Cuestiones
ayuda
option
Mi Daypo

TEST BORRADO, QUIZÁS LE INTERESEoscar

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del test:
oscar

Descripción:
NADA de nada

Autor:
bla bla
(Otros tests del mismo autor)

Fecha de Creación:
05/10/2020

Categoría:
Arte

Número preguntas: 108
Comparte el test:
Facebook
Twitter
Whatsapp
Comparte el test:
Facebook
Twitter
Whatsapp
Últimos Comentarios
No hay ningún comentario sobre este test.
Temario:
1 What protocolallows anengineer to back up20 netwof1< router coofigurations globally wllileusingthe copy funcoon? A TCP B FTP C SMTP D.SNMP.
2 What are two differences between optical-fiber cabling and copper cabling? (Choose two ) A The glass core component 1s encased 11a cladding. B The dala can pass through the cladding C BNC connec1oris used or fiber connections D Light is transmiteed thorough the core of the fiber E Fiber connects to physical interfaces using RJ-45 connections .
3 What Two actiones are performed by the Weigl1led Random Early Detectoo mechanism? (Choose two ) A It can mitigate congestion by preventing the queue from filing up. B it supports protocol discovery C I guarantees the delivery d foghpflonty packets D it drops lower.priority packets before it drops hrgher.priority packets E it can identify different flows woh a high level of grandarity .
4 Refer to the exhibit How does SW2 interact with other switches in this VTP domain? A it processes VTP updates from any VTP clients on the network on its access ports B It towards only the Vtp advertisements that it recesives on its trunk ports. C It receives updates from all VTP serves and fowards all lically configures VLANs out all trunk ports D It transmits and processes VTP updates from any VTP clients on the network on its trunf ports.
5-. A cisco ip phone receives untagged data traffic from an attached PC, which action is taken by the phone? A. It tags the traffic with the default LAN B. It allows the traffic to pass through unchanged C. It drops the traffic D. It tags the traffic with the native VLAN.
6.- Refer to the exhibit. To which device does router1 send packets that are destined to host 10.10.13.165? A. Router 5 B. Router 3 C. Router 2 D. Router 5.
7-. How will link aggregation be implemented on a cisco wireless LAN controller? A. The etherchannel must be configures in “mode active” B. When enabled, the WLC bandwidth drops to 500 Mbps C. To pass client traffic, two or more ports must be configured D. One functional physical port is needed to pass client traffic.
8.- Refer to the exhibit. After the configuration is applied, the two routers fail to establish an OSPF neighbor relationship. What is the reason for the problem? A. The network statement on router 1 is misconfigured B. The OSPF process IDs are mismatched C. The OSPF router IDs are mismatched D. Router2 is using the default hello timer.
9.- Refer to the exhibit. An engineer is configured the New York router to reach the Lo1 interface of the Atlanta router using interface Se0/0/0 as the primary path. Which two commands must be configured on the new York router so that it can reach the Lol interface of the Atlanta router via Washington when the link between new York and Atlanta goes down? (choose two) A. Ipv6 route 2000::1/128 2023::3 5 B. Ipv6 route 2000::1/128 2012::1 C. Ipv6 route 2000::1/128 2012::2 D. Ipv6 route 2000::1/128 2012::1 5.
10.- Refer to the exhibit. How does router 1 handle traffic to 192.168.10.16? A. It selects the OSPF route because it has the lowest cost B. It selects the IS-IS router because it has the shortest prefix inclusive of the destination address C. It selects the EIGRP route because it has the lowest administrative distance D. It selects the RIP route because it has the longest prefix inclusive of the destination address.
11-. What device segregates a network into separate zones that have their own security policies? A. Access point B. Firewall C. Switch D. IPS.
