnet on router R4?
A) Options:
A.
Option A
B.
B) Option B
C.
Option C
D.
C) Option D
Answer:
B
D)
Questions 101
249
Refer to the exhibit. ip route 10.1.1.10 255.255.255.255 gi0/0 125
Answer:
Questions 102
250
Multiple untagged interfaces on the same port must be supported. Answer:
Show Answer Buy Now
Answer:
Questions 103
Drag and drop the Rapid PVST+ forwarding slate actions from the
loft to the right. Not all actions are used. Questions 104
251
B.
C.
D. Drag and drop the prefix lengths from the left onto the
R1(config)# username englneer2 secret 4 corresponding prefixes on the right Not all prefixes are used
S1Sb1Ju$kZbBS1Pyh4QzwXyZ Options:
Show Answer Buy Now Show Answer Buy Now
Answer: Answer:
B Answer:
Questions 105
see the answer below.
Refer to the exhibit.
Explanation:
Explanation:
252
Diagram
Description automatically generated with low confidence
Questions 106 Chart, bar chart Description automatically generated
Drag and drop the REST API call methods for HTTP from the left Questions 107
onto the actions they perform on the right Not all methods are used.
What is a function of Opportunistic Wireless Encryption in an
Options: environment?
Answer: A.
offer compression
Answer:
B.
Explanation: C.
D.
253
protect traffic on open networks F0/11
Answer: F0/12
D.
D
F0/13
Questions 108
Show Answer Buy Now
Refer to the exhibit.
Answer:
Questions 109
Packets received by the router from BGP enter via a serial interface Which WLC management connection type is vulnerable to man-in-
at 209.165.201.10. Each route is present within the routing table. the-middle attacks?
Which interface is used to forward traffic with a destination IP of
Options:
10.10.10.24?
A.
Options:
SSH
A.
B.
F0/10
HTTPS
B.
254
C. traffic shaping
Telnet D.
D. traffic prioritization
255
D. D.
Answer: Answer:
B C
ip domain-name domain A)
256
Option B
C.
Option C
B) D.
Option D
Answer:
C)
Questions 114
D) Refer to the exhibit.
Options:
A.
Option A
B.
257
D)
Options:
A.
Option A
A) Option C
D.
Option D
B) Show Answer Buy Now
Answer:
C) A
258
Questions 115
Options:
A.
dynamic
B.
static
C.
Site A was recently connected to site B over a new single-mode
active
fiber path. Users at site A report Intermittent connectivity Issues
D. with applications hosted at site B. What is the reason for the
auto problem?
A.
Answer:
Heavy usage is causing high latency.
B
B.
Questions 116
An incorrect type of transceiver has been inserted into a device on
Refer to the exhibit. the link.
259
C.
physical network errors are being transmitted between the two sites.
D.
Answer:
Questions 117
Options:
A.
interface FastEthernet0/0
ip helper-address 10.0.1.1
260
access-list 100 permit udp host 10.0.1.1 eq bootps host 10.148.2.1 Answer:
B. B
interface FastEthernot0/1
Questions 118
ip helper-address 10.0.1.1
Refer to the exhibit.
!
C.
interface FastEthernetO/0 Which configuration allows routers R14 and R86 to form an
ip helper-address 10.0.1.1 OSPFv2 adjacency while acting as a central point for exchanging
OSPF information between routers?
I
A)
access-list 100 permit host 10.0.1.1 host 10.148.2.1 eq bootps
D.
interface FastEthernet0/1
ip helper-address 10.0.1.1
261
C)
D)
B)
Options:
A.
262
Option A An engineer is updating the R1 configuration to connect a new
server to the management network. The PCs on the management
B.
network must be blocked from pinging the default gateway of the
Option B new server. Which command must be configured on R1 to complete
C. the task?
Option C Options:
D. A.
Answer:
263
Questions 120
Options:
A.
B.
An engineer is configuring a new router on the network and applied
backing up syslogs at a remote location this configuration. Which additional configuration allows the PC to
C. obtain its IP address from a DHCP server?
D. A.
setting up IP cameras to monitor key infrastructure Configure the ip dhcp relay information command under interface
Gi0/1.
Show Answer Buy Now
B.
Answer:
Configure the ip dhcp smart-relay command globally on the router
A
C.
