Easter Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

What are two protocols within the IPsec suite? (Choose two)

A.

AH

B.

3DES

C.

ESP

D.

TLS

E.

AES

Full Access
Question # 5

What is a benefit of VRRP?

A.

It provides traffic load balancing to destinations that are more than two hops from the source.

B.

It provides the default gateway redundancy on a LAN using two or more routers.

C.

It allows neighbors to share routing table information between each other.

D.

It prevents loops in a Layer 2 LAN by forwarding all traffic to a root bridge, which then makes the final forwarding decision.

Full Access
Question # 6

Refer to the exhibit.

An extended ACL has been configured and applied to router R2 The configuration failed to work as intended Which two

changes stop outbound traffic on TCP ports 25 and 80 to 10.0.20 0 26 from the 10.0.10 0/26 subnet while still allowing all other traffic? (Choose

two )

A.

Add a "permit ip any any" statement to the begining of ACL 101 for allowed traffic.

B.

Add a "permit ip any any" statement at the end of ACL 101 for allowed traffic

C.

The source and destination IPs must be swapped in ACL 101

D.

The ACL must be configured the Gi0/2 interface inbound on R1

E.

The ACL must be moved to the Gi0/1 interface outbound on R2

Full Access
Question # 7

Drag and drop the characteristics of network architectures from the left onto the type of architecture on the right.

Full Access
Question # 8

Refer to the exhibit.

Which prefix did router R1 learn from internal EIGRP?

A.

192.168.10/24

B.

192.168.3.0/24

C.

192.168.2.0/24

D.

172.16 1.0/24

Full Access
Question # 9

IP connectivity between the three routers is configured. OSPF adjacencies must be established.

1. Configure R1 and R2 Router IDs using the interface IP addresses from the link that is shared between them.

2. Configure the R2 links with a max value facing R1 and R3. R2 must become the DR. R1 and R3 links facing R2 must remain with the default OSPF configuration for DR election. Verify the configuration after clearing the OSPF process.

3. Using a host wildcard mask, configure all three routers to advertise their respective Loopback1 networks.

4. Configure the link between R1 and R3 to disable their ability to add other OSPF routers.

Full Access
Question # 10

What is the main difference between traditional networks and controller-based networking?

A.

Controller-based networks increase TCO for the company, and traditional networks require less investment.

B.

Controller-based networks provide a framework for Innovation, and traditional networks create efficiency.

C.

Controller-based networks are open for application requests, and traditional networks operate manually.

D.

Controller-based networks are a closed ecosystem, and traditional networks take advantage of programmability.

Full Access
Question # 11

What is the difference regarding reliability and communication type between TCP and UDP?

A.

TCP is reliable and is a connection-oriented protocol UDP is not reliable and is a connectionless protocol

B.

TCP is not reliable and is a connection-oriented protocol; UDP is reliable and is a connectionless protocol

C.

TCP is not reliable and is a connectionless protocol; UDP is reliable and is a connection-oriented protocol

D.

TCP is reliable and is a connectionless protocol; UDP is not reliable and is a connection-oriented protocol

Full Access
Question # 12

What causes a port to be placed in the err-disabled state?

A.

latency

B.

port security violation

C.

shutdown command issued on the port

D.

nothing plugged into the port

Full Access
Question # 13

Which two encoding methods are supported by REST APIs? (Choose two)

A.

YAML

B.

JSON

C.

EBCDIC

D.

SGML

E.

XML

Full Access
Question # 14

Refer the exhibit.

What is the cause of poor performance on router R19?

A.

excessive collisions

B.

speed and duplex mismatch

C.

port oversubscription

D.

excessive CRC errors

Full Access
Question # 15

What is a function of the core and distribution layers in a collapsed-core architecture?

A.

The router must use IPv4 and IPv6 addresses at Layer 3.

B.

The core and distribution layers are deployed on two different devices to enable failover.

C.

The router can support HSRP for Layer 2 redundancy in an IPv6 network.

D.

The router operates on a single device or a redundant pair.

Full Access
Question # 16

Refer to the exhibit.

Which per-hop QoS behavior is R1 applying to incoming packets?

A.

queuing

B.

marking

C.

shaping

D.

policing

Full Access
Question # 17

Refer to the exhibit.

A packet sourced from 10.10.10.1 is destined for 10.10.8.14. What is the subnet mask of the destination route?

A.

255.255.254.0

B.

255.255.255.240

C.

255.255.255.248

D.

255.255.255.252

Full Access
Question # 18

Which channel-group mode must be configured when multiple distribution interfaces connected to a WLC are bundled?

A.

Channel-group mode passive.

B.

Channel-group mode on.

C.

Channel-group mode desirable.

D.

Channel-group mode active.

Full Access
Question # 19

What is an advantage of using auto mode versus static mode for power allocation when an access point is connected to a PoE switch port?

A.

All four pairs of the cable are used

B.

It detects the device is a powered device

C.

The default level is used for the access point

D.

Power policing is enabled at the same time

Full Access
Question # 20

What are two characteristics of the distribution layer in a three-tier network architecture? (Choose two.)

A.

serves as the network aggregation point

B.

provides a boundary between Layer 2 and Layer 3 communications

C.

designed to meet continuous, redundant uptime requirements

D.

is the backbone for the network topology

E.

physical connection point for a LAN printer

Full Access
Question # 21

Which function does the range of private IPv4 addresses perform?

A.

allows multiple companies to each use the same addresses without conflicts

B.

provides a direct connection for hosts from outside of the enterprise network

C.

ensures that NAT is not required to reach the internet with private range addressing

D.

enables secure communications to the internet for all external hosts

Full Access
Question # 22

What does a switch use to build its MAC address table?

A.

VTP

B.

DTP

C.

egress traffic

D.

ingress traffic

Full Access
Question # 23

Which attribute does a router use to select the best path when two or more different routes to the same destination exist from two different routing protocols.

A.

dual algorithm

B.

metric

C.

administrative distance

D.

hop count

Full Access
Question # 24

Which HTTP status code is returned after a successful REST API request?

A.

200

B.

301

C.

404

D.

500

Full Access
Question # 25

Drag and drop the functions from the left onto the correct network components on the right

Full Access
Question # 26

On workstations running Microsoft Windows, which protocol provides the default gateway for the device?

A.

DHCP

B.

STP

C.

SNMP

D.

DNS

Full Access
Question # 27

What are two improvements provided by automation for network management in an SDN environment? (Choose two)

A.

Data collection and analysis tools establish a baseline for the network

B.

Artificial intelligence identifies and prevents potential design failures.

C.

Machine learning minimizes the overall error rate when automating troubleshooting processes

D.

New devices are onboarded with minimal effort

E.

Proprietary Cisco APIs leverage multiple network management tools.

Full Access
Question # 28

TION NO: 117

Refer to the exhibit. After the configuration is applied, the two routers fail to establish an OSPF neighbor relationship. what is the reason for the problem?

A.

The OSPF router IDs are mismatched.

B.

Router2 is using the default hello timer.

C.

The network statement on Router1 is misconfigured.

D.

The OSPF process IDs are mismatched.

Full Access
Question # 29

Refer to the exhibit.

Which configuration issue is preventing the OSPF neighbor relationship from being established between the two routers?

A.

R2 is using the passive-interface default command

B.

R1 has an incorrect network command for interface Gi1/0

C.

R2 should have its network command in area 1

D.

R1 interface Gil/0 has a larger MTU size

Full Access
Question # 30

Refer to the exhibit.

Router R1 Fa0/0 is unable ping router R3 Fa0/1.

Which action must be taken in router R1 to help resolve the configuration issue?

A.

set the default network as 20.20.20.0/24

B.

set the default gateway as 20.20.20.2

C.

configure a static route with Fa0/1 as the egress interface to reach the 20.20.20.0/24 network

D.

configure a static route with 10.10.10.2 as the next hop to reach the 20.20.20.0/24 network

Full Access
Question # 31

Refer to the exhibit.

Which command configures a floating static route to provide a backup to the primary link?

A.

ip route 0.0.0.0 0.0.0.0 209.165.202.131

B.

ip route 209.165.201.0 255.255.255.224 209.165.202.130

C.

ip route 0.0.0.0 0.0.0.0 209.165.200.224

D.

ip route 209.165.200.224 255.255.255.224 209.165.202.129 254

Full Access
Question # 32

Refer to the exhibit.

Which route type does the routing protocol Code D represent in the output?

A.

internal BGP route

B.

/24 route of a locally configured IP

C.

statically assigned route

D.

route learned through EIGRP

Full Access
Question # 33

Which two capacities of Cisco DNA Center make it more extensible as compared to traditional campus device management? (Choose two)

A.

adapters that support all families of Cisco IOS software

B.

SDKs that support interaction with third-party network equipment

C.

customized versions for small, medium, and large enterprises

D.

REST APIs that allow for external applications to interact natively with Cisco DNA Center

E.

modular design that is upgradable as needed

Full Access
Question # 34

Refer to the exhibit.

What is the metric of the route to the 192.168.10.33/28 subnet?

A.

84

B.

110

C.

128

D.

192

E.

193

Full Access
Question # 35

A network engineer is replacing the switches that belong to a managed-services client with new Cisco Catalyst switches. The new switches will be configured for updated security standards, including replacing Telnet services with encrypted connections and doubling the modulus size from 1024. Which two commands must the engineer configure on the new switches? (Choose two.)

A.

crypto key generate rsa general-keys modulus 1024

B.

transport input all

C.

crypto key generate rsa usage-keys

D.

crypto key generate rsa modulus 2048

E.

transport Input ssh

Full Access
Question # 36

NO: 251

Which IPsec transport mode encrypts the IP header and the payload?

