Spring Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Cisco 200-301 Implementing and Administering Cisco Solutions (200-301 CCNA) v1.1 Exam Practice Test

Page: 1 / 124
Total 1240 questions

Implementing and Administering Cisco Solutions (200-301 CCNA) v1.1 Questions and Answers

Question 1

What is an advantage of using SDN versus traditional networking when it comes to security?

Options:

A.

Security is managed near the perimeter of the network with firewalls, VPNs, and IPS.

B.

Devices communicate with each other to establish a security policy.

C.

It creates a unified control point making security policies consistent across all devices.

D.

It exposes an API to configure locally per device for security policies.

Question 2

What are two behaviors of a point-to-point WAN topology? (Choose two.)

Options:

A.

It uses a single router to route traffic between sites.

B.

It leverages a dedicated connection.

C.

It connects remote networks through a single line.

D.

t delivers redundancy between the central office and branch offices.

E.

It provides direct connections between each router in the topology.

Question 3

Which technology allows multiple operating systems to run a single physical server?

Options:

A.

Containers

B.

Cloud computing

C.

Application hosting

D.

Virtualization

Question 4

Question # 4

Three switches must be configured for Layer 2 connectivity. The company requires only the designated VLANs to be configured on their respective switches and permitted accross any links between switches for security purposes. Do not modify or delete VTP configurations.

The network needs two user-defined VLANs configured:

VLAN 110: MARKETING

VLAN 210: FINANCE

1. Configure the VLANs on the designated switches and assign them as access ports to the interfaces connected to the PCs.

2. Configure the e0/2 interfaces on Sw1 and Sw2 as 802.1q trunks with only the required VLANs permitted.

3. Configure the e0/3 interfaces on Sw2 and Sw3 as 802.1q trunks with only the required VLANs permitted.

Question # 4

Options:

Question 5

Question # 5

Refer to the exhibit. OSPF neighbors routers A, B, C, and D are sending a route for 10.227.150.160/27. When the current route for 10.227.150.160/27 becomes unavailable, which cost will router Y use to route traffic to 10.227.150.160/27?

Options:

A.

cost 20

B.

cost 30

C.

cost 40

D.

cost 50

Question 6

Which security protocol is appropriate for a WPA3 implementation?

Options:

A.

CCMP

B.

MD5

C.

TKIP

D.

GCMP

Question 7

Which technology is appropriate for communication between an SDN controller and applications running over the network?

Options:

A.

REST API

B.

OpenFlow

C.

Southbound API

D.

NETCONF

Question 8

Which feature of Digest Authentication prevents credentials from being sent in plaintext?

Options:

A.

SSL/TLS encryption

B.

Challenge-response mechanism

C.

Token-based authorization

D.

Public key infrastructure

Question 9

How does a network administrator securely manage an AP in lightweight mode?

Options:

A.

using the CLI via an out-of-band connection

B.

using the WLC GUI via HTTPS

C.

using the AP GUI via an in-band SSH connection

D.

using the CLI via a virtual interface with SSH

Question 10

Question # 10

Refer to the exhibit. A network engineer must replicate the AccessSw1 NTP configuration on a new switch. The engineer could not access privileged mode on AccessSw1 to view its configuration.

Which command must be applied to the new switch to replicate the configuration?

Options:

A.

ntp master

B.

ntp master 3

C.

ntp server 2001:db8:12::1

D.

ntp server 127.127.1.1

Question 11

Question # 11

Refer to the exhibit. The static routes were implemented on the border router. What is the next hop IP address for a ping sent to 172.16.153.154 from the border router?

Options:

A.

10.56.65.56

B.

10.56.65.65

C.

10.65.56.56

D.

10.65.65.65

Question 12

Which IP address is used when an administrator must open a web-based management session with a lightweight AP?

Options:

A.

WLCIP

B.

gateway IP

C.

autonomous AP IP

D.

ACS IP

Question 13

Which syslog message logging level displays interface line protocol up/down events?

Options:

A.

Informational

B.

debugging

C.

alerts

D.

notifications

Question 14

Drag and drop the IPv6 address from the left onto the type on the right.

Question # 14

Options:

Question 15

Refer to the exhibit.

Question # 15

What is occurring on this switch?

Options:

A.

A high number of frames smaller than 64 bytes are received.

B.

Frames are dropped after 16 failed transmission attempts.

C.

The internal transmit buffer is overloaded.

D.

An excessive number of frames greater than 1518 bytes are received.

Question 16

Which feature, when used on a WLC, allows it to bundle its distribution system ports into one 802.3ad group?

Options:

A.

QinQ

B.

ISL

C.

PAgP

D.

LAG

Question 17

Which feature of Digest Authentication prevents credentials from being sent in plaintext?

Options:

A.

SSL/TLS encryption

B.

Challenge-response mechanism

C.

Token-based authorization

D.

Public key infrastructure

Question 18

What is represented by the word " LB13 " within this JSON schema?

Question # 18

Options:

A.

value

B.

object

C.

array

D.

key

Question 19

Question # 19

Refer to the exhibit. A secondary route is required on router R1 to pass traffic to the LAN network on R2 if the primary link fails. Which command must be entered to configure the router?

Options:

A.

ip route 10.0.2.0 255.255.255.240 10.0.0.7 92

B.

ip route 10.0.2.0 255.255.255.248 10.0.0.6 91

C.

ip route 10.0.2.0 256.255.255.240 10.0.0.6 91

D.

ip route 10.0.2.0 255.255.255.248 null0 93

Question 20

Which fact must the engineer consider when implementing syslog on a new network?

Options:

A.

Syslog defines the software or hardware component that triggered the message.

B.

There are 16 different logging levels (0-15).

C.

By default, all message levels are sent to the syslog server.

D.

The logging level defines the severity of a particular message.

Question 21

Which type of wired port is required when an AP offers one unique SSID, passes client data and management traffic, and is in autonomous mode?

Options:

A.

LAG

B.

default

C.

trunk

D.

Bopess

Question 22

Question # 22

Refer to the exhibit. An LACP EtherChannel between two directly connected switches is in the configuration process.

Which command must be configured on switch SW2’s Gi0/1-2 interfaces to establish the channel to SW1?

Options:

A.

channel-group 1 mode desirable

B.

channel-group 1 mode on

C.

channel-group 1 mode auto

D.

channel-group 1 mode active

Question 23

An engineer must update the configuration on two PCs in two different subnets to communicate locally with each other. One PC is configured with IP address 192.168.25.128/25 and the other with 192.168.25.100/25. Which network mask must the engineer configure on both PCs to enable the communication?

Options:

A.

255.255.255.224

B.

255.255.255.248

C.

255.255.255.0

D.

255.255.255.252

Question 24

Question # 24

Refer to the exhibit. Which routes are configured with their default administrative distances?

Options:

A.

EIGRP

B.

OSPF

C.

RIP

D.

Local

Question 25

Question # 25

Refer to the exhibit. An administrator is configuring a new WLAN for a wireless network that has these requirements:

Dual-band clients that connect to the WLAN must be directed to the 5-GHz spectrum.

Wireless clients on this WLAN must be able to apply VLAN settings from RADIUS attributes.

Which two actions meet these requirements? (Choose two.)

Options:

A.

Enable the Aironet IE option.

B.

Enable the Coverage Hole Detection option.

C.

Set the MFP Client Protection option to Required

D.

Enable the client band select option.

E.

Enable the allow AAA Override option

Question 26

Question # 26

Refer to the exhibit. The Wi-Fi SSID " Office_WLAN " has Layer 2 Security configured with MAC filtering enabled. What additional security is provided by this specific feature?

Options:

A.

There is an extra layer of security that ensures only authorized devices with known MAC addresses connect to the network

B.

There is strong mutual authentication used between NAC and the network devices using X.509 standard

C.

All data frames exchanged between the client and the access point are encrypted

D.

There is a Galcis cache algorithm configured that provides strong encryption and authentication

Question 27

How does MAC learning function?

Options:

A.

Enabled by default on all VLANs and interfaces

B.

Forwards frames to a neighbor port using CDP

C.

Overwrites the known source MAC address in the address table

D.

Protects against denial of service attacks

Question 28

What is a characteristic of an SSID in wireless networks?

Options:

A.

provides protection against spyware

B.

eliminates network piggybacking

C.

associates a name to a wireless network

D.

allows easy file sharing between endpoints

Question 29

Which action prevents debug messages from being sent via syslog while allowing other messages when an abnormally high number of syslog messages are generated by a device with the debug process turned on?

Options:

A.

Use an access list to filter out the syslog messages.

B.

Turn off the logging monitor in global configuration mode.

C.

Disable logging to the console.

D.

Set the logging trap severity level to informational.

Question 30

What is the default interface for in-band wireless network management on a WLC?

Options:

A.

Redundant port

B.

Out-of-band

C.

Service port

D.

Wireless management

Question 31

Question # 31

Refer to the exhibit. A network engineer is configuring a wireless LAN with Web Passthrough Layer 3 Web Policy. Which action must the engineer take to complete the configuration?

Options:

A.

Set the Layer 2 Security to 802.1X.

B.

Enable TKIP and CCMP256 WPA2 Encryption.

C.

Set the Layer 2 Security to None.

D.

Enable the WPA Policy.

Question 32

Question # 32

All physical cabling between the two switches is installed. Configure the network connectivity between the switches using the designated VLANs and interfaces.

1. Configure VLAN 100 named Compute and VLAN 200 named Telephony where required for each task.

2. Configure Ethernet0/1 on SW2 to use the existing VLAN named Available.

3. Configure the connection between the switches using access ports.

4. Configure Ethernet0/1 on SW1 using data and voice VLANs.

5. Configure Ethemet0/1 on SW2 so that the Cisco proprietary neighbor discovery protocol is turned off for the designated interface only.

Question # 32

Options:

Question 33

Which statement describes virtual machines?

Options:

A.

They include a guest OS and the service.

B.

They enable the network to become agile and hardware-centric.

C.

They use a supervisor to provide management for services.

D.

They facilitate local management of infrastructure devices.

Question 34

Which type of protocol is VRRP?

Options:

A.

uses dynamic IP address assignment

B.

allows two or more routers to act as a default gateway

C.

uses a destination IP address 224.0.0.102 for router-to-router communication

D.

uses Cisco-proprietary First Hop Redundancy Protocol

Question 35

In which way does a spine-and-leaf architecture allow for scalability in a network when additional access ports are required?

Options:

A.

A spine switch and a leaf switch are added with redundant connections between them.

B.

A spine switch is added with at least 40 GB uplinks.

C.

A leaf switch is added with a single connection to a core spine switch.

D.

A leaf switch is added with connections to every spine switch.

Question 36

How are API keys used to enforce rate limiting?

Options:

A.

to specify the type of data format the client prefers to receive

B.

to define the network path the API request should take

C.

to encrypt data sent in the API request

D.

to uniquely identify each client application

Question 37

An engineer requires a switch interface to actively attempt to establish a trunk link with a neighbor switch. What command must be configured?

Options:

A.

switchport mode dynamic desirable

B.

switchport mode trunk

C.

switchport nonegotiate

D.

switchport mode dynamic auto

Question 38

Question # 38

Refer to the exhibit. The routers R1-LAB and R2-LAB are configured with link-local addresses. What command must be applied to interface Gi0/0 on R1-LAB for an automated address self-assignment on the IPv6 network?

Options:

A.

ipv6 address 2001:db8:1:0FFA:0::/64

B.

ipv6 address 2001:db8:0:0FFA::1/64

C.

ipv6 address 2001:db8:0:0FFA::/64 eui-64

D.

ipv6 address 2001:db8:0:0FFA::/64 anycast

Question 39

Which AP mode wirelessly connects two separate network segments each set up within a different campus building?

Options:

A.

mesh

B.

local

C.

bridge

D.

point-to-point

Question 40

Question # 40

Refer to the exhibit. What is the value of the administrative distance for the default gateway?

Options:

A.

10

B.

0

C.

1

D.

110

Question 41

What is the difference between the TCP and UDP protocols?

Options:

A.

TCP ensures ordered, reliable data delivery, and UDP offers low latency and high throughput.

B.

TCP is used for transmitting data over the internet, and UDP is used for transmitting data over a local network.

C.

TCP manages multicast and broadcast data transfers, and UDP only handles unicast communications.

D.

TCP is used to ensure data integrity in a file transfer, and UDP is used to broadcast a message to multiple recipients.

Question 42

Which protocol should be used to transfer large files on a company intranet that allows UDP 69 through the firewall?

Options:

A.

FTP

B.

TFTP

C.

REST API

D.

SMTP

Question 43

Drag and drop the IPv6 address from the left onto the type on the right.

Question # 43

Options:

Question 44

Question # 44

Refer to the exhibit. Of the routes learned with dynamic routing protocols, which has the least preferred metric?

Options:

A.

EIGRP

B.

OSPF

C.

Local

D.

RIP

Question 45

Which role does AI play in monitoring network data flow?

Options:

A.

It analyzes patterns for anomaly detection.

B.

It exclusively predicts device malfunctions.

C.

It simplifies traffic route mapping.

D.

It enhances data packet delivery speeds.

Question 46

What is a characteristic of private IPv4 addressing?

Options:

A.

traverses the Internet when an outbound ACL Is applied

B.

used without allocation from a regional Internet authority

C.

shared address space between an ISP and subscriber

D.

reduces the need for isolated networks

Question 47

Question # 47

Refer to the exhibit. Routers R1 and R2 have been configured with their respective LAN interfaces. The two circuits are operational and reachable across the WAN. Which command set establishes failover redundancy if the primary circuit goes down?

Options:

A.

Ri(config)#ip route 0.0.0.0 0.0.0.0 10.10.10.62R2(config)#ip route 0.0.0.0 0.0.0.0 10.10.10.5 2

B.