12.- Refer to the exhibit. Which configuration on RTR-1 denies SSH access from PC-1 to any RTR-1 interface and allows all other traffic? A. Access-list 100 deny tcp host 172.16.1.33 any eq 23 Access-list 100 permit ip any any Line vty 0 15 Access-class 100 in B. Access-list 100 deny tcp host 172.16.1.33 any eq 22 Access-list 100 permit ip any any Line vty 0 15 Access-class 100 in C. Access-list 100 deny tcp host 172.16.1.33 any eq 23 Access-list 100 permit ip any any Interface gi0/0 Ip access-group 100 in D. Access-list 100 deny tcp host 172.16.1.33 any eq 22 Access-list 100 permit ip any any .
13-. What event has occurred if a router sends notice level message to a syslog server? A. A certificate has expired B. A TCP connection has been torn down C. An ICMP connection has been built D. An interface line has changed status.
14-. which two command sequence must be configured on a switch to establish a layer 3 etherchannel with an open-standard protocol?Chose two A. Interface GigabitEthernet0/0/1 Channel-group 10 mode on B. Interface GigabitEthernet0/0/1 Channel-group 10 mode active C. Interface port-channel 10 Switchport Switchport mode trunk D. Interface GigabitEthernet0/0/1 Channel-group 10 mode auto E. Interface port-channel 10 No switchport Ip address 172.16.0.1 255.255.255.0 .
15.- A network engineer must create a diagram of a multivendor networ. Which command must be configured on the cisco devices so that topology of the network can be mapped? A. Device(config-if) #cdp enabled B. Device(config-if) #cdp run C. Device(config-if) #flow-sampler-map topology D. Device(config-if) #lldp run.
16-. What is the primary purpose of a first hop redundancy protocol? A. It reduces routing failures by allowing more than one router to represent itself as the default gateway of a network B. It allows directly connected neighbors to share configuration information C. It reduces routing failures by allowing layer 3 load balancing between OSPF neighbors that have the same link metric D. It allows a router to use bridge priorities to create multiple loop-free paths to a single destination.
17-. User configured OSPF and advertised the Gigabit ethernet interface in OSPF. By default, which type of OSPF network does this interface belong to? A. Point-to-point B. Broadcast C. Nonbroadcast D. Point-to-multipoint.
18-. Router R1 must send all traffic without a matching routing table entry to 192.168.1.1 which configuration accomplishes this task? A. R1#config t R1(config)#ip routing R1(config)#ip route 0.0.0.0 0.0.0.0 192.168.1.1 B. R1#config t R1(config)#ip routing R1(config)#ip route 192.168.1.1 0.0.0.0 0.0.0.0 C. R1#config t R1(config)#ip routing R1(config)#ip default gateway 192.168.1.1 D. R1#config t R1(config)#ip routing R1(config)#ip default-route 192.168.1.1 .
19-. Which action must be taken to assign a global unicast ipv6 address on an interface that is derived from the MAC address of that interface? A. Explicitly assign a link-local-address B. Enabled SLAAC on an interface C. Configure a stateful DHCP V6 server on the network D. Disable the EUI-64 bit process.
20-. Which function does an SNMP agent perform? A. It requests information from remote network nodes about catastrophic system events B. It coordinates user authentication between a network device and a TACACS+ or RADIUS server C. It sends information about MIB variables in response to requests from the NMS D. It manages routing between layer 3 devices in a network.
21.- Refer to the exhibit. An engineer must add a subnet for a new office that will add 20 users to the network. which IPv4 network and subnet mask combination does the engineer assign to minir address? A. 10.10.255.48 255.255.255.224 B. 10.10.255.48 255.255.255.240 C. 10.10.255.32 255.255.255.240 D. 10.10.255.32 255.255.255.224.
22-. An organization secures its network with multi-factor authentication using an authenticator app on employee smartphones. How is the application secured in the case of a user’s smartphones beings lost or stolen? A. The application requires an administrator password to reactive after a configured interval B. The application verifies that the user is in a specific location before it provides the second factor C. The application requires the user to enter a PIN before it provides the second factor D. The application challenges a user by requiring an administrator password to reactive when the smartphones is rebooted.
Refer to the exhibit. The loopback1 interface of the Atlanta router must reach the loopback3 interface of the Washington router. Which two static host routes must be configured on the New York router? (choose two) A. Ipv6 route 2000:1/128 2012::1 B. Ipv6 route 2000:1/128 s/0/0/1 C. Ipv6 route 2000:1/128 2012::2 D. Ipv6 route 2000:3/128 s/0/0/0 E. Ipv6 route 2000:3/128 2023::3.
