Pre-Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

What is a function of an endpoint on a network?

A.

forwards traffic between VLANs on a network

B.

connects server and client devices to a network

C.

allows users to record data and transmit to a tile server

D.

provides wireless services to users in a building

Full Access
Question # 5

Refer to the exhibit.

A network engineer must update the configuration on Switch2 so that it sends LLDP packets every minute and the information sent via LLDP is refreshed every 3 minutes Which configuration must the engineer apply?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 6

OSPF must be configured between routers R1 and R2. Which OSPF configuration must be applied to router R1 to avoid a DR/BDR election?

A.

router ospf 1

network 192.168.1.1 0.0.0.0 area 0

interface e1/1

ip address 192.168.1.1 255.255.255.252

ip ospf network broadcast

B.

router ospf 1

network 192.168.1.1 0.0.0.0 area 0

interface e1/1

ip address 192.168.1.1 255.255.255.252

ip ospf network point-to-point

C.

router ospf 1

network 192.168.1.1 0.0.0.0 area 0

interface e1/1

ip address 192.168.1.1 255.255.255.252

ip ospf cost 0

D.

router ospf 1

network 192.168.1.1 0.0.0.0 area 0

hello interval 15

interface e1/1

Ip address 192.168.1.1 255.255.255.252

Full Access
Question # 7

Refer to the exhibit.

An engineer is updating the R1 configuration to connect a new server to the management network. The PCs on the management network must be blocked from pinging the default gateway of the new server. Which command must be configured on R1 to complete the task?

A.

R1(config)#lp route 172.16.2.2 255.255.255.248 gi0/1

B.

R1(config)#jp route 172.16.2.2 255.255.255.255 gi0/0

C.

R1(config>#ip route 172.16.2.0 255.255.255.0 192.168.1.15

D.

R1(conflg)#ip route 172.16.2.0 255.255.255.0 192.168.1.5

Full Access
Question # 8

Refer to the exhibit.

Which network prefix was learned via EIGRP?

A.

172.16.0.0/16

B.

192.168.2.0/24

C.

207.165.200.0/24

D.

192.168.1.0/24

Full Access
Question # 9

Refer to the exhibit.

Host A sent a data frame destined for host D

What does the switch do when it receives the frame from host A?

A.

It drops the frame from the switch CAM table.

B.

It floods the frame out of all ports except port Fa0/1.

C.

It shuts down the port Fa0/1 and places it in err-disable mode.

D.

It experiences a broadcast storm.

Full Access
Question # 10

Refer to the exhibit.

All traffic enters the CPE router from interface Serial0/3 with an IP address of 192 168 50 1 Web traffic from the WAN is destined for a LAN network where servers are load-balanced An IP packet with a destination address of the HTTP virtual IP of 192 1681 250 must be forwarded Which routing table entry does the router use?

A.

192.168.1.0/24 via 192.168.12.2

B.

192.168.1.128/25 via 192.168.13.3

C.

192.168.1.192/26 via 192.168.14.4

D.

192.168.1.224/27 via 192.168.15.5

Full Access
Question # 11

Refer to the exhibit.

The DHCP server and clients are connected to the same switch. What is the next step to complete the DHCP configuration to allow clients on VLAN 1 to receive addresses from the DHCP server?

A.

Configure the ip dhcp snooping trust command on the interlace that is connected to the DHCP client.

B.

Configure the ip dhcp relay information option command on the interface that is connected to the DHCP client.

C.

Configure the ip dhcp snooping trust command on the interface that is connected to the DHCP server.

D.

Configure the Ip dhcp relay information option command on the interface that is connected to the DHCP server.

Full Access
Question # 12

Refer to the exhibit.

All VLANs are present in the VLAN database. Which command sequence must be applied to complete the configuration?

A.

Interface FastEthernet0/1 switchport trunk native vlan 10 switchport trunk allowed vlan 10,15

B.

Interface FastEthernet0/1 switchport mode trunk switchport trunk allowed vlan 10,15

C.

interface FastEthernet0/1 switchport mode access switchport voice vlan 10

D.

Interface FastEthernet0/1 switchport trunk allowed vlan add 10 vlan 10 private-vlan isolated

Full Access
Question # 13

Which Layer 2 switch function encapsulates packets for different VLANs so that the packets traverse the same port and maintain traffic separation between the VLANs?

A.

VLAN numbering

B.

VLAN DSCP

C.

VLAN tagging

D.

VLAN marking

Full Access
Question # 14

Refer to the exhibit.

Which two commands must be configured on router R1 to enable the router to accept secure remote-access connections? (Choose two)

A.

transport input telnet

B.

crypto key generate rsa

C.

ip ssh pubkey-chain

D.

login console

E.

username cisco password 0 Cisco

Full Access
Question # 15

What is the difference between IPv6 unicast and anycast addressing?

A.

IPv6 anycast nodes must be explicitly configured to recognize the anycast address, but IPv6 unicast nodes require no special configuration

B.

IPv6 unicast nodes must be explicitly configured to recognize the unicast address, but IPv6 anycast nodes require no special configuration

C.

An individual IPv6 unicast address is supported on a single interface on one node but an IPv6 anycast address is assigned to a group of interfaces on multiple nodes.

D.

Unlike an IPv6 anycast address, an IPv6 unicast address is assigned to a group of interfaces on multiple nodes

Full Access
Question # 16

Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right.

Full Access
Question # 17

Which field within the access-request packet is encrypted by RADIUS?

A.

authorized services

B.

authenticator

C.

username

D.

password

Full Access
Question # 18

What is the function of the controller in a software-defined network?

A.

multicast replication at the hardware level

B.

fragmenting and reassembling packets

C.

making routing decisions

D.

forwarding packets

Full Access
Question # 19

How does Rapid PVST+ create a fast loop-free network topology?

A.

lt requires multiple links between core switches

B.

It generates one spanning-tree instance for each VLAN

C.

It maps multiple VLANs into the same spanning-tree instance

D.

It uses multiple active paths between end stations.

Full Access
Question # 20

What are two benefits of FHRPs? (Choose two.)

A.

They enable automatic failover of the default gateway.

B.

They allow multiple devices to serve as a single virtual gateway for clients in the network.

C.

They are able to bundle multiple ports to increase bandwidth.

D.

They prevent loops in the Layer 2 network.

E.

They allow encrypted traffic.

Full Access
Question # 21

R1 as an NTP server must have:

• NTP authentication enabled

• NTP packets sourced from Interface loopback 0

• NTP stratum 2

• NTP packets only permitted to client IP 209.165 200 225

How should R1 be configured?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 22

Drag and drop the Rapid PVST+ forwarding slate actions from the loft to the right. Not all actions are used.

Full Access
Question # 23

Refer to the exhibit.

What is a reason for poor performance on the network interface?

A.

The interface is receiving excessive broadcast traffic.

B.

The cable connection between the two devices is faulty.

C.

The interface is operating at a different speed than the connected device.

D.

The bandwidth setting of the interface is misconfigured

Full Access
Question # 24

A network administrator wants the syslog server to filter incoming messages into different files based on their Importance. Which filtering criteria must be used?

A.

level

B.

message body

C.

process ID

D.

facility

Full Access
Question # 25

Connectivity between four routers has been established. IP connectivity must be configured in the order presented to complete the implementation. No dynamic routing protocols are included.

1. Configure static routing using host routes to establish connectivity from router R3 to the router R1 Loopback address using the source IP of 209.165.200.230.

2. Configure an IPv4 default route on router R2 destined for router R4.

3. Configure an IPv6 default router on router R2 destined for router R4.

Full Access
Question # 26

Refer to the exhibit.

Which minimum configuration items are needed to enable Secure Shell version 2 access to R15?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 27

Which protocol is used for secure remote CLI access?

A.

HTTPS

B.

HTTP

C.

Telnet

D.

SSH

Full Access
Question # 28

Which wireless security protocol relies on Perfect Forward Secrecy?

A.

WPA3

B.

WPA

C.

WEP

D.

WPA2

Full Access
Question # 29

Refer to the exhibit.

An engineer is configuring the HO router. Which IPv6 address configuration must be applied to the router fa0'1 interface for the router to assign a unique 64-brt IPv6 address to Itself?

A.

ipv6 address 2001:DB8:0:1:C601:42FF:FE0F:7/64

B.

ipv6 address 2001:DB8:0:1:C601:42FE:800F:7/64

C.

ipv6 address 2001 :DB8:0:1:FFFF:C601:420F:7/64

D.

iov6 address 2001 :DB8:0:1:FE80:C601:420F:7/64

Full Access
Question # 30

What is a function of Opportunistic Wireless Encryption in an environment?

A.

offer compression

B.

increase security by using a WEP connection

C.

provide authentication

D.

protect traffic on open networks

Full Access
Question # 31

A network administrator is setting up a new IPv6 network using the 64-bit address 2001 0EB8 00C1 2200:0001 0000 0000 0331/64 To simplify the configuration the administrator has decided to compress the address Which IP address must the administrator configure?