Ri(config)#ip route 10.10.13.10 255.255.255.255 10.10.10.6R2(config)#ip route 192.168.0.100 255.255.255.255 10.10.10.5

C.

Ri(config)#ip route 0.0.0.0 0.0.0.0 10.10.10.6R2(config)#ip route 0.0.0.0 0.0.0.0 10.10.10.5

D.

Ri(config)#ip route 10.10.13.10 255.255.255.255 10.10.10.2R2(config)#ip route 192.168.0.100 255.255.255.255 10.10.10.1

Question 48

Which type of wired port is required when an AP offers one unique SSID, passes client data and management traffic, and is in autonomous mode?

Options:

A.

Default

B.

Access

C.

Trunk

D.

LAG

Question 49

How are API keys used to enforce rate limiting?

Options:

A.

to specify the type of data format the client prefers to receive

B.

to define the network path the API request should take

C.

to encrypt data sent in the API request

D.

to uniquely identify each client application

Question 50

Question # 50

Refer to the exhibit. The route for 10.220.100.96/27 has been very unstable. The same route has four backups to routers A, B, C, and D via the respective methods. The routing protocol defaults for router Y have not been changed. When the current route for 10.220.100.96/27 becomes unavailable, which router will router Y use to route traffic to 10.220.100.96/27?

Options:

A.

router D

B.

router B

C.

router C

D.

router A

Question 51

Why would a network administrator choose to implement RFC 1918 address space?

Options:

A.

to route traffic on the internet

B.

to provide flexibility in the IP network design

C.

to provide overlapping address space with another network

D.

to limit the number of hosts on the network

Question 52

What is the difference between the TCP and UDP protocols?

Options:

A.

TCP ensures ordered, reliable data delivery, and UDP offers low latency and high throughput.

B.

TCP is used for transmitting data over the internet, and UDP is used for transmitting data over a local network.

C.

TCP manages multicast and broadcast data transfers, and UDP only handles unicast communications.

D.

TCP is used to ensure data integrity in a file transfer, and UDP is used to broadcast a message to multiple recipients.

Question 53

Question # 53

Refer to the exhibit. What is the administrative distance for the advertised prefix that includes the host IP address 192.168.20.1?

Options:

A.

1

B.

24

C.

192.168.10.2

D.

0

Question 54

Which technology allows multiple operating systems to run a single physical server?

Options:

A.

Containers

B.

Cloud computing

C.

Application hosting

D.

Virtualization

Question 55

Question # 55

Refer to the exhibit. How must OSPF be configured on the GigabitEthernet0/0 interface of the neighbor device to achieve the desired neighbor relationship?

Options:

A.

Router(config)#interface GigabitEthernet 0/0Router(config-if)#ip ospf network point-to-point

B.

Router(config)#interface GigabitEthernet 0/0Router(config-if)#ip ospf cost 5

C.

Router(config)#interface GigabitEthernet 0/0Router(config-if)#ip ospf 1 area 2

D.

Router(config)#interface GigabitEthernet 0/0Router(config-if)#ip ospf priority 1

Question 56

How does MAC learning function?

Options:

A.

rewrites the source and destination MAC address

B.

adds unknown source MAC addresses to the CAM table

C.

sends the frame back to the source to verify availability

D.

drops received MAC addresses not listed in the address table

Question 57

Question # 57

Refer to the exhibit. Which interface does a packet take to reach the host address of 192.168.18.16?

Options:

A.

GigabitEthernet1/0

B.

GigabitEthernet0/0

C.

GigabitEthernet2/0

D.

Null0

Question 58

Question # 58

Refer to the exhibit. The route for 10.220.100.96/27 has been very unstable. The same route has four backups to routers A, B, C, and D via the respective methods. The routing protocol defaults for router Y have not been changed. When the current route for 10.220.100.96/27 becomes unavailable, which router will router Y use to route traffic to 10.220.100.96/27?

Options:

A.

router D

B.

router B

C.

router C

D.

router A

Question 59

Which two principles must be considered when using per-hop behavior in QoS? (Choose two.)

Options:

A.

Policing is not supported on subinterfaces.

B.

Shaping and rate limiting have the same effect.

C.

Shaping drops excessive traffic without adding traffic delay.

D.

Shaping levels out traffic bursts by delaying excess traffic.

E.

Policing is performed in the inbound and outbound directions.

Question 60

Question # 60

Refer to the exhibit. A VTY password has been set to Labtest32! for remote access. Which commands are required to allow only SSH access and to hide passwords in the running configuration?

Options:

A.

SW1#(config-line)#login local  SW1#(config-line)#exit  SW1(config)#crypto key generate rsa

B.

SW1#(config-line)#login local  SW1#(config-line)#exit  SW1(config)#enable secret test!2E

C.

SW1#(config-line)#transport input ssh  SW1#(config-line)#exit  SW1(config)#service password-encryption

D.

SW1#(config-line)#exit  SW1(config)#aaa new-model

Question 61

Refer to the exhibit.

Question # 61

What is the correct next hop for router R1 to reach IP addresses 192.168.2.86 and 10.20.1.50?

Options:

A.

172.16.1.4

B.

172.16.1.1

C.

172.16.1.2

D.

172.16.1.3

Question 62

Question # 62

Refer to the exhibit. HQC needs to use a configuration that:

Handles up to 150,000 concurrent connections

Minimizes consumption of public IP addresses

Which configuration meets the requirements?

Options:

A.

ip nat pool NATPOOL 209.165.201.1 209.165.201.5 netmask 255.255.255.248ip nat inside source list HQC interface gigabitEthernet0/0 overload

B.

ip nat pool NATPOOL 209.165.200.225 209.165.200.226 netmask 255.255.255.252ip nat outside source list HQC pool NATPOOL overload

C.

ip nat pool NATPOOL 209.165.201.1 209.165.201.3 netmask 255.255.255.248ip nat inside source list HQC pool NATPOOL overload

D.

ip nat pool NATPOOL 209.165.201.1 209.165.201.248 netmask 255.255.255.248ip nat outside source list HQC pool NATPOOL overload

Question 63

Which role do predictive Al models play in network load balancing?

Options:

A.

They anticipate future traffic spikes.

B.

They assign IP addresses to devices.

C.

They select correct cabling types for deployment.

D.

They solely monitor historical traffic volumes.

Question 64

Drag and drop the steps in a standard DNS lookup operation from the let into the order on the right.

Question # 64

Options:

Question 65

Question # 65

Refer to the exhibit. Inter-VLAN routing is configured on SW1. Client A is running Linux as an OS in VLAN 10 with a default gateway IP 10.0.0.1 but cannot ping client B in VLAN 20 running Windows. What action must be taken to verify that client A has the correct IP settings?

Options:

A.

Run the ipconfig command on client A and ensure that the IP address is within the host range of 10.0.0.1 - 10.0.255.254.

B.

Run the ifconfig command on client A to confirm that its IP and subnet mask fall within 255.254.0.0.

C.

Run the ipconfig command on client A to confirm that the correct 10.0.0.1 default gateway is used.

D.

Run the ifconfig command on client A to confirm that the subnet mask is set to 255.255.128.0.

Question 66

Refer to the exhibit.

Question # 66

An engineer must document all Wi-Fi services on a new wireless LAN controller. The Wi-Fi SSID " Office_WLan " has Layer 2 Security. What is determined by this configuration?

Options:

A.

There is a strong mutual authentication used between NAC and the network devices using x.509 standard.

B.

There is an extra layer of security that ensures only authorized devices with known MAC addresses connect to the network.

C.

There is a robust security mechanism configured to protect against various Layer 2 and Layer 3 attacks.

D.

There is Galois cache algorithm configured that provides strong encryption and authentication.

Question 67

Which key function is provided by the data plane?

Options:

A.

Making routing decisions

B.

Originating packets

C.

Forwarding traffic to the next hop

D.

Exchanging routing table data

Question 68

Which header must be included in a REST request from an application that requires JSON-formatted content?

Options:

A.

Content-Type: application/json

B.

Accept-Encoding: application/json

C.

Accept: application/json

D.

Accept-Language: application/json

Question 69

Which statement describes virtualization on containers?

Options:

A.

It is a type of operating system virtualization that allows the host operating system to control the different CPU memory processes.

B.

It emulates a physical computer and enables multiple machines to run with many operating systems on a physical machine.

C.

It separates virtual machines from each other and allocates memory, processors, and storage to compute.

D.

It contains a guest operating system and virtual partition of hardware for OS and requires application libraries.

Question 70

Aswitch receives a frame with the destination MAC address 3C:5D: 7E:9F: 1A:2B.

Switch# show ethernet-frame-and-mac-address-table

Question # 70

How does the switch handle the frame?

Options:

A.

It ages out the frame until the MAC address becomes known.

B.

It drops the frame to avoid unnecessary network congestion.

C.

It switches the frame to a predetermined port based on settings.

D.

It floods the frame to all ports except the incoming port.

Question 71

What is a characteristic of a Layer 2 switch?

Options:

A.

Provides a single broadcast domain for all connected devices

B.

Performs packet fragmentation and reassembly

C.

Tracks the number of active TCP connections

D.

Uses the data link layer for communications

Question 72

All physical cabling is in place. A company plans to deploy 32 new sites.

The sites will utilize both IPv4 and IPv6 networks.

1 . Subnet 172.25.0.0/16 to meet the subnet requirements and maximize

the number of hosts

Using the second subnet

• Assign the first usable IP address to e0/0 on Sw1O1

• Assign the last usable IP address to e0/0 on Sw102

2. Subnet to meet the subnet requirements and maximize

the number of hosts

c Using the second subnet

• Assign an IPv6 GUA using a unique 64-Bit interface identifier

on e0/0 on Sw101

• Assign an IPv6 GUA using a unique 64-Bit interface identifier

on eO/O on swi02

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using

the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Question # 72

Options:

Question 73

Which two QoS tools provide congestion management? (Choose two.)

Options:

A.

PBR

B.

FRTS

C.

PQ

D.

CBWFQ

E.

CAR

Question 74

Question # 74

Refer to the exhibit. What is the administrative distance for the advertised prefix that includes the host IP address 192.168.20.1?

Options:

A.

1

B.

24

C.

192.168.10.2

D.

0

Question 75

Refer to the exhibit.

Question # 75

What does router R1 use as its OSPF router-ID?

Options:

A.

10.10.1.10

B.

10.10.10.20

C.

172.16.15.10

D.

192.168.0.1

Question 76

Refer to the exhibit.

Question # 76

Only four switches are participating in the VLAN spanning-tree process.

Branch-1 priority 614440

Branch-2: priority 39082416

Branch-3: priority 0

Branch-4: root primary

Which switch becomes the permanent root bridge for VLAN 5?

Options:

A.

Branch-1

B.

Branch-2

C.

Branch-3

D.

Branch-4

Question 77

What does an SDN controller use as a communication protocol to relay forwarding changes to a southbound API?

Options:

A.

OpenFlow

B.

Java

C.

REST

D.

XML

Question 78

Which JSON data type is an unordered set of attribute- value pairs?

Options:

A.

array

B.

string

C.

object

D.

Boolean

Question 79

An engineer must configure an OSPF neighbor relationship between router R1 and R3 The authentication configuration has been configured and the connecting interfaces are in the same 192.168 1.0/30 sublet. What are the next two steps to complete the configuration? (Choose two.)

Options:

A.

configure the hello and dead timers to match on both sides

B.

configure the same process ID for the router OSPF process

C.

configure the same router ID on both routing processes

D.

Configure the interfaces as OSPF active on both sides.

E.

configure both interfaces with the same area ID

Question 80

R1 has learned route 10.10.10.0/24 via numerous routing protocols. Which route is installed?

Options:

A.

route with the lowest cost

B.

route with the next hop that has the highest IP

C.

route with the shortest prefix length

D.

route with the lowest administrative distance

Question 81

Refer to the exhibit.

Question # 81

An administrator must configure interfaces Gi1/1 and Gi1/3 on switch SW11 PC-1 and PC-2 must be placed in the Data VLAN and Phone-1 must be placed in the Voice VLAN Which configuration meets these requirements?

Question # 81

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 82

Refer to the exhibit.

Question # 82

An engineer is tasked with verifying network configuration parameters on a client workstation to report back to the team lead. Drag and drop the node identifiers from the left onto the network parameters on the right.

Question # 82

Options:

Question 83

When OSPF learns multiple paths to a network, how does it select a route?

Options:

A.

It multiple the active K value by 256 to calculate the route with the lowest metric.

B.

For each existing interface, it adds the metric from the source router to the destination to calculate the route with the lowest bandwidth.

C.

It divides a reference bandwidth of 100 Mbps by the actual bandwidth of the existing interface to calculate the router with the lowest cost.

D.

It count the number of hops between the source router and the destination to determine the router with the lowest metric

Question 84

Question # 84

Refer to the exhibit. After the configuration is applied, the two routers fail to establish an OSPF neighbor relationship. what is the reason for the problem?

Options:

A.

The OSPF router IDs are mismatched.

B.

Router2 is using the default hello timer.

C.

The network statement on Router1 is misconfigured.

D.

The OSPF process IDs are mismatched.

Question 85

Refer to the exhibit.

Question # 85

Which command must be executed for Gi1.1 on SW1 to become a trunk port if Gi1/1 on SW2 is configured in desirable or trunk mode?

Options:

A.

switchport mode trunk

B.

switchport mode dot1-tunnel

C.

switchport mode dynamic auto

D.

switchport mode dynamic desirable

Question 86

Refer to the exhibit.

Question # 86

An access list is created to deny Telnet access from host PC-1 to RTR-1 and allow access from all other hosts A Telnet attempt from PC-2 gives this message: " % Connection refused by remote host " Without allowing Telnet access from PC-1, which action must be taken to permit the traffic?

Options:

A.

Add the access-list 10 permit any command to the configuration

B.

