Which two northbound APIs are found in a software-defined network? (Choose two.)
Which technology allows for logical Layer 3 separation on physical network equipment?
Refer to the exhibit. An administrator is configuring a new WLAN for a wireless network that has these requirements:
Dual-band clients that connect to the WLAN must be directed to the 5-GHz spectrum.
Wireless clients on this WLAN must be able to apply VLAN settings from RADIUS attributes.
Which two actions meet these requirements? (Choose two.)
Refer to the exhibit. A packet sourced from 10.10.10.1 is destined for 172.16.3.254. What is the subnet mask of the destination route?
Refer to the exhibit.
What is the prefix length for the route that router1 will use to reach host A?
SIP-based Call Admission Control must be configured in the Cisco WLC GUI. SIP call-snooping ports are configured. Which two actions must be completed next? (Choose two.)
Drag and drop the AAA features from the left onto the corresponding AAA security services on the right. Not all options are used.
A network engineer is upgrading a small data center to host several new applications, including server backups that are expected to account for up to 90% of the bandwidth during peak times. The data center connects to the MPLS network provider via a primary circuit and a secondary circuit. How does the engineer inexpensively update the data center to avoid saturation of the primary circuit by traffic associated with the backups?
Refer to the exhibit.
An architect is managing a wireless network with APs from several branch offices connecting to the WLC in the data center. There is a new requirement for a single WLAN to process the client data traffic without sending it to the WLC. Which action must be taken to complete the request?
Which Cisco proprietary protocol ensures traffic recovers immediately, transparently, and automatically when edge devices or access circuits fail?
Drag and drop the statements about AAA from the left onto the corresponding AAA services on the right. Not all options are used.
What is the effect when loopback interfaces and the configured router ID are absent during the OSPF Process configuration?
Refer to the exhibit. An LACP EtherChannel between two directly connected switches is in the configuration process.
Which command must be configured on switch SW2’s Gi0/1-2 interfaces to establish the channel to SW1?
A network analyst is tasked with configuring the date and time on a router using EXEC mode. The date must be set to January 1. 2020 and the time must be set to 12:00 am. Which command should be used?
Refer to the exhibit. Configurations for the switch and PCs are complete.
Which configuration must be applied so that VLANs 2 and 3 communicate back and forth?
Which two features are provided by Ansible in network automation? (Choose two.)
Refer to the exhibit.
A network engineer must update the configuring on switch2 so that it sends LLDP packets.
A)
B)
C)
D)
Refer to the exhibit. A VTY password has been set to Labtest32! for remote access. Which commands are required to allow only SSH access and to hide passwords in the running configuration?
Which feature of Digest Authentication prevents credentials from being sent in plaintext?
Refer to the exhibit. HQC needs to use a configuration that:
Handles up to 150,000 concurrent connections
Minimizes consumption of public IP addresses
Which configuration meets the requirements?
Refer to the exhibit. A network engineer must configure the CPE router to allow computers in the 172.20.1.0/24 network to obtain their IP configurations from the central DHCP server. Which configuration must the engineer apply to the CPE?
Refer to the exhibit. Which routes are configured with their default administrative distances?
Which cloud-provided service allows an organization to install its own operating system on a virtual machine?
Refer to the exhibit. The route for 10.220.100.96/27 has been very unstable. The same route has four backups to routers A, B, C, and D via the respective methods. The routing protocol defaults for router Y have not been changed. When the current route for 10.220.100.96/27 becomes unavailable, which router will router Y use to route traffic to 10.220.100.96/27?
What is an advantage of using SDN versus traditional networking when it comes to security?
Which two principles must be considered when using per-hop behavior in QoS? (Choose two.)
Refer to the exhibit. Which interface does a packet take to reach the host address of 192.168.18.16?
Refer to the exhibit. A secondary route is required on router R1 to pass traffic to the LAN network on R2 if the primary link fails. Which command must be entered to configure the router?
Refer to the exhibit. Which routes are configured with their default administrative distances?
Which header must be included in a REST request from an application that requires JSON-formatted content?