Configure the ip address dhcp command under interface Gi0/0 Show Answer Buy Now
An engineer must configure a WLAN using the strongest encryption Many routers provide WPA2-PSK (TKIP), WPA2-PSK (AES), and
type for WPA2- PSK. Which cipher fulfills the configuration WPA2-PSK (TKIP/AES) as options. TKIP is actually an older
requirement? encryption protocol introduced with WPA to replace the very-
Options: insecure WEP encryption at the time. TKIP is actually quite similar
to WEP encryption. TKIP is no longer considered secure, and is now
A.
deprecated. In other words, you shouldn’t be using it.
WEP AES is a more secure encryption protocol introduced with WPA2
B. and it is currently the strongest encryption type for WPA2-PSK.
RC4
Questions 123
AES
D.
265
Answer:
Questions 124
All traffic enters the CPE router from interface Serial0/3 with an IP
Which condition must be met before an NMS handles an SNMP trap
address of 192 168 50 1 Web traffic from the WAN is destined for a
from an agent?
LAN network where servers are load-balanced An IP packet with a
destination address of the HTTP virtual IP of 192 1681 250 must be Options:
forwarded Which routing table entry does the router use?
A.
Options:
The NMS software must be loaded with the MIB associated with the
A. trap.
B. The NMS must be configured on the same router as the SNMP agent
C. The NMS must receive a trap and an inform message from the
SNMP agent within a configured interval
192.168.1.192/26 via 192.168.14.4
D.
D.
The NMS must receive the same trap from two different SNMP
192.168.1.224/27 via 192.168.15.5
agents to verify that it is reliable.
Show Answer Buy Now
266
Show Answer Buy Now Show Answer Buy Now
Answer: Answer:
A B
What is the effect when loopback interfaces and the configured Drag and drop to the characteristics of networking from the left onto
router ID are absent during the OSPF Process configuration? the correct networking types on the right.
Options:
A.
B.
C.
Options:
The lowest IP address is incremented by 1 and selected as the router
ID. Show Answer Buy Now
D.
Answer:
The router ID 0.0.0.0 is selected and placed in the OSPF process.
267
Answer: Options:
A.
10.10.225.48 255.255.255.240
B.
10.10.225.32 255.255.255.240
C.
10.10.225.48 255.255.255.224
D.
10.10.225.32 255.255.255.224
Answer:
Questions 128
Which action does the router take as rt forwards a packet through the
Refer to the exhibit. An engineer must add a subnet for a new office
network?
that will add 20 users to the network. Which IPv4 network and
subnet mask combination does the engineer assign to minimize Options:
wasting addresses?
268
A. C
The router replaces the source and desinaoon labels wth the sending
Questions 129
router uterface label as a source and the next hop router label as a
desbnabon Refer to the exhibit.
B.
C.
The nip server 192.168.0.3 command has been configured on router
The router replaces the original source and destination MAC 1 to make it an NTP client of router 2. Which command must be
addresses with the sending router MAC address as the source and configured on router 2 so that it operates in server-only mode and
neighbor MAC address as the destination relies only on its internal clock?
D. Options:
The router encapsulates the original packet and then includes a tag A.
that identifies the source router MAC address and transmit
Router2(config)#ntp passive
transparently to the destination
B.
Show Answer Buy Now
Router2(config)#ntp server 172.17.0.1
Answer:
C.
Router2(config)#ntp master 4
269
D. 192.168.1.17
Answer: C.
192.168.1.64
B
D.
Explanation:
192.168.1.127
Explanation:
E.
• To use internal clock of this router, use any configured IP address
192.168.1.254
in any interface of this router.
Show Answer Buy Now
Questions 130
B, C
Questions 131
Which two prefixes are included in this routing table entry? (Choose What is the purpose of an SSID?
two.)
Options:
Options:
A.
A.
270
It provides network security Questions 132
Explanation: E.
“In IEEE 802.11 wireless local area networking standards (including The data can pass through the cladding
Wi-Fi), a service set is a group of wireless network devices which
Show Answer Buy Now
share a service set identifier (SSID)… A service set forms a logical
network of nodes operating with shared link-layer networking Answer:
parameters; they form one logical network segment.“
271
A, C Which port type supports the spanning-tree portfast command
without additional configuration?
Questions 133
Options:
What prevents a workstation from receiving a DHCP address?
A.
Options:
access ports
A.
B.
DTP
Layer 3 main Interfaces
B.
C.
STP
Layer 3 suninterfaces
C.
D.
VTP
trunk ports
D.
Show Answer Buy Now
802.10
Answer:
Show Answer Buy Now
A
Answer:
Questions 135
B
Refer to Exhibit.