Remove the access-class 10 in command from line vty 0.4.

C.

Add the ip access-group 10 out command to interface g0/0.

D.

Remove the password command from line vty 0 4.

Question 87

Refer to the exhibit.

Question # 87

An engineer is bringing up a new circuit to the MPLS provider on the Gi0/1 interface of Router1 The new circuit uses eBGP and teams the route to VLAN25 from the BGP path What s the expected behavior for the traffic flow for route 10.10.13.0/25?

Options:

A.

Traffic to 10.10.13.0.25 is load balanced out of multiple interfaces

B.

Route 10.10.13.0/25 is updated in the routing table as being learned from interface Gi0/1.

C.

Traffic to 10.10.13.0/25 is asymmeteical

D.

Route 10.10.13.0/25 learned via the GiO/0 interface remains in the routing table

Question 88

Refer to the exhibit.

Question # 88

An engineer must configure GigabitEthernet1/1 to accommodate voice and data traffic Which configuration accomplishes this task?

Question # 88

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 89

Refer to the exhibit.

Question # 89

Which prefix does Router 1 use for traffic to Host A?

Options:

A.

10.10.10.0/28

B.

10.10.13.0/25

C.

10.10.13.144/28

D.

10.10.13.208/29

Question 90

Which configuration is needed to generate an RSA key for SSH on a router?

Options:

A.

Configure the version of SSH

B.

Configure VTY access.

C.

Create a user with a password.

D.

Assign a DNS domain name

Question 91

What are two descriptions of three-tier network topologies? (Choose two)

Options:

A.

The core and distribution layers perform the same functions

B.

The access layer manages routing between devices in different domains

C.

The network core is designed to maintain continuous connectivity when devices fail.

D.

The core layer maintains wired connections for each host

E.

The distribution layer runs Layer 2 and Layer 3 technologies

Question 92

Which QoS tool is used to optimize voice traffic on a network that is primarily intended for data traffic?

Options:

A.

FIFO

B.

WFQ

C.

PQ

D.

WRED

Question 93

What is the purpose of an SSID?

Options:

A.

It provides network security

B.

It differentiates traffic entering access posits

C.

It identities an individual access point on a WLAN

D.

It identifies a WLAN

Question 94

Refer to the exhibit.

Question # 94

To which device does Router1 send packets that are destined to host 10.10.13.165?

Options:

A.

Router2

B.

Router3

C.

Router4

D.

Router5

Question 95

An engineer must configure traffic for a VLAN that is untagged by the switch as it crosses a trunk link. Which command should be used?

Options:

A.

switchport trunk allowed vlan 10

B.

switchport trunk native vlan 10

C.

switchport mode trunk

D.

switchport trunk encapsulation dot1q

Question 96

What is the expected outcome when an EUI-64 address is generated?

Options:

A.

The seventh bit of the original MAC address of the interface is inverted

B.

The interface ID is configured as a random 64-bit value

C.

The characters FE80 are inserted at the beginning of the MAC address of the interface

D.

The MAC address of the interface is used as the interface ID without modification

Question 97

An engineer needs to configure LLDP to send the port description time length value (TLV). What command sequence must be implemented?

Options:

A.

switch(config-line)#IIdp port-description

B.

switch(config)#IIdp port-description

C.

switch(config-if)#IIdp port-description

D.

switch#IIdp port-description

Question 98

Which network plane is centralized and manages routing decisions?

Options:

A.

policy plane

B.

management plane

C.

control plane

D.

data plane

Question 99

Router A learns the same route from two different neighbors, one of the neighbor routers is an OSPF neighbor and the other is an EIGRP neighbor. What is the administrative distance of the route that will be installed in the routing table?

Options:

A.

20

B.

90

C.

110

D.

115

Question 100

Drag and drop the descriptions from the left onto the configuration-management technologies on the right.

Question # 100

Options:

Question 101

Refer to the exhibit.

Question # 101

Between which zones do wireless users expect to experience intermittent connectivity?

Options:

A.

between zones 1 and 2

B.

between zones 2 and 5

C.

between zones 3 and 4

D.

between zones 3 and 6

Question 102

Which goal is achieved by the implementation of private IPv4 addressing on a network?

Options:

A.

provides an added level of protection against Internet exposure

B.

provides a reduction in size of the forwarding table on network routers

C.

allows communication across the Internet to other private networks

D.

allows servers and workstations to communicate across public network boundaries

Question 103

Refer to Exhibit.

Question # 103

Which configuration must be applied to the router that configures PAT to translate all addresses in VLAN 200 while allowing devices on VLAN 100 to use their own IP addresses?

Question # 103

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 104

What is a function of a Layer 3 switch?

Options:

A.

move frames between endpoints limited to IP addresses

B.

transmit broadcast traffic when operating in Layer 3 mode exclusively

C.

forward Ethernet frames between VLANs using only MAC addresses

D.

flood broadcast traffic within a VLAN

Question 105

Refer to the exhibit.

Question # 105

The show ip ospf interface command has been executed on R1 How is OSPF configured?

Options:

A.

The interface is not participating in OSPF

B.

A point-to-point network type is configured

C.

The default Hello and Dead timers are in use

D.

There are six OSPF neighbors on this interface

Question 106

What is a characteristic of spine-and-leaf architecture?

Options:

A.

Each device is separated by the same number of hops

B.

It provides variable latency

C.

It provides greater predictability on STP blocked ports.

D.

Each link between leaf switches allows for higher bandwidth.

Question 107

How do traditional campus device management and Cisco DNA Center device management differ in regards to deployment?

Options:

A.

Cisco DNA Center device management can deploy a network more quickly than traditional campus device management

B.

Traditional campus device management allows a network to scale more quickly than with Cisco DNA Center device management

C.

Cisco DNA Center device management can be implemented at a lower cost than most traditional campus device management options

D.

Traditional campus device management schemes can typically deploy patches and updates more quickly than Cisco DNA Center device management

Question 108

Which condition must be met before an NMS handles an SNMP trap from an agent?

Options:

A.

The NMS software must be loaded with the MIB associated with the trap.

B.

The NMS must be configured on the same router as the SNMP agent

C.

The NMS must receive a trap and an inform message from the SNMP agent within a configured interval

D.

The NMS must receive the same trap from two different SNMP agents to verify that it is reliable.

Question 109

Which port type supports the spanning-tree portfast command without additional configuration?

Options:

A.

access ports

B.

Layer 3 main Interfaces

C.

Layer 3 suninterfaces

D.

trunk ports

Question 110

Which two outcomes are predictable behaviors for HSRP? (Choose two)

Options:

A.

The two routers share a virtual IP address that is used as the default gateway for devices on the LAN.

B.

The two routers negotiate one router as the active router and the other as the standby router

C.

Each router has a different IP address both routers act as the default gateway on the LAN, and traffic is load balanced between them.D The two routers synchronize configurations to provide consistent packet forwarding

D.

The two routed share the same IP address, and default gateway traffic is load-balanced between them

Question 111

What are two reasons for an engineer to configure a floating state route? (Choose two)

Options:

A.

to automatically route traffic on a secondary path when the primary path goes down

B.

to route traffic differently based on the source IP of the packet

C.

to enable fallback static routing when the dynamic routing protocol fails

D.

to support load balancing via static routing

E.

to control the return path of traffic that is sent from the router

Question 112

What is a capability of FTP in network management operations?

Options:

A.

encrypts data before sending between data resources

B.

devices are directly connected and use UDP to pass file information

C.

uses separate control and data connections to move files between server and client

D.

offers proprietary support at the session layer when transferring data

Question 113

Refer to the exhibit.

Question # 113

Which IPv6 configuration is required for R17 to successfully ping the WAN interface on R18?

A)

Question # 113

B)

Question # 113

C)

Question # 113

D)

Question # 113

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 114

When a client and server are not on the same physical network, which device is used to forward requests and replies between client and server for DHCP?

Options:

A.

DHCP relay agent

B.

DHCP server

C.

DHCPDISCOVER

D.

DHCPOFFER

Question 115

Where does a switch maintain DHCP snooping information?

Options:

A.

in the MAC address table

B.

in the CAM table

C.

in the binding database

D.

in the frame forwarding database

Question 116

R1 has learned route 192.168.12.0/24 via IS-IS. OSPF, RIP. and Internal EIGRP Under normal operating conditions, which routing protocol is installed in the routing table?

Options:

A.

IS-IS

B.

RIP

C.

Internal EIGRP

D.

OSPF

Question 117

Refer to the exhibit.

Question # 117

Based on the LACP neighbor status, in which mode is the SW1 port channel configured?

Options:

A.

passive

B.

mode on

C.

auto

D.

active

Question 118

Refer to the exhibit.

Question # 118

How does router R1 handle traffic to 192.168.10.16?

Options:

A.

It selects the IS-IS route because it has the shortest prefix inclusive of the destination address.

B.

It selects the EIGRP route because it has the lowest administrative distance.

C.

It selects the OSPF route because it has the lowest cost.

D.

It selects the RIP route because it has the longest prefix inclusive of the destination address.

Question 119

A corporate office uses four floors in a building

• Floor 1 has 24 users

• Floor 2 has 29 users

• Floor 3 has 28 users

•Floor 4 has 22 users

Which subnet summarizes and gives the most efficient distribution of IP addresses for the router configuration?

Options:

A.

192.168.0.0/26 as summary and 192.168.0.0/29 for each floor

B.

192.168.0.0.24 as summary and 192.168.0.0/28 for each floor

C.

192.168.0.0/23 as summary and 192.168.0.0/25 for each floor

D.

l92.168.0.0/25 as summary and 192.168.0.0/27 for each floor

Question 120

Which design element is a best practice when deploying an 802.11b wireless infrastructure?

Options:

A.

disabling TPC so that access points can negotiate signal levels with their attached wireless devices.

B.

setting the maximum data rate to 54 Mbps on the Cisco Wireless LAN Controller

C.

allocating nonoverlapping channels to access points that are in close physical proximity to one another

D.

configuring access points to provide clients with a maximum of 5 Mbps

Question 121

A Cisco IP phone receive untagged data traffic from an attached PC. Which action is taken by the phone?

Options:

A.

It allows the traffic to pass through unchanged

B.

It drops the traffic

C.

It tags the traffic with the default VLAN

D.

It tags the traffic with the native VLAN

Question 122

What Is a syslog facility?

Options:

A.

Host that is configured for the system to send log messages

B.

password that authenticates a Network Management System to receive log messages

C.

group of log messages associated with the configured severity level

D.

set of values that represent the processes that can generate a log message

Question 123

Refer to the exhibit.

Question # 123

The nip server 192.168.0.3 command has been configured on router 1 to make it an NTP client of router 2. Which command must be configured on router 2 so that it operates in server-only mode and relies only on its internal clock?

Options:

A.

Router2(config)#ntp passive

B.

Router2(config)#ntp server 172.17.0.1

C.

Router2(config)#ntp master 4

D.

Router2(config)#ntp server 192.168.0.2

Question 124

which IPv6 address block forwards packets to a multicast address rather than a unicast address?

Options:

A.

2000::/3

B.

FC00::/7

C.

FE80::/10

D.

FF00::/12

Question 125

Refer to the exhibit.

Question # 125

If R1 receives a packet destined to 172.161.1, to which IP address does it send the packet?

Options:

A.

192.168.12.2

B.

192.168.13.3

C.

192.168.14.4

D.

192.168.15.5

Question 126

What Is the path for traffic sent from one user workstation to another workstation on a separate switch In a Ihree-lter architecture model?

Options:

A.

access - core - distribution - access

B.

access - distribution - distribution - access

C.

access - core - access

D.

access -distribution - core - distribution - access

Question 127

Drag and drop the application protocols from the left onto the transport protocols that it uses on the right

Question # 127

Options:

Question 128

Which type of traffic is sent with pure iPsec?

Options:

A.

broadcast packets from a switch that is attempting to locate a MAC address at one of several remote sites

B.

multicast traffic from a server at one site to hosts at another location

C.

spanning-tree updates between switches that are at two different sites

D.

unicast messages from a host at a remote site to a server at headquarters

Question 129

Refer to Exhibit.

Question # 129

An engineer is configuring the NEW York router to reach the Lo1 interface of the Atlanta router using interface Se0/0/0 as the primary path. Which two commands must be configured on the New York router so that it can reach the Lo1 interface of the Atlanta router via Washington when the link between New York and Atlanta goes down? (Choose two)

Options:

A.

ipv6 router 2000::1/128 2012::1

B.

ipv6 router 2000::1/128 2012::1 5

C.

ipv6 router 2000::1/128 2012::2

D.

ipv6 router 2000::1/128 2023::2 5

E.

ipv6 router 2000::1/128 2023::3 5

Question 130

Which type of IPv6 address is publicly routable in the same way as IPv4 public address?

Options:

A.

global unicast

B.

link-local

C.

unique local

D.

multicast

Question 131

Drag and drop the TCP/IP protocols from the left onto the transmission protocols on the right

Question # 131

Options:

Question 132

Which protocol prompts the Wireless LAN Controller to generate its own local web administration SSL certificate for GUI access?

Options:

A.

HTTPS

B.

RADIUS

C.

TACACS+

D.

HTTP

Question 133

Which IPv6 address type provides communication between subnets and is unable to route on the Internet?

Options:

A.

global unicast

B.

unique local

C.

link-local

D.

multicast

Question 134

Refer to the exhibit.

Question # 134

If configuring a static default route on the router with the ip route 0.0.0.0 0.0.0.0 10.13.0.1 120 command how does the router respond?

Options:

A.

It ignores the new static route until the existing OSPF default route is removed

B.

It immediately replaces the existing OSPF route in the routing table with the newly configured static route

C.

It starts load-balancing traffic between the two default routes

D.