A.

ipv6 address 21:EB8:C1:2200:1::331/64

B.

ipv6 address 2001:EB8:C1:22:1::331/64

C.

ipv6 address 2001 :EB8:C 1:2200.1 ::331-64

D.

ipv6 address 2001:EB8:C1:2200:1:0000:331/64

Full Access
Question # 32

All physical cabling between the two switches is installed. Configure the network connectivity between the switches using the designated VLANs and interfaces.

1. Configure VLAN 100 named Compute and VLAN 200 named Telephony where required for each task.

2. Configure Ethernet0/1 on SW2 to use the existing VLAN named Available.

3. Configure the connection between the switches using access ports.

4. Configure Ethernet0/1 on SW1 using data and voice VLANs.

5. Configure Ethemet0/1 on SW2 so that the Cisco proprietary neighbor discovery protocol is turned off for the designated interface only.

Full Access
Question # 33

Refer to the exhibit. IPv6 is being Implemented within the enterprise. The command Ipv6 unlcast-routing is configure. Interlace GlgO/0 on R1 must be configured to provide a dynamic assignment using the assigned IPv6 block Which command accomplishes this task?

A.

ipv6 address 2001:DB8:FFFF:FCF3::1/64

B.

ipv6 address autoconfig 2001:DB8:FFFF:FCF2::/64

C.

ipv6 address 2001:DB8:FFFF:FCF3::/64 eui-64

D.

ipv6 address 2001:DB8:FFFF:FCF3::/64 link-local

Full Access
Question # 34

Configure IPv4 and IPv6 connectivity between two routers. For IPv4, use a /28 network from the 192.168.1.0/24 private range. For IPv6, use the first /64 subnet from the 2001:0db8:aaaa::/48 subnet.

1. Using Ethernet0/1 on routers R1 and R2, configure the next usable/28 from the 192.168.1.0/24 range. The network 192.168.1.0/28 is unavailable.

2. For the IPv4 /28 subnet, router R1 must be configured with the first usable host address.

3. For the IPv4 /28 subnet, router R2 must be configured with the last usable host address.

4. For the IPv6 /64 subnet, configure the routers with the IP addressing provided from the topology.

5. A ping must work between the routers on the IPv4 and IPv6 address ranges.

Full Access
Question # 35

Physical connectivity is implemented between the two Layer 2 switches, and the network connectivity between them must be configured

1. Configure an LACP EtherChannel and number it as 1; configure it between switches SW1 and SVV2 using interfaces Ethernet0/0 and Ethernet0/1 on both sides. The LACP mode must match on both ends

2 Configure the EtherChannel as a trunk link.

3. Configure the trunk link with 802.1 q tags.

4. Configure the native VLAN of the EtherChannel as VLAN 15.

Full Access
Question # 36

Which characteristic differentiates the concept of authentication from authorization and accounting?

A.

user-activity logging

B.

service limitations

C.

consumption-based billing

D.

identity verification

Full Access
Question # 37

Refer to the exhibit. Which type of JSON data is shown?

A.

sequence

B.

string

C.

object

D.

Boolean

Full Access
Question # 38

An engineer must configure a core router with a floating static default route to the backup router at 10.200.0.2. Which command meets the requirements?

A.

ip route 0.0.0.0 0.0.0.0 10.200.0.2 1

B.

Ip route 0.0.0.0 0.0.0.0 10.200.0.2 floating

C.

ip route 0.0.0.0 0.0.0.0 10.200.0.2

D.

Ip route 0.0.0.0 0.0.0.0 10.200.0.2 10

Full Access
Question # 39

Physical connectivity is implemented between the two Layer 2 switches,

and the network connectivity between them must be configured.

I . Configure an LACP EtherChanneI and number it as 44; configure it

between switches SWI and SW2 using interfaces EthernetO/O and

Ethernet0/1 on both sides. The LACP mode must match on both ends.

2. Configure the EtherChanneI as a trunk link.

3. Configure the trunk link with 802. Iq tags.

4. Configure VLAN 'MONITORING' as the untagged VLAN of the

EtherChannel.

==================

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using

the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Full Access
Question # 40

Which alternative to password authentication Is Implemented to allow enterprise devices to log in to the corporate network?

A.

magic links

B.

one-time passwords

C.

digital certificates

D.

90-day renewal policies

Full Access
Question # 41

All physical cabling is in place. Router R4 and PCI are fully configured and

inaccessible. R4's WAN interfaces use .4 in the last octet for each subnet.

Configurations should ensure that connectivity is established end-to-end.

1 . Configure static routing to ensure RI prefers the path through R2 to

reach only PCI on R4's LAN

2. Configure static routing that ensures traffic sourced from RI will take

an alternate path through R3 to PCI in the event of an outage along

the primary path

3. Configure default routes on RI and R3 to the Internet using the least number of hops

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using

the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Full Access
Question # 42

Refer to the exhibit. A packet sourced from 10.10.10.32 is destined tot the Internet. What is the administrative distance for the destination route? A. 0

B. 1

C. 2

D. 32

Full Access
Question # 43

IP connectivity and OSPF are preconfigured on all devices where necessary. Do not make any changes to the IP addressing or OSPF. The company policy uses connected interfaces and next hops when configuring static routes except for load balancing or redundancy without floating static. Connectivity must be established between subnet 172.20.20.128/25 on the Internet and the LAN at 192.168.0.0/24 connected to SW1:

1. Configure reachability to the switch SW1 LAN subnet in router R2.

2. Configure default reachability to the Internet subnet in router R1.

3. Configure a single static route in router R2 to reach to the Internet subnet considering both redundant links between routers R1 and R2. A default route is NOT allowed in router R2.

4. Configure a static route in router R1 toward the switch SW1 LAN subnet where the primary link must be through Ethernet0/1. and the backup link must be through Ethernet0/2 using a floating route. Use the minimal administrative distance value when required.

Full Access
Question # 44

Refer to the exhibit. How will the device handle a packet destined to IP address 100.100.100.100?

A.

If will choose the route with the longest match.

O 100.100.100.100'32 (110/21) via 192.168.1.1. 00:05:57. EmernetO/1.

B.

It will always prefer the static route over dynamic routes and choose the route

S 100.100.0.0/16(1/0] via 192.168.4.1.

C.

It will choose the route with the highest metric.

D 100.100.100.0/24 (90/435200) via 192.168.2.1. 00:00:13. EthernetO/2.

D.

It will choose the route with the lowest metric,

R 100.0.0.0/8 [120/2] via 192.168.3.1. 00:00:13. EthernetO/3.

Full Access
Question # 45

All physical cabling is in place. A company plans to deploy 32 new sites.

The sites will utilize both IPv4 and IPv6 networks.

1 . Subnet 172.25.0.0/16 to meet the subnet requirements and maximize

the number of hosts

Using the second subnet

• Assign the first usable IP address to e0/0 on Sw1O1

• Assign the last usable IP address to e0/0 on Sw102

2. Subnet to meet the subnet requirements and maximize

the number of hosts

c Using the second subnet

• Assign an IPv6 GUA using a unique 64-Bit interface identifier

on e0/0 on Sw101

• Assign an IPv6 GUA using a unique 64-Bit interface identifier

on eO/O on swi02

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using

the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Full Access
Question # 46

Refer to the exhibit. An engineer is creating a secure preshared key based SSID using WPA2 for a wireless network running on 2.4 GHz and 5 GHz. Which two tasks must the engineer perform to complete the process? (Choose two.)

A.

Select the 802.1 x option for Auth Key Management.

B.

Select the WPA Policy option.

C.

Select the PSK option for Auth Key Management.

D.

Select the AES option for Auth Key Management.

E.

Select the AES (CCMP128) option for WPA2/WPA3 Encryption.

Full Access
Question # 47

Three switches must be configured for Layer 2 connectivity. The company requires only the designated VLANs to be configured on their respective switches and permitted accross any links between switches for security purposes. Do not modify or delete VTP configurations.

The network needs two user-defined VLANs configured:

VLAN 110: MARKETING

VLAN 210: FINANCE

1. Configure the VLANs on the designated switches and assign them as access ports to the interfaces connected to the PCs.

2. Configure the e0/2 interfaces on Sw1 and Sw2 as 802.1q trunks with only the required VLANs permitted.

3. Configure the e0/3 interfaces on Sw2 and Sw3 as 802.1q trunks with only the required VLANs permitted.

Full Access
Question # 48

What is the RFC 4627 default encoding for JSON text?

A.

UCS-2

B.

UTF-8

C.

Hex

D.

GB18030

Full Access
Question # 49

Which CRUD operation corresponds to me HTTP GET method?

A.

delete

B.

create

C.

update

D.

read

Full Access
Question # 50

Refer to the exhibit. A network administrator is configuring a router for user access via SSH. The service-password encryption command has been issued. The configuration must meet these requirements:

• Create the username as CCUser.

• Create the password as NA!2Scc.

• Encrypt the user password.

What must be configured to meet the requirements?