A.

pipe

B.

control

C.

transport

D.

tunnel

Full Access
Question # 37

What event has occurred if a router sends a notice level message to a syslog server?

A.

A TCP connection has been torn down

B.

An ICMP connection has been built

C.

An interface line has changed status

D.

A certificate has expired.

Full Access
Question # 38

What is a characteristic of cloud-based network topology?

A.

wireless connections provide the sole access method to services

B.

onsite network services are provided with physical Layer 2 and Layer 3 components

C.

services are provided by a public, private, or hybrid deployment

D.

physical workstations are configured to share resources

Full Access
Question # 39

A device detects two stations transmitting frames at the same time. This condition occurs after the first 64 bytes of the frame is received interface counter increments?

A.

collision

B.

CRC

C.

runt

D.

late collision

Full Access
Question # 40

Refer to the exhibit. An engineer is creating a secure preshared key based SSID using WPA2 for a wireless network running on 2.4 GHz and 5 GHz. Which two tasks must the engineer perform to complete the process? (Choose two.)

A.

Select the 802.1 x option for Auth Key Management.

B.

Select the WPA Policy option.

C.

Select the PSK option for Auth Key Management.

D.

Select the AES option for Auth Key Management.

E.

Select the AES (CCMP128) option for WPA2/WPA3 Encryption.

Full Access
Question # 41

Which alternative to password authentication Is Implemented to allow enterprise devices to log in to the corporate network?

A.

magic links

B.

one-time passwords

C.

digital certificates

D.

90-day renewal policies

Full Access
Question # 42

Refer to the exhibit.

An engineer has started to configure replacement switch SW1. To verify part of the configuration, the engineer issued the commands as shown and noticed that the entry for PC2 is missing. Which change must be applied to SW1 so that PC1 and PC2 communicate normally?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 43

What is a function of Opportunistic Wireless Encryption in an environment?

A.

offer compression

B.

increase security by using a WEP connection

C.

provide authentication

D.

protect traffic on open networks

Full Access
Question # 44

Drag and drop the characteristics of networking from the left onto the networking types on the right.

Full Access
Question # 45

Refer to the exhibit.

Which configuration enables DHCP addressing for hosts connected to interface FastEthernetO/1 on router R4?

A.

interface FastEthernet0/0

ip helper-address 10.0.1.1

i

access-list 100 permit udp host 10.0.1.1 eq bootps host 10.148.2.1

B.

interface FastEthernot0/1

ip helper-address 10.0.1.1

!

access-list 100 permit tcp host 10.0.1.1 eq 67 host 10.148.2.1

C.

interface FastEthernetO/0

ip helper-address 10.0.1.1

I

access-list 100 permit host 10.0.1.1 host 10.148.2.1 eq bootps

D.

interface FastEthernet0/1

ip helper-address 10.0.1.1

!

access-list 100 permit udp host 10.0.1.1 eq bootps host 10.148.2.1

Full Access
Question # 46

Refer to the exhibit.

Which two commands when used together create port channel 10? (Choose two.)

A.

int range g0/0-1

channel-group 10 mode active

B.

int range g0/0-1 chanm.l-group 10 mode desirable

C.

int range g0/0-1

channel-group 10 mode passive

D.

int range g0/0-1 channel-group 10 mode auto

E.

int range g0/0-1 channel-group 10 mode on

Full Access
Question # 47

Refer to the exhibit.

R1 learns all routes via OSPF Which command configures a backup static route on R1 to reach the 192 168.20.0/24 network via R3?

A.

R1(config)#ip route 192.168.20.0 255.255.0.0 192.168.30.2

B.

R1(config)#ip route 192.168.20.0 255.255.255.0 192.168.30.2 90

C.

R1(config)#ip route 192.168.20.0 255.255.255.0 192.168.30.2 111

D.

R1(config)#ip route 192.168.20.0 255.255.255.0 192.168.30.2

Full Access
Question # 48

Refer to the exhibit.

All VLANs are present in the VLAN database. Which command sequence must be applied to complete the configuration?

A.

Interface FastEthernet0/1 switchport trunk native vlan 10 switchport trunk allowed vlan 10,15

B.

Interface FastEthernet0/1 switchport mode trunk switchport trunk allowed vlan 10,15

C.

interface FastEthernet0/1 switchport mode access switchport voice vlan 10

D.

Interface FastEthernet0/1 switchport trunk allowed vlan add 10 vlan 10 private-vlan isolated

Full Access
Question # 49

A network engineer must implement an IPv6 configuration on the vlan 2000 interface to create a routable locally-unique unicast address that is blocked from being advertised to the internet. Which configuration must the engineer apply?

A.

interface vlan 2000

ipv6 address ffc0:0000:aaaa::1234:2343/64

B.

interface vlan 2000

Ipv6 address fc00:0000:aaaa:a15d:1234:2343:8aca/64

C.

interface vlan 2000

ipv6 address fe80;0000:aaaa::1234:2343/64

D.

interface vlan 2000

ipv6 address fd00::1234:2343/64

Full Access
Question # 50

Refer to the exhibit.

Router R1 resides in OSPF Area 0. After updating the R1 configuration to influence the paths that it will use to direct traffic, an engineer verified that each of the four Gigabit interfaces has the same route to 10.10.0.0/16. Which interface will R1 choose to send traffic to reach the route?

A.

GigabitEthernet0/0

B.

GigabltEthornet0/1

C.

GigabitEthernet0/2

D.

GigabitEthernet0/3

Full Access
Question # 51

Refer to the exhibit.

How many objects are present in the given JSON-encoded data?

A.

one

B.

four

C.

seven

D.

nine

Full Access
Question # 52

Refer to the exhibit.

Router R14 is in the process of being configured. Which configuration must be used to establish a host route to PC 10?

A.

ip route 10.80.65.10 255.255.255.254 10.80.65.1

B.

ip route 10.8065.10 255.255.255.255 10.73.65.66

C.

ip route 1073.65.65 255.0.0.0 10.80.65.10

D.

ip route 10.73.65.66 0.0.0.255 10.80.65.10

Full Access
Question # 53

Refer to the exhibit.

An engineer is asked to insert the new VLAN into the existing trunk without modifying anything previously configured Which command accomplishes this task?

A.

switchport trunk allowed vlan 100-104

B.

switchport trunk allowed vlan add 104

C.

switchport trunk allowed vlan all

D.

switchport trunk allowed vlan 104

Full Access
Question # 54

Refer to the Exhibit.

After the switch configuration the ping test fails between PC A and PC B Based on the output for switch 1. which error must be corrected?

A.

There is a native VLAN mismatch

B.

Access mode is configured on the switch ports.

C.

The PCs are m the incorrect VLAN

D.

All VLANs are not enabled on the trunk

Full Access
Question # 55

What is the primary effect of the spanning-tree portfast command?

A.

it enables BPDU messages

B.

It minimizes spanning-tree convergence time

C.

It immediately puts the port into the forwarding state when the switch is reloaded

D.

It immediately enables the port in the listening state

Full Access
Question # 56

What is a function of Wireless LAN Controller?

A.

register with a single access point that controls traffic between wired and wireless endpoints.

B.

use SSIDs to distinguish between wireless clients.

C.

send LWAPP packets to access points.

D.

monitor activity on wireless and wired LANs

Full Access
Question # 57

A manager asks a network engineer to advise which cloud service models are used so employees do not have to waste their time installing, managing, and updating software which is only used occasionally Which cloud service model does the engineer recommend?

A.

infrastructure-as-a-service

B.

platform-as-a-service

C.

business process as service to support different types of service

D.

software-as-a-service

Full Access
Question # 58

Which device performs stateful inspection of traffic?

A.

firewall

B.

switch

C.

access point

D.

wireless controller

Full Access
Question # 59

Which two WAN architecture options help a business scalability and reliability for the network? (Choose two)

A.

asychronous routing

B.

single-homed branches

C.

dual-homed branches

D.

static routing

E.

dynamic routing

Full Access
Question # 60

Which two outcomes are predictable behaviors for HSRP? (Choose two.)

A.

The two routers synchronize configurations to provide consistent packet forwarding

B.

The two routers negotiate one router as the active router and the other as the standby router

C.

Each router has a different IP address, both routers act as the default gateway on the LAN, and traffic is load-balanced between them

D.

The two routers share a virtual IP address that is used as the default gateway for devices on the LAN

E.

The two routers share the same interface IP address and default gateway traffic is load-balanced between them

Full Access
Question # 61

Drag and drop the DHCP snooping terms from the left onto the descriptions on the right.

Full Access
Question # 62

Refer to the exhibit.

An engineer is updating the R1 configuration to connect a new server to the management network. The PCs on the management network must be blocked from pinging the default gateway of the new server. Which command must be configured on R1 to complete the task?

A.

R1(config)#lp route 172.16.2.2 255.255.255.248 gi0/1

B.

R1(config)#jp route 172.16.2.2 255.255.255.255 gi0/0

C.

R1(config>#ip route 172.16.2.0 255.255.255.0 192.168.1.15

D.

R1(conflg)#ip route 172.16.2.0 255.255.255.0 192.168.1.5

Full Access
Question # 63

Refer to the exhibit.

Users need to connect to the wireless network with IEEE 802. 11r-compatible devices. The connection must be maintained as users travel between floors or to other areas in the building What must be the configuration of the connection?

A.

Select the WPA Policy option with the CCKM option.

B.

Disable AES encryption.

C.

Enable Fast Transition and select the FT 802.1x option.

D.

Enable Fast Transition and select the FT PSK option.

Full Access
Question # 64

Refer to the exhibit.

Which command must be issued to enable a floating static default route on router A?