It starts sending traffic without a specific matching entry in the routing table to GigabitEthernet0/1

Question 135

Which mode must be set for APs to communicate to a Wireless LAN Controller using the Control and Provisioning of Wireless Access Points (CAPWAP) protocol?

Options:

A.

bridge

B.

route

C.

autonomous

D.

lightweight

Question 136

What are two differences between optical-fiber cabling and copper cabling? (Choose two)

Options:

A.

Light is transmitted through the core of the fiber

B.

A BNC connector is used for fiber connections

C.

The glass core component is encased in a cladding

D.

Fiber connects to physical interfaces using Rj-45 connections

E.

The data can pass through the cladding

Question 137

Which technology can prevent client devices from arbitrarily connecting to the network without state remediation?

Options:

A.

802.1x

B.

IP Source Guard

C.

MAC Authentication Bypass

D.

802.11n

Question 138

Refer to the exhibit.

Question # 138

Drag and drop the networking parameters from the left onto the correct values on the right.

Question # 138

Options:

Question 139

When the active router in an HSRP group fails, what router assumes the role and forwards packets?

Options:

A.

backup

B.

standby

C.

listening

D.

forwarding

Question 140

Refer to the exhibit.

Question # 140

A network engineer is in the process of establishing IP connectivity between two sites. Routers R1 and R2 are partially configured with IP addressing. Both routers have the ability to access devices on their respective LANs. Which command set configures the IP connectivity between devices located on both LANs in each site?

Question # 140

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 141

What is a difference between RADIUS and TACACS+?

Options:

A.

RADIUS is most appropriate for dial authentication, but TACACS+ can be used for multiple types of authentication

B.

TACACS+ encrypts only password information and RADIUS encrypts the entire payload

C.

TACACS+ separates authentication and authorization, and RADIUS merges them

D.

RADIUS logs all commands that are entered by the administrator, but TACACS+ logs only start, stop, and interim commands

Question 142

Which function does an SNMP agent perform?

Options:

A.

it sends information about MIB variables in response to requests from the NMS

B.

it requests information from remote network nodes about catastrophic system events.

C.

it manages routing between Layer 3 devices in a network

D.

it coordinates user authentication between a network device and a TACACS+ or RADIUS server

Question 143

Refer to the exhibit.

Question # 143

Which route does R1 select for traffic that is destined to 192 168.16.2?

Options:

A.

192.168.16.0/21

B.

192.168.16.0/24

C.

192.168 26.0/26

D.

192.168.16.0/27

Question 144

Using direct sequence spread spectrum, which three 2.4-GHz channels are used to limit collisions?

Options:

A.

1,6,11

B.

1,5,10

C.

1,2,3

D.

5,6,7

Question 145

Which two must be met before SSH can operate normally on a Cisco IOS switch? (Choose two)

Options:

A.

The switch must be running a k9 (crypto) IOS image

B.

The Ip domain-name command must be configured on the switch

C.

IP routing must be enabled on the switch

D.

A console password must be configured on the switch

E.

Telnet must be disabled on the switch

Question 146

Refer to me exhibit.

Question # 146

Which action is taken by the router when a packet is sourced from 10.10.10.2 and destined for 10.10.10.16?

Options:

A.

It uses a route that is similar to the destination address

B.

It discards the packets.

C.

It floods packets to all learned next hops.

D.

It Queues the packets waiting for the route to be learned.

Question 147

Refer to the exhibit.

Question # 147

Which route type is configured to reach the internet?

Options:

A.

host route

B.

default route

C.

floating static route

D.

network route

Question 148

Which communication interaction takes place when a southbound API Is used?

Options:

A.

between the SDN controller and PCs on the network

B.

between the SON controller and switches and routers on the network

C.

between the SON controller and services and applications on the network

D.

between network applications and switches and routers on the network

Question 149

An organization secures its network with multi-factor authentication using an authenticator app on employee smartphone. How is the application secured in the case of a user’s smartphone being lost or stolen?

Options:

A.

The application requires an administrator password to reactivate after a configured Interval.

B.

The application requires the user to enter a PIN before it provides the second factor.

C.

The application challenges a user by requiring an administrator password to reactivate when the smartphone is rebooted.

D.

The application verifies that the user is in a specific location before it provides the second factor.

Question 150

What are two benefits for using private IPv4 addressing? (Choose two.)

Options:

A.

They alleviate the shortage of public IPv4 addresses.

B.

They supply redundancy in the case of failure.

C.

They offer Internet connectivity to endpoints on private networks.

D.

They allow for Internet access from IoT devices.

E.

They provide a layer of security from Internet threats.

Question 151

Why would VRRP be implemented when configuring a new subnet in a multivendor environment?

Options:

A.

when a gateway protocol is required that support more than two Cisco devices for redundancy

B.

to enable normal operations to continue after a member failure without requiring a change In a host ARP cache

C.

to ensure that the spanning-tree forwarding path to the gateway is loop-free

D.

to interoperate normally with all vendors and provide additional security features for Cisco devices

Question 152

Which REST method updates an object in the Cisco DNA Center Intent API?

Options:

A.

CHANGE

B.

UPDATE

C.

POST

D.

PUT

Question 153

Which group of channels in the 802.11b/g/n/ax 2.4 GHz frequency bands are non-overlapping channels?

Options:

A.

channels 1, 5, and 10

B.

channels 1, 5, and 11

C.

channels 1, 6, and 10

D.

channels 1, 6, and 11

Question 154

A network architect is deciding whether to implement Cisco autonomous access points or lightweight access points. Which fact about firmware updates must the architect consider? Unlike lightweight access points, which require

Options:

A.

Unlike lightweight access points, which require redundant WLCs to support firmware upgrades, autonomous access points require only one WLC.

B.

Unlike autonomous access points, lightweight access points store a complete copy of the current firmware for backup.

C.

Unlike lightweight access points, autonomous access points can recover automatically from a corrupt firmware update.

D.

Unlike autonomous access points, lightweight access points require a WLC to implement remote firmware updates.

Question 155

Refer to the exhibit.

Question # 155

Which two values does router R1 use to determine the best path to reach destinations in network 1,0.0.0/8? (Choose two.)

Options:

A.

longest prefix match

B.

highest administrative distance

C.

highest metric

D.

lowest metric

E.

lowest cost to reach the next hop

Question 156

Refer to the exhibit.

Question # 156

What are two conclusions about this configuration? {Choose two.)

Options:

A.

The spanning-tree mode is Rapid PVST+.

B.

This is a root bridge.

C.

The root port is FastEthernet 2/1.

D.

The designated port is FastEthernet 2/1.

E.

The spanning-tree mode is PVST+.

Question 157

What is used as a solution for protecting an individual network endpoint from attack?

Options:

A.

Router

B.

Wireless controller

C.

Anti software

D.

Cisco DNA Center

Question 158

What are two lacts that differentiate optical-fiber cabling from copper cabling? (Choose two.)

Options:

A.

It is less expensive when purchasing patch cables.

B.

It has a greater sensitivity to changes in temperature and moisture.

C.

It provides greater throughput options.

D.

It carries signals for longer distances.

E.

It carries electrical current further distances for PoE devices.

Question 159

Refer to the exhibit.

Question # 159

The given Windows PC is requesting the IP address of the host at www.cisco.com. To which IP address is the request sent?

Options:

A.

192.168.1.226

B.

192.168.1.100

C.

192.168.1.254

D.

192.168.1.253

Question 160

Refer to the exhibit.

Question # 160

An architect is managing a wireless network with APs from several branch offices connecting to the WLC in the data center. There is a new requirement for a single WLAN to process the client data traffic without sending it to the WLC. Which action must be taken to complete the request?

Options:

A.

Enable local HTTP profiling.

B.

Enable Disassociation Imminent.

C.

Enable FlexConnect Local Switching.

D.

Enable local DHCP Profiling.

Question 161

A network engineer is implementing a corporate SSID for WPA3-Personal security with a PSK. Which encryption cipher must be configured?

Options:

A.

GCMP2S6

B.

GCMP128

C.

CCMP256

D.

CCMP128

Question 162

Which type of IPv4 address must be assigned to a server to protect it from external access and allow only internal users access while restricting internet access?

Options:

A.

global unicast

B.

public

C.

private

D.

multicast

Question 163

Refer to the exhibit.

Question # 163

A newly configured PC fails to connect to the internet using TCP port 80 to www cisco com Which setting must be modified for the connection to work?

Options:

A.

Subnet Mask

B.

DNS Servers

C.

Default Gateway

D.

DHCP Server

Question 164

Which command creates a static NAT binding for a PC address of 10.1.1.1 to the public routable address 209.165.200.225 assigned to the PC?

Options:

A.

R1(config)#ip nat inside source static 10.1.1.1 209.165.200.225

B.

R1(config)#ip nat inside source static 209.165.200.225 10.1.1.1

C.

R1(config)#ip nat outside source static 10.1.1.1 209.165.200.225

D.

R1(config)#ip nat outside source static 209.165.200.225 10.1.1.1

Question 165

Which two VPN technologies are recommended by Cisco for multiple branch offices and large-scale deployments? (Choose two.)

Options:

A.

site-to-site VPN

B.

DMVPN

C.

GETVPN

D.

IPsec remote access

E.

clientless VPN

Question 166

The address block 192.168.32.0/24 must be subnetted into smaller networks. The engineer must meet these requirements:

Create 8 new subnets

Each subnet must accommodate 30 hosts

Interface VLAN 10 must use the last usable IP in the first new subnet.

A Layer 3 interface is used.

Which configuration must be applied to the interface?

Options:

A.

no switchport  ip address 192.168.32.30 255.255.255.224

B.

no switchport mode trunk  ip address 192.168.32.97 255.255.255.224

C.

no switchport mode access  ip address 192.168.32.62 255.255.255.240

D.

switchport  ip address 192.168.32.65 255.255.255.240

Question 167

Which interface IP address serves as the tunnel source for CAPWAP packets from the WLC to an AP?

Options:

A.

service

B.

trunk

C.

AP-manager

D.

virtual AP connection

Question 168

Drag and drop the IPv6 address types from the left onto their description on the right.

Question # 168

Options:

Question 169

Drag and drop the virtualization concepts from the left onto the matching statements on the right.

Question # 169

Options:

Question 170

Question # 170

Refer to the exhibit. A packet sourced from 10.10.10.32 is destined for the Internet. What is the administrative distance for the destination route?

Options:

A.

0

B.

1

C.

2

D.

32

Question 171

What is the difference between controller-based networks and traditional networks as they relate to control-plane and/or data-plane functions?

Options:

A.

Controller-based networks centralize all important data-plane functions, and traditional networks distribute data-plane functions.

B.

Controller-based networks centralize all important control-plane functions, and traditional networks distribute control-plane functions.

C.

Traditional networks centralize all important control-plane functions, and controller-based networks distribute control-plane functions.

D.

Traditional networks centralize all important data-plane functions, and controller-based networks distribute data-plane functions.

Question 172

Refer to the exhibit.

Question # 172

How many JSON objects are presented?

Options:

A.

1

B.

2

C.

3

D.

4

Question 173

What is a similarity OM3 and OM4 fiber optical cable?

Options:

A.

Both have a 62.5 micron core diameter.

B.

Both have a 50 micron core diameter.

C.

Both have a 100 micron core diameter.

D.

Both have a 9 micron core diameter.

Question 174

Which protocol must be implemented to support separate authorization and authentication solutions for wireless APs?

Options:

A.

RADIUS

B.

TACACS+

C.

802.1X

D.

Kerberos

Question 175

An engineer must configure a core router with a floating static default route to the backup router at 10.200.0.2. Which command meets the requirements?

Options:

A.

ip route 0.0.0.0 0.0.0.0 10.200.0.2 1

B.

Ip route 0.0.0.0 0.0.0.0 10.200.0.2 floating

C.

ip route 0.0.0.0 0.0.0.0 10.200.0.2

D.

Ip route 0.0.0.0 0.0.0.0 10.200.0.2 10

Question 176

Which action must be taken when password protection is Implemented?

Options:

A.

Use less than eight characters in length when passwords are complex.

B.

Store passwords as contacts on a mobile device with single-factor authentication.

C.

Include special characters and make passwords as long as allowed.

D.

Share passwords with senior IT management to ensure proper oversight.

Question 177

Which IPsec transport mode encrypts the IP header and the payload?

Options:

A.

pipe

B.

control

C.

transport

D.

tunnel

Question 178

Question # 178

Refer to the exhibit. What is the next-hop P address for R2 so that PC2 reaches the application server via ElGRP?

Options:

A.

192.168.30.1

B.

10.10 105

C.

10.10.10.6

D.

192.168.201

Question 179

An engineer must configure a core router with a floating static default route to the backup router at 10.200.0.2.

Question # 179

Options:

Question 180

Question # 180

Refer to the exhibit. Drag and drop the learned prefixes from the left onto the preferred route methods from which they were learned on the right.

Question # 180

Options:

Question 181

Which remote access protocol provides unsecured remote CLI access?

Options:

A.

console

B.

Telnet

C.

Bash

D.

SSH

Question 182

Refer to the exhibit.

Question # 182

PC1 regularly sends 1800 Mbps of traffic to the server. A network engineer needs to configure the EtherChannel to disable Port Channel 1 between SW1 and SW2 when the Ge0/0 and Ge0/1 ports on SW2 go down. Which configuration must the engineer apply to the switch?

A)

Question # 182

B)

Question # 182

C)

Question # 182

D)

Question # 182

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 183

What is a functionality of the control plane in the network?

Options:

A.

It exchanges topology information with other routers.

B.

It forwards traffic to the next hop.

C.

It looks up an egress interface in the forwarding information base.

D.

It provides CLI access to the network device.

Question 184

Exhibit.

Question # 184

The switches are connected via a Cat5 Ethernet cable that was successfully tested. The Interfaces are configured as access ports and are both in a ' down " status. What is the cause of this issue?