A.

username CCUser privies 10 password NA!2Scc

B.

username CCUser password NA!2Scc enable password level 5 NA!2$cc

C.

username CCUser secret NA!2Scc

D.

username CCUser privilege 15 password NA!2Scc enable secret 0 NA!2$cc

Full Access
Question # 51

Which WLC management connection type is vulnerable to man-in-the-middIe attacks?

A.

Telnet

B.

console

C.

HTTPS

D.

SSH

Full Access
Question # 52

What are two lacts that differentiate optical-fiber cabling from copper cabling? (Choose two.)

A.

It is less expensive when purchasing patch cables.

B.

It has a greater sensitivity to changes in temperature and moisture.

C.

It provides greater throughput options.

D.

It carries signals for longer distances.

E.

It carries electrical current further distances for PoE devices.

Full Access
Question # 53

Refer to the exhibit. The user has connectivity to devices on network 192.168.3 0/24 but cannot reach users on the network 10.10.1.0724.

What is the first step to verify connectivity?

A.

Is the internet reachable?

B.

Is the default gateway reachable?

C.

Is the DNS server reachable?

Full Access
Question # 54

Refer to the exhibit. A network engineer updates the existing configuration on interface fastethernet1/1 switch SW1. It must establish an EtherChannel by using the same group designation with another vendor switch. Which configuration must be performed to complete the process?

A.

interface port-channel 2

channel-group 2 mode desirable

B.

interface fasteinernet 1/1

channel-group 2 mode active

C.

interface fasteinernet 1/1

channel-group 2 mode on

D.

interface port-channel 2

channel-group 2 mode auto

Full Access
Question # 55

Connectivity between three routers has been established, and IP services must be configured jn the order presented to complete the implementation Tasks assigned include configuration of NAT, NTP, DHCP, and SSH services.

1. All traffic sent from R3 to the R1 Loopback address must be configured for NAT on R2. All source addresses must be translated from R3 to the IP address of Ethernet0/0 on R2, while using only a standard access list named NAT To verify, a ping must be successful to the R1 Loopback address sourced from R3. Do not use NVI NAT configuration.

2. Configure R1 as an NTP server and R2 as a client, not as a peer, using the IP address of the R1 Ethernet0/2 interface. Set the clock on the NTP server for midnight on January 1, 2019.

3. Configure R1 as a DHCP server for the network 10.1.3.0/24 in a pool named TEST. Using a single command, exclude addresses 1-10 from the range. Interface Ethernet0/2 on R3 must be issued the IP address of 10.1.3.11 via DHCP.

4. Configure SSH connectivity from R1 to R3, while excluding access via other remote connection protocols. Access for user root and password Cisco must be set on router R3 using RSA and 1024 bits. Verify connectivity using an SSH session from router R1 using a destination address of 10.1.3.11. Do NOT modify console access or line numbers to accomplish this task.

Full Access
Question # 56

Drag and drop the TCP and UDP characteristics from the left onto the supporting protocols on the right. Not all options are used.

Full Access
Question # 57

In which two ways does a password manager reduce the chance of a hacker stealing a users password? (Choose two.)

A.

It automatically provides a second authentication factor that is unknown to the original user.

B.

It uses an internal firewall to protect the password repository from unauthorized access.

C.

It protects against keystroke logging on a compromised device or web site.

D.

It stores the password repository on the local workstation with built-in antivirus and anti-malware functionality

E.

It encourages users to create stronger passwords.

Full Access
Question # 58

After installing a new Cisco ISE server, which task must the engineer perform on the Cisco WLC to connect wireless clients on a specific VLAN based on their credentials?

A.

Enable the allow AAA Override

B.

Enable the Even: Driven RRM.

C.

Disable the LAG Mode or Next Reboot.

D.

Enable the Authorized MIC APs against auth-list or AAA.

Full Access
Question # 59

Several new coverage cells are required to improve the Wi-Fi network of an organization. Which two standard designs are recommended? (choose two.)

A.

5GHz provides increased network capacity with up to 23 nonoveriapping channels.

B.

For maximum throughput, the WLC is configured to dynamically set adjacent access points to the same channel.

C.

5GHz channel selection requires an autonomous access point.

D.

Adjacent cells with overlapping channels use a repeater access point.

E.

Cells that overlap one another are configured to use nonoveriapping channels.

Full Access
Question # 60

Refer to the exhibit.

What commands are needed to add a subinterface to Ethernet0/0 on R1 to allow for VLAN 20, with IP address 10.20.20.1/24?

A.

R1(config)#interface ethernet0/0

R1(config)#encapsulation dot1q 20

R1(config)#ip address 10.20.20.1 255.255.255.0

B.

R1(config)#interface ethernet0/0.20

R1(config)#encapsulation dot1q 20

R1(config)#ip address 10.20.20.1 255.255.255.0

C.

R1(config)#interface ethernet0/0.20

R1(config)#ip address 10.20.20.1 255.255.255.0

D.

R1(config)#interface ethernet0/0

R1(config)#ip address 10.20.20.1 255.255.255.0

Full Access
Question # 61

IP connectivity between the three routers is configured. OSPF adjacencies must be established.

1. Configure R1 and R2 Router IDs using the interface IP addresses from the link that is shared between them.

2. Configure the R2 links with a max value facing R1 and R3. R2 must become the DR. R1 and R3 links facing R2 must remain with the default OSPF configuration for DR election. Verify the configuration after clearing the OSPF process.

3. Using a host wildcard mask, configure all three routers to advertise their respective Loopback1 networks.

4. Configure the link between R1 and R3 to disable their ability to add other OSPF routers.

Full Access
Question # 62

What is the main difference between traditional networks and controller-based networking?

A.

Controller-based networks increase TCO for the company, and traditional networks require less investment.

B.

Controller-based networks provide a framework for Innovation, and traditional networks create efficiency.

C.

Controller-based networks are open for application requests, and traditional networks operate manually.

D.

Controller-based networks are a closed ecosystem, and traditional networks take advantage of programmability.

Full Access
Question # 63

A HCP pool has been created with the name CONTROL. The pool uses the next to last usable IP address as the default gateway for the DHCP clients. The server is located at 172.16 32.15. What is the step in the process for clients on the 192.168.52.0/24 subnet to reach the DHCP server?

A.

ip forward-protocol udp 137

B.

ip default-network 192.168.52.253

C.

ip helper-address 172.16.32.15

D.

ip default-gateway 192.168.52.253

Full Access
Question # 64

A network engineer is configuring a new router at a branch office. The router is connected to an upstream WAN network that allows the branch to communicate with the head office. The central time server with IP address 172.24.54.8 is located behind a firewall at the head office. Which command must the engineer configure so that the software clock of the new router synchronizes with the time server?

A.

ntp master 172.24.54.8

B.

ntp client 172.24.54.8

C.

ntp peer 172.24.54.8

D.

ntp server 172.24.54.8

Full Access
Question # 65

Drag and drop the IPv6 address type characteristics from the left to the right.

Full Access
Question # 66

Which type of information resides on a DHCP server?

A.

a list of the available IP addresses in a pool

B.

a list of public IP addresses and their corresponding names

C.

usernames and passwords for the end users in a domain

D.

a list of statically assigned MAC addresses

Full Access
Question # 67

Refer to the exhibit.

The network administrator wants VLAN 67 traffic to be untagged between Switch 1 and Switch 2 while all other VLANs are to remain tagged.

Which command accomplishes this task?

A.

switchport access vlan 67

B.

switchport trunk allowed vlan 67

C.

switchport private-vlan association host 67

D.

switchport trunk native vlan 67

Full Access
Question # 68

Refer to the exhibit.

What is the next hop address for traffic that is destined to host 10.0.1.5?

A.

10.0.1.3

B.

10.0.1.50

C.

10.0.1.4

D.

Loopback D

Full Access
Question # 69

What mechanism carries multicast traffic between remote sites and supports encryption?

A.

ISATAP

B.

GRE over iPsec

C.

iPsec over ISATAP

D.

GRE

Full Access
Question # 70

Which function is performed by the collapsed core layer in a two-tier architecture?

A.

enforcing routing policies

B.

marking interesting traffic for data polices

C.

attaching users to the edge of the network

D.

applying security policies

Full Access
Question # 71

Which IPv6 address block sends packets to a group address rather than a single address?

A.

2000::/3

B.

FC00::/7

C.

FE80::/10

D.

FF00::/8

Full Access
Question # 72

Which level of severity must be set to get informational syslogs?

A.

alert

B.

critical

C.

notice

D.

debug

Full Access
Question # 73

A network engineer is configuring an OSPFv2 neighbor adjacency Drag and drop the parameters from the left onto their required categories on the right. Not all parameters are used

Full Access
Question # 74

In QoS, which prioritization method is appropriate for interactive voice and video?

A.

expedited forwarding

B.

traffic policing

C.

round-robin scheduling

D.

low-latency queuing

Full Access
Question # 75

Which option about JSON is true?