24.- Refer to the exhibit. What action establishes the OSPF neighbor relationship without forming an adjacency? A. Modify process ID B. Modify priority C. Modify network type D. Modify hello interval.
25-. An engineer configured an OSPF neighbor as a designated router. Which state verifies the designated router is in the proper mode? A. Full B. 2-way C. Exchange D. Init.
26-.how do TCP and UDP differ in the way they guarantee packet delivery? A. TCP uses retransmissions acknowledgment and parity checks and UDP uses cycli redundancy checks only B. TCP uses checksum acknowledgment and retransmissions, and UDP uses checksum only C. TCP uses two-dimensional parity checks, checksum, and cyclic redundancy checks, and UDP uses retransmissions only D. TCP uses checksum, parity check, and retransmissions, and UDP uses acknowledgment only.
27-. WHICH IPV6 address block forwards packets to a multicast address rather than a unicast address? A. FC00::/7 B. FF00::/12 C. 2000:/3 D. FE80::/10.
28-. Which purpose does a northbound API serve in a controller-based networking architecture? A. Communicates between the controller and the physical network hardware B. Reports device errors to a controller C. Facilitates communication between the controller and the application D. Generates statistics for network hardware and traffic.
29-. What are two roles of the dynamic host configuration protocol (DHCP)? (choose two) A. The DHCP Client can request up to four DNS server addresses B. The DHCP client maintains a pool of IP addresses it can assign C. The DHCP server offers the ability to exclude specific IP addresses from a pool of ip addresses D. The DHCP server leases client IP addresses dynamically E. The DHCP server assigns IP addresses without requiring the client to renew them.
30.- Refer to the exhibit. Which type of route does R1 use to reach host 10.10.13.10/32? A. Network route B. Default route C. Host route D. Floating static route.
31.- Refer to the exhibit. Router1 is running three different routing protocols. Which router characteristic is used by router to forward the packet that destination IP 172.16.32.1? A. Metric B. Administrative distance C. Longest prefix D. Cost.
32-. While examining excessive traffic on the network, it is noted that all incoming packets on an interface appear to be allowed even though an IPV4 ACL is applied to the interface. Which two misconfigurations cause this behavior? (choose two) A. A matching permit statement is too high in the access list B. A matching permit statement is too broadly defined C. The ACL is empty D. A matching deny statement is too high in the access list E. The packets fail to match any permit statement .
33-. Using direct sequence spread spectrum, which three 2.4-GHz channels are used to limit collision? A. 5,6,7 B. 1,5,10 C. 1,6,11 D. 1,2,3.
34.- Refer to the exhibit. Router R2 is configured with multiple routers to reach network 10.1.1.0/24 from router R1. What protocol is chosen by router? A. Static B. Ebgp C. EIGRP D. OSPF.
35-. When the active router in an HSRP group fails, what router assumes the role and forwards packets? A. Listening B. Backup C. Standby D. Forwarding.
36-. An email user has been lured into clicking a link in an email sent by their company’s security organization. The webpage that opens reports that it was safe, but the link may have contained malicious code. Which type of security programs is in place? A. Brute force attack B. User awareness C. Physical access control D. Social engineering attack.
37-. An engineer needs to configure LLDP to send the port description time length value (TLV). What command sequence must be implemented? A. Switch(config-if)#lldp port description B. Switch(config-if)#lldp port-description C. Switch(config)#lldp port-description D. Switch#lldp port-description.
38.- Refer to the exhibit. Which switch in this configuration will be elected as the root bridge? SW1: 0C: E0:38:00:85 SW2: 0C:0E:15:22:05:97 SW3: 0C:0E:15:1A:3C:9D SW4: 0C:E0:18:A1:B3:19 A. SW3 B. SW2 C. SW1 D. SW4.
39-. Which device performs stateful inspection of traffic? A. Firewall B. Wireless controller C. Switch D. Access point.