Refer to the exhibit. Which interface does a packet take to reach the destination address of 10.10.10.147?
Refer to the exhibit. A network engineer is configuring a WLAN to use a WPA2 PSK and allow only specific clients to join. Which two actions must be taken to complete the process? (Choose two)
Refer to the exhibit. An engineer is using the Cisco WLC GUI to configure a WLAN for WPA2 encryption with AES and preshared key Cisc0123456. After the engineer selects the WPA + WPA2 option from the Layer 2 Security drop-down, which two tasks must they perform to complete the process? (Choose two)
Refer to the exhibit. What is the administrative distance for the advertised prefix that includes the host IP address 192.168.20.1?
Refer to the exhibit.
An engineer is required to verify that the network parameters are valid for the users wireless LAN connectivity on a /24 subnet. Drag and drop the values from the left onto the network parameters on the right. Not all values are used.
An engineer is installing a new wireless printer with a static IP address on the Wi-Fi network. Which feature must be enabled and configured to prevent connection issues with the printer?
Refer to the exhibit.
What is the metric for the route to the 192.168.10.33 host?
The service password-encryption command is entered on a router. What is the effect of this configuration?
Which type of API allows SDN controllers to dynamically make changes to the network?
What is a function of the core and distribution layers in a collapsed-core architecture?
Refer to the exhibit.
Which action is expected from SW1 when the untagged frame is received on the GigabitEthernet0/1 interface?
Which two values or settings must be entered when configuring a new WLAN in the Cisco Wireless LAN Controller GUI? (Choose two)
Refer to the exhibit.
An engineer is tasked with verifying network configuration parameters on a client workstation to report back to the team lead. Drag and drop the node identifiers from the left onto the network parameters on the right.
Refer to the exhibit.
The New York router is configured with static routes pointing to the Atlanta and Washington sites. Which two tasks must be performed so that the Serial0/0/0 interfaces on the Atlanta and Washington routers can reach one another?
(Choose two.)
Drag the descriptions of IP protocol transmissions from the left onto the IP traffic types on the right.
A router running EIGRP has learned the same route from two different paths. Which parameter does the router use to select the best path?
Refer to the exhibit.
Which per-hop QoS behavior is R1 applying to incoming packets?
What is the total number of users permitted to simultaneously browse the controller management pages when using the AireOS GUI?
Refer to me exhibit.
Which action is taken by the router when a packet is sourced from 10.10.10.2 and destined for 10.10.10.16?
Refer to the exhibit. An engineer just installed network 10.120.10.0/24. Which configuration must be applied to the R14 router to add the new network to its OSPF routing table?
Refer to Exhibit.
Which configuration must be applied to the router that configures PAT to translate all addresses in VLAN 200 while allowing devices on VLAN 100 to use their own IP addresses?
While examining excessive traffic on the network, it is noted that all incoming packets on an interface appear to be allowed even though an IPv4 ACL is applied to the interface.
Which two misconfigurations cause this behavior? (Choose two)
Refer to the exhibit.
An engineer must configure GigabitEthernet1/1 to accommodate voice and data traffic Which configuration accomplishes this task?
Refer to the exhibit. IPv6 is being Implemented within the enterprise. The command Ipv6 unlcast-routing is configure. Interlace GlgO/0 on R1 must be configured to provide a dynamic assignment using the assigned IPv6 block Which command accomplishes this task?
Refer to the exhibit. An engineer executed the script and added commands that were not necessary for SSH and must now remove the commands. Which two commands must be executed to correct the configuration? (Choose two.)
Drag and drop the characteristic from the left onto the IPv6 address type on the right.
Which Rapid PVST+ feature should be configured on a switch port to immediately send traffic to a connected server as soon as it is active?
What Is the path for traffic sent from one user workstation to another workstation on a separate switch In a Ihree-lter architecture model?
Which statement about Link Aggregation when implemented on a Cisco Wireless LAN Controller is true?
Which command configures the Cisco WLC to prevent a serial session with the WLC CLI from being automatical togged out?
Refer to the exhibit.