A.

uses predefined tags or angle brackets () to delimit markup text

B.

used to describe structured data that includes arrays

C.

used for storing information

D.

similar to HTML, it is more verbose than XML

Full Access
Question # 76

A network engineer must back up 20 network router configurations globally within a customer environment. Which protocol allows the engineer to perform this function using the Cisco IOS MIB?

A.

CDP

B.

SNMP

C.

SMTP

D.

ARP

Full Access
Question # 77

Which global command encrypt all passwords in the running configuration?

A.

password-encrypt

B.

enable password-encryption

C.

enable secret

D.

service password-encryption

Full Access
Question # 78

What does a switch use to build its MAC address table?

A.

VTP

B.

DTP

C.

egress traffic

D.

ingress traffic

Full Access
Question # 79

Refer to the exhibit.

If OSPF Is running on this network, how does Router2 handle traffic from Site B to 10.10.13.128/25 at Site A?

A.

It load-balances traffic out of Fa0/1 and Fa0/2.

B.

It is unreachable and discards the traffic.

C.

It sends packets out of interface FaO/2.

D.

It sends packets out of interface Fa0/1.

Full Access
Question # 80

Drag and drop the DHCP snooping terms from the left onto the descriptions on the right.

Full Access
Question # 81

Refer to the exhibit Routers R1 and R2 have been configured with their respective LAN interfaces The two circuits are operational and reachable across WAN Which command set establishes failover redundancy if the primary circuit goes down?

A.

Option A

B.

B. Option B

C.

Option C

D.

Option D

Full Access
Question # 82

What facilitates a Telnet connection between devices by entering the device name?

A.

SNMP

B.

DNS lookup

C.

syslog

D.

NTP

Full Access
Question # 83

Which two protocols are supported on service-port interfaces? (Choose two.)

A.

RADIUS

B.

TACACS+

C.

SCP

D.

Telnet

E.

SSH

Full Access
Question # 84

Refer to the exhibit.

How does the router manage traffic to 192.168.12.16?

A.

It selects the RIP route because it has the longest prefix inclusive of the destination address.

B.

It chooses the OSPF route because it has the longest prefix inclusive of the destination address.

C.

it load-balances traffic between all three routes

D.

It chooses the EIGRP route because it has the lowest administrative distance

Full Access
Question # 85

Which WAN topology provides a combination of simplicity quality, and availability?

A.

partial mesh

B.

full mesh

C.

point-to-point

D.

hub-and-spoke

Full Access
Question # 86

Why was the RFC 1918 address space defined?

A.

conserve public IPv4 addressing

B.

preserve public IPv6 address space

C.

reduce instances of overlapping IP addresses

D.

support the NAT protocol

Full Access
Question # 87

What does a router do when configured with the default DNS lookup settings, and a URL is entered on the CLI?

A.

initiates a ping request to the URL

B.

prompts the user to specify the desired IP address

C.

continuously attempts to resolve the URL until the command is cancelled

D.

sends a broadcast message in an attempt to resolve the URL

Full Access
Question # 88

Refer to the exhibit.

When PC-A sends traffic to PC-B, which network component is in charge of receiving the packet from PC-A verifying the IP addresses, and forwarding the packet to PC-B?

A.

Layer 2 switch

B.

Router

C.

Load balancer

D.

firewall

Full Access
Question # 89

In software-defined architecture, which place handles switching for traffic through a Cisco router?

A.

Control

B.

Management

C.

Data

D.

application

Full Access
Question # 90

What is the default behavior of a Layer 2 switch when a frame with an unknown destination MAC address is received?

A.

The Layer 2 switch drops the received frame

B.

The Layer 2 switch floods packets to all ports except the receiving port in the given VLAN.

C.

The Layer 2 switch sends a copy of a packet to CPU for destination MAC address learning.

D.

The Layer 2 switch forwards the packet and adds the destination MAC address to its MAC address table

Full Access
Question # 91

Which two capacities of Cisco DNA Center make it more extensible as compared to traditional campus device management? (Choose two)

A.

adapters that support all families of Cisco IOS software

B.

SDKs that support interaction with third-party network equipment

C.

customized versions for small, medium, and large enterprises

D.

REST APIs that allow for external applications to interact natively with Cisco DNA Center

E.

modular design that is upgradable as needed

Full Access
Question # 92

Drag and drop the characteristics of network architectures from the left onto the type of architecture on the right.

Full Access
Question # 93

Aside from discarding, which two states does the switch port transition through while using RSTP (802.1w)? (Choose two)

A.

listening

B.

blocking

C.

forwarding

D.

learning

E.

speaking

Full Access
Question # 94

What is a DNS lookup operation?

A.

DNS server pings the destination to verify that it is available

B.

serves requests over destination port 53

C.

DNS server forwards the client to an alternate IP address when the primary IP is down

D.

responds to a request for IP address to domain name resolution to the DNS server

Full Access
Question # 95

On workstations running Microsoft Windows, which protocol provides the default gateway for the device?

A.

DHCP

B.

STP

C.

SNMP

D.

DNS

Full Access
Question # 96

Which access layer threat-mitigation technique provides security based on identity?

A.

Dynamic ARP Inspection

B.

using a non-default native VLAN

C.

802.1x

D.

DHCP snooping

Full Access
Question # 97

in Which way does a spine and-leaf architecture allow for scalability in a network when additional access ports are required?

A.

A spine switch and a leaf switch can be added with redundant connections between them

B.

A spine switch can be added with at least 40 GB uplinks

C.

A leaf switch can be added with a single connection to a core spine switch.

D.

A leaf switch can be added with connections to every spine switch

Full Access
Question # 98

Refer to the exhibit.

which path is used by the router for internet traffic ?

A.

209.165.200.0/27

B.

10.10.10.0/28

C.

0.0.0.0/0

D.

10.10.13.0/24

Full Access
Question # 99

What are two southbound APIs? (Choose two )

A.

OpenFlow

B.

NETCONF

C.

Thrift

D.

CORBA

E.

DSC

Full Access
Question # 100

Refer to the exhibit.

After the election process what is the root bridge in the HQ LAN?

A.

Switch 1

B.

Switch 2

C.

Switch 3

D.

Switch 4

Full Access
Question # 101

Refer to the exhibit.

PC1 is trying to ping PC3 for the first time and sends out an ARP to S1 Which action is taken by S1?

A.

It forwards it out G0/3 only

B.

It is flooded out every port except G0/0.

C.

It drops the frame.

D.

It forwards it out interface G0/2 only.

Full Access
Question # 102

Refer to the exhibit Router R1 Fa0/0 is unable to ping router R3 Fa0'1. Which action must be taken in router R1 to help resolve the configuration issue?

A.

set the default network as 20.20.20.0/24

B.

set the default gateway as 20.20.20.2

C.

configure a static route with Fa0/1 as the egress interface to reach the 20.20.20.0/24 network

D.

configure a static route with 10.10.10.2 as the next hop to reach the 20.20.20.0/24 network

Full Access
Question # 103

Which spanning-tree enhancement avoids the learning and listening states and immediately places ports in the forwarding state?

A.

BPDUfilter

B.

PortFast

C.

Backbonefast

D.

BPDUguard

Full Access
Question # 104

Refer to the exhibit.

Which switch becomes the root of the spanning tree for VLAN 110?

A.

Switch 1

B.

Switch 2

C.

Switch 3

D.

Switch 4

Full Access
Question # 105

What is a difference between local AP mode and FiexConnet AP mode?

A.

Local AP mode creates two CAPWAP tunnels per AP to the WLC

B.

FiexConnect AP mode fails to function if the AP loses connectivity with the WLC

C.

FlexConnect AP mode bridges the traffic from the AP to the WLC when local switching is configured

D.

Local AP mode causes the AP to behave as if it were an autonomous AP

Full Access
Question # 106

What are two benefits of controller-based networking compared to traditional networking?

A.

controller-based increases network bandwidth usage, while traditional lightens the load on the network.

B.

controller-based inflates software costs, while traditional decreases individual licensing costs

C.

Controller-based reduces network configuration complexity, while traditional increases the potential for errors

D.

Controller-based provides centralization of key IT functions. While traditional requires distributes management function

E.

controller-based allows for fewer network failure, while traditional increases failure rates.

Full Access
Question # 107

Refer to the exhibit.

After running the code in the exhibit, which step reduces the amount of data that the NETCONF server returns to the NETCONF client, to only the interface's configuration?

A.

Use the Ixml library to parse the data returned by the NETCONF server for the interface's configuration.

B.

Create an XML filter as a string and pass it to get_config() method as an argument.

C.

Create a JSON filter as a string and pass it to the get_config() method as an argument.

D.

Use the JSON library to parse the data returned by the NETCONF server for the interface's configuration.

Full Access
Question # 108

A network analyst is tasked with configured the date and time on a router using EXEC mode. The date must be set to 12:00am. Which command should be used?

A.

Clock timezone

B.

Clock summer-time-recurring

C.

Clock summer-time date

D.