Questions 134
272
ipv6 router 2000::1/128 2012::2
D.
E.
273
Refer to the exhibit. Show Answer Buy Now
Answer:
Questions 137
When a client and server are not on the same physical network,
Which command must be executed for Gi1.1 on SW1 to become a
which device is used to forward requests and replies between client
trunk port if Gi1/1 on SW2 is configured in desirable or trunk
and server for DHCP?
mode?
Options:
Options:
A.
A.
DHCP relay agent
switchport mode trunk
B.
B.
DHCP server
switchport mode dot1-tunnel
C.
C.
DHCPDISCOVER
switchport mode dynamic auto
D.
D.
DHCPOFFER
switchport mode dynamic desirable
Show Answer Buy Now
274
Answer: B
A Questions 139
Questions 138 Drag and drop the Cisco Wireless LAN Controller security settings
from the left onto the correct security mechanism categories on the
Which IPv6 address type provides communication between subnets
right.
and is unable to route on the Internet?
Options:
A.
global unicast
B.
unique local
C. Options:
D. Answer:
multicast
Answer:
275
Answer: SNMPv3
Answer:
Questions 141
NetFlow D.
D.
276
unicast messages from a host at a remote site to a server at For each existing interface, it adds the metric from the source router
headquarters to the destination to calculate the route with the lowest bandwidth.
D.
Explanation:
It count the number of hops between the source router and the
Explanation:
destination to determine the router with the lowest metric
“The original poster makes a correct observation that EIGRP does
Show Answer Buy Now
not work in a pure IPSEC environment. IPSEC was designed to
process unicast traffic. Answer:
Questions 142
C
When OSPF learns multiple paths to a network, how does it select a
route? Questions 143
Options: When the active router in an HSRP group fails, what router assumes
the role and forwards packets?
A.
Options:
It multiple the active K value by 256 to calculate the route with the
lowest metric. A.
B. backup
277
B.
standby
C.
listening
D.
forwarding
Show Answer Buy Now A packet is being sent across router R1 to host 172.16.0.14. What is
the destination route for the packet?
Answer:
Options:
B A.
C.
D.
278
Show Answer Buy Now A.
B.
A
Router2 is using the default hello timer.
Questions 145
C.
D.
Answer:
Questions 146
279
Telnet A.
280
Explanation: broadcast
long you do it (can be used for billing and auditing)An example of nonbroadcast
AAA is shown below:+ Authentication: “I am a normal user. My
Show Answer Buy Now
username/password is user_tom/learnforever”+ Authorization:
“user_tom can access LearnCCNA server via HTTP and FTP”+ Answer:
Accounting: “user_tom accessed LearnCCNA server for 2 hours”.
This user only uses “show” commands. C
Questions 148
Explanation:
A user configured OSPF in a single area between two routers A
Explanation:
serial interface connecting R1 and R2 is running encapsulation PPP
By default which OSPF network type is seen on this interface when The default OSPF network type for HDLC and PPP on Serial link is
the user types show ip ospf interface on R1 or R2? point-to-point (while the default OSPF network type for Ethernet
link is Broadcast).
Options:
Questions 149
A.
What benefit does controller-based networking provide versus
port-to-multipoint
traditional networking?
B.
Options:
281
A. Options:
Answer: C
C Questions 151
Which protocol does an access point use to draw power from a Options:
connected switch?
A.
282
It can be hidden or broadcast in a WLAN
B.
C.
D.
With which metric was the route to host 172.16.0.202 learned?
It is at most 32 characters long.
Options:
E.
A.
IT provides secured access to a WLAN
0
Show Answer Buy Now
B.
Answer:
110
B, E C.
3184439
283
Answer: Which action must be taken in router R1 to help resolve the
configuration issue?
C
Options:
Explanation:
A.
Explanation:
set the default network as 20.20.20.0/24
Both the line “O 172.16.0.128/25” and “S 172.16.0.0/24” cover the B.
host 172.16.0.202 but with the “longest (prefix) match” rule the
router will choose the first route. set the default gateway as 20.20.20.2
Questions 153 C.
Refer to the exhibit. configure a static route with Fa0/1 as the egress interface to reach
the 20.20.20.0/24 network
D.
configure a static route with 10.10.10.2 as the next hop to reach the
20.20.20.0/24 network
Answer:
D
Router R1 Fa0/0 is unable ping router R3 Fa0/1.