A.

lp route 0.0.0.0 0.0.0.0 192.168.1.2

B.

ip default-gateway 192.168.2.1

C.

ip route 0.0.0.0 0.0.0.0 192.168.2.1 10

D.

ip route 0.0.0.0 0.0.0.0 192.168.1.2 10

Full Access
Question # 65

Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.

Full Access
Question # 66

Refer to the exhibit. A network engineer updates the existing configuration on interface fastethernet1/1 switch SW1. It must establish an EtherChannel by using the same group designation with another vendor switch. Which configuration must be performed to complete the process?

A.

interface port-channel 2

channel-group 2 mode desirable

B.

interface fasteinernet 1/1

channel-group 2 mode active

C.

interface fasteinernet 1/1

channel-group 2 mode on

D.

interface port-channel 2

channel-group 2 mode auto

Full Access
Question # 67

How does machine learning improve the detection of unauthorized network access?

A.

It monitors for outdated software.

B.

It dictates security policy updates.

C.

It identifies patterns indicating intrusions.

D.

It assigns security clearance levels.

Full Access
Question # 68

Why is UDP more suitable than TCP tor applications that require low latency, such as VoIP?

A.

UDP reliably guarantees delivery of all packets and TCP drops packets under heavy load.

B.

TCP sends an acknowledgment for every packet that is received and UDP operates without acknowledgments.

C.

UDP uses sequencing data for packets to arrive in order, and TCP offers the capability to receive packets in random order.

D.

TCP uses congestion control for efficient packet delivery and UDP uses flow control mechanisms for the delivery of packets.

Full Access
Question # 69

Drag and drop the TCP and UDP characteristics from the left onto the supporting protocols on the right. Not all options are used.

Full Access
Question # 70

All physical cabling is in place. A company plans to deploy 32 new sites.

The sites will utilize both IPv4 and IPv6 networks.

1 . Subnet 172.25.0.0/16 to meet the subnet requirements and maximize

the number of hosts

Using the second subnet

• Assign the first usable IP address to e0/0 on Sw1O1

• Assign the last usable IP address to e0/0 on Sw102

2. Subnet to meet the subnet requirements and maximize

the number of hosts

c Using the second subnet

• Assign an IPv6 GUA using a unique 64-Bit interface identifier

on e0/0 on Sw101

• Assign an IPv6 GUA using a unique 64-Bit interface identifier

on eO/O on swi02

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using

the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Full Access
Question # 71

All physical cabling between the two switches is installed. Configure the network connectivity between the switches using the designated VLANs and interfaces.

1. Configure VLAN 100 named Compute and VLAN 200 named Telephony where required for each task.

2. Configure Ethernet0/1 on SW2 to use the existing VLAN named Available.

3. Configure the connection between the switches using access ports.

4. Configure Ethernet0/1 on SW1 using data and voice VLANs.

5. Configure Ethemet0/1 on SW2 so that the Cisco proprietary neighbor discovery protocol is turned off for the designated interface only.

Full Access
Question # 72

Refer to the exhibit. The user has connectivity to devices on network 192.168.3 0/24 but cannot reach users on the network 10.10.1.0724.

What is the first step to verify connectivity?

A.

Is the internet reachable?

B.

Is the default gateway reachable?

C.

Is the DNS server reachable?

Full Access
Question # 73

Refer to the exhibit. A packet sourced from 10.10.10.32 is destined for the Internet. What is the administrative distance for the destination route?

A.

0

B.

1

C.

2

D.

32

Full Access
Question # 74

Refer to the exhibit. An engineer just installed network 10.120.10.0/24. Which configuration must be applied to the R14 router to add the new network to its OSPF routing table?

A.

router ospf 100

network 10.120.10.0 255.255.255.0 area 0

B.

router ospf 120

network 10.120.10.0 255.255.255.0 area 0

ip route 10.120.10.0 255.255.255.0 fa0/1

C.

router ospf 100 area 0

network 10.120.10.0 0.0.0.255

Full Access
Question # 75

A network engineer is configuring a new router at a branch office. The router is connected to an upstream WAN network that allows the branch to communicate with the head office. The central time server with IP address 172.24.54.8 is located behind a firewall at the head office. Which command must the engineer configure so that the software clock of the new router synchronizes with the time server?

A.

ntp master 172.24.54.8

B.

ntp client 172.24.54.8

C.

ntp peer 172.24.54.8

D.

ntp server 172.24.54.8

Full Access
Question # 76

Which type of security program is violated when a group of employees enters a building using the ID badge of only one person?

A.

intrusion detection

B.

user awareness

C.

physical access control

D.

network authorization

Full Access
Question # 77

All physical cabling is in place. Router R4 and PCI are fully configured and

inaccessible. R4's WAN interfaces use .4 in the last octet for each subnet.

Configurations should ensure that connectivity is established end-to-end.

1 . Configure static routing to ensure RI prefers the path through R2 to

reach only PCI on R4's LAN

2. Configure static routing that ensures traffic sourced from RI will take

an alternate path through R3 to PCI in the event of an outage along

the primary path

3. Configure default routes on RI and R3 to the Internet using the least number of hops

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using

the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Full Access
Question # 78

Physical connectivity is implemented between the two Layer 2 switches, and the network connectivity between them must be configured

1. Configure an LACP EtherChannel and number it as 1; configure it between switches SW1 and SVV2 using interfaces Ethernet0/0 and Ethernet0/1 on both sides. The LACP mode must match on both ends

2 Configure the EtherChannel as a trunk link.

3. Configure the trunk link with 802.1 q tags.

4. Configure the native VLAN of the EtherChannel as VLAN 15.

Full Access
Question # 79

Configure IPv4 and IPv6 connectivity between two routers. For IPv4, use a /28 network from the 192.168.1.0/24 private range. For IPv6, use the first /64 subnet from the 2001:0db8:aaaa::/48 subnet.

1. Using Ethernet0/1 on routers R1 and R2, configure the next usable/28 from the 192.168.1.0/24 range. The network 192.168.1.0/28 is unavailable.

2. For the IPv4 /28 subnet, router R1 must be configured with the first usable host address.

3. For the IPv4 /28 subnet, router R2 must be configured with the last usable host address.

4. For the IPv6 /64 subnet, configure the routers with the IP addressing provided from the topology.

5. A ping must work between the routers on the IPv4 and IPv6 address ranges.

Full Access
Question # 80

Connectivity between four routers has been established. IP connectivity must be configured in the order presented to complete the implementation. No dynamic routing protocols are included.

1. Configure static routing using host routes to establish connectivity from router R3 to the router R1 Loopback address using the source IP of 209.165.200.230.

2. Configure an IPv4 default route on router R2 destined for router R4.

3. Configure an IPv6 default router on router R2 destined for router R4.

Full Access
Question # 81

Which two statements distinguish authentication from accounting? (Choose two.)

A.

Only authentication records the duration of a user's connection.

B.

Only authentication supports user-activity audits.

C.

Only authentication provides supporting information for billing users.

D.

Only authentication challenges users for their credentials and returns a response.

E.

Only authentication validates "who you are."

Full Access
Question # 82

Which interface or port on the WLC is the default for in-band device administration and communications between the controller and access points?

A.

virtual interface

B.

management interface

C.

console port

D.

service port

Full Access
Question # 83

Refer to the exhibit.

Rooter R1 is added to the network and configured with tie 10 0 0 64/26 and 10.0.20.0/24 subnets However traffic destined for the LAN on R3 is not access. Which command when executed on R1 defines a tunic route to reach the R3 LAN?

A)

B)

C)

A.

Option

B.

Option

C.

Option

Full Access
Question # 84

Which two practices are recommended for an acceptable security posture in a network? (Choose two)

A.

Backup device configurations to encrypted USB drives for secure retrieval

B.

maintain network equipment in a secure location

C.

Use a cryptographic keychain to authenticate to network devices

D.

Place internal email and file servers in a designated DMZ

E.

Disable unused or unnecessary ports, interfaces and services

Full Access
Question # 85

A router has two static routes to the same destination network under the same OSPF process. How does the router forward packets to the destination if the next-hop devices are different?

A.

The router chooses the route with the oldest age.

B.

The router load-balances traffic over all routes to the destination.

C.

The router chooses the next hop with the lowest MAC address.

D.

The router chooses the next hop with the lowest IP address.

Full Access
Question # 86

What is the operating mode and role of a backup port on a shared LAN segment in Rapid PVST+?

A.

forwarding mode and provides the lowest-cost path to the root bridge for each VLAN

B.

learning mode and provides the shortest path toward the root bridge handling traffic away from the LAN

C.

blocking mode and provides an alternate path toward the designated bridge

D.

listening mode and provides an alternate path toward the root bridge

Full Access
Question # 87

A network administrator wants the syslog server to filter incoming messages into different files based on their Importance. Which filtering criteria must be used?

A.

level

B.

message body

C.

process ID

D.

facility

Full Access
Question # 88

Drag and drop the common functions from the left onto the cofresponding network topology architecture layer on the right. Not all common functions are used.

Full Access
Question # 89

What is the difference between controller-based networks and traditional networks as they relate to control-plane and/or data-plane functions?

A.

Controller-based networks centralize all important data-plane functions, and traditional networks distribute data-plane functions.

B.

Controller-based networks centralize all important control-plane functions, and traditional networks distribute control-plane functions.

C.

Traditional networks centralize all important control-plane functions, and controller-based networks distribute control-plane functions.

D.

Traditional networks centralize all important data-plane functions, and controller-based networks distribute data-plane functions.

Full Access
Question # 90

What does the term "spirt MAC” refer to in a wireless architecture?