Clock set

Full Access
Question # 109

What is an advantage of Cisco DNA Center versus traditional campus device management?

A.

It supports numerous extensibility options including cross-domain adapters and third-party SDKs.

B.

It supports high availability for management functions when operating in cluster mode.

C.

It enables easy autodiscovery of network elements m a brownfield deployment.

D.

It is designed primarily to provide network assurance.

Full Access
Question # 110

What is recommended for the wireless infrastructure design of an organization?

A.

group access points together to increase throughput on a given channel

B.

configure the first three access points are configured to use Channels 1, 6, and 11

C.

include a least two access points on nonoverlapping channels to support load balancing

D.

assign physically adjacent access points to the same Wi-Fi channel

Full Access
Question # 111

Drag and drop the functions of DHCP from the left onto any of the positions on the right Not all functions are used

Full Access
Question # 112

NO: 124

By default, how Does EIGRP determine the metric of a route for the routing table?

A.

it uses the bandwidth and delay values of the path to calculate the route metric

B.

it uses a default metric of 10 for all routes that are learned by the router

C.

it uses a reference Bandwidth and the actual bandwidth of the connected link to calculate the route metric

D.

it counts the number of hops between the receiving and destination routers and uses that value as the metric

Full Access
Question # 113

When a site-to-site VPN is configured, which IPsec mode provides encapsulation and encryption of the entire original P packet?

A.

IPsec tunnel mode with AH

B.

IPsec transport mode with AH

C.

IPsec tunnel mode with ESP

D.

IPsec transport mode with ESP

Full Access
Question # 114

Which command entered on a switch configured with Rapid PVST* listens and learns for a specific time period?

A.

switch(config)#spanning-tree vlan 1 max-age 6

B.

switch(config)#spanning-tree vlan 1 hello-time 10

C.

switch(config)#spanning-tree vlan 1 priority 4096

D.

switch(config)#spanning-tree vlan 1 forward-time 20

Full Access
Question # 115

Refer to the exhibit. All routers in the network are configured R2 must be the DR. After the engineer connected the devices, R1 was elected as the DR. Which command sequence must be configure on R2 to Be elected as the DR in the network?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 116

A network administrator is asked to configure VLANS 2, 3 and 4 for a new implementation. Some ports must be assigned to the new VLANS with unused remaining. Which action should be taken for the unused ports?

A.

configure port in the native VLAN

B.

configure ports in a black hole VLAN

C.

configure in a nondefault native VLAN

D.

configure ports as access ports

Full Access
Question # 117

What is the difference in data transmission delivery and reliability between TCP and UDP?

A.

TCP transmits data at a higher rate and ensures packet delivery. UDP retransmits lost data to ensure applications receive the data on the remote end.

B.

UDP sets up a connection between both devices before transmitting data. TCP uses the three-way handshake to transmit data with a reliable connection.

C.

UDP is used for multicast and broadcast communication. TCP is used for unicast communication and transmits data at a higher rate with error checking.

D.

TCP requires the connection to be established before transmitting data. UDP transmits data at a higher rate without ensuring packet delivery.

Full Access
Question # 118

How do TCP and UDP differ in the way they provide reliability for delivery of packets?

A.

TCP is a connectionless protocol that does not provide reliable delivery of data, UDP is a connection-oriented protocol that uses sequencing to provide reliable delivery.

B.

TCP does not guarantee delivery or error checking to ensure that there is no corruption of data UDP provides message acknowledgement and retransmits data if lost.

C.

TCP provides flow control to avoid overwhelming a receiver by sending too many packets at once, UDP sends packets to the receiver in a continuous stream without checking for sequencing

D.

TCP uses windowing to deliver packets reliably; UDP provides reliable message transfer between hosts by establishing a three-way handshake

Full Access
Question # 119

An email user has been lured into clicking a link in an email sent by their company's security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?

A.

Physical access control

B.

Social engineering attack

C.

brute force attack

D.

user awareness

Full Access
Question # 120

What is a zero-day exploit?

A.

It is when a new network vulnerability is discovered before a fix is available

B.

It is when the perpetrator inserts itself in a conversation between two parties and captures or alters data.

C.

It is when the network is saturated with malicious traffic that overloads resources and bandwidth

D.

It is when an attacker inserts malicious code into a SOL server.

Full Access
Question # 121

Which two transport layer protocols carry syslog messages? (Choose two.)

A.

UDP

B.

RTP

C.

IP

D.

TCP

E.

ARP

Full Access
Question # 122

Which component controls and distributes physical resources for each virtual machine?

A.

OS

B.

hypervisor

C.

CPU

D.

physical enclosure

Full Access
Question # 123

Which feature on the Cisco Wireless LAN Controller when enabled restricts management access from specific networks?

A.

CPU ACL

B.

TACACS

C.

Flex ACL

D.

RADIUS

Full Access
Question # 124

Drag and drop the REST API call method for HTTP from the left onto the action they perform on the right.

Full Access
Question # 125

Refer to the exhibit. What is represented by “R1” and “SW1” within the JSON output?

A.

object

B.

value

C.

key

D.

array

Full Access
Question # 126

What does WPA3 provide in wireless networking?

A.

safeguards against brute force attacks with SAE

B.

optional Protected Management Frame negotiation

C.

backward compatibility with WPAand WPA2

D.

increased security and requirement of a complex configuration

Full Access
Question # 127

What is the advantage of separating the control plane from the data plane within an SDN network?

A.

decreases overall network complexity

B.

limits data queries to the control plane

C.

reduces cost

D.

offloads the creation of virtual machines to the data plane

Full Access
Question # 128

What is the purpose of classifying network traffic in QoS?

A.

services traffic according to its class

B.

identifies the type of traffic that will receive a particular treatment

C.

writes the class identifier of a packet to a dedicated field in the packet header

D.

configures traffic-matching rules on network devices

Full Access
Question # 129

Which two protocols are used by an administrator for authentication and configuration on access points?

A.

Kerberos

B.

802.1Q

C.

802.1x

D.

TACACS+

E.

RADIUS

Full Access
Question # 130

What does a switch search for in the CAM table when forwarding a frame?

A.

source MAC address and aging time

B.

destination MAC address and flush time

C.

source MAC address and source port

D.

destination MAC address and destination port

Full Access
Question # 131

What are two protocols within the IPsec suite? (Choose two)

A.

AH

B.

3DES

C.

ESP

D.

TLS

E.

AES

Full Access
Question # 132

What is the MAC address used with VRRP as a virtual address?

A.

00-00-0C-07-AD-89

B.

00-00-5E-00-01-0a

C.

00-07-C0-70-AB-01

D.

00-C6-41-93-90-91

Full Access
Question # 133

Drag and drop the Ansible terms from the left onto the right.

Full Access
Question # 134

What is a link-local all-nodes IPv6 multicast address?

A.

ff02:0:0:0:0:0:0:1

B.

2004:31c:73d9:683e:255::

C.

fffe:034:0dd:45d6:789e::

D.

fe80:4433:034:0dd::2

Full Access
Question # 135

Which IPsec encryption mode is appropriate when the destination of a packet differs from the security termination point?

A.

tunnel

B.

transport

C.

aggressive

D.

main

Full Access
Question # 136

Which action implements physical access control as part of the security program of an organization1?

A.

backing up syslogs at a remote location

B.

configuring a password for the console port

C.

configuring enable passwords on network devices

D.

setting up IP cameras to monitor key infrastructure

Full Access
Question # 137

Refer to the exhibit.

A network administrator must permit traffic from the 10.10.0.0/24 subnet to the WAN on interlace Seria10. What is the effect of the configuration as the administrator applies the command?

A.

The permit command fails and returns an error code.

B.

The router accepts all incoming traffic to Seria10 with the last octet of the source IP set to 0.

C.

The sourced traffic from IP range 10.0.0.0 -10.0.0.255 is allowed on Seria10.

D.

The router fails to apply the access list to the interface.

Full Access
Question # 138

Drag and drop the statements about networking from the left onto the corresponding networking types on the right

Full Access
Question # 139

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 140

Refer to the exhibit.

Load-balanced traffic is coming in from the WAN destined to a host at 172.16.1.190. Which next-hop is used by the router to forward the request?

A.

192.168.7.4

B.

192.168.7.7

C.

192.168.7.35

D.

192.168.7.40

Full Access
Question # 141

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

Full Access
Question # 142

Drag and drop the characteristics of transport layer protocols from the left onto the corresponding protocols on the right.

Full Access
Question # 143

Which cipher is supported for wireless encryption only with the WPA2 standard?

A.

AES256

B.

AES

C.

RC4

D.

SHA

Full Access
Question # 144

Refer to the exhibit.

A packet sourced from 172.16.32 254 is destined for 172.16.32.8. What is the subnet mask of the preferred destination route?

A.

255.255.224.0

B.

255.255.255.0

C.

255.255.255.192

D.

255.255.255.252

Full Access
Question # 145

Refer to the exhibit.

