252 -327
![]() |
![]() |
![]() |
Título del Test:![]() 252 -327 Descripción: temario |




Comentarios |
---|
NO HAY REGISTROS |
(Q252) Which tunneling mechanism embeds an IPv4 address within an IPv6 address?. ISATA. 4to6. 6to4. GRE. Teredo. (Q253) Which command should you enter to configure a single port to prevent alternate ports from becoming designated ports?. spanning-tree etherchannel misconfig. spanning-tree guard root. spanning-tree guard loop. spanning-tree loopguard. (Choice, Q254) What is the most efficient subnet mask for a point to point ipv6 connection?. /128. /127. /32. /64. /48. (Choice, Q255) Which two goals reasons to implement private IPv4 addressing on your network?. Comply with local law. Conserve IPv4 address. Comply With PCI regulations. Reduce the size of the forwarding table on network routers. Reduce the risk of a network security breach. (Choice, Q256) Which circumstance matches the description of an excessive collision?. Bit 512 of the frame is sent. The same frame IS sent sixteen times. An interface receives fifteen or more alignment errors. The deferred counter value IS greater than 1024. (Choice, Q257) Which two statements about GRE tunnels are true? (Choose two.). They can operate In tunnel mode and transpon mode. They encapsulate the payload. They allow multicast traffic to traverse WAN circuits. They provide privacy, integrity, and authenticity. They add 8 bytes to the IP header of each packet. (Choice, Q258) Refer to the exhibit If Computer A IS sending traffic to computer B, which option is the source ip address when a packet leaves R1 on interface F0/1?. IP address of computer B. IP address of R1 interface F0/1. IP address of Computer A. IP address of the R2 interface F0/1. (Choice, Q259) When you deploy multilink PPP on your network, where must you configure the group IP Address on each device?. Under serial interface. Under the multilink interface. Under the routing protocol. In the global config. (Choice, Q260) Refer to the exhibit. Which two facts can you determine from the EIGRP topology table? (Choose two). If a route has more than one successor, only one route is Injected into the routing table. All successors are injecting into the routing table. The variance command must have been issued to allow route 10.85.184.0 to have two successors. The FD 28416 for route IS also the metric for the routing table. The reported distance value is greater than the feasible distance. (Choice, Q261) Which two commands should you enter to view the PID and serial number of a router? (Choose two). show license feature. show license. show license status. show license udi. show version. (Choice, Q262) Which file-system management command is used frequently when IOS backups, upgrades, and restores are performed?. delete. show file. copy. show dir. (Choice, Q263) Which specification supports full-duplex traffic only?. 100BASE-TX. 10BASE-T. 1000BASE-SX. 1000BASE-TX. (Choice, Q264) Which two statements about PDU encapsulation are true? (Choose two). During encapsulation each layer adds a header and trailer to the PDU from the layer below. PDU encapsulation takes place only at the transport layer. During encapsulation, each layer adds a header and sometimes adds a trailer to the PDU from the layer above. In the TCP/IP reference model , PDLJ encapsulation starts on the Internet layer With the data from the application layer. In the TCP'IP reference model, PDU encapsulation occurs on the network layer. Refer to the exhibit. Which BGP configuration do you need to apply to router RI to allow traffic to flow normally on this network?. router bgp 1 no synchronization neighbor 192.168.1.2 remote-as 2 neighbor 192.168.2.2 remote-as 5 neighbor 192.168.3.2 remote-as 1 neighbor 192.168.3.2 ebgp-multihop 4 no auto-summary. router bgp 1 no synchronization neighbor 192.168.1.2 remote-as 1 neighbor 192.168.3.2 remote-as 1 no auto-summary. no synchronization neighbor 192.168.1.2 remote-as 1 neighbor 192.168.3.2 remote-as 1 neighbor 192.168.3.2 ebgp-multihop 4. (Choice, Q266) Which statement about switch pons is true?. VLAN 1 is preconfigured as the default VLAN on all switch ports. VLAN 1 is preconfigured as the native VLAN on trunk ports only. VLAN 100 is preconfigured as the native VLAN on al switch ports. The default VLAN and native VLAN must be different on al ports Answer. (Choice, Q267) Which