Cuestiones
ayuda
option
Mi Daypo

TEST BORRADO, QUIZÁS LE INTERESE637-697

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del test:
637-697

Descripción:
637-697

Autor:
AVATAR

Fecha de Creación:
03/12/2022

Categoría:
Otros

Número preguntas: 54
Comparte el test:
Facebook
Twitter
Whatsapp
Comparte el test:
Facebook
Twitter
Whatsapp
Últimos Comentarios
No hay ningún comentario sobre este test.
Temario:
Drag and drop the Ansible terms from the left onto the rigth. control node inventory managed node module playbook task.
Refer to the exihibit. The router1 routing table has multiple methods to reach 10.10.10.0/24 as shown. The default Administrative Distance is used. Drag and drop the network conditions from the left onto the routing methods that Router1 uses on the rigth. All protocols are up OSPF and eBGP are down The static route and eBGP are down the static route and EIGRP are down The static route and OSPF are down.
Drag and drop the wireless architecture beneficts from the left onto the architecture types on the rigth. appropiate for a small-business environment work is divided between the access point and the controller the access point transmit beacon frames. supports per device configuration and management. Uses the CAPWAP tunneling protocol.
Drag and drop the REST API call methods for HTTP from the left onto the actions they perform on the rigth. Not all methods are used DELETE GET POST PUT PATCH.
Drag and drop the DNS commands from the left onto their effects on the rigth ip domain-lookup ip domain-name ip host switch_1 192.168.0.1 ip name-server show hosts.
Drag and drop the subnet masks from the left onto the corresponding subnets on the rigth. Not all subnet mask are used. 255.255.248.0 255.255.255.128 255.255.255.224 255.255.255.240 255.255.255.248 255.255.255.252.
Drag and drop the IPv6 address types from the left onto their descriptions on the rigth. 2001:DB8::bced:1234:456d:aacc FDO0:0000:0000:1a2d:a153:3992:a19d:ccca FE80::abcf:fff:12de:3992 FF05::23:becf:22:1111.
Drag an drop the attack-mitigation techniques from the left onto the types of attack that they mitigate on the right. configure 802.1x authentication configure DHCP snooping configure the native VLAN with a nondefault VLAN ID disable DTP.
Refer to the exihibit. An engineer is tasked with verifying network configuration parameters on a client workstation to report back to the team lead. Drag and drop the node indentifiers from the left onto the network parameters on the rigth. Not all values are used 192.168.1.1 192.168.1.20 192.168.1.254 192.168.1.255 B8-76-3F-7C-57-DF.
Drag and drop the AAA terms from the left onto the descriptions on the rigth. accounting authentication authorization CoA.
Drag and drop the rapid PVST+ forwarding stat actions from the left to the right. Not all actions are used. BPDUs received are forwarded to the system module. BPDUs received from the system module are processed and trasmitted frames received from the attached segment are discarded frames received from the attached sefments are processed the port in the forwarding stat responds to network management messages switched frames received from other ports are advanced.
Drag and drop the statemets about networking from the left onto the correspondig networking types on the right. this type implements changes individually at each device this type leverages controllers to handle network management maintenance costs are higher than with other networking options this type provides a centralized view of the network.
Drag an drop TCP or UDP details to corresponding protocols. used to reliably share files between devices apporpiate for streaming operations with minimal latency provides best-effort service supports reliable data transmission.
Drag and drop the configuration management terms from the left onto the descriptions on the rigth. not al terms are used. agent agentless provision pull push post.
Refer to the exihibit. An engineer must configure a static network route between two networks so that host A communicates with host B. Drag and drop the commands form the left onto the routers where they must be configured on the rigtht. not al comands are used. ip route 10.10.13.0 255.255.255.128 10.10.10.1 ip route 10.10.13.0 255.255.255.128 10.10.10.5 ip route 10.10.13.10 255.255.255.255 10.10.10.1 ip route 10.10.14.0 255.255.255.0 10.1010.2 ip route 10.10.14.0 255.255.255.0 10.10.10.6 ip route 10.10.14.10 255.255.255.255 10.10.10.6.
Drag and drop the statements about device management from the left onto the corresponding types on the rigth. Leverages Cisco Prime infrastructure reduces the workload for enterprise customers requres manual configuration of complex protocols lacks support for SDA uses algorithms to detect security threats uses northbound APIs.
Drag an drop the virtualization concepts from the left onto the matching statements on the rigth guest operating system host operating system hypervisor multithreading virtual machine.
Drag and drop the SNMP componets from the left onto the descriptions on the right. agent managed device MIB NMS.
Drag and drop the facts about wireless architectures from the left onto the types of access point on the rigtht. not al options are used configured and managed by a WLC accessible for management via telnet, SSH , or a Web GUI supports different operational modes requres a management IP address supports automatic deployment.