Options:

A.

The switches are configured with incompatible duplex settings.

B.

The distance between the two switches is not supported by Cut5.

C.

The speed settings on the switches are mismatched.

D.

The portfast command is missing from the configuration.

Question 185

A Cisco engineer at a new branch office is configuring a wireless network with access points that connect to a controller that is based at corporate headquarters Wireless client traffic must terminate at the branch office and access-point survivability is required in the event of a WAN outage Which access point mode must be selected?

Options:

A.

Lightweight with local switching disabled

B.

Local with AP fallback enabled

C.

OfficeExtend with high availability disabled

D.

FlexConnect with local switching enabled

Question 186

What is the benefit of using FHRP (First Hop Redundancy Protocol)?

Options:

A.

Reduced ARP traffic on the network

B.

Balancing traffic across multiple gateways in proportion to their loads

C.

Reduced management overhead on network routers

D.

Higher degree of availability

Question 187

Refer to the exhibit.

Question # 187

An engineer is checking the routing table in the main router to identify the path to a server on the network. Which route does the router use to reach the server at 192.168.2.2?

Options:

A.

S 192.168.0.0/20 [1/0] via 10.1.1.1

B.

S 192.168.2.0/29 [1/0] via 10.1.1.1

C.

S 192.168.2.0/28 [1/0] via 10.1.1.1

D.

S 192.168.1.0/30 [1/0] via 10.1.1.1

Question 188

A Cisco engineer notices thai two OSPF neighbors are connected using a crossover Ethernet cable. The neighbors are taking too long to become fully adjacent. Which command must be issued under the interface configuration on each router to reduce the time required for the adjacency to reach the FULL state?

Options:

A.

ip ospf network broadcast

B.

ip ospf dead-interval 40

C.

ip ospf network point-to-point

D.

ip ospf priority 0

Question 189

What is the operating mode and role of a backup port on a shared LAN segment in Rapid PVST+?

Options:

A.

forwarding mode and provides the lowest-cost path to the root bridge for each VLAN

B.

learning mode and provides the shortest path toward the root bridge handling traffic away from the LAN

C.

blocking mode and provides an alternate path toward the designated bridge

D.

listening mode and provides an alternate path toward the root bridge

Question 190

A network engineer is replacing the switches that belong to a managed-services client with new Cisco Catalyst switches. The new switches will be configured for updated security standards, including replacing Telnet services with encrypted connections and doubling the modulus size from 1024. Which two commands must the engineer configure on the new switches? (Choose two.)

Options:

A.

crypto key generate rsa general-keys modulus 1024

B.

transport input all

C.

crypto key generate rsa usage-keys

D.

crypto key generate rsa modulus 2048

E.

transport Input ssh

Question 191

Question # 191

Refer to the exhibit. Clients on the WLAN are required to use 802.11r. What action must be taken to meet the requirement?

Options:

A.

Set the Fast Transition option to Enable and enable FT 802.1X under Authentication Key Management

B.

Set the Fast Transition option and the WPA gik-randomize State to disable

C.

Under Protected Management Frames, set the PMF option to Required

D.

Enable CCKM under Authentication Key Management

Question 192

Drag and drop the IPv6 address description from the left onto the IPv6 address types on the right. Not all options are used.

Question # 192

Options:

Question 193

Refer to the exhibit.

Question # 193

A new VLAN and switch are added to the network. A remote engineer configures OldSwitch and must ensure that the configuration meets these requirements:

• accommodates current configured VLANs

• expands the range to include VLAN 20

• allows for IEEE standard support for virtual LANs

Which configuration on the NewSwitch side of the link meets these requirements?

A)

Question # 193

B)

Question # 193

C)

Question # 193

D)

Question # 193

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 194

Drag and drop the management connection types from the left onto the definitions on the right.

Question # 194

Options:

Question 195

Refer to the exhibit.

Question # 195

What does the host do when using the IPv4 Preferred function?

Options:

A.

It continues to use a statically assigned IPv4 address

B.

It forces the DNS server to provide the same IPv4 address at each renewal.

C.

It requests the same IPv4 address when it renews its lease with the DHCP server.

D.

It prefers a pool of addresses when renewing the IPv4 host IP address

Question 196

PC1 tries to send traffic to newly installed PC2. The PC2 MAC address is not listed in the MAC address table of the switch, so the switch sends the packet to all ports in the same VLAN Which switching concept does this describe?

Options:

A.

MAC address aging

B.

MAC address table

C.

frame flooding

D.

spanning-tree protocol

Question 197

Question # 197

Refer to the exhibit. An engineer executed the script and added commands that were not necessary for SSH and must now remove the commands. Which two commands must be executed to correct the configuration? (Choose two.)

Options:

A.

no ip domain name ccna.cisco.com

B.

no login local

C.

no service password-encryption

D.

no ip name-server 198.51.100.210

E.

no hostname CPE

Question 198

A network engineer starts to implement a new wireless LAN by configuring the authentication server and creating the dynamic Interface. What must be performed next to complete the basic configuration?

Options:

A.

Install the management interface and add the management IP.

B.

Configure high availability and redundancy tor the access points.

C.

Enable Telnet and RADIUS access on the management interface.

D.

Create the new WLAN and bind the dynamic interface to It.

Question 199

Question # 199

Refer to the exhibit. What is the cause of the issue?

Options:

A.

STP

B.

port security

C.

wrong cable type

D.

shutdown command

Question 200

Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.

Question # 200

Options:

Question 201

Which IPsec encryption mode is appropriate when the destination of a packet differs from the security termination point?

Options:

A.

tunnel

B.

transport

C.

aggressive

D.

main

Question 202

Question # 202

Refer to the exhibit. An engineer is asked to confère router R1 so that it forms an OSPF single-area neighbor relationship with R2. Which command sequence must be implemented to configure the router?

Question # 202

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 203

Question # 203

Refer to the exhibit. Router-WAN1 has a new connection via Gi0/0 to the ISP. Users running the web applications indicate that connectivity is unstable to the internet. What is causing the interface issue?

Options:

A.

Small frames less than 64 bytes are rejected due to size.

B.

The receive buffer is full due to a broadcast storm.

C.

Frames are discarded due to a half-duplex negotiation.

D.

Broadcast packets are rejected because ARP timeout is enabled.

Question 204

Refer to the exhibit.

Question # 204

Which interface is chosen to forward traffic to the host at 192.168.0.55?

Options:

A.

GigabitEthernet0

B.

GigabitEthernet0/1

C.

Null0

D.

GigabitEthernet0/3

Question 205

When a WPA2-PSK WLAN is configured in the Wireless LAN Controller, what is the minimum number of characters that is required in ASCII format?

Options:

A.

6

B.

8

C.

12

D.

18

Question 206

Refer to the exhibit.

Question # 206

How must OSPF be configured on the GigabitEthernet0/0 interface of the neighbor device to achieve.

A)

Question # 206

B)

Question # 206

C)

Question # 206

D)

Question # 206

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 207

Which two capabilities of Cisco DNA Center make it more extensible as compared to traditional campus device management? (Choose two.)

Options:

A.

REST APIs that allow for external applications to interact natively

B.

adapters that support all families of Cisco IOS software

C.

SDKs that support interaction with third-party network equipment

D.

customized versions for small, medium, and large enterprises

E.

modular design that is upgradable as needed

Question 208

Refer to the exhibit.

Question # 208

Which command must be enable a floating default route on router A?

Options:

A.

ip route 0.0.0.0 0.0.0.0 192.168.1.2

B.

ip default-gateway 192.168.2.1

C.

ip route 0.0.0.0 0.0.0.0 192.168.1.2 10

D.

ip route 0.0.0.0 0.0.0.0 192.168.2.1 10

Question 209

What is a valid IPv6 address record in DNS?

Options:

A.

A

B.

MX

C.

AAAA

D.

CNAME

Question 210

Refer to the exhibit.

Question # 210

Rapid PVST+ mode is on the same VLAN on each switch. Which switch becomes the root bridge and why?

Options:

A.

SW2, because its MAC address is the highest

B.

SW3, because its priority is the highest

C.

SW4, because its priority is highest and its MAC address is lower

D.

SW1, because its priority is the lowest and its MAC address is higher

Question 211

What are two examples of multifactor authentication? (Choose two.)

Options:

A.

single sign-on

B.

unique user knowledge

C.

passwords that expire

D.

soft tokens

E.

shared password responsibility

Question 212

Refer to the exhibit.

Question # 212

Which action must be taken to ensure that router A is elected as the DR for OSPF area 0?

Options:

A.

Configure the router A interfaces with the highest OSPF priority value within the area.

B.

Configure router B and router C as OSPF neighbors of router A.

C.

Configure the OSPF priority on router A with the lowest value between the three routers.

D.

Configure router A with a fixed OSPF router ID.

Question 213

An on-site service desk technician must verify the IP address and DNS server information on a users Windows computer. Which command must the technician enter at the command prompt on the user ' s computer?

Options:

A.

ipconfig /all

B.

ifconfig -a

C.

show interface

D.

netstat -r

Question 214

Under which condition is TCP preferred over UDP?

Options:

A.

UDP is used when low latency is optimal, and TCP is used when latency is tolerable.

B.

TCP is used when dropped data is more acceptable, and UDP is used when data is accepted out- of-order.

C.

TCP is used when data reliability is critical, and UDP is used when missing packets are acceptable.

D.

UDP is used when data is highly interactive, and TCP is used when data is time-sensitive.

Question 215

Question # 215

Refer to the exhibit. Each router must be configured with the last usable IP address in the subnet. Which configuration fulfills this requirement?

Question # 215

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 216

A network analyst is tasked with configuring the date and time on a router using EXEC mode. The date must be set to January 1. 2020 and the time must be set to 12:00 am. Which command should be used?

Options:

A.

clock summer-time recurring

B.

clock timezone

C.

clock summer-time date

D.

clock set

Question 217

Which two server types support dornas name to IP address resolution? (Choose two >

Options:

A.

ESX host

B.

resolver

C.

web

D.

file transfer

E.

authentication

Question 218

What describes the functionality of southbound APIs?

Options:

A.

They use HTTP messages to communicate.

B.

They enable communication between the controller and the network device.

C.

They convey information from the controller to the SDN applications.

D.

They communicate with the management plane.

Question 219

Question # 219

Refer to the exhibit. A network engineer is configuring a WLAN to use a WPA2 PSK and allow only specific clients to join. Which two actions must be taken to complete the process? (Choose two.)

Options:

A.

Enable the 802.1X option for Authentication Key Management

B.

Enable the WPA2 Policy option

C.

Enable the CCKM option for Authentication Key Management

D.

Enable the MAC Filtering option

E.

Enable the OSEN Policy option

Question 220

What does a switch search for in the CAM table when forwarding a frame?

Options:

A.

source MAC address and aging time

B.

destination MAC address and flush time

C.

source MAC address and source port

D.

destination MAC address and destination port

Question 221

What is the role of community strings in SNMP operations?

Options:

A.

It serves as a sequence tag on SNMP traffic messages.

B.

It serves as a password lo protect access to MIB objects.

C.

It passes the Active Directory username and password that are required for device access

D.

It translates alphanumeric MIB output values to numeric values.

Question 222

Which action implements physical access control as part of the security program of an organization1?

Options:

A.

backing up syslogs at a remote location

B.

configuring a password for the console port

C.

configuring enable passwords on network devices

D.

setting up IP cameras to monitor key infrastructure

Question 223

Which selections must be used on the WLC when implementing a RADIUS server for wireless authentication?

Options:

A.

Client Exclusion and SSH

B.

802.1x and the MAC address of the server

C.

Network Access Control State and SSH

D.

AAA Override and the IP address of the server

Question 224

A network engineer is configuring a switch so that it is remotely reachable via SSH. The engineer has already configured the host name. Which additional command must the engineer configure before entering the command to generate the RSA key?

Options:

A.

ip domain-name domain

B.

password password

C.

crypto key generate rsa modulus 1024

D.

ip ssh authentication-retries 2

Question 225

Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right.

Question # 225

Options:

Question 226

Refer to the exhibit.

Question # 226

Host A sent a data frame destined for host D

Question # 226

What does the switch do when it receives the frame from host A?

Options:

A.

It drops the frame from the switch CAM table.

B.

It floods the frame out of all ports except port Fa0/1.

C.

It shuts down the port Fa0/1 and places it in err-disable mode.

D.

It experiences a broadcast storm.

Question 227

An engineer is tasked to configure a switch with port security to ensure devices that forward unicasts multicasts and broadcasts are unable to flood the port The port must be configured to permit only two random MAC addresses at a time Drag and drop the required configuration commands from the left onto the sequence on the right Not all commands are used.

Question # 227

Options:

Question 228

Refer to the exhibit.

Question # 228

Switch A is newly configured. All VLANs are present in the VLAN database. The IP phone and PC A on Gi0/1 must be configured for the appropriate VLANs to establish connectivity between the PCs. Which command set fulfills the requirement?

A)

Question # 228

B)

Question # 228

C)

Question # 228

D)

Question # 228

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 229

Which interface mode must be configured to connect the lightweight APs in a centralized architecture?

Options:

A.

WLAN dynamic

B.

management

C.

trunk

D.

access

Question 230

Drag and drop the descriptions of AAA services from the left onto the corresponding services on the right.

Question # 230

Options:

Question 231

Drag and drop the characteristics of networking from the left onto the networking types on the right.

Question # 231

Options:

Question 232

What are two benefits of FHRPs? (Choose two.)

Options:

A.

They enable automatic failover of the default gateway.

B.

They allow multiple devices to serve as a single virtual gateway for clients in the network.

C.

They are able to bundle multiple ports to increase bandwidth.

D.

They prevent loops in the Layer 2 network.

E.

They allow encrypted traffic.

Question 233

Which two spanning-tree states are bypassed on an interface running PortFast? (Choose two.)