protocol enables a Cisco IP phone to provide QoS instructions to a switch?. CDP. VTP. 802.1Q. DTP. (Choice, Q268) Which two statements about MPLS are true? (Choose two.). It uses point-to-point physical circuits to provide logical full-mesh connections to the service provider. It requires a hub In a large data center With a fast connection to the service provider. It provides easily scalable bandwidth to support newer connectivity options for numerous remote sites. Because It IS a mature technology, It requires less skill to administer. All connections are full mesh with full redundancy. (Choice, Q269) Which two statements about the routing table are true? (Choose two.). It displays the administrative distance and metric of the routes that learns. It uses letters such as O, I ,and D to Identify how a route IS learned. It displays the metric and the reported distance of the routes that learns. It uses the > symbol to Indicate the best route. It displays information about the successor and the feasible successor. (Choice, Q270) Which chassis-aggregation technology binds two individual Cisco switches at control and data planes to act as one logical switch?. LACP. VSS. VRRP. vPC. (Choice, Q271) Which function can be centralized in software-defined networking?. application plane. control plane. services plane. data plane. Refer to the exhibit. Given the output shown from this CISCO Catalyst 2950, what is the most likely reason that interface FastEthernet 0/10 is not the root port for VLAN 2?. This switch interface has a higher path cost to the root bridge than another In the topology. This switch has more than one interface connected to the root network segment in VLAN 2. This switch has a lower bridge ID for VLAN 2 than the elected designated switch. This switch is running RSTP while the elected designated switch is running 802. ld Spanning Tree. (Choice, Q273) How many bits in length is a VLAN Identifier?. 64. 16. 48. 32. (Choice, Q274) Which two features can mitigate spanning tree issues that are caused by broken fiber cables on interswitch links?. loop guard. UDLD. DTP. root guard. BPDU guard. (Choice, Q275)Refer to the exhibit. Which two configuration lines must you add to the Dialer 1 intefface configuration to enable the two interfaces to estat connection (Choose two). ppp chap hostname cisco. no cdp enable. ppp enable group. ppp authentication pap chap callin. ip unnumbered GigabitEthernet0/0. (Choice, Q276) Refer to the exhibit.A new subnet With 60 hosts has been added to the network. Which subnet address should this network use to provide enough usable addresses while wasting the fewest addresses. 192.168.1.56/26. 192.168.1.56/27. 192.168.1.64/27. 192.168.1.64/26. (Choice, Q277) Which characteristics are representative of a link-state routing protocol? (Choose two.). provides common View of entire topology. utilizes event-triggered updates. utilizes frequent periodic updates. exchanges routing tables With neighbors. calculates shortest path. (Choice, Q278) Which two statements about the tunnel mode ipv6ip command are true? (Choose two.). It specifies IPv6 as the transport protocol. It specifies that the tunnel IS a Teredo tunnel. It specifies IPv6 as the encapsulation protocol. It specifies IPv4 as the encapsulation protocol. It enables the transmssion of IPv6 packets within the configured tunnel. (Choice, Q279) Which two statements about LLDP are true ? (Choose two). It is implemented in accordance with the 802.1 la specfication. It Is a Cisco-proprietary technology. It functions at Layer 2 and Layer 3. It uses mandatory TLVs to discover the neighboring devices. It enables systerns to learn about one another over the data-link layer. (Choice, Q280) Which two commands can you use to verify an IP SLA? (Choose two.). show ip sla history. show ip sla statistics. show ip sla configuration. show ip sla reaction-configuration. show ip sla application. (Choice, Q281) Which technology supports multiple dynamic secure connections over an unsecure transpon network?. DMVPN. VPN. Point-to-point. site-to-site VPN. (Choice, Q282) After an FTP session to ftp_cisco.com fails,you attempt to ping the server. A ping to ftp_cisco.com also fails, but a ping to the IP address of the server is successful. What IS reason for the failed FTP session?. An ACL is blocking the FTP request. A firewall is blocking