A.

divides data link layer functions between the AP and WLC

B.

combines the management and control functions from the data-forwarding functions

C.

uses different MAC addresses for 2.4 GHz and 5 GHz bands on the same AP

D.

leverages two APs to handle control and data traffic

Full Access
Question # 91

IP connectivity and OSPF are preconfigured on all devices where necessary. Do not make any changes to the IP addressing or OSPF. The company policy uses connected interfaces and next hops when configuring static routes except for load balancing or redundancy without floating static. Connectivity must be established between subnet 172.20.20.128/25 on the Internet and the LAN at 192.168.0.0/24 connected to SW1:

1. Configure reachability to the switch SW1 LAN subnet in router R2.

2. Configure default reachability to the Internet subnet in router R1.

3. Configure a single static route in router R2 to reach to the Internet subnet considering both redundant links between routers R1 and R2. A default route is NOT allowed in router R2.

4. Configure a static route in router R1 toward the switch SW1 LAN subnet where the primary link must be through Ethernet0/1. and the backup link must be through Ethernet0/2 using a floating route. Use the minimal administrative distance value when required.

Full Access
Question # 92

Which CRUD operation corresponds to me HTTP GET method?

A.

delete

B.

create

C.

update

D.

read

Full Access
Question # 93

Refer to the exhibit. How will the device handle a packet destined to IP address 100.100.100.100?

A.

If will choose the route with the longest match.

O 100.100.100.100'32 (110/21) via 192.168.1.1. 00:05:57. EmernetO/1.

B.

It will always prefer the static route over dynamic routes and choose the route

S 100.100.0.0/16(1/0] via 192.168.4.1.

C.

It will choose the route with the highest metric.

D 100.100.100.0/24 (90/435200) via 192.168.2.1. 00:00:13. EthernetO/2.

D.

It will choose the route with the lowest metric,

R 100.0.0.0/8 [120/2] via 192.168.3.1. 00:00:13. EthernetO/3.

Full Access
Question # 94

Which authentication method requires the user to provide a physical attribute to authenticate successfully?

A.

password

B.

muftifactor

C.

biometric

D.

certificate

Full Access
Question # 95

An engineer must configure a core router with a floating static default route to the backup router at 10.200.0.2. Which command meets the requirements?

A.

ip route 0.0.0.0 0.0.0.0 10.200.0.2 1

B.

Ip route 0.0.0.0 0.0.0.0 10.200.0.2 floating

C.

ip route 0.0.0.0 0.0.0.0 10.200.0.2

D.

Ip route 0.0.0.0 0.0.0.0 10.200.0.2 10

Full Access
Question # 96

What are two facts that differentiate optical-fiber cabling from copper cabling? (Choose two.)

A.

It is less expensive when purchasing patch cables.

B.

It has a greater sensitivity to changes in temperature and moisture.

C.

It provides greater throughput options.

D.

It carries signals for longer distances.

E.

It carries electrical current further distances for PoE devices.

Full Access
Question # 97

Which AP feature provides a captive portal for users to authenticate register and accept terms before accessing the internet?

A.

One-Click

B.

Hotspot

C.

Enhanced Bluetooth

D.

Whole Home

Full Access
Question # 98

Refer to the exhibit. Which interface does a packet take to reach the destination address of 10.10.10.147?

A.

FastEthemet 0/0

B.

Senal0/0

C.

FastEthemet 0/1

Full Access
Question # 99

A HCP pool has been created with the name CONTROL. The pool uses the next to last usable IP address as the default gateway for the DHCP clients. The server is located at 172.16 32.15. What is the step in the process for clients on the 192.168.52.0/24 subnet to reach the DHCP server?

A.

ip forward-protocol udp 137

B.

ip default-network 192.168.52.253

C.

ip helper-address 172.16.32.15

D.

ip default-gateway 192.168.52.253

Full Access
Question # 100

Which solution is appropriate when mitigating password attacks where the attacker was able to sniff the clear-text password of the system administrator?

A.

next-generation firewall to keep stateful packet inspection

B.

multifactor authentication using two separate authentication sources

C.

ACL to restrict incoming Telnet sessions "admin" accounts

D.

IPS with a block list of known attack vectors

Full Access
Question # 101

What is the RFC 4627 default encoding for JSON text?

A.

UCS-2

B.

UTF-8

C.

Hex

D.

GB18030

Full Access
Question # 102

Refer to the exhibit. A network administrator is configuring a router for user access via SSH. The service-password encryption command has been issued. The configuration must meet these requirements:

• Create the username as CCUser.

• Create the password as NA!2Scc.

• Encrypt the user password.

What must be configured to meet the requirements?

A.

username CCUser privies 10 password NA!2Scc

B.

username CCUser password NA!2Scc enable password level 5 NA!2$cc

C.

username CCUser secret NA!2Scc

D.

username CCUser privilege 15 password NA!2Scc enable secret 0 NA!2$cc

Full Access
Question # 103

Which WLC management connection type is vulnerable to man-in-the-middIe attacks?

A.

Telnet

B.

console

C.

HTTPS

D.

SSH

Full Access
Question # 104

Three switches must be configured for Layer 2 connectivity. The company requires only the designated VLANs to be configured on their respective switches and permitted accross any links between switches for security purposes. Do not modify or delete VTP configurations.

The network needs two user-defined VLANs configured:

VLAN 110: MARKETING

VLAN 210: FINANCE

1. Configure the VLANs on the designated switches and assign them as access ports to the interfaces connected to the PCs.

2. Configure the e0/2 interfaces on Sw1 and Sw2 as 802.1q trunks with only the required VLANs permitted.

3. Configure the e0/3 interfaces on Sw2 and Sw3 as 802.1q trunks with only the required VLANs permitted.

Full Access
Question # 105

Drag and drop each characteristic of device-management technologies from the left onto the deployment type on the right.

Full Access
Question # 106

Refer to the exhibit.

What is the issue with the interface GigabitEthernet0/0/1?

A.

Port security

B.

High throughput

C.

Cable disconnect

D.

duplex mismatch

Full Access
Question # 107

Refer to the exhibit.

Which two values does router R1 use to determine the best path to reach destinations in network 1,0.0.0/8? (Choose two.)

A.

longest prefix match

B.

highest administrative distance

C.

highest metric

D.

lowest metric

E.

lowest cost to reach the next hop

Full Access
Question # 108

Refer to the exhibit. An engineer must configure a static network route between two networks so that host A communicates with host B. Drag and drop the commands from the left onto the routers where they must be configured on the right. Not all commands are used.

Full Access
Question # 109

Refer to the exhibit.

In which structure does the word "warning" directly reside?

A.

array

B.

object

C.

Boolean

D.

string

Full Access
Question # 110

Which cipher is supported for wireless encryption only with the WPA2 standard?

A.

AES256

B.

AES

C.

RC4

D.

SHA

Full Access
Question # 111

Which QoS queuing method discards or marks packets that exceed the desired bit rate of traffic flow?

A.

shaping

B.

policing

C.

CBWFQ

D.

LLQ

Full Access
Question # 112

Refer to the exhibit.

A new VLAN and switch are added to the network. A remote engineer configures OldSwitch and must ensure that the configuration meets these requirements:

• accommodates current configured VLANs

• expands the range to include VLAN 20

• allows for IEEE standard support for virtual LANs

Which configuration on the NewSwitch side of the link meets these requirements?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 113

Refer to the exhibit.

Which configuration for RTR-1 deniess SSH access from PC-1 to any RTR-1 interface and allows all other traffic?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 114

Which advantage does the network assurance capability of Cisco DNA Center provide over traditional campus management?

A.

Cisco DNA Center correlates information from different management protocols to obtain insights, and traditional campus management requires manual analysis.

B.

Cisco DNA Center handles management tasks at the controller to reduce the load on infrastructure devices, and traditional campus management uses the data backbone.

C.

Cisco DNA Center leverages YANG and NETCONF to assess the status of fabric and nonfabric devices, and traditional campus management uses CLI exclusively.

D.

Cisco DNA Center automatically compares security postures among network devices, and traditional campus management needs manual comparisons.

Full Access
Question # 115

What are two benefits of controller-based networking compared to traditional networking?

A.

controller-based increases network bandwidth usage, while traditional lightens the load on the network.

B.

controller-based inflates software costs, while traditional decreases individual licensing costs

C.

Controller-based reduces network configuration complexity, while traditional increases the potential for errors

D.

Controller-based provides centralization of key IT functions. While traditional requires distributes management function

E.

controller-based allows for fewer network failure, while traditional increases failure rates.

Full Access
Question # 116

Refer to the exhibit.

How must router A be configured so that it only sends Cisco Discovery Protocol Information to router C?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 117

How do TCP and UDP differ in the way they guarantee packet delivery?

A.

TCP uses checksum, acknowledgement, and retransmissions, and UDP uses checksums only.

B.

TCP uses two-dimensional parity checks, checksums, and cyclic redundancy checks and UDP uses retransmissions only.

C.

TCP uses checksum, parity checks, and retransmissions, and UDP uses acknowledgements only.

D.

TCP uses retransmissions, acknowledgement and parity checks and UDP uses cyclic redundancy checks only.

Full Access
Question # 118

Why was the RFC 1918 address space defined?

A.

conserve public IPv4 addressing

B.

preserve public IPv6 address space

C.

reduce instances of overlapping IP addresses

D.

support the NAT protocol

Full Access
Question # 119

What is the difference in data transmission delivery and reliability between TCP and UDP?

A.

TCP transmits data at a higher rate and ensures packet delivery. UDP retransmits lost data to ensure applications receive the data on the remote end.

B.

UDP sets up a connection between both devices before transmitting data. TCP uses the three-way handshake to transmit data with a reliable connection.

C.

UDP is used for multicast and broadcast communication. TCP is used for unicast communication and transmits data at a higher rate with error checking.

D.

TCP requires the connection to be established before transmitting data. UDP transmits data at a higher rate without ensuring packet delivery.