Options:

A.

disabled

B.

listening

C.

forwarding

D.

learning

E.

blocking

Question 234

Refer to the exhibit.

Question # 234

Which two commands must be added to update the configuration of router R1 so that it accepts only encrypted connections? (Choose two )

Options:

A.

username CNAC secret R!41!4319115@

B.

ip ssh version 2

C.

line vty 0 4

D.

crypto key generate rsa 1024

E.

transport input ssh

Question 235

How does Rapid PVST+ create a fast loop-free network topology?

Options:

A.

lt requires multiple links between core switches

B.

It generates one spanning-tree instance for each VLAN

C.

It maps multiple VLANs into the same spanning-tree instance

D.

It uses multiple active paths between end stations.

Question 236

What is the purpose of the ip address dhcp command?

Options:

A.

to configure an Interface as a DHCP server

B.

to configure an interface as a DHCP helper

C.

to configure an interface as a DHCP relay

D.

to configure an interface as a DHCP client

Question 237

Refer to the exhibit.

Question # 237

The router has been configured with a supernet to accommodate the requirement for 380 users on a subnet The requirement already considers 30% future growth. Which configuration verifies the IP subnet on router R4?

A)

Question # 237

B)

Question # 237

C)

Question # 237

D)

Question # 237

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 238

Refer to the exhibit.

Question # 238

Which command configures OSPF on the point-to-point link between routers R1 and R2?

Options:

A.

router-id 10.0.0.15

B.

neighbor 10.1.2.0 cost 180

C.

ipospf priority 100

D.

network 10.0.0.0 0.0.0.255 area 0

Question 239

Refer to the exhibit.

Question # 239

An engineer is configuring a new router on the network and applied this configuration. Which additional configuration allows the PC to obtain its IP address from a DHCP server?

Options:

A.

Configure the ip dhcp relay information command under interface Gi0/1.

B.

Configure the ip dhcp smart-relay command globally on the router

C.

Configure the ip helper-address 172.16.2.2 command under interface Gi0/0

D.

Configure the ip address dhcp command under interface Gi0/0

Question 240

Refer to the exhibit.

Question # 240

Users on existing VLAN 100 can reach sites on the Internet. Which action must the administrator take to establish connectivity to the Internet for users in VLAN 200?

Options:

A.

Define a NAT pool on the router.

B.

Configure static NAT translations for VLAN 200.

C.

Configure the ip nat outside command on another interface for VLAN 200.

D.

Update the NAT INSIDF RANGFS ACL

Question 241

What causes a port to be placed in the err-disabled state?

Options:

A.

nothing plugged into the port

B.

link flapping

C.

shutdown command issued on the port

D.

latency

Question 242

Refer to the exhibit.

Question # 242

The following must be considered:

• SW1 is fully configured for all traffic

• The SW4 and SW9 links to SW1 have been configured

• The SW4 interface Gi0/1 and Gi0/0 on SW9 have been configured

• The remaining switches have had all VLANs adde d to their VLAN database

Which configuration establishes a successful ping from PC2 to PC7 without interruption to traffic flow between other PCs?

A)

Question # 242

B)

Question # 242

C)

Question # 242

D)

Question # 242

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 243

Refer to the exhibit.

Question # 243

An engineer is configuring an EtherChannel using LACP between Switches 1 and 2 Which configuration must be applied so that only Switch 1 sends LACP initiation packets?

Options:

A.

Switch 1 (config-if)#channel-group 1 mode onSwrtch2(config-if)#channel-group 1 mode passive

B.

Switch1(config-if)#channel-group 1 mode passiveSwitch2(config-if)#channel-group 1 mode active

C.

Switch1{config-if)£channel-group 1 mode activeSwitch2(config-if)#channel-group 1 mode passive

D.

Switch1(config-if)#channel-group 1 mode onSwitch2(config-if)#channel-group 1 mode active

Question 244

Which type of network attack overwhelms the target server by sending multiple packets to a port until the half-open TCP resources of the target are exhausted?

Options:

A.

SYIM flood

B.

reflection

C.

teardrop

D.

amplification

Question 245

Refer to the exhibit.

Question # 245

How should the configuration be updated to allow PC1 and PC2 access to the Internet?

Options:

A.

Modify the configured number of the second access list.

B.

Add either the ip nat {inside|outside} command under both interfaces.

C.

Remove the overload keyword from the ip nat inside source command.

D.

Change the ip nat inside source command to use interface GigabitEthernet0/0.

Question 246

An engineer is configuring remote access to a router from IP subnet 10.139.58.0/28. The domain name, crypto keys, and SSH have been configured. Which configuration enables the traffic on the destination router?

A)

Question # 246

B)

Question # 246

C)

Question # 246

D)

Question # 246

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 247

Which two network actions occur within the data plane? (Choose two.)

Options:

A.

Add or remove an 802.1Q trunking header.

B.

Make a configuration change from an incoming NETCONF RPC.

C.

Run routing protocols.

D.

Match the destination MAC address to the MAC address table.

E.

Reply to an incoming ICMP echo request.

Question 248

Refer to the exhibit.

Question # 248

Which action must be taken to ensure that router A is elected as the DR for OSPF area 0?

Options:

A.

Configure the OSPF priority on router A with the lowest value between the three routers.

B.

Configure router B and router C as OSPF neighbors of router A.

C.

Configure the router A interfaces with the highest OSPF priority value within the area.

D.

Configure router A with a fixed OSPF router ID

Question 249

Which protocol is used for secure remote CLI access?

Options:

A.

HTTPS

B.

HTTP

C.

Telnet

D.

SSH

Question 250

Refer to the exhibit.

Question # 250

Which configuration allows routers R14 and R86 to form an OSPFv2 adjacency while acting as a central point for exchanging OSPF information between routers?

A)

Question # 250

B)

Question # 250

C)

Question # 250

D)

Question # 250

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 251

Which WLC management connection type is vulnerable to man-in-the-middle attacks?

Options:

A.

SSH

B.

HTTPS

C.

Telnet

D.

console

Question 252

Refer to the exhibit.

Question # 252

Web traffic is coming in from the WAN interface. Which route takes precedence when the router is processing traffic destined for the LAN network at 10 0.10.0/24?

Options:

A.

via next-hop 10.0.1.5

B.

via next-hop 10 0 1.4

C.

via next-hop 10.0 1.50

D.

via next-hop 10.0 1 100

Question 253

Refer to the exhibit.

Question # 253

Which command must be issued to enable a floating static default route on router A?

Options:

A.

lp route 0.0.0.0 0.0.0.0 192.168.1.2

B.

ip default-gateway 192.168.2.1

C.

ip route 0.0.0.0 0.0.0.0 192.168.2.1 10

D.

ip route 0.0.0.0 0.0.0.0 192.168.1.2 10

Question 254

Refer to the exhibit.

Question # 254

The DHCP server and clients are connected to the same switch. What is the next step to complete the DHCP configuration to allow clients on VLAN 1 to receive addresses from the DHCP server?

Options:

A.

Configure the ip dhcp snooping trust command on the interlace that is connected to the DHCP client.

B.

Configure the ip dhcp relay information option command on the interface that is connected to the DHCP client.

C.

Configure the ip dhcp snooping trust command on the interface that is connected to the DHCP server.

D.

Configure the Ip dhcp relay information option command on the interface that is connected to the DHCP server.

Question 255

A Cisco engineer is configuring a factory-default router with these three passwords:

• The user EXEC password for console access is p4ssw0rd1

• The user EXEC password for Telnet access is s3cr3t2

• The password for privileged EXEC mode is pnv4t3p4ss Which command sequence must the engineer configured

A)

Question # 255

B)

Question # 255

C)

Question # 255

D)

Question # 255

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 256

What provides centralized control of authentication and roaming In an enterprise network?

Options:

A.

a lightweight access point

B.

a firewall

C.

a wireless LAN controller

D.

a LAN switch

Question 257

Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.

Question # 257

Options:

Question 258

A network administrator is setting up a new IPv6 network using the 64-bit address 2001 0EB8 00C1 2200:0001 0000 0000 0331/64 To simplify the configuration the administrator has decided to compress the address Which IP address must the administrator configure?

Options:

A.

ipv6 address 21:EB8:C1:2200:1::331/64

B.

ipv6 address 2001:EB8:C1:22:1::331/64

C.

ipv6 address 2001 :EB8:C 1:2200.1 ::331-64

D.

ipv6 address 2001:EB8:C1:2200:1:0000:331/64

Question 259

Refer to the exhibit.

Question # 259

Which network prefix was learned via EIGRP?

Options:

A.

172.16.0.0/16

B.

192.168.2.0/24

C.

207.165.200.0/24

D.

192.168.1.0/24

Question 260

A network engineer must implement an IPv6 configuration on the vlan 2000 interface to create a routable locally-unique unicast address that is blocked from being advertised to the internet. Which configuration must the engineer apply?

Options:

A.

interface vlan 2000ipv6 address ffc0:0000:aaaa::1234:2343/64

B.

interface vlan 2000Ipv6 address fc00:0000:aaaa:a15d:1234:2343:8aca/64

C.

interface vlan 2000ipv6 address fe80;0000:aaaa::1234:2343/64

D.

interface vlan 2000ipv6 address fd00::1234:2343/64

Question 261

Refer to the exhibit.

Question # 261

Which minimum configuration items are needed to enable Secure Shell version 2 access to R15?

A)

Question # 261

B)

Question # 261

C)

Question # 261

D)

Question # 261

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 262

Which protocol uses the SSL?

Options:

A.

HTTP

B.

SSH

C.

HTTPS

D.

Telnet

Question 263

What is a requirement when configuring or removing LAG on a WLC?

Options:

A.

The Incoming and outgoing ports for traffic flow must be specified If LAG Is enabled.

B.

The controller must be rebooted after enabling or reconfiguring LAG.

C.

The management interface must be reassigned if LAG disabled.

D.

Multiple untagged interfaces on the same port must be supported.

Question 264

Refer to the exhibit.

Question # 264

Site A was recently connected to site B over a new single-mode fiber path. Users at site A report Intermittent connectivity Issues with applications hosted at site B. What is the reason for the problem?

Options:

A.

Heavy usage is causing high latency.

B.

An incorrect type of transceiver has been inserted into a device on the link.

C.

physical network errors are being transmitted between the two sites.

D.

The wrong cable type was used to make the connection.

Question 265

Refer to the exhibit.

Question # 265

R1 learns all routes via OSPF Which command configures a backup static route on R1 to reach the 192 168.20.0/24 network via R3?

Options:

A.

R1(config)#ip route 192.168.20.0 255.255.0.0 192.168.30.2

B.

R1(config)#ip route 192.168.20.0 255.255.255.0 192.168.30.2 90

C.

R1(config)#ip route 192.168.20.0 255.255.255.0 192.168.30.2 111

D.

R1(config)#ip route 192.168.20.0 255.255.255.0 192.168.30.2

Question 266

Refer to the exhibit.

Question # 266

Router R1 currently is configured to use R3 as the primary route to the Internet, and the route uses the default administrative distance settings. A network engineer must configure R1 so that it uses R2 as a backup, but only if R3 goes down. Which command must the engineer configure on R1 so that it correctly uses R2 as a backup route, without changing the administrative distance configuration on the link to R3?

Options:

A.

ip route 0.0.0.0 0.0.0.0 g0/1 1

B.

ip route 0.0.0.0 0.0.0.0 209.165.201.5 10

C.

ip route 0.0.0.0 0.0.0.0 209.165.200.226 1

D.

ip route 0,0.0.0 0.0.0.0 g0/1 6

Question 267

What is an expected outcome when network management automation is deployed?

Options:

A.

A distributed management plane must be used.

B.

Software upgrades are performed from a central controller

C.

Complexity increases when new device configurations are added

D.

Custom applications are needed to configure network devices

Question 268

Refer to the exhibit.

Question # 268

A static route must be configured on R14 to forward traffic for the 172 21 34 0/25 network that resides on R86 Which command must be used to fulfill the request?

Options:

A.

ip route 172.21.34.0 255.255.255.192 10.73.65.65

B.

ip route 172.21.34.0 255.255.255.0 10.73.65.65

C.

ip route 172.21.34.0 255.255.128.0 10.73.65.64

D.

ip route 172.21.34.0 255.255.255.128 10.73.65.66

Question 269

Which QoS traffic handling technique retains excess packets in a queue and reschedules these packets for later transmission when the configured maximum bandwidth has been surpassed?

Options:

A.

weighted random early detection

B.

traffic policing

C.

traffic shaping

D.

traffic prioritization

Question 270

Which action is taken by the data plane within a network device?

Options:

A.

forwards traffic to the next hop

B.

constructs a routing table based on a routing protocol

C.

provides CLI access to the network device

D.

looks up an egress interface in the forwarding information base

Question 271

What is a requirement for nonoverlapping Wi-Fi channels?

Options:

A.

different security settings

B.

discontinuous frequency ranges

C.

different transmission speeds

D.

unique SSIDs

Question 272

What is a function of a Next-Generation IPS?

Options:

A.

makes forwarding decisions based on learned MAC addresses

B.

serves as a controller within a controller-based network

C.

integrates with a RADIUS server to enforce Layer 2 device authentication rules

D.

correlates user activity with network events

Question 273

Refer to the exhibit.

Question # 273

Which two commands must be configured on router R1 to enable the router to accept secure remote-access connections? (Choose two)

Options:

A.

transport input telnet

B.

crypto key generate rsa

C.

ip ssh pubkey-chain

D.

login console

E.

username cisco password 0 Cisco

Question 274

Refer to the exhibit.

Question # 274

An engineer built a new L2 LACP EtherChannel between SW1 and SW2 and executed these show commands to verify the work. Which additional task allows the two switches to establish an LACP port channel?

Options:

A.

