EXAMEN PARTE 1
![]() |
![]() |
![]() |
Título del Test:![]() EXAMEN PARTE 1 Descripción: Matemáticas |




Comentarios |
---|
NO HAY REGISTROS |
1. A wireless administrator has configured a WLAN, however, the clients need access to a less congested 5GHz network for their voice quality . What action must be taken to meet the requirement?. enable AAA override. enable DTIM. enable RX-SOP. enable Band Select. 2. Which unified access point mode continues to serve wireless clients after losing connectivity to the Cisco Wireless LAN Controller?. local. sniffer. flexconnect. mesh. 3. What is the same for both copper and fiber interfaces when using SFP modules?. They offer reliable bandwidth up to 100 Mbps in half duplex mode. They support an inline optical attenuator to enhance signal strength. They provide minimal interruption to services by being hot-swappable. They accommodate single-mode and multi-mode in a single module. 4. An administrator configures four switches for local authentication using passwords that are stored as a cryptographic hash. The four switches must also support SSH access for administrators to manage the network infrastructure . Which switch is configured correctly to meet these requirements?. SW1. SW2. SW3. SW4. 5. An engineer is bringing up a new circuit to the MPLS provider on the Gi0/1 interface of Router1. The new circuit uses eBGP arms the route to VLAN25 from the BGP path. What is the expected behavior for the traffic flow for route 10.10.13.0/25?. Route 10.10.13.0/25 learned via the Gi0/0 interface remains in the routing table. Traffic to 10.10.13.0/25 is asymmetrical. Traffic to 10.10.13.0/25 is load balanced out of multiple interfaces. Route to 10.10.13.0/25 is updated in the routing table as being learned from interface Gi0/1. 6. An organization secures its network with multifactor authentication using an authentication app on employee smartphones. How is the application secured in the case of a user's smartphone being lost or stolen?. The application requires an administrator password to reactivate after a configured interval. The application challeges a user by requiring an administrator password to reactivate when the smartphone is rebooted. The application requires the user to enter a PIN before it provides the second factor. The application verifies that the user is in a specific location before it provides the second factor. 7. The default-information originate command is configured under the R1 OSPF configuration. After testing, workstations or VLAN20 at Site B cannot reach a DNS server on the Internet. Which action corrects the configuration issue?. Configure the IP route 0.0.0.0.0.0.0.010.10.10.18 command on R1. Add the default-information originate command on R2. Add the always keyword to the default-information originate command on R1. Configure the IP route 0.0.0.0.0.0.0.010.10.10.2 command on R2. 8. What is a DHCP client?. a host that is configured to request an IP address automatically. a router that statically assings IP address to host. a workstation that request a domain name associated with its IP address. a server that dynamically assings IP address to host. 9. How does CAPWAP communicate between an access point in local mode and a WLC?. The access point must not be connected to the wired network as it would create a loop. The access point must directly connect to the WLC using a cooper cable. The access point must be connected to the same switch as the WLC. The access point has the ability to link to any switch in the network, assumming connectivity to the WLC. 10. What are two benefits of network automation? (Choose two). reduced operational costs. reduced hadware footprint. fewer network failures. increased network security. faster changes with more reliable results. 11. The SW1 interface g0/1 is in the down/down state. Which two configurations are valid reasons for the interface condition? (Choose two). The interface is shut down. There is a duplex mismatch. There is a speed mismatch. There is a protocol mismatch. The interface is error-disabled. 12. An engineer must add a subnet for a new office that will add 20 users to the network . Which IPv4 network and subnet mask combination does the engineer assing to minimize wasting address?. 10.10.225.32.255.255.255.224. 10.10.225.48.255.255.255.224. 10.10.225.32.255.255.255.240. 10.10.225.48.255.255.255.240. 13. Which two tasks must be performed to configure NTP to a trusted server in client mode on a single network device? (Choose two). Specify the IP address of the NTP server. Disable NTP broadcast. Enable NTP authentication. Verify the time zone. Set the NTP server private key. 14. Which two actions influence the EIGRP route selection proccess? (Choose two). The router calculates the best backup path to the destination route and assingns it as the feasible successor. The router must use the advertised distance as the metric for any given route. The router calculates the feasible distance of all paths to the destination route. The adversited distance is calculated by a downstream neighbor to inform the local router of the bandwidth on the link. The router calculates the reported distance by multiplying the delay on the exiting interface by 256. 