Drag and drop the characteristics of device-management technologies from the left onto the corresponding deplyment types on the right. orchestrates background device configuration provides greater flexibility for custom and non-standard configurations relies on per-device management supports centralized software management supports open APIs uses individual software management.
Drag an drop the Cisco wireless LAN controller secirity settings from the left onto the correct mechanism categories on the right. web policy passthrough WPA+WPA2 802.1x.
Drag and drop the cloud-computing components from the left onto the correct descriptions on the right. broad network access measured service on-demand self-service rapid electuary resource pooling.
Drag and drop the wireless standards from the left onto the number of nonoverlapping channels they support on the right. 802.11a 802.11b 802.11g 802.11n 2.4GHz 802.11n 5GHz.
Drag and drop the DHCP snooping terms from the left onto the descriptions on the right. DHCP server snooping binding database spurious DHCP server trusted untrusted.
drag and drop the VLAN port modes , with their description Dynamic access private static access trunk tunnel.
Drag and drop the IPv6 address type characteristics from the left to the right. addresses with prefix FC00:/7 configured only once per interface attached to a single subnet addressing for exclusive use internally without internet routing.
Drag and drop the SNMP manager and agent identifier commands from the left onthe the functions on the rigth. show snmp chassis show snmp community show snmp engineID show snmp group show snmp host.
Drag and drop te RF terms from the left onto the corresponding statements on the right. Absorption Noise floor Reflection Receiver sensitivity Signal-to-noise ratio.
Drag and drop the functions of DHCP from the lefto onto any of the positions on the right. Not all functions are used. provides local control for network segments uising a client-server scheme reduces the administrative burden for onboarding end users associates hostnames to IP address maintains an address pool assigns IP addresses to local hosts for a configurable lease time offers domain name server configuration uses authoritative servers for record keeping.
Drag and drop the device behaviors from the left onto the matching HSRP state on the right. has heard from the neighbor device and is receiving hello packets is forwarding packets is ready to forward packets if the device that is currently forwarding packets fails is transmitting and receiving hello packets is waiting to hear from the neighbor device.
Drag and drop the SNMP componets from the left onto the descriptions on the right MIB SNMP agent SNMP manager SNMP trap.
refer to the exhibit. Drag and drop the learned prefixes from the left onto the preferred route methods frtom which they learned on the right 172.16.2.0/24 192.168.1.0/24 192.168.2.0/24 207.165.200.244/30 207.165.200.248/30.
Drag and drop the IPv6 address type characteristics from the left to the right. configured only once per interrface equivalent to public IPv4 addresses attached to a single subnet routable and reachable via the internet.
Drag and drop the QoS features from the left onto the corresponding statements on the right classification marking policing queuing.
Drag and drop the IPv6 addresses from the left to the corresponding address types on the right. 3ffe:e54d:620:a87a:f00d fd6d:c83b:5cef:b6b2::1 fe80:a00:27ff:feeb:89aa ff05::1:3.
drag and drop ip protocols from the left to ip traffic on the right sends transmissions in sequence transmissions include an 8 byte header transmits packets as a stream transmits packets individually uses a higher transmission rate to support latency sensitive applications uses a lower trnasmission rate to ensure reliability.
Refer to the exhibit. Drag and drop the learned prefixes from the left onto the subnet masks on the right. 172.16.3.128 172.16.3.64 172.16.2.128 172.16.3.192 172.16.4.0.
Drag and drop the DNS lookup commands from the left onto the functions on the right. ip dns server ip domain list ip domain lookup source-interface ip domain name ip host ip name-server.
An engineer is tasked to configure a switch with port security to ensure devices that forward unicasts, multicasts , and broadcasts are unable to flood the port. The port must be configured to permit only two random MAC addresses at a time. Drag and drop the required configuration commands from the left onto the sequence on the right. Not all commands are used. switchport mode access switchport port-security switchport port-security mac-address 0060.3EDD.77AB switchport port-security mac-address 00D0.D3ED.622A switchport port-security mac-address sticky switchport port-security maximum 2 switchport port-security violation shutdown.
Drag and drop the steps in a standard DNS lookup operation from the left into the order on the right an endpoint submits a request for the IP address of a domain name The DNS receives a reply from the domain DNS server The DNS responds to the endpoint The DNS submits a request to a root DNS server the DNS submits a request to the domain DNS server.