Change the channel-group mode on SW2 to auto

B.

Change the channel-group mode on SW1 to desirable.

C.

Configure the interface port-channel 1 command on both switches.

D.

Change the channel-group mode on SW1 to active or passive.

Question 275

R1 as an NTP server must have:

• NTP authentication enabled

• NTP packets sourced from Interface loopback 0

• NTP stratum 2

• NTP packets only permitted to client IP 209.165 200 225

How should R1 be configured?

A)

Question # 275

B)

Question # 275

C)

Question # 275

D)

Question # 275

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 276

A Cisco engineer must configure a single switch interface to meet these requirements

• accept untagged frames and place them in VLAN 20

• accept tagged frames in VLAN 30 when CDP detects a Cisco IP phone

Which command set must the engineer apply?

A)

Question # 276

B)

Question # 276

C)

Question # 276

D)

Question # 276

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 277

Drag and drop the statements about networking from the left onto the corresponding networking types on the right.

Question # 277

Options:

Question 278

Drag and drop the facts about wireless architectures from the left onto the types of access point on the right. Not all options are used.

Question # 278

Options:

Question 279

Refer to the exhibit.

Question # 279

Traffic that is flowing over interface TenGigabitEthernet0/0 experiences slow transfer speeds. What is the reason for the issue?

Options:

A.

heavy traffic congestion

B.

a duplex incompatibility

C.

a speed conflict

D.

queuing drops

Question 280

What is the difference between IPv6 unicast and anycast addressing?

Options:

A.

IPv6 anycast nodes must be explicitly configured to recognize the anycast address, but IPv6 unicast nodes require no special configuration

B.

IPv6 unicast nodes must be explicitly configured to recognize the unicast address, but IPv6 anycast nodes require no special configuration

C.

An individual IPv6 unicast address is supported on a single interface on one node but an IPv6 anycast address is assigned to a group of interfaces on multiple nodes.

D.

Unlike an IPv6 anycast address, an IPv6 unicast address is assigned to a group of interfaces on multiple nodes

Question 281

Refer to the exhibit.

Question # 281

Routers R1 and R3 have the default configuration The router R2 priority is set to 99 Which commands on R3 configure it as the DR in the 10.0 4.0/24 network?

Options:

A.

R3(config)#interface Gig0/1 R3(config-if)#ip ospf priority 100

B.

R3(config)#interface Gig0/0 R3(config-if)#ip ospf priority 100

C.

R3(config)#interface Gig0/0 R3(config-if)i=ip ospf priority 1

D.

R3(config)#interface Gig0/1 R3(config-if)#ip ospf priority 0

Question 282

Refer to the exhibit.

Question # 282

An IP subnet must be configured on each router that provides enough addresses for the number of assigned hosts and anticipates no more than 10% growth for now hosts. Which configuration script must be used?

A)

Question # 282

B)

Question # 282

C)

Question # 282

D)

Question # 282

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 283

Refer to the exhibit.

Question # 283

Which switch becomes the root of a spanning tree for VLAN 20 if all li links are of equal speed?

Question # 283

Options:

A.

SW1

B.

SW2

C.

SW3

D.

SW4

Question 284

Refer to the exhibit.

Question # 284

A network engineer must update the configuration on Switch2 so that it sends LLDP packets every minute and the information sent via LLDP is refreshed every 3 minutes Which configuration must the engineer apply?

A)

Question # 284

B)

Question # 284

C)

Question # 284

D)

Question # 284

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 285

Refer to the exhibit.

Question # 285

Which route must be configured on R1 so that OSPF routing is used when OSPF is up. but the server is still reachable when OSPF goes down?

Options:

A.

ip route 10.1.1.10 255.255.255.255 172.16.2.2 100

B.

ip route 10.1.1.0 255.255.255.0 gi0/1 125

C.

ip route 10.1.1.0 255.255.255.0 172.16.2.2 100

D.

ip route 10.1.1.10 255.255.255.255 gi0/0 125

Question 286

Refer to the exhibit.

Question # 286

Which two commands when used together create port channel 10? (Choose two.)

Options:

A.

int range g0/0-1channel-group 10 mode active

B.

int range g0/0-1 chanm.l-group 10 mode desirable

C.

int range g0/0-1channel-group 10 mode passive

D.

int range g0/0-1 channel-group 10 mode auto

E.

int range g0/0-1 channel-group 10 mode on

Question 287

Refer to the exhibit.

Question # 287

The link between PC1 and the switch is up. but it is performing poorly. Which interface condition is causing the performance problem?

Options:

A.

There is a duplex mismatch on the interface

B.

There is an issue with the fiber on the switch interface.

C.

There is a speed mismatch on the interface.

D.

There is an interface type mismatch

Question 288

Which QoS per-hop behavior changes the value of the ToS field in the IPv4 packet header?

Options:

A.

shaping

B.

classification

C.

policing

D.

marking

Question 289

Refer to the exhibit.

Question # 289

What is a reason for poor performance on the network interface?

Options:

A.

The interface is receiving excessive broadcast traffic.

B.

The cable connection between the two devices is faulty.

C.

The interface is operating at a different speed than the connected device.

D.

The bandwidth setting of the interface is misconfigured

Question 290

Refer to the exhibit.

Question # 290

Which configuration enables DHCP addressing for hosts connected to interface FastEthernetO/1 on router R4?

Options:

A.

interface FastEthernet0/0ip helper-address 10.0.1.1iaccess-list 100 permit udp host 10.0.1.1 eq bootps host 10.148.2.1

B.

interface FastEthernot0/1ip helper-address 10.0.1.1!access-list 100 permit tcp host 10.0.1.1 eq 67 host 10.148.2.1

C.

interface FastEthernetO/0ip helper-address 10.0.1.1Iaccess-list 100 permit host 10.0.1.1 host 10.148.2.1 eq bootps

D.

interface FastEthernet0/1ip helper-address 10.0.1.1!access-list 100 permit udp host 10.0.1.1 eq bootps host 10.148.2.1

Question 291

Refer to the exhibit.

Question # 291

An engineer is updating the R1 configuration to connect a new server to the management network. The PCs on the management network must be blocked from pinging the default gateway of the new server. Which command must be configured on R1 to complete the task?

Options:

A.

R1(config)#lp route 172.16.2.2 255.255.255.248 gi0/1

B.

R1(config)#jp route 172.16.2.2 255.255.255.255 gi0/0

C.

R1(config > #ip route 172.16.2.0 255.255.255.0 192.168.1.15

D.

R1(conflg)#ip route 172.16.2.0 255.255.255.0 192.168.1.5

Question 292

Refer to the exhibit.

Question # 292

Users need to connect to the wireless network with IEEE 802. 11r-compatible devices. The connection must be maintained as users travel between floors or to other areas in the building What must be the configuration of the connection?

Options:

A.

Select the WPA Policy option with the CCKM option.

B.

Disable AES encryption.

C.

Enable Fast Transition and select the FT 802.1x option.

D.

Enable Fast Transition and select the FT PSK option.

Question 293

Refer to the exhibit.

Question # 293

Packets received by the router from BGP enter via a serial interface at 209 165 201 1 Each route is present within the routing table Which interface is used to forward traffic with a destination IP of 10.1.1.19?

Options:

A.

F0/4

B.

F0/0

C.

F0/1

D.

F0/3

Question 294

Refer to the exhibit.

Question # 294

Which two configurations must the engineer apply on this network so that R1 becomes the DR? (Choose two.)

A)

Question # 294

B)

Question # 294

C)

Question # 294

D)

Question # 294

E)

Question # 294

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Question 295

Refer to the exhibit.

Question # 295

Router R1 resides in OSPF Area 0. After updating the R1 configuration to influence the paths that it will use to direct traffic, an engineer verified that each of the four Gigabit interfaces has the same route to 10.10.0.0/16. Which interface will R1 choose to send traffic to reach the route?

Options:

A.

GigabitEthernet0/0

B.

GigabltEthornet0/1

C.

GigabitEthernet0/2

D.

GigabitEthernet0/3

Question 296

What is one reason to implement LAG on a Cisco WLC?

Options:

A.

to increase security and encrypt management frames

B.

to provide link redundancy and load balancing

C.

to allow for stateful and link-state failover

D.

to enable connected switch ports to failover and use different VLANs

Question 297

Refer to the exhibit.

Question # 297

All VLANs are present in the VLAN database. Which command sequence must be applied to complete the configuration?

Options:

A.

Interface FastEthernet0/1 switchport trunk native vlan 10 switchport trunk allowed vlan 10,15

B.

Interface FastEthernet0/1 switchport mode trunk switchport trunk allowed vlan 10,15

C.

interface FastEthernet0/1 switchport mode access switchport voice vlan 10

D.

Interface FastEthernet0/1 switchport trunk allowed vlan add 10 vlan 10 private-vlan isolated

Question 298

OSPF must be configured between routers R1 and R2. Which OSPF configuration must be applied to router R1 to avoid a DR/BDR election?

Options:

A.

router ospf 1network 192.168.1.1 0.0.0.0 area 0interface e1/1ip address 192.168.1.1 255.255.255.252ip ospf network broadcast

B.

router ospf 1network 192.168.1.1 0.0.0.0 area 0interface e1/1ip address 192.168.1.1 255.255.255.252ip ospf network point-to-point

C.

router ospf 1network 192.168.1.1 0.0.0.0 area 0interface e1/1ip address 192.168.1.1 255.255.255.252ip ospf cost 0

D.

router ospf 1network 192.168.1.1 0.0.0.0 area 0hello interval 15interface e1/1Ip address 192.168.1.1 255.255.255.252

Question 299

Refer to the exhibit.

Question # 299

An engineer assumes a configuration task from a peer Router A must establish an OSPF neighbor relationship with neighbor 172 1 1 1 The output displays the status of the adjacency after 2 hours. What is the next step in the configuration process for the routers to establish an adjacency?

Options:

A.

Configure router A to use the same MTU size as router B.

B.

Set the router B OSPF ID to a nonhost address.

C.

Configure a point-to-point link between router A and router B.

D.

Set the router B OSPF ID to the same value as its IP address

Question 300

Refer to the exhibit.

Question # 300

If OSPF Is running on this network, how does Router2 handle traffic from Site B to 10.10.13.128/25 at Site A?

Options:

A.

It load-balances traffic out of Fa0/1 and Fa0/2.

B.

It is unreachable and discards the traffic.

C.

It sends packets out of interface FaO/2.

D.

It sends packets out of interface Fa0/1.

Question 301

Which MAC address is recognized as a VRRP virtual address?

Options:

A.

0000.5E00.010a

B.

0005.3711.0975

C.

0000.0C07.AC99

D.

0007.C070/AB01

Question 302

Which type of information resides on a DHCP server?

Options:

A.

a list of the available IP addresses in a pool

B.

a list of public IP addresses and their corresponding names

C.

usernames and passwords for the end users in a domain

D.

a list of statically assigned MAC addresses

Question 303

What is a difference between local AP mode and FiexConnet AP mode?

Options:

A.

Local AP mode creates two CAPWAP tunnels per AP to the WLC

B.

FiexConnect AP mode fails to function if the AP loses connectivity with the WLC

C.

FlexConnect AP mode bridges the traffic from the AP to the WLC when local switching is configured

D.

Local AP mode causes the AP to behave as if it were an autonomous AP

Question 304

What is the function of a controller in controller-based networking?

Options:

A.

It serves as the centralized management point of an SDN architecture.

B.

It centralizes the data plane for the network.

C.

It is the card on a core router that maintains all routing decisions for a campus.

D.

It is a pair of core routers that maintain all routing decisions for a campus

Question 305

Which two functions are performed by the core layer in a three-tier architecture? (Choose two)

Options:

A.

Provide uninterrupted forwarding service.

B.

Police traffic that is sent to the edge of the network.

C.

Provide direct connectivity for end user devices.

D.

Ensure timely data transfer between layers.

E.

Inspect packets for malicious activity.

Question 306

Which QoS Profile is selected in the GUI when configuring a voice over WLAN deployment?

Options:

A.

Bronze

B.

Platinum

C.

Silver

D.

Gold

Question 307

What is a DHCP client?

Options:

A.

a workstation that requests a domain name associated with its IP address

B.

a host that is configured to request an IP address automatically

C.

a server that dynamically assigns IP addresses to hosts.

D.

a router that statically assigns IP addresses to hosts.

Question 308

In which situation is private IPv4 addressing appropriate for a new subnet on the network of an organization?

Options:

A.

There is limited unique address space, and traffic on the new subnet will stay local within the organization.

B.

The network has multiple endpoint listeners, and it is desired to limit the number of broadcasts.

C.

Traffic on the subnet must traverse a site-to-site VPN to an outside organization.

D.

The ISP requires the new subnet to be advertised to the internet for web services.

Question 309

Drag and drop the QoS congestion management terms from the left onto the description on the right.

Question # 309

Options:

Question 310

Which two functions are performed by the core layer in a three-tier architecture? (Choose two)

Options:

A.

Provide uninterrupted forwarding service.

B.

Police traffic that is sent to the edge of the network.

C.

Provide direct connectivity for end user devices.

D.

Ensure timely data transfer between layers.

E.

Inspect packets for malicious activity.

Question 311

What is a role of wireless controllers in an enterprise network?

Options:

A.

centralize the management of access points in an enterprise network

B.

support standalone or controller-based architectures

C.

serve as the first line of defense in an enterprise network

D.

provide secure user logins to devices on the network.

Question 312

Which feature on the Cisco Wireless LAN Controller when enabled restricts management access from specific networks?

Options:

A.

CPU ACL

B.

TACACS

C.

Flex ACL

D.

RADIUS

Question 313

Which switch technology establishes a network connection immediately when it is plugged in?

Options:

A.

PortFast

B.

BPDU guard

C.

UplinkFast

D.