Questions 154
284
A packet is destined for 10.10.1.22. Which static route does the Options:
router choose to forward the packet?
A.
Options:
The user swipes a key fob, then clicks through an email link
A.
B.
ip route 10.10.1.0 255.255.255.240 10.10.255.1
The user enters a user name and password, and then clicks a
B. notification in an authentication app on a mobile device
C. The user enters a PIN into an RSA token, and then enters the
displayed RSA key on a login screen
ip route 10.10.1.20 255.255.255.252 10.10.255.1
D.
D.
The user enters a user name and password and then re-enters the
ip route 10.10.1.20 255.255.255.254 10.10.255.1
credentials on a second screen
Show Answer Buy Now
Show Answer Buy Now
Answer:
Answer:
C
B
Questions 155
Explanation:
Which set of action satisfy the requirement for multifactor
authentication? Explanation:
285
This is an example of how two-factor authentication (2FA) works:1. Show Answer Buy Now
The user logs in to the website or service with their username and
password.2. The password is validated by an authentication server Answer:
and, if correct, the user becomes eligible for the second factor.3. The
A
authentication server sends a unique code to the user’s second-factor
method (such as a smartphone app).4. The user confirms their Questions 157
identity by providing the additional authentication for their second-
Which statement about Link Aggregation when implemented on a
factor method.
Cisco Wireless LAN Controller is true?
Questions 156
Options:
How does WPA3 improve security?
A.
Options:
To pass client traffic two or more ports must be configured.
A.
B.
It uses SAE for authentication.
The EtherChannel must be configured in "mode active"
B.
C.
It uses a 4-way handshake for authentication.
When enabled the WLC bandwidth drops to 500 Mbps
C.
D.
It uses RC4 for encryption.
One functional physical port is needed to pass client traffic
D.
Show Answer Buy Now
It uses TKIP for encryption.
286
Answer: The destination MAC address of the frame is unknown.
Answer:
Explanation:
Reference: [Reference: B
https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-2/config-
Questions 159
guide/b_cg82/b_cg82_chapter_010101011.html, ]
Questions 158 What makes Cisco DNA Center different from traditional network
management applications and their management of networks?
Why does a switch flood a frame to all ports?
Options:
Options:
A.
A.
It omits supports auto-discovery of network elements in a greenfield
The frame has zero destination MAC addresses. deployment.
B. B.
The source MAC address of the frame is unknown It modular design allows someone to implement different versions to
C. meet the specific needs of an organization
The source and destination MAC addresses of the frame are the C.
287
It does not support high availability of management functions when Show Answer Buy Now
operating in cluster mode
Answer:
Show Answer Buy Now
B
Answer:
Questions 161
C
How does CAPWAP communicate between an access point in local
Questions 160 mode and a WLC?
A. The access point must directly connect to the WLC using a copper
cable
management-plane
B.
B.
The access point must not be connected to the wired network, as it
control-plane
would create a loop
C.
C.
data-plane
The access point must be connected to the same switch as the WLC
D.
D.
services-plane
288
The access point has the ability to link to any switch in the network, Show Answer Buy Now
assuming connectivity to the WLC
Answer:
Show Answer Buy Now
D
Answer:
Questions 163
D
What are two benefits of FHRPs? (Choose two.)
Questions 162
Options:
What is a characteristic of private IPv4 addressing?
A.
Options:
They prevent (oops in the Layer 2 network.
A.
B.
traverse the Internet when an outbound ACL is applied
They allow encrypted traffic.
B.
C.
issued by IANA in conjunction with an autonomous system number
They are able to bundle muftlple ports to increase bandwidth
C.
D.
composed of up to 65.536 available addresses
They enable automatic failover of the default gateway.
D.
E.
used without tracking or registration
289
They allow multiple devices lo serve as a single virtual gateway for configure switchport trunk dynamic desirable
clients in the network
Show Answer Buy Now
Show Answer Buy Now
Answer:
Answer:
C
D, E
Questions 165
Questions 164
What is the function of a server?
An engineer must establish a trunk link between two switches. The
Options:
neighboring switch is set to trunk or desirable mode. What action
should be taken? A.
A. B.
B. C.
configure switchport mode dynamic desirable It routes traffic between Layer 3 devices.