40-. An office has 8 floors with approximately 30-40 users per floor. What command must be configured on the router switched virtual interface to use address space efficiently? A. Ip address 192.168.0.0 255.255.255.128 B. Ip address 192.168.0.0 255.255.255.224 C. Ip address 192.168.0.0 255.255.254.0 D. Ip address 192.168.0.0 255.255.0.0.
41 Refer to exhibit. A packet is being sent across router R1 to host 172.16.0.14. What is the destination route for the packet? A. 209.165.200.250 via Serial0/0/0 B. 209.165.200.246 via Serial0/1/0 C. 209.165.200.254 via Serial0/0/0 D. 209.165.200.254 via Serial0/0/1 .
42 Refer to exhibit. A packet is being sent across router R1 to host 172.16.3.14. To which destination does the router send the packet? A. 207.165.200.250 via Serial0/0/0 B. 207.165.200.254 via Serial0/0/0 C. 207.165.200.254 via Serial0/0/1 D. 207.165.200.246 via Serial0/1/0 .
43 A wireless administrator has configured a WLAN, however, the clients need access to a less congested 5-GHz networks for their voice quality. What action must be taken to meet the requirement. A. enable RX-SOP B. enable AAA override C. enable Band Select D. enable DTIM .
44 Which configuration ensures that the switch is always the root for VLAN 750? A. Switch(config)#spanning-tree vlan 750 priority 0 B. Switch(config)#spanning-tree vlan 750 root primary C. Switch(config)#spanning-tree vlan 750 priority 38003685 .
45 Refer to the exhibit. A network administrator assumes a task to complete the connectivity between PC A and the File Server. Switch A and Switch B have been partially configured with VLANs 10, 11, 12 and 13. What is the next step in the configuration? A. Add PC A to VLAN 10 and the File Server to VLAN 11 for VLAN segmentation B. Add VLAN 13 to the trunk links on Switch A and Switch B for VLAN propagation C. Add PC A to the same subnet as File Server allowing for intra-VLAN comunication D. Add a router on a stick between Switch A and Switch B allowing for inter-VLAN routing .
46 An engineer must configure an OSPF neighbor relationship between router R1 and R3. The authentication configuration has been configured and the connecting interfaces are in the same 192.68.1.0/30 subnet. What are the next two steps to complete the configuration? (Choose two.) A. configure the interface as OSPF active on both sides B. configure the same process ID for the router OSPF process C. configure both interface with the same area ID D. configure the hello and dead timers to match on both sides E. configure the same router ID on both routing processes .
47 What software defined architecture plane assists devices with making packet-forwarding decisions by providing Layer 2 reachability and Layer 3 routing information? A. policy plane B. control plane C. data plane D. management plane .
48 Whitch WAN access technology is preferred for a small office/home architecture? A. Integrate Services Digital Network switching B. frame-relay packet switching C. dedicated point-to-point leased line D. broadband cable access .
59 A network administrator enable port security on a switch interface connected to a printer. What is the next configuration action in order to allow the port to learn the MAC address of the printer and insert it into the table automatically? A. enable sticky MAC addressing B. implement static MAC addressing C. enable dynamic MAC address learning D. implemet auto MAC address learning .
50 By default how does EIGRP determine the metric of a route for the routing table? A. it uses a default metric of 10 for all routes that are learned by the router B. it uses a referent bandwidth and actual bandwidth of the connected link to calculate the route metric. C. it uses the bandwidth and delay values of the path to calculate the router metric. D.it counts the number of hops between the receiving and destination routers and uses that value as the metric. .
51 Which type of IPV6 address is publicly routable in the same way as IPV4 public addresses? A. multicast B. unique local C. global unicast D. link-local .
52 Which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network? A. AES encryption B. scramble encryption key C. TKIP encryption D. SAE encryption .
53 Refer to the exhibit. Which two commands were used to create port channel 10? (Chosse two.) A. int range g0/0-1 channel-group 10 mode passive B.int range g0/0-1 channel-group 10 mode active C.int range g0/0-1 channel-group 10 mode desirable D. int range g0/0-1 channel-group 10 mode auto E. int range g0/0-1 channel-group 10 mode on .