A network administrator configures an interface control re switch so that it connects to interface Gi1/0/1 on switch Cat9300-1. Which configuration must be applied to the new interface?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 146

What determines the sequence in which materials are planned during the material requirements planning (MRP) run?

A.

The control parameters of the MRP run

B.

The creation date of the materials

C.

The low-level code of the materials

D.

The replenishment lead time of the materials

Full Access
Question # 147

How is a configuration change made to a wireless AP in lightweight mode?

A.

SSH connection to the management IP of the AP

B.

EolP connection via the parent WLC

C.

CAPWAP/LWAPP connection via the parent WLC

D.

HTTPS connection directly to the out-of-band address of the AP

Full Access
Question # 148

What is a reason to implement IPv4 private addressing?

A.

Reduce the risk of a network security breach

B.

Comply with PCI regulations

C.

Comply with local law

D.

Reduce the size of the forwarding table on network routers

Full Access
Question # 149

Which port type does a lightweight AP use to connect to the wired network when it is configured in local mode?

A.

EtherChannel

B.

LAG

C.

trunk

D.

access

Full Access
Question # 150

Drag and drop the steps in a standard DNS lookup operation from the left into the order on the right.

Full Access
Question # 151

What are two functions of DHCP servers? (Choose two.)

A.

prevent users from assigning their own IP addresses to hosts

B.

assign dynamic IP configurations to hosts in a network

C.

support centralized IP management

D.

issue DHCPDISCOVER messages when added to the network

E.

respond to client DHCPOFFER requests by issuing an IP address

Full Access
Question # 152

When an access point is seeking to join wireless LAN controller, which message is sent to the AP- Manager interface?

A.

Discovery response

B.

DHCP request

C.

DHCP discover

D.

Discovery request

Full Access
Question # 153

Refer to the exhibit.

A network engineer configures the CCNA WLAN so that clients must authenticate hourly and to limit the number of simultaneous connections to the WLAN to Which two actions complete this configuration? (Choose two.)

A.

Enable the Enable Session Timeout option and set the value to 3600.

B.

Set the Maximum Allowed Clients value to 10.

C.

Enable the Client Exclusion option and set the value to 3600.

D.

Enable the Wi-Fi Direct Clients Policy option.

E.

Set the Maximum Allowed Clients Per AP Radio value to 10.

Full Access
Question # 154

When a WPA2-PSK WLAN is configured in the Wireless LAN Controller, what is the minimum number of characters that is required in ASCII format?

A.

6

B.

8

C.

12

D.

18

Full Access
Question # 155

What is a specification for SSIDS?

A.

They are a Cisco proprietary security feature.

B.

They must include one number and one letter.

C.

They define the VLAN on a switch.

D.

They are case sensitive.

Full Access
Question # 156

Refer to the exhibit.

Which format matches the Modified EUI-64 IPv6 interface address for the network 2001:db8::/64?

A.

2001 :db8::5000:0004:5678:0090/64

B.

2001 :db8:4425:5400:77ft:fe07:/64

C.

2001 :db8::5000:00ff:fe04 0000/64

D.

2001 :db8::5200:00ff:fe04:0000/64

Full Access
Question # 157

Which set of 2.4 GHz nonoverlapping wireless channels is standard in the United States?

A.

channels 2, 7, 9, and 11

B.

channels 1, 6, 11, and 14

C.

channels 2, 7, and 11

D.

channels 1, 6, and 11

Full Access
Question # 158

What is the operating mode and role of a backup port on a shared LAN segment in Rapid PVST+?

A.

forwarding mode and provides the lowest-cost path to the root bridge for each VLAN

B.

learning mode and provides the shortest path toward the root bridge handling traffic away from the LAN

C.

blocking mode and provides an alternate path toward the designated bridge

D.

listening mode and provides an alternate path toward the root bridge

Full Access
Question # 159

Refer to the exhibit.

Drag and drop the learned prefixes from the left onto the subnet masks on the right

Full Access
Question # 160

What is the role of disaggregation in controller-based networking?

A.

It divides the control-plane and data-plane functions.

B.

It summarizes the routes between the core and distribution layers of the network topology.

C.

It enables a network topology to quickly adjust from a ring network to a star network

D.

It streamlines traffic handling by assigning individual devices to perform either Layer 2 or Layer 3 functions.

Full Access
Question # 161

Which command implies the use of SNMPv3?

A.

snmp-server host

B.

snmp-server community

C.

snmp-server enable traps

D.

snmp-server user

Full Access
Question # 162

Which capability does TFTP provide?

A.

loads configuration files on systems without data storage devices

B.

provides authentication for data communications over a private data network

C.

provides encryption mechanisms for file transfer across a WAN

D.

provides secure file access within the LAN

Full Access
Question # 163

What describes a northbound REST API for SON?

A.

application-facing interface for SNMP GET requests

B.

network-element-facing interface for GET POST PUT and DELETE methods

C.

network-element-facing interface for the control and data planes

D.

application-facing interface far GET, POST, PUT, and DELETE methods

Full Access
Question # 164

Which two VPN technologies are recommended by Cisco for multiple branch offices and large-scale deployments? (Choose two.)

A.

site-to-site VPN

B.

IDMVPN

C.

IGETVPN

D.

IPsec remote access

E.

clientless VPN

Full Access
Question # 165

Drag and drop the characteristics of northbound APIs from the left onto any position on the right. Not all characteristics are used.

Full Access
Question # 166

Drag and drop the QoS terms from the left onto the descriptions on the right.

Full Access
Question # 167

Which two practices are recommended for an acceptable security posture in a network? (Choose two)

A.

Backup device configurations to encrypted USB drives for secure retrieval

B.

maintain network equipment in a secure location

C.

Use a cryptographic keychain to authenticate to network devices

D.

Place internal email and file servers in a designated DMZ

E.

Disable unused or unnecessary ports, interfaces and services

Full Access
Question # 168

What is a characteristic of private IPv4 addressing?

A.

traverse the Internet when an outbound ACL is applied

B.

issued by IANA in conjunction with an autonomous system number

C.

composed of up to 65.536 available addresses

D.

used without tracking or registration

Full Access
Question # 169

Refer to the exhibit.

An engineer is bringing up a new circuit to the MPLS provider on the Gi0/1 interface of Router1 The new circuit uses eBGP and teams the route to VLAN25 from the BGP path What s the expected behavior for the traffic flow for route 10.10.13.0/25?

A.

Traffic to 10.10.13.0.25 is load balanced out of multiple interfaces

B.

Route 10.10.13.0/25 is updated in the routing table as being learned from interface Gi0/1.

C.

Traffic to 10.10.13.0/25 is asymmeteical

D.

Route 10.10.13.0/25 learned via the GiO/0 interface remains in the routing table

Full Access
Question # 170

What benefit does controller-based networking provide versus traditional networking?

A.

moves from a two-tier to a three-tier network architecture to provide maximum redundancy

B.

provides an added layer of security to protect from DDoS attacks

C.

allows configuration and monitoring of the network from one centralized port

D.

combines control and data plane functionality on a single device to minimize latency

Full Access
Question # 171

What is the functionality of the Cisco DNA Center?

A.

data center network pokey con

B.

console server that permits secure access to all network devices

C.

IP address cool distribution scheduler

D.

software-defined controller for automaton of devices and services

Full Access
Question # 172

Refer to the exhibit.

All interfaces are configured with duplex auto and ip ospf network broadcast. Which configuration allows routers R14 and R86 to form an OSPFv2 adjacency and act as a central point for exchanging OSPF information between routers?

A.

Option A

B.

Option B

C.

Option C

D.

option D

Full Access
Question # 173

Refer to the exhibit.

A network engineer must provide configured IP addressing details to investigate a firewall rule Issue. Which subnet and mask Identify what is configured on the en0 interface?

A.

10.8.0.0/16

B.

10.8.64.0/18

C.

10.8.128.0/19

D.

10.8.138.0/24

Full Access
Question # 174

Refer to the exhibit.

What is the issue with the interface GigabitEthernet0/0/1?

A.

Port security

B.

High throughput

C.

Cable disconnect

D.

duplex mismatch

Full Access
Question # 175

Refer to the exhibit.

Traffic from R1 to the 10.10.2.0/24 subnet uses 192.168.1.2 as its next hop. An network engineer wants to update the R1 configuration so that traffic with destination 10.10.2.1 passes through router R3, and all other traffic to the 10.10.20/24 subnet passes through r2. Which command must be used?

A.

Ip route 10.10.2.1 255.255.255.255 192.168.1.4 115

B.

Ip route 10.10.2.0 255.255.255.0 192.168.1.4 100

C.

Ip route 10.10.2.0 255.255.255.0 192.168.1.4 115

D.

Ip route 10.10.2.1 255.255.255.255 192.168.1.4 100

Full Access
Question # 176

The clients and OHCP server reside on different subnets. Which command must be used to forward requests and replies between clients on the 10.10.0.1/24 subnet and the DHCP server at 192.168.10.1?