C. D.
configure switchport mode dynamic auto It Creates security zones between trusted and untrusted networks
290
Answer: D
B Questions 167
Questions 166 Which two values or settings must be entered when configuring a
new WLAN in the Cisco Wireless LAN Controller GUI? (Choose
An engineer observes high usage on the 2.4GHz channels and lower
two)
usage on the 5GHz channels. What must be configured to allow
clients to preferentially use 5GH2 access points? Options:
Options: A.
B. QoS settings
11ac MU-MIMO C.
D. SSID
291
Answer: C
D, E Questions 169
Answer:
Answer:
292
A The trunk forms but VLAN 99 and VLAN 999 are in a shutdown
state.
Questions 170
Show Answer Buy Now
Refer to Exhibit.
Answer:
Explanation:
Explanation:
Which action do the switches take on the trunk link?
The trunk still forms with mismatched native VLANs and the traffic
Options:
can actually flow between mismatched switches. But it is absolutely
A. necessary that the native VLANs on both ends of a trunk link match;
otherwise a native VLAN mismatch occurs, causing the two VLANs
The trunk does not form and the ports go into an err-disabled status.
to effectively merge.
B.
For example with the above configuration, SW1 would send
The trunk forms but the mismatched native VLANs are merged into untagged frames for VLAN 999. SW2 receives them but would
a single broadcast domain. think they are for VLAN 99 so we can say these two VLANs are
C. merged.
Questions 171
The trunk does not form, but VLAN 99 and VLAN 999 are allowed
to traverse the link. How does a Cisco Unified Wireless network respond to Wi-Fi
D. channel overlap?
293
Options: Refer to the exhibit.
A.
B.
A C.
294
It starts sending traffic without a specific matching entry in the
routing table to GigabitEthernet0/1
Answer:
Explanation: Options:
Our new static default route has the Administrative Distance (AD) Answer:
of 120, which is bigger than the AD of OSPF External route (O*E2)
so it will not be pushed into the routing table until the current OSPF Answer:
External route is removed.For your information, if you don’t type
the AD of 120 (using the command “ip route 0.0.0.0 0.0.0.0
10.13.0.1”) then the new static default route would replace the OSPF
default route as the default AD of static route is 1. You will see such
line in the routing table:S* 0.0.0.0/0 [1/0] via 10.13.0.1
Questions 173
Drag and drop the lightweight access point operation modes from
the left onto the descriptions on the right
Explanation:
295
Explanation:
Options:
A.
B.
C.
Questions 174 The switch discard all ingress ARP traffic with invalid MAC-to-IP
address bindings.
Refer to the exhibit.
Show Answer Buy Now
Answer:
296
D B
What is the same for both copper and fiber interfaces when using What are two recommendations for protecting network ports from
SFP modules? being exploited when located in an office space outside of an IT
closer? (Choose two.)
Options:
Options:
A.
A.
They support an inline optical attenuator to enhance signal strength
enable the PortFast feature on ports
B.
B.
They provide minimal interruption to services by being hot-
swappable implement port-based authentication
C. C.
They offer reliable bandwidth up to 100 Mbps in half duplex mode configure static ARP entries
D. D.
They accommodate single-mode and multi-mode in a single module configure ports to a fixed speed
297
Answer:
B, E
Questions 177
Options:
A.
Perform a lookup in the MAC address table and discard the frame
due to a missing entry.
B.
Insert the source MAC address and port into the forwarding table
and forward the frame to Sales-1.
C.
The entire contents of the MAC address table are shown. Sales-4
Map the Layer 2 MAC address to the Layer 3 IP address and
sends a data frame to Sales-1.
forward the frame.
D.
Flood the frame out of all ports except on the port where Sales-1 is
connected.
298
Show Answer Buy Now D.
Answer: Layer 2
Options: A.
A. discarding
SSID B.
B. listening
radio C.
C. forwarding
band D.
299
learning Which device segregates a network into separate zones that have
their own security policies?
Show Answer Buy Now
Options:
Answer:
A.
A
IPS
Explanation: B.
Explanation: firewall
When Rapid PVST+ is used, switch ports always enter the blocking C.
state immediately after the boot process 1. The blocking state is the
access point
first of the five possible port states in the Rapid PVST+ protocol. In
this state, the port does not forward frames but listens to BPDUs to D.
determine the location of the root bridge and the best path to reach it switch
12. After a port enters the blocking state, it transitions to the
Show Answer Buy Now
listening state and then to the learning state before finally entering
the forwarding state. When Rapid PVST+ (Per-VLAN Spanning
Answer:
Tree Plus) is used, switch ports go through a specific state
immediately after the boot process. This state is known as the C
"discarding" state.