54 What are two fundamentals of virtualization? (Choose two.) A. It allows logical network devices to move traffic between virtual machines and the rest of the physical network. B. It allows multiple operating systems and applications to run independently on one physical server. C. It requires that some servers, virtual machines, and network gear reside on the internet. D. It allows a physical router to directly connect NICs from each virtual machine into the network E. The environment must configured with one hypervisor that serves solely las a network manager to monitor SNMP traffic. .
55 Refer to the exhibit. What is the next hop address for traffic that is destined to host 10.0.1.5? A. 10.0.1.50 B. 10.0.1.4 C. 10.0.1.3 D. Loopback 0 .
56 When configuring a WLAN with WPA2 PSK in the Cisco Wireless LAN Controller. GUI, which two formats are available to select? (Chosse two.) A. decimal B. binary C. hexadecimal D. base64 E. ASCII .
57 Refer to the exhibit. Which path is used by the router for internet traffic? A. 10.10.10.0/28 B. 209.165.200.0/27 C. 10.10.13.0/24 D. 0.0.0.0/0 .
58 Which two encoding methods are supported by REST APIs? (Choose two.) A. SGML B. JSON C. YAML D. EBCDIC E. XML .
59 What is an advantage of Cisco DNA Center versus traditional campus device management? A. It supports high availability for management fuctions when operating in cluster mode B. It supports numerous extensibility options, including cross-domain adapters and third-party SDKs. C. It enables easy autodiscovery of nerwork elements in a brownfiels deployment. D. It is designed primary to provide network assurance. .
60 When a WPA2-PSK WLAN is configured in the Wireless LAN controller, whats is the mimimum number of character that is required in ASCII format? A. 8 B. 6 C. 12 D. 18 .
61 Which two conditions must be met before SSH can operate normally on a Cisco IOS switch? (Chosse two.) A. The switch must be running a k9(crypto) IOS image. B. IP routing must be enable on the switch C. Telnet must be disable on the switch D. The ip domain-name command must be configured on the switch E. A console password must be confiured on the switch. .
62 Refer to the exhibit. What two conclusions should be made about this configuration? (Choosse two.) A. The spanning-tree mode is Rapid PVST+ B. The spaning-tree mode is PVST+ C. the root port is FastEthernet2/1 D. This is a root bridge E. The designated port is FastEthernet2/1 .
63 What is a difference between RADIUS and TACACS+? A. RADIUS is most appropiate for dial authentication, but TACACS+ can be used for multiple types of autentication. B. RADIUS logs all commands that are entered by the administrator, but TACACS+ logs only start, stop, and interim commands. C. TACACS+ separates authentication and authorization, and RADIUS merges them. D. TACACS+ encrypts only password information, and RADIUS encrypts the entire payload .
64 What are two benefits of networks automation? (Chosse two.) A. reduce hardware footprint B. reduce operational costs C. fewer network failures D. faster changes with more reliable results E. increased network security .
65 Refer to the exhibit. How does the router manage traffic to 192.168.12.16? A. It load-balances traffic between all three routes. B. It chooses the OSPF route because it has the longest prefix inclusive of the destination address. C. It chosses the EIGRP route because it has lowest administrative distance. D. It selects the RIP route because it has the longest prefix inclusive of the destination address. .
66 Which two capabilities of Cisco DNA Center make it more extensible? (Choose two.) A. REST APIS that allow for external applications to interact natively with Cisco DNA Center B. customized versions for small, medium, and large enterprises C. SDKs that support interaction with third-party network equipment D. modular design that is upgrade as needed E. adapters that support all families of Cisco IOS software .
67 When configuring IPv6 on an interface, which two IPv6 multicast groups are joined? (Choose two.) A. FF02::1 B. 2000::/3 C. 2002::/5 D. FC00::/7 E. FC02::2 .
68 An engineer must configure a WLAN using the strongest encryption type for WA2-PSK Which cipher fulfills the configuration requirement? A. TKIP B. WEP C. RC4 D. AES .