Full Access
Question # 120

A network engineer is configuring an OSPFv2 neighbor adjacency Drag and drop the parameters from the left onto their required categories on the right. Not all parameters are used

Full Access
Question # 121

Which resource is able to be shared among virtual machines deployed on the same physical server?

A.

disk

B.

applications

C.

VM configuration file

D.

operating system

Full Access
Question # 122

Refer to Exhibit.

The loopback1 interface of the Atlanta router must reach the loopback3 interface of the Washington router. Which two static host routes must be configured on the NEW York router? (Choose two)

A.

ipv6 route 2000::1/128 2012::1

B.

ipv6 route 2000::3/128 2023::3

C.

ipv6 route 2000::3/128 s0/0/0

D.

ipv6 route 2000::1/128 2012::2

E.

ipv6 route 2000::1/128 s0/0/1

Full Access
Question # 123

Which type of wireless encryption is used for WPA2 in preshared key mode?

A.

TKIP with RC4

B.

RC4

C.

AES-128

D.

AES-256

Full Access
Question # 124

A frame that enters a switch fails the Frame Check Sequence. Which two interface counters are incremented? (Choose two)

A.

runts

B.

giants

C.

frame

D.

CRC

E.

input errors

Full Access
Question # 125

Aside from discarding, which two states does the switch port transition through while using RSTP (802.1w)? (Choose two)

A.

listening

B.

blocking

C.

forwarding

D.

learning

E.

speaking

Full Access
Question # 126

Which syslog severity level is considered the most severe and results in the system being considered unusable?

A.

Alert

B.

Error

C.

Emergency

D.

Critical

Full Access
Question # 127

What differentiates the Cisco OfficeExtend AP mode from FlexConnect AP mode?

A.

FlexConnect allows a personal SSID to be configured on the AP, and personal SSIDs are not supported with OfficeExtend.

B.

OfficeExtend does not support DTLS tunneling of traffic to the WLC, and FlexConnect tunnels traffic to the WLC with DTLS.

C.

OfficeExtend tunnels all traffic through the WLC, and FlexConnect terminates client traffic at the AP switch port.

D.

FlexConnect must be deployed behind a router that NATs the client traffic, and OfficeExtend uses public IP sources.

Full Access
Question # 128

What is the default port-security behavior on a trunk link?

A.

It causes a network loop when a violation occurs.

B.

It disables the native VLAN configuration as soon as port security is enabled.

C.

It places the port in the err-disabled state if it learns more than one MAC address.

D.

It places the port in the err-disabled slate after 10 MAC addresses are statically configured.

Full Access
Question # 129

Refer to the exhibit.

An engineer must configure router R2 so it is elected as the DR on the WAN subnet. Which command sequence must be configured?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 130

Drag and chop the TCP/IP protocols from the left onto their primary transmission protocols on the right.

Full Access
Question # 131

How is a configuration change made to a wireless AP in lightweight mode?

A.

SSH connection to the management IP of the AP

B.

EolP connection via the parent WLC

C.

CAPWAP/LWAPP connection via the parent WLC

D.

HTTPS connection directly to the out-of-band address of the AP

Full Access
Question # 132

Refer to the exhibit.

The loopback1 interface of the Atlanta router must reach the lookback3 interface of the Washington router.

A.

ipv6 route 2000::1/128 2012::2

B.

ipv6 route 2000::1/128 2012::1

C.

ipv6 route 2000:3 123 s0/0/0

D.

ipv6 route 2000::3/128 2023::3

E.

ipv6 route 2000::1/128 s0/0/1

Full Access
Question # 133

A network architect is deciding whether to implement Cisco autonomous access points or lightweight access points. Which fact about firmware updates must the architect consider? Unlike lightweight access points, which require

A.

Unlike lightweight access points, which require redundant WLCs to support firmware upgrades, autonomous access points require only one WLC.

B.

Unlike autonomous access points, lightweight access points store a complete copy of the current firmware for backup.

C.

Unlike lightweight access points, autonomous access points can recover automatically from a corrupt firmware update.

D.

Unlike autonomous access points, lightweight access points require a WLC to implement remote firmware updates.

Full Access
Question # 134

Which (unction generally performed by a traditional network device is replaced by a software-defined controller?

A.

encryption and decryption for VPN link processing

B.

building route tables and updating the forwarding table

C.

changing the source or destination address during NAT operations

D.

encapsulation and decapsulation of packets in a data-link frame

Full Access
Question # 135

What must be considered for a locally switched FlexConnect AP if the VLANs that are used by the AP and client access are different?

A.

The APs must be connected to the switch with multiple links in LAG mode

B.

The switch port mode must be set to trunk

C.

The native VLAN must match the management VLAN of the AP

D.

IEEE 802.10 trunking must be disabled on the switch port.

Full Access
Question # 136

When the LAG configuration is updated on a Cisco WLC which additional task must be performed when changes are complete?

A.

Flush all MAC addresses from the WLC

B.

Re-associate the WLC with the access point.

C.

Re-enable the WLC interfaces

D.

Reboot the WLC

Full Access
Question # 137

Which interface IP address serves as the tunnel source for CAPWAP packets from the WLC to an AP?

A.

service

B.

trunk

C.

AP-manager

D.

virtual AP connection

Full Access
Question # 138

Drag and drop the IPv6 addresses from the left onto the corresponding address types on the right.

Full Access
Question # 139

Refer to the exhibit.

Which switch becomes the root bridge?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 140

What are two reasons lo configure PortFast on a switch port attached to an end host? (Choose two.)

A.

to enable the number of MAC addresses learned on the port to l

B.

to protect the operation of the port from topology change processes

C.

to enable the pod to enter the forwarding state immediately when the host boots up

D.

to prevent the port from participating in Spanning Tree Protocol operations

E.

to block another switch or host from communicating through the port

Full Access
Question # 141

Refer to the exhibit.

Which format matches the Modified EUI-64 IPv6 interface address for the network 2001:db8::/64?

A.

2001 :db8::5000:0004:5678:0090/64

B.

2001 :db8:4425:5400:77ft:fe07:/64

C.

2001 :db8::5000:00ff:fe04 0000/64

D.

2001 :db8::5200:00ff:fe04:0000/64

Full Access
Question # 142

Which two protocols are used by an administrator for authentication and configuration on access points?

A.

Kerberos

B.

802.1Q

C.

802.1x

D.

TACACS+

E.

RADIUS

Full Access
Question # 143

What is a function of a Layer 3 switch?

A.

move frames between endpoints limited to IP addresses

B.

transmit broadcast traffic when operating in Layer 3 mode exclusively

C.

forward Ethernet frames between VLANs using only MAC addresses

D.

flood broadcast traffic within a VLAN

Full Access
Question # 144

How does the dynamically-learned MAC address feature function?

A.

The CAM table is empty until ingress traffic arrives at each port

B.

Switches dynamically learn MAC addresses of each connecting CAM table.

C.

The ports are restricted and learn up to a maximum of 10 dynamically-learned addresses

D.

It requires a minimum number of secure MAC addresses to be filled dynamically

Full Access
Question # 145

Which plane is centralized in software-defined networking?

A.

application

B.

services

C.

control

D.

data

Full Access
Question # 146

Refer to the exhibit. An engineer is using the Cisco WLC GUI to configure a WLAN for WPA2 encryption with AES and preshared key Cisc0123456. After the engineer selects the WPA + WPA2 option from the Layer 2 Security drop-down list, which two tasks must they perform to complete the process? (Choose two.)

A.

Select the WPA2 Policy, AES, and TKIP check boxes.

B.

Select ASCII from the PSK Format drop-down list, enter the key, and leave the Auth Key Mgmt setting blank.

C.

Select PSK from the Auth Key Mgmt drop-down list, set the PSK Format to ASCII, and enter the key.

D.

Select the WPA2 Policy and AES check boxes.

Full Access
Question # 147

Connectivity between three routers has been established, and IP services must be configured jn the order presented to complete the implementation Tasks assigned include configuration of NAT, NTP, DHCP, and SSH services.

1. All traffic sent from R3 to the R1 Loopback address must be configured for NAT on R2. All source addresses must be translated from R3 to the IP address of Ethernet0/0 on R2, while using only a standard access list named NAT To verify, a ping must be successful to the R1 Loopback address sourced from R3. Do not use NVI NAT configuration.

2. Configure R1 as an NTP server and R2 as a client, not as a peer, using the IP address of the R1 Ethernet0/2 interface. Set the clock on the NTP server for midnight on January 1, 2019.

3. Configure R1 as a DHCP server for the network 10.1.3.0/24 in a pool named TEST. Using a single command, exclude addresses 1-10 from the range. Interface Ethernet0/2 on R3 must be issued the IP address of 10.1.3.11 via DHCP.

4. Configure SSH connectivity from R1 to R3, while excluding access via other remote connection protocols. Access for user root and password Cisco must be set on router R3 using RSA and 1024 bits. Verify connectivity using an SSH session from router R1 using a destination address of 10.1.3.11. Do NOT modify console access or line numbers to accomplish this task.

Full Access
Question # 148

Refer to the exhibit. IPv6 is being Implemented within the enterprise. The command Ipv6 unlcast-routing is configure. Interlace GlgO/0 on R1 must be configured to provide a dynamic assignment using the assigned IPv6 block Which command accomplishes this task?

A.

ipv6 address 2001:DB8:FFFF:FCF3::1/64

B.

ipv6 address autoconfig 2001:DB8:FFFF:FCF2::/64

C.

ipv6 address 2001:DB8:FFFF:FCF3::/64 eui-64

D.

ipv6 address 2001:DB8:FFFF:FCF3::/64 link-local

Full Access
Question # 149

Refer to the exhibit. This ACL is configured to allow client access only to HTTP, HTTPS, and DNS services via UDP. The new administrator wants to add TCP access to the DNS service. Which configuration updates the ACL efficiently?