15. Based on the LACP neighbor status, in which mode is the SW1 port channel configured?. mode on. passive. active. auto. 16. Which command prevents passwords from being stored in the configuration as plain text on a router or switch?. enable secret. username cisco password encrypt. enable password. service password-encryption. 17. Which desing element is a best practice when deploying an 802.11b wireless infrastructure?. disabling TPC so that access points can negotiate signal levels with their attached wireless devices. allocating nonoverlapping channels to access points that are in close physical proximity to one another. configuring access points to provide clients with a maximum of 5Mbps. setting the maximum data rate to 54Mbps on the Cisco Wireless LAN Controller. 18. Which command configures a floating static route to provide a backup to the primary link?. ip route 209.165.201.0.255.255.255.224.209.165.202.130. ip route 0.0.0.0.0.0.0.0.209.165.202.131. ip route 0.0.0.0.0.0.0.0.209.165.200.224. ip route 209.165.200.224.255.255.255.224.209.165.202.129.254. 19. An engineer configured the New York router with state routers that point to the Atlanta and Washington sites. Which command must be configured on the Atlanta and Washington routers so that both sites are able to reach the loopback2 interface on the New York router?. ip route 0.0.0.0.0.0.0.0 Serial 0/0/0. ipv6 route ::/0 Serial 0/0/1. ipv6 route 0/0 Serial 0/0/0. ipv6 route ::/0 2000::2. ipv6 route ::/0 Serial 0/0/0. 20. A network engineer must create a diagram of a multivendor network. Which command must be configured on the Cisco devices so that the topology of the network can be mapped?. Device (config)# lldp run. Device (config)# flow-sampler-map-topology. Device (config-if)# cdp enable. Device (config)# cdp run. 21. An engineer must configure an OSPF neighbor relationship between router R1 and R3. The authentication configuration has been configured and the connecting interfaces are in the same 192.168.1.0/30 subnet. What are the next steps to complete the configuration? (Choose two). configure the same router ID on both routing processes. configure the same process ID for the router OSPF process. configure both interfaces with the same area ID. configure the hello and dead timers to match on both sides. configure the interfaces as OSPF active on both sides. 22. A user configured OSPF in a single area between two routers . A serial interface connecting R1 and R2 is running encapsulation PPP. By default, which OSPF network type is seen on this interface when the user types show ip OSPF interface on R1 or R2?. point-to-multipoint. nonbroadcast. broadcast. point-to-point. 23. A router running EIGRP has learned the same route from two different paths. Which parameter does the router use to select the best path?. cost. as-path. administrative distance. metric. 24. When configuring a WLAN with WPA2 PSK in the Cisco Wireless LAN Controller GUI, which two formats are available to select? (Choose two). decimal. base64. binary. hexadecimal. ASCII. 25. A network administrator assumes a task to complete the conectivity between PC A and the File Server Switch A and Switch B have been partially configure with VLAN's 10, 11, 12 and 13. What is the next step in the configuration?. Add a router on a stick between Switch A and Switch B allowing for inter VLAN routing. Add PC A to VLAN10 and the File server to VLAN11 for VLAN segmatation. Add PC A to the same subnet as the File server allowing for intra-VLAN communication. Add VLAN13 to the trunk links on Switch A and Switch B for VLAN propagation. 26. An engineer needs to configure LLDP to send the port description time length value (TLV). What command sequence must be implemented?. switch(config-line)#lldp port-description. switch#lldp port-description. switch(config)#lldp port-description. switch(config-if)#lldp port description. 27. What is the primary difference between AAA authentication and authorization?. Authentication identifies a user who is attempting to access a system, and authorization validates the user's password. Authentication controls the system processes a user can access , and authorization logs the activities the user initiates. Authentication identifies and verifies a user who is attempting to access a system and authorization controls the tasks the user can perform. Authentication verifies a username and password, and authorization handles the communication between the authentication agent and the user database. 