traffic from the FTP site. The internet connection is down. The assigned DNS server IS down. (Choice, Q283) Which command can you enter to display the operational status of the network ports on a router?. show running-config interface fastethernet 0/1. show interface switchport. show interface status. show ip interface brief. (Choice, Q284) Which three commands are required to enable NTP authentication on a Cisco router? (Choose three). ntp authentication-key. ntp refclock. ntp peer. ntp max-associations. ntp trusted-key. ntp authenticate. (Choice, Q285) Which two operational modes are supported on the members of a StackWise switch stack? (Choose two). redundant. power-sharing. standby. active. passive. Choice, Q286) In which STP state does MAC address learning take place on a PonFastænabled port?. forwarding. discarding. learning. listening. (Choice, Q287) Which option describes a benefit of a point-to-point leased line?. Full-mesh capability. Simply of configuration. Flexibilllty of design. Low cost. (Choice, Q288) Which option is the industry-standard protocol for EtherChannel?. DTP. PAgP. Cisco Discovery Protocol. LACP. (Choice, Q289)Refer to the exhibit Which two statements about the interface that generated the output are true? (Choose two.). Two secure MAC address are manually configured on the interface. A syslog message is generated when the maximum number of secure MAC addresses is reached on the interface. An SNMP trap is generated when the maximum number of secure MAC addresses IS reached on the interface. The interface dynamically learned two secure MAC addresses. The interface IS error-disabled. (Choice, Q290) While troubleshooting a GRE tunnel interfface issue,show interface command output displays tunnel status up,but line protocol is down. Which reason for this problem IS most likely?. The tunnel was just reset. The interface has been administratively shutdown. The route to the tunnel destination address IS through the tunnel itself. The next hop server is misconfigured. (Choice, Q291) Refer to the exhibit. Users on the 10.120.26_x subnet can reach server but they cannot reach server The network is using dynamic routing, and routers R1 and R2 are connected Via EIGRP_ Which two actions must you take to begin troubleshooting the connectivity ISSUe to server (Choose two.). Verify that the route to the server is present in the database table. Verify the status of the interfaces between routers and switches. Verity that the route to the server is present in the topology table and routing table. Verify that routers RI and R2 have established an EIGRP neighbor relationship. Verify that the inbound and outbound ACLs on each device permit traffic to and from the server. (Choice, Q292) Which two statements about IPv6 and routing protocols are true? (Choose two.). Link-local addresses are used to form routing adjacencies. Loopback addresses are used to form routing adjacencies. EIGRPv3 was developed to support IPv6 routing. OSPFv3 was developed to support IPv6 routing. EIGRP, OSPF, and BGP are the only routing protocols that support IPv6. (Choice, Q293) Which type of routing protocol operates by exchanging the entire routing information?. link state protocols. exterior gateway protocols. path vector protocols. distance vector protocols. (Choice, Q294)Refer to the exhibit. At the end of an RSTP election process, which access layer switch port will assume the discarding role?. Switch3, port Gi0/2. Switch4, port fa0/2. Switch4, port fa0/11. Switch3, port Gi0/1. Switch3, port fa0/1. Switch3, port fa0/12. (Choice, Q295) What are types of IPv6 static routes? (Choose Three.). Directly connected static routes. Fully specified static routes. Recursive Static routes. Dynarnlcally specified static routes. injected static routes. Redistributed static routes. (Choice, Q296) Which two functions can be performed by local DNS server(Choose two). resolving names locally. copying updated IOS images to CISCO switches. transferring split horizon traffic between zones. forwarding name resolution requests to an external DNS server. assigning IP addresses to local clients. (Choice, Q297) Which two benefits of implementing a full mesh wan topology are true? (Choose two). reduced jitter. reliability. Increased latency. redundancy. improved scalability. (Choice, Q298) Which two statements about IPv6 anycast