A.

ip access-list extended Services

35 permit tcp 10.0.0.0 0.255.255.255 host 198.51.100.11 eq domain

B.

no ip access-list extended Services

ip access-list extended Services

30 permit tcp 10.0.0.0 0.255.255.255 host 198.51.100.11 eq domain

C.

ip access-list extended Services

permit tcp 10.0.0.0 0.255.255.255 host 198.51.100.11 eq domain

D.

no ip access-list extended Services

ip access-list extended Services

permit udp 10.0.0.0 0.255.255.255 any eq 53

permit tcp 10.0.0.0 0.255.255.255 host 198.51.100.11 eq domain

deny ip any any log

Full Access
Question # 150

Refer to the exhibit Routers R1 R2 and R3 use a protocol to identify their neighbors' IP addresses hardware platforms, and software versions. A network engineer must configure R2 to avoid sharing any neighbor information with R3, and maintain its relationship with R1. What action meets this requirement?

A.

Configure the no cdp enable command on gO/2.

B.

Configure the no cdp run command globally.

C.

Configure the no lldp run command globally.

D.

Configure the no lldp receive command on gQV1.

Full Access
Question # 151

Which advantage does machine learning offer for network security?

A.

It improves real-time threat detection.

B.

It manages firewall rule sets.

C.

It enforces password complexity requirements.

D.

It controls VPN access permissions.

Full Access
Question # 152

What is an Ansible inventory?

A.

file that defines the target devices upon which commands and tasks are executed

B.

unit of Python code to be executed within Ansible

C.

collection of actions to perform on target devices, expressed in YAML format

D.

device with Ansible installed that manages target devices

Full Access
Question # 153

Physical connectivity is implemented between the two Layer 2 switches,

and the network connectivity between them must be configured.

I . Configure an LACP EtherChanneI and number it as 44; configure it

between switches SWI and SW2 using interfaces EthernetO/O and

Ethernet0/1 on both sides. The LACP mode must match on both ends.

2. Configure the EtherChanneI as a trunk link.

3. Configure the trunk link with 802. Iq tags.

4. Configure VLAN 'MONITORING' as the untagged VLAN of the

EtherChannel.

==================

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using

the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Full Access
Question # 154

Refer to the exhibit. Which type of JSON data is shown?

A.

sequence

B.

string

C.

object

D.

Boolean

Full Access
Question # 155

What is a role of wireless controllers in an enterprise network?

A.

centralize the management of access points in an enterprise network

B.

support standalone or controller-based architectures

C.

serve as the first line of defense in an enterprise network

D.

provide secure user logins to devices on the network.

Full Access
Question # 156

Which two events occur automatically when a device is added to Cisco DNA Center? (Choose two. )

A.

The device Is assigned to the Global site.

B.

The device Is placed into the Unmanaged state.

C.

The device is placed into the Provisioned state.

D.

The device is placed into the Managed state.

E.

The device is assigned to the Local site.

Full Access
Question # 157

Which action does the router take as it forwards a packet through the network?

A.

The router replaces the original source and destination MAC addresses with the sending router MAC address as the source and neighbor MAC address as the destination

B.

The router encapsulates the original packet and then includes a tag that identifies the source router MAC address and transmits it transparently to the destination

C.

The router encapsulates the source and destination IP addresses with the sending router IP address as the source and the neighbor IP address as the destination

D.

The router replaces the source and destination labels with the sending router interface label as a source and the next hop router label as a destination

Full Access
Question # 158

Drag and drop the IPv6 address type characteristics from the left to the right.

Full Access
Question # 159

What are two roles of the Dynamic Host Configuration Protocol (DHCP)? (Choose two)

A.

The DHCP server offers the ability to exclude specific IP addresses from a pool of IP addresses

B.

The DHCP client can request up to four DNS server addresses

C.

The DHCP server assigns IP addresses without requiring the client to renew them

D.

The DHCP server leases client IP addresses dynamically.

E.

The DHCP client maintains a pool of IP addresses it can assign.

Full Access
Question # 160

Drag and drop the network protocols from the left onto the correct transport services on the right.

Full Access
Question # 161

Refer to the exhibit.

Which outcome is expected when PC_A sends data to PC_B?

A.

The switch rewrites the source and destination MAC addresses with its own.

B.

The source MAC address is changed.

C.

The source and destination MAC addresses remain the same.

D.

The destination MAC address is replaced with ffff.ffff.ffff.

Full Access
Question # 162

Which security program element involves installing badge readers on data-center doors to allow workers to enter and exit based on their job roles?

A.

role-based access control

B.

biometrics

C.

multifactor authentication

D.

physical access control

Full Access
Question # 163

Which technology allows for multiple operating systems to be run on a single host computer?

A.

virtual routing and forwarding

B.

network port ID visualization

C.

virtual device contexts

D.

server visualization

Full Access
Question # 164

Several new coverage cells are required to improve the Wi-Fi network of an organization. Which two standard designs are recommended? (choose two.)

A.

5GHz provides increased network capacity with up to 23 nonoveriapping channels.

B.

For maximum throughput, the WLC is configured to dynamically set adjacent access points to the same channel.

C.

5GHz channel selection requires an autonomous access point.

D.

Adjacent cells with overlapping channels use a repeater access point.

E.

Cells that overlap one another are configured to use nonoveriapping channels.

Full Access
Question # 165

An organization has decided to start using cloud-provided services. Which cloud service allows the organization to install its own operating system on a virtual machine?

A.

platform-as-a-service

B.

software-as-a-service

C.

network-as-a-service

D.

infrastructure-as-a-service

Full Access
Question # 166

Which WAN access technology is preferred for a small office / home office architecture?

A.

broadband cable access

B.

frame-relay packet switching

C.

dedicated point-to-point leased line

D.

Integrated Services Digital Network switching.

Full Access
Question # 167

When a site-to-site VPN is configured, which IPsec mode provides encapsulation and encryption of the entire original P packet?

A.

IPsec tunnel mode with AH

B.

IPsec transport mode with AH

C.

IPsec tunnel mode with ESP

D.

IPsec transport mode with ESP

Full Access
Question # 168

Refer to the exhibit.

After running the code in the exhibit, which step reduces the amount of data that the NETCONF server returns to the NETCONF client, to only the interface's configuration?

A.

Use the Ixml library to parse the data returned by the NETCONF server for the interface's configuration.

B.

Create an XML filter as a string and pass it to get_config() method as an argument.

C.

Create a JSON filter as a string and pass it to the get_config() method as an argument.

D.

Use the JSON library to parse the data returned by the NETCONF server for the interface's configuration.

Full Access
Question # 169

What is a DHCP client?

A.

a workstation that requests a domain name associated with its IP address

B.

a host that is configured to request an IP address automatically

C.

a server that dynamically assigns IP addresses to hosts.

D.

a router that statically assigns IP addresses to hosts.

Full Access
Question # 170

What are two fundamentals of virtualization? (choose two)

A.

The environment must be configured with one hypervisor that serves solely as a network manager to monitor SNMP traffic

B.

It allows logical network devices to move traffic between virtual machines and the rest of the physical network

C.

It allows multiple operating systems and applications to run independently on one physical server.

D.

It allows a physical router to directly connect NICs from each virtual machine into the network

E.

It requires that some servers, virtual machines and network gear reside on the Internet

Full Access
Question # 171

Which type of information resides on a DHCP server?

A.

a list of the available IP addresses in a pool

B.

a list of public IP addresses and their corresponding names

C.

usernames and passwords for the end users in a domain

D.

a list of statically assigned MAC addresses

Full Access
Question # 172

What is the benefit of using FHRP?

A.

reduced management overhead on network routers

B.

balancing traffic across multiple gateways in proportion to their loads

C.

higher degree of availability

D.

reduced ARP traffic on the network

Full Access
Question # 173

Which 802.11 frame type is association response?

A.

management

B.

protected frame

C.

control

D.

action

Full Access
Question # 174

Refer to the exhibit.

Which switch becomes the root bridge?

A.

S1

B.

S2

C.

S3

D.

S4

Full Access
Question # 175

How does a switch process a frame received on Fa0/1 with the destination MAC address of 0e38.7363.657b when the table is missing the address?

A.

lt drops the frame immediately.

B.

It forwards the frame back out of interface Fa0/1.

C.

It floods the frame to all interfaces except Fa0/1.

D.

It holds the frame until the MAC address timer expires and then drops the frame.

Full Access
Question # 176

Drag and drop the QoS congestion management terms from the left onto the description on the right.

Full Access
Question # 177

Refer to the exhibit.

If OSPF is running on this network, how does Router 2 handle traffic from Site B to 10.10.13/25 at Site A?

A.

It sends packets out of interface Fa0/2 only.

B.

It sends packets out of interface Fa0/1 only.

C.

It cannot send packets to 10.10.13 128/25

D.

It load-balances traffic out of Fa0/1 and Fa0/2

Full Access
Question # 178

What is the expected outcome when an EUI-64 address is generated?

A.

The seventh bit of the original MAC address of the interface is inverted

B.

The interface ID is configured as a random 64-bit value

C.

The characters FE80 are inserted at the beginning of the MAC address of the interface

D.

The MAC address of the interface is used as the interface ID without modification

Full Access
Question # 179

Refer to the exhibit.

An engineer configured the New York router with state routes that point to the Atlanta and Washington sites. When command must be configured on the Atlanta and Washington routers so that both sites are able to reach the loopback2 interface on the New York router?