A.

ip route 192.168.10.1

B.

ip default-gateway 192.168.10.1

C.

ip helper-address 192.168.10.1

D.

ip dhcp address 192.168.10.1

Full Access
Question # 177

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

Full Access
Question # 178

A Cisco engineer notices thai two OSPF neighbors are connected using a crossover Ethernet cable. The neighbors are taking too long to become fully adjacent. Which command must be issued under the interface configuration on each router to reduce the time required for the adjacency to reach the FULL state?

A.

ip ospf network broadcast

B.

ip ospf dead-interval 40

C.

ip ospf network point-to-point

D.

ip ospf priority 0

Full Access
Question # 179

Refer to the exhibit.

A packet sourced from 10.10.10.32 is destined for the internet.

A.

0

B.

1

C.

2

D.

32

Full Access
Question # 180

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

Full Access
Question # 181

Refer to the exhibit.

An OSPF neighbor relationship must be configured using these guidelines:

• R1 is only permitted to establish a neighbor with R2

• R1 will never participate in DR elections

• R1 will use a router-id of 101.1.1.

Which configuration must be used?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 182

Refer to the exhibit.

What is represented by "R1" and "SW1" within the JSON output?

A.

key

B.

array

C.

value

D.

object

Full Access
Question # 183

Refer to the exhibit.

A packet sourced from 172.18.33.2 is destined for 172.18.32.38. Where does the router forward the packet?

A.

GigabitEthernet0/0

B.

Loopback0

C.

10.1.1.1

D.

10.1.1.3

Full Access
Question # 184

Refer to the exhibit.

A network engineer is in the process of establishing IP connectivity between two sites. Routers R1 and R2 are partially configured with IP addressing. Both routers have the ability to access devices on their respective LANs. Which command set configures the IP connectivity between devices located on both LANs in each site?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 185

Refer to the exhibit.

Which command configures a floating static route to provide a backup to the primary link?

A.

ip route 0.0.0.0 0.0.0.0 209.165.202.131

B.

ip route 209.165.201.0 255.255.255.224 209.165.202.130

C.

ip route 0.0.0.0 0.0.0.0 209.165.200.224

D.

ip route 209.165.200.224 255.255.255.224 209.165.202.129 254

Full Access
Question # 186

What are two benefits of using the PortFast feature? (Choose two )

A.

Enabled interfaces are automatically placed in listening state

B.

Enabled interfaces come up and move to the forwarding state immediately

C.

Enabled interfaces never generate topology change notifications.

D.

Enabled interfaces that move to the learning state generate switch topology change notifications

E.

Enabled interfaces wait 50 seconds before they move to the forwarding state

Full Access
Question # 187

Which unified access point mode continues to serve wireless clients after losing connectivity to the Cisco Wireless LAN Controller?

A.

sniffer

B.

mesh

C.

flexconnect

D.

local

Full Access
Question # 188

An engineer configured an OSPF neighbor as a designated router. Which state verifies the designated router is in the proper mode?

A.

Exchange

B.

2-way

C.

Full

D.

Init

Full Access
Question # 189

What are two recommendations for protecting network ports from being exploited when located in an office space outside of an IT closer? (Choose two.)

A.

enable the PortFast feature on ports

B.

implement port-based authentication

C.

configure static ARP entries

D.

configure ports to a fixed speed

E.

shut down unused ports

Full Access
Question # 190

Which two primary drivers support the need for network automation? (Choose two.)

A.

Eliminating training needs

B.

Increasing reliance on self-diagnostic and self-healing

C.

Policy-derived provisioning of resources

D.

Providing a ship entry point for resource provisioning

E.

Reducing hardware footprint

Full Access
Question # 191

Refer to the exhibit.

Which route type does the routing protocol Code D represent in the output?

A.

internal BGP route

B.

/24 route of a locally configured IP

C.

statically assigned route

D.

route learned through EIGRP

Full Access
Question # 192

What are two reasons that cause late collisions to increment on an Ethernet interface? (Choose two)

A.

when the sending device waits 15 seconds before sending the frame again

B.

when the cable length limits are exceeded

C.

when one side of the connection is configured for half-duplex

D.

when Carrier Sense Multiple Access/Collision Detection is used

E.

when a collision occurs after the 32nd byte of a frame has been transmitted

Full Access
Question # 193

A network administrator must to configure SSH for remote access to router R1 The requirement is to use a public and private key pair to encrypt management traffic to and from the connecting client.

Which configuration, when applied, meets the requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 194

What are two reasons for an engineer to configure a floating state route? (Choose two)

A.

to automatically route traffic on a secondary path when the primary path goes down

B.

to route traffic differently based on the source IP of the packet

C.

to enable fallback static routing when the dynamic routing protocol fails

D.

to support load balancing via static routing

E.

to control the return path of traffic that is sent from the router

Full Access
Question # 195

Refer to the exhibit.

The default-information originate command is configured under the R1 OSPF configuration After testing workstations on VLAN 20 at Site B cannot reach a DNS server on the Internet Which action corrects the configuration issue?

A.

Add the default-information originate command onR2

B.

Configure the ip route 0.0.0.0 0.0.0.0 10.10.10.18 command on R1

C.

Configure the ip route 0.0.0.0 0.0.0.0 10.10.10.2 command on R2

D.

Add the always keyword to the default-information originate command on R1

Full Access
Question # 196

A corporate office uses four floors in a building

• Floor 1 has 24 users

• Floor 2 has 29 users

• Floor 3 has 28 users

•Floor 4 has 22 users

Which subnet summarizes and gives the most efficient distribution of IP addresses for the router configuration?

A.

192.168.0.0/26 as summary and 192.168.0.0/29 for each floor

B.

192.168.0.0.24 as summary and 192.168.0.0/28 for each floor

C.

192.168.0.0/23 as summary and 192.168.0.0/25 for each floor

D.

l92.168.0.0/25 as summary and 192.168.0.0/27 for each floor

Full Access
Question # 197

Refer to the exhibit.

What action establishes the OSPF neighbor relationship without forming an adjacency?

A.

modify hello interval

B.

modify process ID

C.

modify priority

D.

modify network type

Full Access
Question # 198

Using direct sequence spread spectrum, which three 2.4-GHz channels are used to limit collisions?

A.

1,6,11

B.

1,5,10

C.

1,2,3

D.

5,6,7

Full Access
Question # 199

What are two differences between optical-fiber cabling and copper cabling? (Choose two)

A.

Light is transmitted through the core of the fiber

B.

A BNC connector is used for fiber connections

C.

The glass core component is encased in a cladding

D.

Fiber connects to physical interfaces using Rj-45 connections

E.

The data can pass through the cladding

Full Access
Question # 200

How do AAA operations compare regarding user identification, user services and access control?

A.

Authorization provides access control and authentication tracks user services

B.

Authentication identifies users and accounting tracks user services

C.

Accounting tracks user services, and authentication provides access control

D.

Authorization identifies users and authentication provides access control

Full Access
Question # 201

What does an SDN controller use as a communication protocol to relay forwarding changes to a southbound API?

A.

OpenFlow

B.

Java

C.

REST

D.

XML

Full Access
Question # 202

Refer to the exhibit.

The nip server 192.168.0.3 command has been configured on router 1 to make it an NTP client of router 2. Which command must be configured on router 2 so that it operates in server-only mode and relies only on its internal clock?

A.

Router2(config)#ntp passive

B.

Router2(config)#ntp server 172.17.0.1

C.

Router2(config)#ntp master 4

D.

Router2(config)#ntp server 192.168.0.2

Full Access
Question # 203

When a client and server are not on the same physical network, which device is used to forward requests and replies between client and server for DHCP?

A.

DHCP relay agent

B.

DHCP server

C.

DHCPDISCOVER

D.

DHCPOFFER

Full Access
Question # 204

Drag and drop the Cisco Wireless LAN Controller security settings from the left onto the correct security mechanism categories on the right.

Full Access
Question # 205

Refer to the exhibit.

An engineer booted a new switch and applied this configuration via the console port. Which additional configuration must be applied to allow administrators to authenticate directly to enable privilege mode via Telnet using a local username and password?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 206

Which plane is centralized by an SDN controller?

A.

management-plane

B.

control-plane

C.

data-plane

D.

services-plane

Full Access
Question # 207

A network engineer must configure the router R1 GigabitEthernet1/1 interface to connect to the router R2 GigabitEthernet1/1 interface. For the configuration to be applied the engineer must compress the address 2001:0db8:0000:0000:0500:000a:400F:583B. Which command must be issued on the interface?

A.

ipv6 address 2001:0db8::5: a: 4F 583B

B.

ipv6 address 2001:db8::500:a:400F:583B

C.

ipv6 address 2001 db8:0::500:a:4F:583B

D.

ipv6 address 2001::db8:0000::500:a:400F:583B

Full Access
Question # 208

Refer to the exhibit.

What is the effect of this configuration?

A.

All ARP packets are dropped by the switch

B.

Egress traffic is passed only if the destination is a DHCP server.