69 Which goal is achieved by the implementation of private IPv4 addresing on a network? A. provides a reduction in size of the forwarding table on network routers B. provides an added level of protection against Internet exposure C. allows servers and workstation to communicate acrooss public network boundaries D. allows communication across the Internet to other private networks .
70 Which type of attack is mitigated by dynamyc ARP inspections? A.Worm B.Malware C.DDos D.man-in-the-middle .
71A device detects two stations transmittig frames at the same time. This condition occurs after the first 64 bytes of the frame is recived. Which interface counter increments. A.Collision B.CRC C.late collision D.Runt .
72 How does Cisco DNA Center gather data from the network? A. Device use the call-home protocol to periodically send data to the controller B. Device establish an IPsec tunnel to exchange data with the controller. C. Network devices use different services like SNMP, syslog, and streaming telemetry to send data to the controller. D. the Cisco CLI Analyzer tool gathers data each licensed network device and streams it to the controller .
73 How does CAPWAP communicate between an access point in local mode and a WLC? A. The access point must not be connected to the wired network, as it would create a loop. B. The access point must directly connect to the WLC using a copper cable C. The access point must be connected to the same switch as the WLC D. The access point has ability to link to any switch in the network assuming connectivity to the WLC. .
74 An engineer is configuring NAT to translate the source subnet of 10.10.0.0/24 to any one of three addresses: 192.168.3.1, 192.168.3.2, 192.168.3.3. Which configuration should be used? A.enable configure terminal ip nat pool mypool 192.168.3.1 192.168.3.3 prefix-length 30 access-list 1 permit 10.10.0.0 0.0.0.255 ip nat outside destination list 1 pool mypool interface g1/1 ip nat inside interface g1/2 ip nat outside B.enable configure terminal ip nat pool mypool 192.168.3.1 192.168.3.3 prefix-length 30 access-list 1 permit 10.10.0.0 0.0.0.255 ip nat inside source list 1 pool mypool interface g1/1 ip nat inside interface g1/2 ip nat outside C.enable configure terminal ip nat pool mypool 192.168.3.1 192.168.3.3 prefix-length 30 route-map permit 10.10.0.0 255.255.255.0 ip nat outside destination list 1 pool mypool interface g1/1 ip nat inside interface g1/2 ip nat outside .
75 Refer to the exhibit. An engineer deploys a topology in which R1 obtains its IP configuration from DHCP. If the switch and DHCP server configuration are complete and correct, which two sent of commands must be configured on R1 and R2 to complete the task? (Choose two.) A. R2(config)# interface gi0/0 R2(config-if)# ip address dhcp B. R1(config)# interface fa0/0 R1(config-if)# ip address dhcp R1(config-if)# no shutdown C. R2(config)# interface gi0/0 R2(config-if)# ip helper-address 198.51.100.100 D. R1(config)# interface fa0/0 R1(config-if)# ip helper-address 198.51.100.100 E. R1(config)# interface fa0/0 R1(config-if)# ip helper-address 198.0.2.2.
76 Which command must be entered when a device is configurated as an NTP server? A. ntp server B. ntp master C. ntp peer D. ntp authenticate .
77 What mechanism carries multicast traffic between remote sites and supports encryption? A. IPsec over ISATAP B. GRE over IPsec C. ISATAP D. GRE .
78.- Which 802.11 frame type is Association Response? A. management B. action C. protected frame D. control .
79-. The service password-encryption command is entered on a router . What is the effect of this configuration? A Prevents network administrators from configuring clear-text passwords B. Protects the vlan database from unauthorized PC connections on the switch C. Restricts unauthorized user from viewing clear-text passwords in the running configuration D. Encrypts the password exchange when a VPN tunnel is established.
80-. Refer to the exhibit. Which outcome is expected when PC_A send data to PC_B? A. The source and destination MAC addresses remain the same B. The switch rewrites the source and destination MAC addresses whit its own C. The destination MAC address is replaced whit ffff.ffff.ffff D. The source MAC address is changed.