Questions 181
Questions 180
Refer to the exhibit.
300
D.
nine
Answer:
Questions 182
Options:
A.
What is the subnet mask for route 172.16.4.0?
one Options:
B.
A.
four
255.255.248.0
C.
B.
seven
301
255.255.254.0
C.
255.255.255.192
D.
255.255.240.0
Answer:
Questions 183
Refer to the exhibit. How many arrays are present in the JSON data?
Options:
A.
one
B.
three
C.
302
six Options:
D. A.
C.
C
Select Enable next to Network User
Questions 184
D.
Refer to the exhibit.
Change the Support for CoA to Enabled.
Answer:
Questions 185
303
Refer to the exhibit. What is the cause of the issue?
Options:
A.
Answer: D.
B policing
304
Explanation: A network engineer is configuring a WLAN to connect with the
172.16.10.0/24 network on VLAN 20. The engineer wants to limit
Explanation:
the number of devices that connect to the WLAN on the USERWL
R1 is applying policing to incoming packets. Policing is a QoS SSID to 125. Which configuration must the engineer perform on the
mechanism that limits the rate of traffic flow by dropping or WLC?
remarking packets that exceed the configured rate limit. In this case,
Options:
R1 is applying policing to incoming packets on interface G0/0 and
G0/1. The exhibit shows that R1 is configured to police traffic at a A.
rate of AF31, AF21, and AF11. This means that R1 is limiting the
In the Management Software activation configuration, set the
rate of traffic flow for these three traffic classes .
Clients value to 125.
References:
B.
• : Cisco CCNA Certification Guide - Chapter 16: Quality of Service In the Controller IPv6 configuration, set the Throttle value to 125.
(QoS)
C.
• : Cisco IOS Quality of Service Solutions Configuration Guide -
Configuring Class-Based Policing In the WLAN configuration, set the Maximum Allowed Clients
value to 125.
Questions 187
D.
Refer to the exhibit.
In the Advanced configuration, set the DTIM value to 125.
Answer:
305
C D.
10.101014
Questions 188
Show Answer Buy Now
Refer to the exhibit.
Answer:
Explanation:
Explanation:
Packets are flowing from 192.168 10.1 to the destination at IP
The router will select the next hop based on the longest prefix match
address 192.168.20 75. Which next hop will the router select for the
in the routing table. The destination IP address 192.168.20.75
packet?
belongs to the network 192.168.0.0/19, which is a classless network
Options: created by subnetting the classful network 192.168.0.0/16. The
routing table has two entries for the network 192.168.0.0/19, one
A.
with a metric of 219414 and another with a metric of 5. The router
10.10101 will choose the entry with the lower metric, which is 5, and forward
B. the packet to the next hop 10.10.10.111.
Questions 189
10.10.10.11
306
Options: Questions 190
WPA3 um AES for stronger protection than WPA2 which uses SAE
B.
WPA2 uses 1 M-bit key encryption and WPA3 requires 256-brt key
encryption
C.
An engineer is checking the routing table in the main router to
WPA3 uses AES for stronger protection than WPA2 which uses identify the path to a server on the network. Which route does the
TKIP WPA3 uses router use to reach the server at 192.168.2.2?
D. Options:
WPA2 uses 12B-M key encryption and WPA3 supports 128 bit and B.
192 bit key encryption
S 192.168.2.0/29 [1/0] via 10.1.1.1
Show Answer Buy Now
C.
C, E D.
307
S 192.168.1.0/30 [1/0] via 10.1.1.1 A.
Answer: B.
MDF-DC-3:08:0E:18::1A:3C:9D
B
C.
Questions 191
MDF-DC-08:0E:18:22:05:97
Refer to the exhibit.
D.
MDF-DC-1:DB:E:44:02:54:79
Answer:
Questions 192
Options: A.
308
LAG Options:
B. A.
EtherChannel 192.168.10/24
C. B.
trunk 192.168.3.0/24
D. C.
access 192.168.2.0/24
Questions 194
What are two features of the DHCP relay agent? (Choose two.)
Options:
A.
Which prefix did router R1 learn from internal EIGRP?
309
assigns DNS locally and then forwards request to DHCP server What is the difference between 1000BASE-LX/LH and 1000BASE-
ZX interfaces?
B.
Options:
permits one IP helper command under an individual Layer 3
interface A.
Answer:
310
C Questions 197
Options:
A.