Drag and drop the Ansible features from the left to the right. not al features are used. executes modules via SSH by default uses the YAML language uses agents to manage hosts pushes configurations to the client requires clients ro pull configurations from the server operates without agents.
Drag and drop the management connection types from the left onto the definitions on the right console HTTPS SSH Telnet.
Drag and drop the characteristics of the transport layer protocols from the left onto the corresponding protocols on the right guarantees packet delivery uses a 32-bit sequence number ideal for voice traffic provides support for retransmission of lost packets offers minimal overhead within a packet requieres less computer resources.
Refer to the exhibit. The IP address configurations must be completed on the DC-1 and HQ-1 routers based on these requirements: DC-1 Gi1/0 must be the last usable address on a /30 DC-1 Gi1/1 must be the first usable address on a /29 DC-1 Gi1/2 must be the last usable address on a /28 HQ-1 Gi1/3 must be the last usable address on a /29 Drag and drop the commands from the left onto the destination interfaces on the right. not all commands are used. ip address 192.168.4.9 255.255.255.248 ip address 192.168.3.14 255.255.255.240 ip address 209.165.202.129 255.255.255.252 ip address 192.168.4.13 255.255.255.240 ip address 209.165.202.130 255.255.255.252 ip address 209.165.202.131 255.255.255.252 ip address 192.168.3.14 255.255.255.248.
Drag and drop the AAA features from the left onto the corresponding AAA security services on the right. not all options are used. it enables the device to allow user- or group- based access it leverages a RADIUS server to grant user access to reverse Telnet session it records the amount of time for which a user accesses the network on a remote server it uses TACACS+ to log the configuration commands entered by a network administrator it verifies the user before granting access to the device it restricts the CLI commands that a user is able to perform.
Drag and drop the Cisco IOS mitigation features from the left onto the types of network attack they mitigate on the tight. DHCP snooping Dynamic ARP inspection IP source guard storm control.
Drag and drop the functions of AAA supporting protocols from the left onto the protocols on the rigth Encrypts only the password when it sends an access request encrypts the entire body of the access-request packet separates all three AAA operations combines authentication and autorization uses TCP uses UDP.
Drag and drop the TCP and UDP details from the left onto their corresponding protocols on the right transmitted based on data contained in the packet without the need for a data channel requires the client and the server to establish a connection before sending the packet appropiate for streaming operations with minimal latency used to reliably share files between devices.
Drag and drop the IPv6 addresses from the left onto the corresponding address types on the right. 2001:db8:600d:cafe::123 fcba:926a:e8e:7a25:b1:c6d2:1a76:6fdc fd6d:c83b:5cef:b6b2::1 3ffe:e54d:620:a87a::f00d.
Drag and drop lo uno con lo otro overlay and underlay configuration routed access deployment STP deploymet VLAN and HSRP configuration VXLAN and LISP configuration configuration via console.
Drag and drop the statements about device management from the left onto the corresponding device-management types on the right. it manages device configurations on a per-device basis it provides a single interface for network security and analytics security is managed near the perimeter of the network with firewalls. VPNs, and IPS it supports CLI templates to apply a conssistent configuration to multiple devices it uses multiple tools and applications to analyze and troubleshoot different types of data it uses NetFlow to analyze potential secirity threats and take apporpiate action on nat traffic.
Drag and drop the traffic types from the left onto the QoS delivery mechanisms on the right database syncronization traffic standard Web browsing traffic video traffic VoIP traffic.
Drag and drop the HTTP verbs from the left onto the API operations on the right DELETE GET PATCH POST PUT.
=========LAB========= Physical connectivity is implemented between the two Layer2 switches, and the network connectivity between them must be configured. 1. Configure an LACP EtherChannel and number ir as 44; configure it between switches SW1 and SW2 using interfaces Ethernet0/0 and Ethernet0/1 on both sides. The LACP mode must match on both ends. 2. Configure the EtherChannel as a trunk link 3. Configure the trunk link with 802.1a tags] 4. Configure VLAN " MONITORING " as the untagged VLAN of the EtherChannel SW1(config)# int range e0/0-1 SW1(config-if-range)# channel-group 44 mode active SW1(config-if-range)# int po44 SW1(config-if)# shutdown SW1(config-if)# switchport trunk encapsulation dot1q SW1(config-if)# switchport mode trunk SW1(config-if)# switchport trunk native vlan 746 SW1(config-if)# no shutdown SW1(config-if)# end SW1# wr SW2(config)# int range e0/0-1 SW2(config-if-range)# channel-group 44 mode active SW2(config-if-range)# int po44 SW2(config-if)# shutdown SW2(config-if)# switchport trunk encapsulation dot1q SW2(config-if)# switchport mode trunk SW2(config-if)# switchport trunk native vlan 746 SW2(config-if)# no shutdown SW2(config-if)# end SW2# wr no.
Denunciar test Consentimiento Condiciones de uso