28. Which goal is achieved by the implementation of private IPv4 addressing on a network?. provides an added level of protection against Internet exposure. allows servers and workstations to communicate across public network boundaries. provides a reduction in size of the forwarding table on network routers. allows communication across the Internet to other private networks. 29. If configuring a static default route on the router with the ip route 0.0.0.0.0.0.0.0.10.13.0.1 120 command , how does the router respond?. It starts load-balancing traffic between the two default routes. It immediately replaces the existing OSPF route in the routing table with the newly cnfigure static route. It starts sending traffic without a specific matching entry in the routing table to GigabitEthermet0/1. It ignores the new static route until the existing OSPF default route is removed. 30. What is a characteristic of spine-and.leaf architecture?. Each device is separated by the same number of hops. Each link between leaf switches allows for higher bandwidth. It provides greater predictability on STP blocked ports. It provides variable latency. 31. How does HSRP provide firts hop redundancy?. It load-balances traffic by assigning the same metric value to more than one route to the same destination in the IP routing table. It load-balances Layer 2 traffic along the path by flooding traffic out all interfaces configured with the same VLAN. It uses a shared virtual MAC and virtual IP address to a group of routers that serve as the default gateway for hosts on a LAN. It forwards multiple packets to the same destination over different routed links in the data path. 32. A ntwork engineer must block access for all computers on VLAN 20 to the web server via HTTP. All other computers must be able to access the web server. Which configuration when applied to Switch A accomplishes this task?. config t ip access-list extended wwwblock deny tcp any host 10.30.0.100 eq 80 int vlan 10 ip access-group wwwblock in. config t ip access-list extended wwwblock permit ip any any deny tcp any host 10.30.0.100 eq 80 int vlan 30 ip access-group wwwblock in. config t ip access-list extended wwwblock deny tcp any host 10.30.0.100 eq 80 permit ip any any int vlan 20 ip access-group wwwblock in. config t ip access-list extended wwwblock permit ip any any deny tcp any host 10.30.0.100 eq 80 int vlan 20 ip access-group wwwblock in. 33. Which statement compares traditional networka and controller-based networks?. Only traditional networks natively support centralized management. Traditional and controller-based networks abstracts policies from device configurations. Only controller-based networks decouple the control plane and the data plane. Only traditional networks offer a centralized control plane. 34. What configuration management mechanism uses TCP port 22 by default when communicating with managed nodes?. Python. Puppet. Ansible. Chef. 35. What is a difference between RADIUS and TACACS+?. RADIUS logs all commands that are entered by the administrator, but TACACS+ logs only start, stop, and interim commands. TACACS+ separates authentication and authorization, and RADIUS merges them. RADIUS is most appropiate for dial authentication, but TACACS+ can be used for multiple types of authentication. TACACS+ encrypt only password information , and RADIUS encrypts the entire payload. 36. To which device does Router1 send packets that are destined to host 10.10.13.165?. Router 3. Router 2. Router 5. Router 4. 37. What is the effect of this configuration?. The switch discards all ingress ARP traffic with invalid MAC-to-IP address bindings. All ARP packets are drpped by the switch. Egress traffic is passed only if the destination is a DHCP server. All ingress and engress traffic is dropped because the interface is untrusted. 38. What are two descrptions of three-tier network topologies? (Choose two). The core and distribution layers perform the same functions. The network core is designed to maintain continuous connectivity when devices fail. The access layer manages routing between devices in diifferent domains. The core layer maintains wired connections for each host. The distribution layer runs Layer 2 and Layer 3 technologies. 39. Which route does R1 select for traffic that is destined to 192.168.16.2?. 192.168.26.0/26. 192.168.16.0/21. 192.168.16.0/27. 192.168.16.0/24. 40. What makes Cisco DNA Center different from traditional network management applications and their management of networks?. It only supports auto-discovery of network elements in a greenfield deployment. It abstracts policy from the actual device configuration. Its modular desing allows someone to implement different versions to meet the specific needs of an organization. It does not support high availability of management functions when operating in cluster mode. |