B.
B 255.255.248.
311
D. Show Answer Buy Now
255.255.255.248 Answer:
Show Answer Buy Now
C
Answer:
Questions 199
D Why is TCP desired over UDP for application that require extensive
error checking, such as HTTPS?
Questions 198
Options:
Which WPA mode uses PSK authentication?
A.
Options:
UDP operates without acknowledgments, and TCP sends an
A.
acknowledgment for every packet received.
Local
B.
B.
UDP reliably guarantees delivery of all packets, and TCP drops
Client packets under heavy load.
C. C.
Enterprise UDP uses flow control mechanisms for the delivery of packets, and
D. TCP uses congestion control for efficient packet delivery.
Personal D.
312
UDP uses sequencing data tor packets to arrive in order, and TCP D.
offers trie capability to receive packets in random order.
It is when an attacker inserts malicious code into a SOL server.
Show Answer Buy Now
Show Answer Buy Now
Answer:
Answer:
A
A
Questions 200
Explanation:
What is a zero-day exploit?
Explanation:
Options:
https://www.kaspersky.com/resource-center/definitions/zero-day-
A. exploit
313
C. Options:
D.
Answer:
IPsec remote access
Answer:
E.
clientless VPN
Answer:
B, E Questions 203
Questions 202 Which advantage does the network assurance capability of Cisco
DNA Center provide over traditional campus management?
Drag and drop the IPv6 address types from the left onto their
description on the right. Options:
A.
B.
314
Cisco DNA Center handles management tasks at the controller to
reduce the load on infrastructure devices, and traditional campus
management uses the data backbone.
C.
315
Vlan 210
Name FINANCE
Inter e0/1
do wr
Options:
Sw2
Show Answer Buy Now
Enable
Answer: config t
Name MARKITING
See the Explanation below.
Int e0/1
Explanation: Switchport acees vlan 110
Explanation: do wr
Answer as below configuration: Sw3
Sw1 Enable
enbale config t
config t Vlan 110
316
Name MARKITING Questions 205
Name FINANCE
Int e0/0
Int e0/1 Which format matches the Modified EUI-64 IPv6 interface address
for the network 2001:db8::/64?
Switchport access vlan 210
Options:
Sw1
A.
Int e0/1
2001 :db8::5000:0004:5678:0090/64
Switchport allowed vlan 210
B.
Sw2
2001 :db8:4425:5400:77ft:fe07:/64
Int e0/2
C.
Switchport trunk allowed vlan 210
2001 :db8::5000:00ff:fe04 0000/64
Sw3
D.
Int e0/3
2001 :db8::5200:00ff:fe04:0000/64
Switchport trunk allowed vlan 210
Show Answer Buy Now
Switchport trunk allowed vlan 210,110
317
Answer: B)
Questions 206
C)
D)
Options:
A.
Option A
B.
A) Option B
C.
Option C
318
D. A.
Option D 192.168.30.1
C.
B
10.10.10.6
Questions 207
D.
192.168.201
Answer:
Questions 208
Options:
Refer lo the exhibit. What is the next-hop P address for R2 so that
A.
PC2 reaches the application server via ElGRP?
for small networks with minimal need for growth
Options:
319
B. Options:
C. 1
D. 2
Answer: D.
4
C
Show Answer Buy Now
Questions 209
Answer:
Refer to the exhibit.
B
Questions 210
320
C.
Option C
B) D.
Option D
C) Answer:
Questions 211
D)
What is a benefit of a point-to-point leased line?
Options:
A.
A. B.
B. C.
321
D. E.
Answer: Answer:
B B, D
What are two disadvantages of a full-mesh topology? (Choose two.) Refer to the exhibit.
Options:
A.
B.
C.
It must have point-to-point communication. The P2P blocking action option is disabled on the WLC.
D. Options:
It requires complex configuration. A.
322
Enable the Static IP Tunneling option. A network engineer must configure NETCONF. After creating the
configuration, the engineer gets output from the command show line
B.
but not from show running- config. Which command completes the
Disable the Coverage Hole Detection option. configuration?
C. Options:
Check the DHCP Addr. Assignment check box. A.
D. Device(config)# netconf lock-time 500
Set the P2P Blocking Action option to Forward-UpStream. B.
Answer: C.
D.
Questions 214
Device(config)# netconf max-sessions 100
Refer to the exhibit.