addresses are true? (Choose two). They are allocated from the IPv6 broadcast address space. They are allocated from the IPv6 unicast address space. They receive packets on the closest interface that is discovered by the routing protocol. They use the prefix. They are used in conjunction with source-specific multicast for IPv6. (Choice, Q299) What is one benefit of PVST+?. PVST+ supports Layer 3 load balancing without loops. PVST+ automatically selects the root bridge location,to provide optimized bandwidth usage. PVST+ reduces the CPU cycles for all the switches in the network C,. PVST+ allow the root switch location to be optimized per vlan. (Choice, Q300) Which keyword enables an HSRP router to take the active role immediately when t comes online?. priority. version. preempt. IP address. Refer to the exhibit. The network shown in the diagram IS experiencing connectivity problems. Which of the following will correct the problems? (Choose two.). Configure the masks on both hosts to be 255.255.255.240. Configure the gateway on Host A as 10.1 1.1. Configure the masks on both hosts to be 255.255.255.224. Configure the IP address of Host A as 10.1.2.2. Configure the IP address of Host B as 10.1.2.2. Configure the gateway on Host B as 10.12.254. (Choice, Q302) Which technology provides chassis redundancy in a VSS environment?. VRRP. StackWise. BFD. multichassis EtherChannels. (Choice, Q303) You are configuring port security on a Cisco switch. Which command must you enter so that only a certain number of dynamically learned MAC addresses are permanently assigned to the Interface?. switchport port-security mac-address sticky. switchport nonegotiate. switchport poll-security. switchport poll-security maximum. (Choice, Q304) During which phase of PPPoE is PPP authentication performed?. the PPP Session phase. Phase 1. Phase 2. the Authentication phase. the Active Discovery phase. (Choice, Q305) Which switching method helps mitigate late collisions?. A. Layer 3. fragment-free. store-and-forward. cut through. (Choice, Q306) Which two QoS tools can provide congestion management? (Choose two). CAR. PBR. CBWFQ. PQ. FRTS. (Choice, Q307) Which command is configured on a switch to enable neighbor discovery in a multivendor environment?. Ildp transmit. cdp run. Ildp receive. Ildp run. (Choice, Q308) When you configure DHCP on a router, Which command must you enter so that the default gateway is automatically distributed?. default-gateway. ip helper-address. dns-server. default-router. (Choice, Q309) What parameter can be different on pons within an EtherChannel?. DTP negotiation settings. duplex. speed. trunk encapsulation. (Choice, Q310) At which severity level can syslog logglng begin to affect router performance?. emergency. critical. debugging. notification. (Choice, Q311) What are two benefits that the LIDP protocol provide for application traffic? (Choose two). UDP traffic has lower overhead than TCP traffic. The application can use checksums to verify the Integrity of application data. UDP maintains the connection state to provide more stable connections than TCP. UDP provides a built-in recovery mechanism to retransmit lost packets. The CTL field in the LJDP packet header enables a three-way handshake to establish the connection. (Choice, Q312) Which statement about loopback testing on a router serial intefface is true?. Traffic passes through the interface with both software loopbacks and hardware loopbacks. Traffic is dropped with both software loopbacks and hardware loopbacks. Traffic is dropped with a software loopback, but traffic passes through the Intefface with a hardware loopback. Traffic IS dropped With a hardware loopback, but traffic passes through the interface With a software loopback. Choice, Q313) Which two facts about configuring EIGRPv6 are true? (Choose two.). The router ID must be an lPv6 address. You must configure neighboring devices with the same ipv6 hello-interval eigrp value. If you change the interface bandwidth, the EIGRPv4 metric IS afected. If you change the Interface delay, the EIGRPv4 delay remains unchanged. The variance command for EIGRPv6 IS independent of EIGRPv4. (Choice, Q314) Which command can you enter to set the default route for all traffic to an intefface?. router(config)#ip route 0.0.0.0 0.0.0.0 GigabitEthernet0/1. router(config-router)#default-lnformation