A.

ipv6 route ::/0 Serial 0/0/1

B.

ipv6 route 0/0 Serial 0/0/0

C.

ipv6 route ::/0 Serial 0/0/0

D.

ip route 0.0.0.0.0.0.0.0 Serial 0/0/0

E.

ipv6 route ::/0 2000::2

Full Access
Question # 180

An engineer must configure traffic for a VLAN that is untagged by the switch as it crosses a trunk link. Which command should be used?

A.

switchport trunk allowed vlan 10

B.

switchport trunk native vlan 10

C.

switchport mode trunk

D.

switchport trunk encapsulation dot1q

Full Access
Question # 181

How does CAPWAP communicate between an access point in local mode and a WLC?

A.

The access point must directly connect to the WLC using a copper cable

B.

The access point must not be connected to the wired network, as it would create a loop

C.

The access point must be connected to the same switch as the WLC

D.

The access point has the ability to link to any switch in the network, assuming connectivity to the WLC

Full Access
Question # 182

Which two must be met before SSH can operate normally on a Cisco IOS switch? (Choose two)

A.

The switch must be running a k9 (crypto) IOS image

B.

The Ip domain-name command must be configured on the switch

C.

IP routing must be enabled on the switch

D.

A console password must be configured on the switch

E.

Telnet must be disabled on the switch

Full Access
Question # 183

Which command must be entered to configure a DHCP relay?

A.

ip helper-address

B.

ip address dhcp

C.

ip dhcp pool

D.

ip dhcp relay

Full Access
Question # 184

Which unified access point mode continues to serve wireless clients after losing connectivity to the Cisco Wireless LAN Controller?

A.

sniffer

B.

mesh

C.

flexconnect

D.

local

Full Access
Question # 185

When a client and server are not on the same physical network, which device is used to forward requests and replies between client and server for DHCP?

A.

DHCP relay agent

B.

DHCP server

C.

DHCPDISCOVER

D.

DHCPOFFER

Full Access
Question # 186

What is the function of a server?

A.

It transmits packets between hosts in the same broadcast domain.

B.

It provides shared applications to end users.

C.

It routes traffic between Layer 3 devices.

D.

It Creates security zones between trusted and untrusted networks

Full Access
Question # 187

Which plane is centralized by an SDN controller?

A.

management-plane

B.

control-plane

C.

data-plane

D.

services-plane

Full Access
Question # 188

Which statement correctly compares traditional networks and controller-based networks?

A.

Only traditional networks offer a centralized control plane

B.

Only traditional networks natively support centralized management

C.

Traditional and controller-based networks abstract policies from device configurations

D.

Only controller-based networks decouple the control plane and the data plane

Full Access
Question # 189

Which two values or settings must be entered when configuring a new WLAN in the Cisco Wireless LAN Controller GUI? (Choose two)

A.

management interface settings

B.

QoS settings

C.

Ip address of one or more access points

D.

SSID

E.

Profile name

Full Access
Question # 190

What is the primary function of a Layer 3 device?

A.

to analyze traffic and drop unauthorized traffic from the Internet

B.

to transmit wireless traffic between hosts

C.

to pass traffic between different networks

D.

forward traffic within the same broadcast domain

Full Access
Question # 191

Which type of organization should use a collapsed-core architecture?

A.

large and requires a flexible, scalable network design

B.

large and must minimize downtime when hardware fails

C.

small and needs to reduce networking costs currently

D.

small but is expected to grow dramatically in the near future

Full Access
Question # 192

What are two characteristics of an SSID? (Choose Two)

A.

It can be hidden or broadcast in a WLAN

B.

It uniquely identifies an access point in a WLAN

C.

It uniquely identifies a client in a WLAN

D.

It is at most 32 characters long.

E.

IT provides secured access to a WLAN

Full Access
Question # 193

Which 802.11 frame type is indicated by a probe response after a client sends a probe request?

A.

action

B.

management

C.

control

D.

data

Full Access
Question # 194

Refer to the exhibit.

An administrator must configure interfaces Gi1/1 and Gi1/3 on switch SW11 PC-1 and PC-2 must be placed in the Data VLAN and Phone-1 must be placed in the Voice VLAN Which configuration meets these requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 195

Refer to the exhibit.

What is the effect of this configuration?

A.

All ARP packets are dropped by the switch

B.

Egress traffic is passed only if the destination is a DHCP server.

C.

All ingress and egress traffic is dropped because the interface is untrusted

D.

The switch discard all ingress ARP traffic with invalid MAC-to-IP address bindings.

Full Access
Question # 196

Drag and drop the descriptions from the left onto the configuration-management technologies on the right.

Full Access
Question # 197

What is the same for both copper and fiber interfaces when using SFP modules?

A.

They support an inline optical attenuator to enhance signal strength

B.

They provide minimal interruption to services by being hot-swappable

C.

They offer reliable bandwidth up to 100 Mbps in half duplex mode

D.

They accommodate single-mode and multi-mode in a single module

Full Access
Question # 198

Which action is taken by a switch port enabled for PoE power classification override?

A.

When a powered device begins drawing power from a PoE switch port a syslog message is generated

B.

As power usage on a PoE switch port is checked data flow to the connected device is temporarily paused

C.

If a switch determines that a device is using less than the minimum configured power it assumes the device has failed and disconnects

D.

Should a monitored port exceeds the maximum administrative value for power, the port is shutdown and err-disabled

Full Access
Question # 199

Which port type supports the spanning-tree portfast command without additional configuration?

A.

access ports

B.

Layer 3 main Interfaces

C.

Layer 3 suninterfaces

D.

trunk ports

Full Access
Question # 200

Which protocol prompts the Wireless LAN Controller to generate its own local web administration SSL certificate for GUI access?

A.

HTTPS

B.

RADIUS

C.

TACACS+

D.

HTTP

Full Access
Question # 201

Refer to the exhibit.

An engineer booted a new switch and applied this configuration via the console port. Which additional configuration must be applied to allow administrators to authenticate directly to enable privilege mode via Telnet using a local username and password?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 202

Which QoS tool is used to optimize voice traffic on a network that is primarily intended for data traffic?

A.

FIFO

B.

WFQ

C.

PQ

D.

WRED

Full Access
Question # 203

Refer to the exhibit.

With which metric was the route to host 172.16.0.202 learned?

A.

0

B.

110

C.

38443

D.

3184439

Full Access
Question # 204

What Is a syslog facility?

A.

Host that is configured for the system to send log messages

B.

password that authenticates a Network Management System to receive log messages

C.

group of log messages associated with the configured severity level

D.

set of values that represent the processes that can generate a log message

Full Access
Question # 205

A corporate office uses four floors in a building

• Floor 1 has 24 users

• Floor 2 has 29 users

• Floor 3 has 28 users

•Floor 4 has 22 users

Which subnet summarizes and gives the most efficient distribution of IP addresses for the router configuration?

A.

192.168.0.0/26 as summary and 192.168.0.0/29 for each floor

B.

192.168.0.0.24 as summary and 192.168.0.0/28 for each floor

C.

192.168.0.0/23 as summary and 192.168.0.0/25 for each floor

D.

l92.168.0.0/25 as summary and 192.168.0.0/27 for each floor

Full Access
Question # 206

What is a role of access points in an enterprise network?

A.

connect wireless devices to a wired network

B.

support secure user logins to devices or the network

C.

integrate with SNMP in preventing DDoS attacks

D.

serve as a first line of defense in an enterprise network

Full Access
Question # 207

What are two benefits of network automation? (Choose two)

A.

reduced operational costs

B.

reduced hardware footprint

C.

faster changes with more reliable results

D.

fewer network failures

E.

increased network security

Full Access
Question # 208

Refer to the exhibit.

An engineer is bringing up a new circuit to the MPLS provider on the Gi0/1 interface of Router1 The new circuit uses eBGP and teams the route to VLAN25 from the BGP path What s the expected behavior for the traffic flow for route 10.10.13.0/25?

A.

Traffic to 10.10.13.0.25 is load balanced out of multiple interfaces

B.

Route 10.10.13.0/25 is updated in the routing table as being learned from interface Gi0/1.

C.

Traffic to 10.10.13.0/25 is asymmeteical

D.

Route 10.10.13.0/25 learned via the GiO/0 interface remains in the routing table

Full Access
Question # 209

Refer to the exhibit.

Which two commands were used to create port channel 10? (Choose two )

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 210

Refer to the exhibit.

Which route type is configured to reach the internet?

A.

host route

B.

default route

C.

floating static route

D.

network route

Full Access
Question # 211

Router A learns the same route from two different neighbors, one of the neighbor routers is an OSPF neighbor and the other is an EIGRP neighbor. What is the administrative distance of the route that will be installed in the routing table?

A.

20

B.

90

C.

110

D.

115

Full Access
Question # 212

Which action does the router take as rt forwards a packet through the network?

A.

The router replaces the source and desinaoon labels wth the sending router uterface label as a source and the next hop router label as a desbnabon

B.

The router encapsulates the source and destination IP addresses with the sending router P address as the source and the neighbor IP address as the destination

C.

The router replaces the original source and destination MAC addresses with the sending router MAC address as the source and neighbor MAC address as the destination

D.

The router encapsulates the original packet and then includes a tag that identifies the source router MAC address and transmit transparently to the destination

Full Access
Question # 213

Refer to the exhibit.

Which IPv6 configuration is required for R17 to successfully ping the WAN interface on R18?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 214

What is a characteristic of spine-and-leaf architecture?

A.

Each device is separated by the same number of hops

B.

It provides variable latency

C.

It provides greater predictability on STP blocked ports.

D.

Each link between leaf switches allows for higher bandwidth.

Full Access
Question # 215

Which mode must be set for APs to communicate to a Wireless LAN Controller using the Control and Provisioning of Wireless Access Points (CAPWAP) protocol?