81-. What is a characteristic of spine-and-leaf architecture? A. It provides greater predictability on STP blocked ports B. Each link between leaf switches allows for higher bandwidth C. Each devices is separated by the same number of hops D. It provides variable latency.
82-. A packet is destined for 10.10.1.22. Which static route does the router choose to forward the packet? A. Ip route 10.10.1.16 255.255.255.252 10.10.255.1 B. Ip route 10.10.1.0 255.255.255.240 10.10.255.1 C. Ip route 10.10.1.20 255.255.255.254 10.10.255.1 D. Ip route 10.10.1.20 255.255.255.252 10.10.255.1.
83-. How do AAA operation compare regarding user identification, user services, and access control? A. Authorization identifies user, and authentication provides access control. B. Authorization provides access control, and authentication tracks user services C. Authentication identifies user, and accounting tracks user services D. Accounting tracks user services, and authentication provides access control.
84 Refer to the exhibit. Which configuration issue is preventing the OSPF neighbor relationship from being established between the two routers? A. R2 should have its network command in area 1 B. R1 interface Gi1/0 has larger MTU size C. R2 is using the passive-interface default command D. R1 has an incorrect network command for interface Gi1/0.
85-. Which feature on the cisco Wireless LAN controller when enabled restricts management access from specific networks? A. TACACS B. Radius C. Flex ACL D. CPU ACL.
86-. What are two reason for an engineer to configure a floating static route? (choose two) A. To automatically route traffic on a secondary path when the primary path goes down B. To control the return path of traffic that is sent from the router C. To enable fallback static routing when the dynamic routing protocol fails D. To route traffic differently based on the source ip of the packet E. To support load balancing via static.
87-. What is the expected outcome when an EUI-64 address is generated? A. The seventh bit of the original MAC address of the interface is inverted B. The interface ID is configured as a random 64-bit value C. The MAC address of the interface is used as the interface ID without modification D. The characters FE80 are inserted at the beginning of the MAC address of the interface.
88-. What are two reasons that cause late collisions to increment on an ethernet interface? (choose two) A. When a collision occurs after the 32n byte of a frame has been transmitted B. When carrier sense multiple access/collision detection is used C. When one side of the connection is configured for half-duplex D. When the sending device waits 25 seconds before sending the frame again E. When the cable length limits are exceeded.
89 Refer to the exhibit. What is the effect of this configuration? A. The switch port remains administratively down until the interface is connected to another switch. B. The switch port remains down until it is configured to trust or untrust incoming packets C. Th switch port interface trust state becomes untrusted D. Dynamic ARP inspection is disabled because the ARP ACL is missing.
90 Refer to the exhibit. What commands are needed to add a subinterface to ethernet 0/0 on R1 to allow for VLAN 20, with IP address 10.20.20.1/24? A. R1(config)# interface ethernet0/0.20 R1(config)# encapsulation dotq 20 R1(config)# ip address 10.20.20.1 255.255.255.0 B. R1(config)# interface ethernet0/0 R1(config)#encapsulation dotq 20 R1(config)#ip address 10.20.20.1 255.255.255.0 C. R1(config)# interface ethernet0/0 R1(config)# ip address 10.20.20.1 255.255.255.0 D. R1(config)#interface ethernet0/0.20 E. R1(config)#ip address 10.20.20.1 255.255.255.0 .
91-. What are two benefits of controller-based networking compared to traditional networking? (choose two) A. Controller-based allows for fewer network failures, while traditional increases failure rates B. Controller-based reduce network configuration complexity, while traditional increases the potential for errors C. Controller-based increases network bandwidth usage, while traditional lightens the load on the network D. Controller-based provides centralization of key IT functions, while traditional requires distributed management functions E. Controller-based inflates software costs, while traditional decreases individual licencing cost.
92 Refer to the exhibit. An engineer booted a new switch and applied this configuration via the console port. Which additional configuration must be applied to allow administrators to authenticate directly to enable privilege mode via telnet using a local username and password? A. R1(config)#username admin R1(config-if)# line vty 0 4 R1(config-line)#password p@ss1234 R1(config-line)#transport input telnet B. R1(config)#username admin secret p@ss1234 R1(config)#line VTY 0 4 R1(config-line)#login local R1(config)#enable secret p@ss1234 C. R1(config)#username admin R1(config-if)#line vty 0 4 R1(config-line)#password p@ss1234 D. R1(config)#username admin privilege 15 secret p@ss1234 R1(config-if)#line vty 0 4 R1(config-line)#login local .