Show Answer Buy Now
Answer:
Questions 215
323
Which two capabilities of Cisco DNA Center make it more Questions 216
extensible as compared to traditional campus device management? Refer to the exhibit.
(Choose two.)
Options:
A.
REST APIs that allow for external applications to interact natively What is represented by "R1" and "SW1" within the JSON output?
B. Options:
C. key
D. array
E. value
324
C switchport trunk encapsulation dot1q
B.
Questions 217
switchport mode trunk
Refer to the exhibit.
switchport trunk allowed vlan all
C.
D.
SW_1 and SW_12 represent two companies that are merging. They switchport dynamic auto
use separate network vendors. The VLANs on both Sides have been switchport nonegotiate
migrated to share IP subnets. Which command sequence must be
Show Answer Buy Now
issued on both sides to join the two companies and pass all VLANs
between the companies?
Answer:
Options:
A
A.
Questions 218
switchport mode trunk
325
Which IPsec encryption mode is appropriate when the destination of IPsec encryption mode is the way IPsec secures the data packets that
a packet differs from the security termination point? are sent over an IP network. There are two main modes of IPsec
encryption: tunnel mode and transport mode1. Tunnel mode
Options:
encrypts the entire IP packet, including the original header, and adds
A. a new IP header with the source and destination addresses of the
Explanation:
Explanation:
326
A packet sourced from 10.10.10.32 is destined for the internet.
Options:
A.
B.
C.
R1 has just received a packet from host A that is destined to host B.
2 Which route in the routing table is used by R1 to reac B?
D. Options:
32 A.
Show Answer Buy Now 10.10.13.0/25 [108/0] via 10.10.10.10
Answer: B.
C.
Questions 220
10.10.13.0/25 [110/2] via 10.10.10.6
Refer to the exhibit.
D.
327
Show Answer Buy Now ip ospf priority 0
D Answer:
Questions 221 C
A Cisco engineer notices thai two OSPF neighbors are connected Questions 222
using a crossover Ethernet cable. The neighbors are taking too long
A network engineer is upgrading a small data center to host several
to become fully adjacent. Which command must be issued under the
new applications, including server backups that are expected to
interface configuration on each router to reduce the time required for
account for up to 90% of the bandwidth during peak times. The data
the adjacency to reach the FULL state?
center connects to the MPLS network provider via a primary circuit
Options: and a secondary circuit. How does the engineer inexpensively
update the data center to avoid saturation of the primary circuit by
A.
traffic associated with the backups?
ip ospf network broadcast
Options:
B.
A.
ip ospf dead-interval 40
Assign traffic from the backup servers to a dedicated switch.
C.
B.
ip ospf network point-to-point
Configure a dedicated circuit for the backup traffic.
D.
C.
328
Place the backup servers in a dedicated VLAN. • The existing connections must be maintained between PC1 PC2
and PC3
D.
• Allow the switch to pass traffic from future VLAN 10. Which
Advertise a more specific route for the backup traffic via the
configuration must be applied?
secondary circuit.
A)
Show Answer Buy Now
Answer:
A B)
Questions 223
C)
D)
329
A. Channel-group mode passive.
Option A B.
Option B C.
Option C D.
330
It requires both sides to have identical keys C.
C. bridge mode
D. lightweight mode
repeater mode
B.
autonomous mode
331
Answer:
Questions 228
What does the switch do when it receives the frame from host D? Options:
Options: A.
D. Point-to-Point Protocol
It floods the frame out of every port except the source port. Show Answer Buy Now
332
C Questions 230
Options:
A.
B.
C.
D.
Answer: Switch AccSw2 has just been added to the network along with PC2.
All VLANs have been implemented on AccSw2. How must the
B ports on AccSw2 be configured to establish Layer 2 connectivity
between PC1 and PC2?
333
Options: D.
A.
B. Answer:
Questions 231
C.
Text Description
automatically generated
334
Options:
335
Answer:
336
Answer:
Options:
Questions 233
Show Answer Buy Now
Drag and drop the AAA features from the left onto the
corresponding AAA security services on the right. Not all options
Answer:
are used.
337
Answer:
Drag and drop the destination IPs from the left onto the paths to
Questions 234 reach those destinations on the right.
Refer to the exhibit.
Options:
338
Show Answer Buy Now
Answer:
B)
C)
Questions 235
D)
Two switches have been implemented and all interfaces are at the
default configuration level. A trunk link must be implemented
between two switches with these requirements:
339
Option B
C.
Option C
D.
Option D
Answer:
340