A.

bridge

B.

route

C.

autonomous

D.

lightweight

Full Access
Question # 216

What is a function of TFTP in network operations?

A.

transfers a backup configuration file from a server to a switch using a username and password

B.

transfers files between file systems on a router

C.

transfers a configuration files from a server to a router on a congested link

D.

transfers IOS images from a server to a router for firmware upgrades

Full Access
Question # 217

Refer to the exhibit.

An administrator is tasked with configuring a voice VLAN. What is the expected outcome when a Cisco phone is connected to the GigabitEfriemet3/1/4 port on a switch?

A.

The phone and a workstation that is connected to the phone do not have VLAN connectivity

B.

The phone and a workstation that is connected to the phone send and receive data in VLAN 50.

C.

The phone sends and receives data in VLAN 50, but a workstation connected to the phone has no VLAN connectivity

D.

The phone sends and receives data in VLAN 50, but a workstation connected to the phone sends and receives data in VLAN 1

Full Access
Question # 218

Which configuration management mechanism uses TCP port 22 by default when communicating with managed nodes?

A.

Ansible

B.

Python

C.

Puppet

D.

Chef

Full Access
Question # 219

While examining excessive traffic on the network, it is noted that all incoming packets on an interface appear to be allowed even though an IPv4 ACL is applied to the interface.

Which two misconfigurations cause this behavior? (Choose two)

A.

The packets fail to match any permit statement

B.

A matching permit statement is too high in the access test

C.

A matching permit statement is too broadly defined

D.

The ACL is empty

E.

A matching deny statement is too high in the access list

Full Access
Question # 220

Which condition must be met before an NMS handles an SNMP trap from an agent?

A.

The NMS software must be loaded with the MIB associated with the trap.

B.

The NMS must be configured on the same router as the SNMP agent

C.

The NMS must receive a trap and an inform message from the SNMP agent within a configured interval

D.

The NMS must receive the same trap from two different SNMP agents to verify that it is reliable.

Full Access
Question # 221

Refer to the exhibit.

Which change to the configuration on Switch?

allows the two switches to establish an GtherChannel?

A.

Change the protocol to EtherChannel mode on.

B.

Change the LACP mode to active

C.

Change the LACP mode to desirable

D.

Change the protocol to PAqP and use auto mode

Full Access
Question # 222

An administrator must secure the WLC from receiving spoofed association requests. Which steps must be taken to configure the WLC to restrict the requests and force the user to wait 10 ms to retry an association request?

A.

Enable Security Association Teardown Protection and set the SA Query timeout to 10

B.

Enable MAC filtering and set the SA Query timeout to 10

C.

Enable 802.1x Layer 2 security and set me Comeback timer to 10

D.

Enable the Protected Management Frame service and set the Comeback timer to 10

Full Access
Question # 223

A user configured OSPF and advertised the Gigabit Ethernet interface in OSPF By default, which type of OSPF network does this interface belong to?

A.

point-to-multipoint

B.

point-to-point

C.

broadcast

D.

nonbroadcast

Full Access
Question # 224

The service password-encryption command is entered on a router. What is the effect of this configuration?

A.

restricts unauthorized users from viewing clear-text passwords in the running configuration

B.

encrypts the password exchange when a VPN tunnel is established

C.

prevents network administrators from configuring clear-text passwords

D.

protects the VLAN database from unauthorized PC connections on the switch

Full Access
Question # 225

Where does wireless authentication happen?

A.

SSID

B.

radio

C.

band

D.

Layer 2

Full Access
Question # 226

Refer to the exhibit. An engineer must add a subnet for a new office that will add 20 users to the network. Which IPv4 network and subnet mask combination does the engineer assign to minimize wasting addresses?

A.

10.10.225.48 255.255.255.240

B.

10.10.225.32 255.255.255.240

C.

10.10.225.48 255.255.255.224

D.

10.10.225.32 255.255.255.224

Full Access
Question # 227

Which technology must be implemented to configure network device monitoring with the highest security?

A.

IP SLA

B.

syslog

C.

NetFlow

D.

SNMPv3

Full Access
Question # 228

What is the effect when loopback interfaces and the configured router ID are absent during the OSPF Process configuration?

A.

No router ID is set, and the OSPF protocol does not run.

B.

The highest up/up physical interface IP address is selected as the router ID.

C.

The lowest IP address is incremented by 1 and selected as the router ID.

D.

The router ID 0.0.0.0 is selected and placed in the OSPF process.

Full Access
Question # 229

An engineer requires a scratch interface to actively attempt to establish a trunk link with a neighbor switch. What command must be configured?

A.

switchport mode trunk

B.

switchport mode dynamic desirable

C.

switchport mode dynamic auto

D.

switchport nonegotiate

Full Access
Question # 230

Refer to the exhibit.

Router R1 must be configured to reach the 10.0.3.0/24 network from the 10.0.1.0/24 segment.

Which command must be used to configure the route?

A.

ip route 10.0.3.0 0.255255.255 10.0.4.2

B.

route add 10.0.3.0 mask 255.255.255.0 10.0.4.3

C.

Ip route 10.0.3.0 255.255.255.0 10.0.4.3

D.

route add 10.0.3.0 0.255.255.255 10.0.4.2

Full Access
Question # 231

Refer to the exhibit.

What does route 10.0.1.3/32 represent in the routing table?

A.

the 10.0.0.0 network

B.

a single destination address

C.

the source 10.0.1.100

D.

all hosts in the 10.0.1.0 subnet

Full Access
Question # 232

The clients and OHCP server reside on different subnets. Which command must be used to forward requests and replies between clients on the 10.10.0.1/24 subnet and the DHCP server at 192.168.10.1?

A.

ip route 192.168.10.1

B.

ip default-gateway 192.168.10.1

C.

ip helper-address 192.168.10.1

D.

ip dhcp address 192.168.10.1

Full Access
Question # 233

What is a benefit of using private IPv4 addressing?

A.

Multiple companies can use the same addresses without conflicts.

B.

Direct connectivity is provided to internal hosts from outside an enterprise network.

C.

Communication to the internet Is reachable without the use of NAT.

D.

All external hosts are provided with secure communication to the Internet.

Full Access
Question # 234

A network analyst is tasked with configuring the date and time on a router using EXEC mode. The date must be set to January 1. 2020 and the time must be set to 12:00 am. Which command should be used?

A.

clock summer-time recurring

B.

clock timezone

C.

clock summer-time date

D.

clock set

Full Access
Question # 235

Under which condition is TCP preferred over UDP?

A.

UDP is used when low latency is optimal, and TCP is used when latency is tolerable.

B.

TCP is used when dropped data is more acceptable, and UDP is used when data is accepted out- of-order.

C.

TCP is used when data reliability is critical, and UDP is used when missing packets are acceptable.

D.

UDP is used when data is highly interactive, and TCP is used when data is time-sensitive.

Full Access
Question # 236

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 237

Refer to the exhibit.

Routers R1 and R2 are configured with RIP as the dynamic routing protocol. A network engineer must configure R1 with a floating static route to serve as a backup route to network 192.168.23. Which command must the engineer configure on R1?

A.

ip route 192.168.23.0 255.255.255.0 192.168.13.3 100

B.

ip route 192.168.23.0 255.255.255.0 192.168.13.3 121

C.

ip route 192.168.23.0 255.255.255.255 192.168.13.3 121

D.

ip route 192.168.23.0 255.255.255.0 192.168.13.3

Full Access
Question # 238

Refer to the exhibit.

The administrator must configure a floating sialic default route that points to 2001:db8:1234:2::1 and replaces the current default route only if it fails. Which command must the engineer configure on the CPE?

A.

ipv6 route ::/0 2001:db8:1234:2::1 3

B.

ipv6 route ::/128 2001 :db8:1234:2::1 3

C.

ipv6 route ::/0 2001:db8:1234:2::1 1

D.

ipv6 route ::/0 2001:db8:1234:2::1 2

Full Access
Question # 239

Which two wireless security stewards use Counter Mode Cipher Block Chaining Message Authentication Code Protocol for encryption and data integrity'? (Choose two.)

A.

WPA2

B.

WPA3

C.

Wi-Fi 6

D.

WEP

E.

WPA

Full Access
Question # 240

Exhibit.

The switches are connected via a Cat5 Ethernet cable that was successfully tested. The Interfaces are configured as access ports and are both in a 'down" status. What is the cause of this issue?

A.

The switches are configured with incompatible duplex settings.

B.

The distance between the two switches is not supported by Cut5.

C.

The speed settings on the switches are mismatched.

D.

The portfast command is missing from the configuration.

Full Access
Question # 241

Which command implies the use of SNMPv3?

A.

snmp-server host

B.

snmp-server community

C.

snmp-server enable traps

D.

snmp-server user

Full Access
Question # 242

Drag and drop the Wi-Fi terms from the left onto the descriptions on the right.

Full Access
Question # 243

Refer to the exhibit.

An administrator received a call from a branch office regarding poor application performance hosted at the headquarters. Ethernet 1 is connected between Router1 and the LAN switch. What identifies the issue?

A.

The QoS policy is dropping traffic.

B.

There is a duplex mismatch.

C.

The link is over utilized.

D.

The MTU is not set to the default value.

Full Access
Question # 244

Refer to the exhibit.

Which configuration establishes a Layer 2 LACP EtherChannel when applied to both switches?

A.

Interface range G1/1 – 1/3 switchport mode trunk channel-group 1 mode active no shutdown

B.

Interface range G1/1 – 1/3 switchport mode access channel-group 1 mode passive no shutdown

C.

Interface range G1/1 – 1/3 switchport mode trunk

channel-group 1 mode desirable

no shutdown

D.

Interface range G1/1 – 1/3 switchport mode access channel-group 1 mode on no shutdown

Full Access