93 Refer to the exhibit. Which switch becomes the root bridge? A. S1 B. S4 C. S2 D. S3.
94 Refer to the exhibit. Which route type does the routing protocol code D represent in the output? A. Route learned through EIGRP B. Internal BGP route C. /24 route of a locally configured IP D. Statically assigned route.
95. Which two values or settings must be entered when configuring a new WLAN in the cisco wireless LAN controller GUI? (choose two) A. QoS settings B. Management interface settings C. Profile name D. Ip address of one or more access points E. SSID.
96-. Which configuration is needed to generate an RSA key for SSH on a router? A. Assign a DNS domain name B. Configure the version os SSH C. Create a user with a password D. Configure VTY access.
97 Refer to the exhibit. An administrator is tasked with configurin71g a voice VLAN, what is the expected outcome when a cisco phone is connected to the gi3/1/4 port on a switch? A. The phone and workstation that is connected to the phone do not have VLAN connectivity B. The phone sends and receives data in VLAN 50, but a workstation connected to the phone has no VLAN connectivity C. The phone sends and receives data in VLAN 50, but workstation connected to the phone sends and receives data in VLAN 1 D It transmits and processes VTP updates from any VTP clients on the network on its trunf ports. D. The phone and a workstation that is connected to the phone send and receive data in vlan 50.
98 Refer to the exhibit. Which action is expected from SW1 when the untagged frame is received on the gi0/1 interface? A. The frame is processed in vlan 5 B. The frame is processed in vlan 1 C. The frame is dropped D. The frame is processed in vlan 1.
99 -. What are two descriptions of three-tier network topologies? (choose two) A. The network core is designed to maintains continuous connectivity when device fail B. The access layer manages routing between devices in different domains C. The core layer maintains wired connections for each host D. The core and distribution layers perform the same functions E. The distribution layer runs layer 2 and layer 3 technologies.
100.- Which state does the switch port move to when PortFast is enabled? A. Listening B. Learning C. Blocking D. Forwarding.
101.- What are two roles of Domain Name Services (DNS)? (Choose Two) A. Build a flat structure of DNS names for more efficient IP operations B. Improves security by protecting IP addresses under Fully. Qualified Domain Names (FQDNs) C. Allows a single host name to be shared across more tan one IP address D. Encrypts network traffic as it travel across a WAN by default E. Enables applications to identify resources by name instead of IP addres.
102.- Which technology is used to improve web traffic performance by proxy caching? A. Firepower B. FireSIGHT C. ASA D. WSA.
103.- Which two Wan architecture options help a business scalability and reliability for the network (Choose Two) A. Dynamic routing B. Single-homed brances C. Static routing E. Asynchronous routing D. Dual-homed branches.
104.- A network analyst is tasked with configuring the date and time on a router using EXEC mode. The date must be set to January 1,2020 and the time must be set to 12:00am . What command should be used? A. Clock summer-time recurring B. Clock set C. Clock summer-time date D. Clock timezone.
105.- What is a difference between local AP mode and FlexConnect AP mode? A. FlexConnect AP mode bridges the traffic from the AP to the WLC when local switching is configured. B. Local AP mode creates two CAPWAP tunnels per AP to the WLC. C. FlexConnect AP mode fails to function if the AP loses connectivity with the WLC. D. Local AP mode causes the AP to behave as if it were an autonomus AP.
106.- Refer to the exhibit . Whicj routes type is configured to reach the internet A. default route B. host route C. network route D. Floating static route.
107- What configution management mechanism uses TCP port 22 by default when communicating witch managed nodes? A. Ansible B. Pyton C. Puppet D. Chef.
108.- Which output displays a JSON data representation? Option A Option B Option C Option D.
Denunciar test Consentimiento Condiciones de uso