C.

All ingress and egress traffic is dropped because the interface is untrusted

D.

The switch discard all ingress ARP traffic with invalid MAC-to-IP address bindings.

Full Access
Question # 209

A Cisco IP phone receive untagged data traffic from an attached PC. Which action is taken by the phone?

A.

It allows the traffic to pass through unchanged

B.

It drops the traffic

C.

It tags the traffic with the default VLAN

D.

It tags the traffic with the native VLAN

Full Access
Question # 210

Which two QoS tools provides congestion management? ( Choose two )

A.

CAR

B.

CBWFQ

C.

PQ

D.

PBR

E.

FRTS

Full Access
Question # 211

Which condition must be met before an NMS handles an SNMP trap from an agent?

A.

The NMS software must be loaded with the MIB associated with the trap.

B.

The NMS must be configured on the same router as the SNMP agent

C.

The NMS must receive a trap and an inform message from the SNMP agent within a configured interval

D.

The NMS must receive the same trap from two different SNMP agents to verify that it is reliable.

Full Access
Question # 212

R1 has learned route 10.10.10.0/24 via numerous routing protocols. Which route is installed?

A.

route with the lowest cost

B.

route with the next hop that has the highest IP

C.

route with the shortest prefix length

D.

route with the lowest administrative distance

Full Access
Question # 213

Which two must be met before SSH can operate normally on a Cisco IOS switch? (Choose two)

A.

The switch must be running a k9 (crypto) IOS image

B.

The Ip domain-name command must be configured on the switch

C.

IP routing must be enabled on the switch

D.

A console password must be configured on the switch

E.

Telnet must be disabled on the switch

Full Access
Question # 214

What Is the path for traffic sent from one user workstation to another workstation on a separate switch In a Ihree-lter architecture model?

A.

access - core - distribution - access

B.

access - distribution - distribution - access

C.

access - core - access

D.

access -distribution - core - distribution - access

Full Access
Question # 215

Which mode must be set for APs to communicate to a Wireless LAN Controller using the Control and Provisioning of Wireless Access Points (CAPWAP) protocol?

A.

bridge

B.

route

C.

autonomous

D.

lightweight

Full Access
Question # 216

What is the benefit of configuring PortFast on an interface?

A.

After the cable is connected, the interface uses the fastest speed setting available for that cable type

B.

After the cable is connected, the interface is available faster to send and receive user data

C.

The frames entering the interface are marked with higher priority and then processed faster by a switch.

D.

Real-time voice and video frames entering the interface are processed faster

Full Access
Question # 217

Refer to the exhibit.

Which two commands were used to create port channel 10? (Choose two )

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 218

Which network plane is centralized and manages routing decisions?

A.

policy plane

B.

management plane

C.

control plane

D.

data plane

Full Access
Question # 219

What is the function of a server?

A.

It transmits packets between hosts in the same broadcast domain.

B.

It provides shared applications to end users.

C.

It routes traffic between Layer 3 devices.

D.

It Creates security zones between trusted and untrusted networks

Full Access
Question # 220

When the active router in an HSRP group fails, what router assumes the role and forwards packets?

A.

backup

B.

standby

C.

listening

D.

forwarding

Full Access
Question # 221

Refer to the exhibit.

Router R1 is running three different routing protocols. Which route characteristic is used by the router to forward the packet that it receives for destination IP 172.16.32.1?

A.

longest prefix

B.

metric

C.

cost

D.

administrative distance

Full Access
Question # 222

Which protocol prompts the Wireless LAN Controller to generate its own local web administration SSL certificate for GUI access?

A.

HTTPS

B.

RADIUS

C.

TACACS+

D.

HTTP

Full Access
Question # 223

Refer to the exhibit.

A packet is being sent across router R1 to host 172.163.3.14. To which destination does the router send the packet?

A.

207.165.200.246 via Serial0/1/0

B.

207.165.200.254 via Serial0/0/1

C.

207.165.200.254 via Serial0/0/0

D.

207.165.200.250 via Serial/0/0/0

Full Access
Question # 224

Refer to the exhibit.

Shortly after SiteA was connected to SiteB over a new single-mode fiber path users at SiteA report intermittent connectivity issues with applications hosted at SiteB What is the cause of the intermittent connectivity issue?

A.

Interface errors are incrementing

B.

An incorrect SFP media type was used at SiteA

C.

High usage is causing high latency

D.

The sites were connected with the wrong cable type

Full Access
Question # 225

A wireless administrator has configured a WLAN; however, the clients need access to a less congested 5-GHz network for their voice quality. What action must be taken to meet the requirement?

A.

enable AAA override

B.

enable RX-SOP

C.

enable DTIM

D.

enable Band Select

Full Access
Question # 226

An office has 8 floors with approximately 30-40 users per floor What command must be configured on the router Switched Virtual Interface to use address space efficiently?

A.

ip address 192.168.0.0 255.255.0.0

B.

ip address 192.168.0.0 255.255.254.0

C.

ip address 192.168.0.0 255.255.255.128

D.

ip address 192.168.0.0 255.255.255.224

Full Access
Question # 227

Refer to Exhibit.

An engineer is configuring the NEW York router to reach the Lo1 interface of the Atlanta router using interface Se0/0/0 as the primary path. Which two commands must be configured on the New York router so that it can reach the Lo1 interface of the Atlanta router via Washington when the link between New York and Atlanta goes down? (Choose two)

A.

ipv6 router 2000::1/128 2012::1

B.

ipv6 router 2000::1/128 2012::1 5

C.

ipv6 router 2000::1/128 2012::2

D.

ipv6 router 2000::1/128 2023::2 5

E.

ipv6 router 2000::1/128 2023::3 5

Full Access
Question # 228

While examining excessive traffic on the network, it is noted that all incoming packets on an interface appear to be allowed even though an IPv4 ACL is applied to the interface.

Which two misconfigurations cause this behavior? (Choose two)

A.

The packets fail to match any permit statement

B.

A matching permit statement is too high in the access test

C.

A matching permit statement is too broadly defined

D.

The ACL is empty

E.

A matching deny statement is too high in the access list

Full Access
Question # 229

Refer to the exhibit.

An administrator must configure interfaces Gi1/1 and Gi1/3 on switch SW11 PC-1 and PC-2 must be placed in the Data VLAN and Phone-1 must be placed in the Voice VLAN Which configuration meets these requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 230

An engineer must configure traffic for a VLAN that is untagged by the switch as it crosses a trunk link. Which command should be used?

A.

switchport trunk allowed vlan 10

B.

switchport trunk native vlan 10

C.

switchport mode trunk

D.

switchport trunk encapsulation dot1q

Full Access
Question # 231

Refer to the exhibit.

A packet is being sent across router R1 to host 172.16.0.14. What is the destination route for the packet?

A.

209.165.200.254 via Serial0/0/1

B.

209.165.200.254 via Serial0/0/0

C.

209.165.200.246 via Serial0/1/0

D.

209.165.200.250 via Serial0/0/0

Full Access
Question # 232

Refer to the exhibit.

Which action is expected from SW1 when the untagged frame is received on the GigabitEthernet0/1 interface?

A.

The frame is processed in VLAN 5.

B.

The frame is processed in VLAN 11

C.

The frame is processed in VLAN 1

D.

The frame is dropped

Full Access
Question # 233

An engineer needs to configure LLDP to send the port description time length value (TLV). What command sequence must be implemented?

A.

switch(config-line)#IIdp port-description

B.

switch(config)#IIdp port-description

C.

switch(config-if)#IIdp port-description

D.

switch#IIdp port-description

Full Access
Question # 234

An implementer is preparing hardware for virtualization to create virtual machines on a host. What is needed to provide communication between hardware and virtual machines?

A.

hypervisor

B.

router

C.

straight cable

D.

switch

Full Access
Question # 235

Drag and drop the application protocols from the left onto the transport protocols that it uses on the right

Full Access
Question # 236

Where does wireless authentication happen?

A.

SSID

B.

radio

C.

band

D.

Layer 2

Full Access
Question # 237

Which protocol does an access point use to draw power from a connected switch?

A.

Internet Group Management Protocol

B.

Adaptive Wireless Path Protocol

C.

Cisco Discovery Protocol

D.

Neighbor Discovery Protocol

Full Access
Question # 238

Refer to the exhibit.

To which device does Router1 send packets that are destined to host 10.10.13.165?

A.

Router2

B.

Router3

C.

Router4

D.

Router5

Full Access
Question # 239

Drag and drop the lightweight access point operation modes from the left onto the descriptions on the right

Full Access
Question # 240

Which result occurs when PortFast is enabled on an interface that is connected to another switch?

A.

Spanning tree may fail to detect a switching loop in the network that causes broadcast storms

B.

VTP is allowed to propagate VLAN configuration information from switch to switch automatically.

C.

Root port choice and spanning tree recalculation are accelerated when a switch link goes down

D.

After spanning tree converges PortFast shuts down any port that receives BPDUs.

Full Access