BackboneFast

Question 314

What are two improvements provided by automation for network management in an SDN environment? (Choose two)

Options:

A.

Data collection and analysis tools establish a baseline for the network

B.

Artificial intelligence identifies and prevents potential design failures.

C.

Machine learning minimizes the overall error rate when automating troubleshooting processes

D.

New devices are onboarded with minimal effort

E.

Proprietary Cisco APIs leverage multiple network management tools.

Question 315

Which resource is able to be shared among virtual machines deployed on the same physical server?

Options:

A.

disk

B.

applications

C.

VM configuration file

D.

operating system

Question 316

Which type of attack can be mitigated by dynamic ARP inspection?

Options:

A.

worm

B.

malware

C.

DDoS

D.

man-in-the-middle

Question 317

What is the primary purpose of a First Hop Redundancy Protocol?

Options:

A.

It allows directly connected neighbors to share configuration information.

B.

It allows a router to use bridge priorities to create multiple loop-free paths to a single destination.

C.

It reduces routing failures by allowing Layer 3 load balancing between OSPF neighbors that have the same link metric.

D.

It reduces routing failures by allowing more than one router to represent itself, as the default gateway of a network.

Question 318

What are two functions of an SDN controller? (Choose two)

Options:

A.

Layer 2 forwarding

B.

coordinating VTNs

C.

tracking hosts

D.

managing the topology

E.

protecting against DDoS attacks

Question 319

How do servers connect to the network in a virtual environment?

Options:

A.

wireless to an access point that is physically connected to the network

B.

a cable connected to a physical switch on the network

C.

a virtual switch that links to an access point that is physically connected to the network

D.

a software switch on a hypervisor that is physically connected to the network

Question 320

Refer to the exhibit.

Question # 320

An access list is required to permit traffic from any host on interface G0/0 and deny traffic from interface G/0/1. Which access list must be applied?

Question # 320

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 321

How is the native VLAN secured in a network?

Options:

A.

separate from other VLANs within the administrative domain

B.

give it a value in the private VLAN range

C.

assign it as VLAN 1

D.

configure it as a different VLAN ID on each end of the link

Question 322

Question # 322

Refer to the exhibit Router R1 Fa0/0 is unable to ping router R3 Fa0 ' 1. Which action must be taken in router R1 to help resolve the configuration issue?

Options:

A.

set the default network as 20.20.20.0/24

B.

set the default gateway as 20.20.20.2

C.

configure a static route with Fa0/1 as the egress interface to reach the 20.20.20.0/24 network

D.

configure a static route with 10.10.10.2 as the next hop to reach the 20.20.20.0/24 network

Question 323

What is the benefit of using FHRP?

Options:

A.

reduced management overhead on network routers

B.

balancing traffic across multiple gateways in proportion to their loads

C.

higher degree of availability

D.

reduced ARP traffic on the network

Question 324

Refer to the exhibit.

Question # 324

R5 is the current DR on the network, and R4 is the BDR. Their interfaces are flapping, so a network engineer wants the OSPF network to elect a different DR and BDR. Which set of configurations must the engineer implement?

A)

Question # 324

B)

Question # 324

C)

Question # 324

D)

Question # 324

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Question 325

Refer to the exhibit.

Question # 325

What is the next hop address for traffic that is destined to host 10.0.1.5?

Options:

A.

10.0.1.3

B.

10.0.1.50

C.

10.0.1.4

D.

Loopback D

Question 326

What mechanism carries multicast traffic between remote sites and supports encryption?

Options:

A.

ISATAP

B.

GRE over iPsec

C.

iPsec over ISATAP

D.

GRE

Question 327

Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right.

Question # 327

Options:

Question 328

What is a practice that protects a network from VLAN hopping attacks?

Options:

A.

Enable dynamic ARP inspection

B.

Configure an ACL to prevent traffic from changing VLANs

C.

Change native VLAN to an unused VLAN ID

D.

Implement port security on internet-facing VLANs

Question 329

A frame that enters a switch fails the Frame Check Sequence. Which two interface counters are incremented? (Choose two)

Options:

A.

runts

B.

giants

C.

frame

D.

CRC

E.

input errors

Question 330

Which security program element involves installing badge readers on data-center doors to allow workers to enter and exit based on their job roles?

Options:

A.

role-based access control

B.

biometrics

C.

multifactor authentication

D.

physical access control

Question 331

An engineering team asks an implementer to configure syslog for warning conditions and error conditions. Which command does the implementer configure to achieve the desired result?

Options:

A.

logging trap 5

B.

logging trap 2

C.

logging trap 4

D.

logging trap 3

Question 332

An organization has decided to start using cloud-provided services. Which cloud service allows the organization to install its own operating system on a virtual machine?

Options:

A.

platform-as-a-service

B.

software-as-a-service

C.

network-as-a-service

D.

infrastructure-as-a-service

Question 333

Refer to the exhibit.

Question # 333

A router reserved these five routes from different routing information sources.

Which two routes does the router install in its routing table? (Choose two)

Options:

A.

RIP route 10.0.0.0/30

B.

iBGP route 10.0.0.0/30

C.

OSPF route 10.0.0.0/30

D.

EIGRP route 10.0.0.1/32

E.

OSPF route 10.0.0.0/16

Question 334

What causes a port to be placed in the err-disabled state?

Options:

A.

latency

B.

port security violation

C.

shutdown command issued on the port

D.

nothing plugged into the port

Question 335

How are VLAN hopping attacks mitigated?

Options:

A.

enable dynamic ARP inspection

B.

manually implement trunk ports and disable DTP

C.

activate all ports and place in the default VLAN

D.

configure extended VLANs

Question 336

Which IPv6 address block sends packets to a group address rather than a single address?

Options:

A.

2000::/3

B.

FC00::/7

C.

FE80::/10

D.

FF00::/8

Question 337

Which CRUD operation corresponds to the HTTP GET method?

Options:

A.

read

B.

update

C.

create

D.

delete

Question 338

Which two capacities of Cisco DNA Center make it more extensible as compared to traditional campus device management? (Choose two)

Options:

A.

adapters that support all families of Cisco IOS software

B.

SDKs that support interaction with third-party network equipment

C.

customized versions for small, medium, and large enterprises

D.

REST APIs that allow for external applications to interact natively with Cisco DNA Center

E.

modular design that is upgradable as needed

Question 339

Drag drop the descriptions from the left onto the correct configuration-management technologies on the right.

Question # 339

Options:

Question 340

Refer to the Exhibit.

Question # 340

After the switch configuration the ping test fails between PC A and PC B Based on the output for switch 1. which error must be corrected?

Options:

A.

There is a native VLAN mismatch

B.

Access mode is configured on the switch ports.

C.

The PCs are m the incorrect VLAN

D.

All VLANs are not enabled on the trunk

Question 341

By default, how Does EIGRP determine the metric of a route for the routing table?

Options:

A.

it uses the bandwidth and delay values of the path to calculate the route metric

B.

it uses a default metric of 10 for all routes that are learned by the router

C.

it uses a reference Bandwidth and the actual bandwidth of the connected link to calculate the route metric

D.

it counts the number of hops between the receiving and destination routers and uses that value as the metric

Question 342

A network administrator is asked to configure VLANS 2, 3 and 4 for a new implementation. Some ports must be assigned to the new VLANS with unused remaining. Which action should be taken for the unused ports?

Options:

A.

configure port in the native VLAN

B.

configure ports in a black hole VLAN

C.

configure in a nondefault native VLAN

D.

configure ports as access ports

Question 343

When a floating static route is configured, which action ensures that the backup route is used when the primary route fails?

Options:

A.

The floating static route must have a higher administrative distance than the primary route so it is used as a backup

B.

The administrative distance must be higher on the primary route so that the backup route becomes secondary.

C.

The floating static route must have a lower administrative distance than the primary route so it is used as a backup

D.

The default-information originate command must be configured for the route to be installed into the routing table

Question 344

What is a network appliance that checks the state of a packet to determine whether the packet is legitimate?

Options:

A.

Layer 2 switch

B.

load balancer

C.

firewall

D.

LAN controller

Question 345

Drag and drop the attack-mitigation techniques from the left onto the Types of attack that they mitigate on the right.

Question # 345

Options:

Question 346

Refer to exhibit.

Question # 346

Which statement explains the configuration error message that is received?

Options:

A.

It is a broadcast IP address

B.

The router does not support /28 mask.

C.

It belongs to a private IP address range.

D.

IT is a network IP address.

Question 347

Which two protocols are supported on service-port interfaces? (Choose two.)

Options:

A.

RADIUS

B.

TACACS+

C.

SCP

D.

Telnet

E.

SSH

Question 348

When DHCP is configured on a router, which command must be entered so the default gateway is automatically distributed?

Options:

A.

default-router

B.

default-gateway

C.

ip helper-address

D.

dns-server

Question 349

Which virtual MAC address is used by VRRP group 1?

Options:

A.

0050.0c05.ad81

B.

0007.c061.bc01

C.

0000.5E00.0101

D.

0500.3976.6401

Question 350

Refer to the exhibit.

Question # 350

Which password must an engineer use to enter the enable mode?

Options:

A.

adminadmin123

B.

default

C.

testing 1234

D.

cisco123

Question 351

Drag and drop the SNMP components from the left onto the descriptions on the right.

Question # 351

Options:

Question 352

Why was the RFC 1918 address space defined?

Options:

A.

conserve public IPv4 addressing

B.

preserve public IPv6 address space

C.

reduce instances of overlapping IP addresses

D.

support the NAT protocol

Question 353

Refer to the exhibit.

Question # 353

Which switch becomes the root bridge?

Options:

A.

S1

B.

S2

C.

S3

D.

S4

Question 354

What are two roles of Domain Name Services (DNS)? (Choose Two)

Options:

A.

builds a flat structure of DNS names for more efficient IP operations

B.

encrypts network Traffic as it travels across a WAN by default

C.

improves security by protecting IP addresses under Fully Qualified Domain Names (FQDNs)

D.

enables applications to identify resources by name instead of IP address

E.

allows a single host name to be shared across more than one IP address

Question 355

When configuring IPv6 on an interface, which two IPv6 multicast groups are joined? (Choose two)

Options:

A.

2000::/3

B.

2002::5

C.

FC00::/7

D.

FF02::1

E.

FF02::2

Question 356

What are network endpoints?

Options:

A.

act as routers to connect a user to the service prowler network

B.

a threat to the network if they are compromised

C.

support inter-VLAN connectivity

D.

enforce policies for campus-wide traffic going to the internet

Question 357

Which two WAN architecture options help a business scalability and reliability for the network? (Choose two)

Options:

A.

asychronous routing

B.

single-homed branches

C.

dual-homed branches

D.

static routing

E.

dynamic routing

Question 358

Drag and drop the IPv4 network subnets from the left onto the correct usable host ranges on the right

Question # 358

Options:

Question 359

Which type of security program is violated when a group of employees enters a building using the ID badge of only one person?

Options:

A.

intrusion detection

B.

user awareness

C.

physical access control

D.

network authorization

Question 360

Which two command sequences must you configure on switch to establish a Layer 3 EtherChannel with an open-standard protocol? (Choose two )

Options:

A.

interface GigabitEthernet0/0/1channel-group 10 mode on

B.

interface GigabitEthernet0/0/1channel-group 10 mode active

C.

interface GigabitEthernet0/0/1channel-group 10 mode auto

D.

interface port-channel 10switchportswitchport mode trunk

E.

interface port-channel 10no switchportip address 172.16.0.1.255.255.255.0

Question 361

What protocol allows an engineer to back up 20 network router configurations globally while using the copy function?

Options:

A.

SMTP

B.

SNMP

C.

TCP

D.

FTP

Question 362

which purpose does a northbound API serve in a controller-based networking architecture?

Options:

A.

communicates between the controller and the physical network hardware

B.

reports device errors to a controller

C.

generates statistics for network hardware and traffic

D.

facilitates communication between the controller and the applications

Question 363

Which option about JSON is true?

Options:

A.

uses predefined tags or angle brackets () to delimit markup text

B.

used to describe structured data that includes arrays

C.

used for storing information

D.

similar to HTML, it is more verbose than XML

Question 364

Which type of address is the public IP address of a NAT device?

Options:

A.

outside global

B.

outsdwde local

C.

inside global

D.

insride local

E.

outside public

F.

inside public

Question 365

An engineer must configure Interswitch VLAN communication between a Cisco switch and a third-party switch. Which action should be taken?

Options:

A.

configure IEEE 802.1p

B.

configure IEEE 802.1q

C.

configure ISL

D.

configure DSCP

Question 366

An email user has been lured into clicking a link in an email sent by their company ' s security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?

Options:

A.

Physical access control

B.

Social engineering attack

C.

brute force attack

D.

user awareness

Question 367

In software defined architectures, which plane is distributed and responsible for traffic forwarding?

Options:

A.

management plane

B.

control plane

C.

policy plane

D.

data plane

Question 368

In which two ways does a password manager reduce the chance of a hacker stealing a users password? (Choose two.)

Options:

A.

It automatically provides a second authentication factor that is unknown to the original user.

B.

It uses an internal firewall to protect the password repository from unauthorized access.

C.

It protects against keystroke logging on a compromised device or web site.

D.

It stores the password repository on the local workstation with built-in antivirus and anti-malware functionality

E.

It encourages users to create stronger passwords.

Question 369

Which protocol does an IPv4 host use to obtain a dynamically assigned IP address?

Options:

A.

ARP

B.

DHCP

C.

CDP

D.

DNS

Question 370

Which WAN topology provides a combination of simplicity quality, and availability?

Options:

A.

partial mesh

B.

full mesh

C.

point-to-point

D.

hub-and-spoke

Question 371

Drag and drop the descriptions of file-transfer protocols from the left onto the correct protocols on the right.

Question # 371

Options:

Page: 1 / 124
Total 1240 questions