originate. route(config)#ip route 0.0.0.0 255.255.255.255 GigabitEthernet0/1. router(config-router)#default-lnformation originate always A. (Choice, Q315) Which two statements about an Ethernet frame source address are true? (Choose two.). The leftmost bit is always 1. The address is 4 bytes long. The leftmost bit Is always 0. The address is 6 bytes long. The address is 4 bits long. (Choice, Q316) You have configured a router with an OSPF router ID, but its IP address still reflects the physical Intefface_ Which action can you take to correct the problem In the least disruptive way?. Reload the OSPF process. Reboot the router. Save the router configuration. Specify a loopback address. (Choice, Q317) Which two functions can be performed by a local DNS server? (Choose two.). copying updated IOS images to Cisco switches. transferring split horizon traffic between zones. assigning IP addresses to local clients. forwarding name resolution requests to an external DNS server. resolving names locally. (Choice, Q318) Which technology a critical component of a cloud-based architecture?. MPLS. DHCP. IPv6. DNS. (Choice, Q319) A network technician is asked to design a small network with redundancy. The exhibit represents this design, with all hosts configured in the same VLAN_ What conclusions can be made about this design?. The router Will not accept the addressing scheme. The connection between switches should be a trunk. This design will function as Intended. Spanning-tree Will need to be used. The router inteffaces must be encapsulated With the 802 IQ protocol. (Choice, Q320) What is the minimum Ethernet frame size?. 32 bytes. 1500bytes. 1024 bytes. 64 bytes. (Choice, Q321) Which two statements about extended traceroute command are true? (Choose two.). it can use a specified TTL value. it can send packets from a specified interface or p address. It can validate the reply data it can repeated automatically to a specified interval. it can use a specificed TOS. (Choice, Q322) What happens when you add a switch running an earier IOS version to a SackWlse configration running a later version?. The switch software upgrades the IOS version on the switch to match the version on the stack. The switch software downgrades the IOS version on the stack to match the version on the switch. The switch keeps Its version of IOS and runs normally as part of the stack. The stack gnoresthe switch until you update the IOS version on the switch. (Choice, Q323) Which three statements about link-state routing are true? (Choose three.). Updates are sent to a multicast address by default. RIP is a link-state protocol. Routes are updated when a change in topology occurs. Updates are sent to a broadcast address. OSPF IS a link-state protocol. It uses split horizon. (Choice, Q324) Which prompt does a Cisco switch display when it is running in privileged exec mode?(Choose one). Switch>. Switch(config)#. Switch#. Switch(config-if)#. (Choice, Q325) A network administrator needs to configure pon security on a switch. Which two statements are true? (Choose two.). The network administrator can apply port security to EtherChannels. The network administrator can apply port security to dynamic access ports. The sticky learning feature allows the addition of dynamically learned addresses to the running configuration. The network administrator can configure static secure or sticky secure MAC addresses the voice VLAN. When dynamic MAC address learning is enabled on an interface, the switch can learn new addresses, up to the maximum defined. (Choice, Q326) Which two conditions can StackWise use to determine the master of the stack? (Choose two.). the highest member priority. the lowest system MAC address. the greatest number of configured VLANs. the highest system MAC address. the lowest member priority. (Choice, Q327) Refer to the exhibit. Router R4 is dynamically learning the path to the server. if R4 is connected to RI Via OSPF Area 20. to R2wa BGP, and to R3 via EIGRP 77T which path is installed in the routing table of R4?. the path through R2, because the IBGP administrative distance is 200. the path through R2, because the EBGP administrative distance is 20. the path through RI. because the OSPF administrative distance is 110. the path through R3, because the EIGRP administrative distance is lower than the OSPF and BGP administrative distances. |