The network administrator must prevent the switch Cat9K-2 IP address from being visible in LLDP without disabling the protocol. Which action must be taken must be taken to complete the task?
Refer to the exhibit.
The New York router must be configured so that traffic to 2000::1 is sent primarily via the Atlanta site, with a secondary path via Washington that has an administrative distance of 2. Which two commands must be configured on the New York router? (Choose two.)
An on-site service desk technician must verify the IP address and DNS server information on a users Windows computer. Which command must the technician enter at the command prompt on the user ' s computer?
Drag and drop the lightweight access point operation modes from the left onto the descriptions on the right
An organization secures its network with multi-factor authentication using an authenticator app on employee smartphone. How is the application secured in the case of a user’s smartphone being lost or stolen?
Refer to the exhibit.
A network administrator has been tasked with securing VTY access to a router. Which access-list entry accomplishes this task?
Which configuration management mechanism uses TCP port 22 by default when communicating with managed nodes?
When a site-to-site VPN is used, which protocol is responsible for the transport of user data?
An engineer needs to configure LLDP to send the port description time length value (TLV). What command sequence must be implemented?
A corporate office uses four floors in a building
• Floor 1 has 24 users
• Floor 2 has 29 users
• Floor 3 has 28 users
•Floor 4 has 22 users
Which subnet summarizes and gives the most efficient distribution of IP addresses for the router configuration?
Refer to the exhibit.
A network engineer must block access for all computers on VLAN 20 to the web server via HTTP All other computers must be able to access the web server Which configuration when applied to switch A accomplishes this task?
An engineer requires a scratch interface to actively attempt to establish a trunk link with a neighbor switch. What command must be configured?
Refer to the exhibit.
An engineer is bringing up a new circuit to the MPLS provider on the Gi0/1 interface of Router1 The new circuit uses eBGP and teams the route to VLAN25 from the BGP path What s the expected behavior for the traffic flow for route 10.10.13.0/25?
Which action must be taken to assign a global unicast IPv6 address on an interface that is derived from the MAC address of that interface?
Refer to the exhibit.
For security reasons, automatic neighbor discovery must be disabled on the R5 Gi0/1 interface. These tasks must be completed:
• Disable all neighbor discovery methods on R5 interface GiO/1.
• Permit neighbor discovery on R5 interface GiO/2.
• Verify there are no dynamically learned neighbors on R5 interface Gi0/1.
• Display the IP address of R6*s interface Gi0/2.
Which configuration must be used?
Refer to the exhibit.
Which two commands were used to create port channel 10? (Choose two )
Which goal is achieved by the implementation of private IPv4 addressing on a network?
Refer to the exhibit.
With which metric was the route to host 172.16.0.202 learned?
An engineer must configure an OSPF neighbor relationship between router R1 and R3 The authentication configuration has been configured and the connecting interfaces are in the same 192.168 1.0/30 sublet. What are the next two steps to complete the configuration? (Choose two.)
What are two recommendations for protecting network ports from being exploited when located in an office space outside of an IT closer? (Choose two.)
R1 has learned route 10.10.10.0/24 via numerous routing protocols. Which route is installed?
Which two must be met before SSH can operate normally on a Cisco IOS switch? (Choose two)
A network administrator must to configure SSH for remote access to router R1 The requirement is to use a public and private key pair to encrypt management traffic to and from the connecting client.
Which configuration, when applied, meets the requirements?
Refer to the exhibit.
Which change to the configuration on Switch?
allows the two switches to establish an GtherChannel?
Which technology can prevent client devices from arbitrarily connecting to the network without state remediation?
Which design element is a best practice when deploying an 802.11b wireless infrastructure?
The SW1 interface g0/1 is in the down/down state. Which two configurations are valid reasons for the interface conditions?(choose two)
Refer to the exhibit.
Drag and drop the networking parameters from the left onto the correct values on the right.
Refer to the exhibit.
An access list is created to deny Telnet access from host PC-1 to RTR-1 and allow access from all other hosts A Telnet attempt from PC-2 gives this message: " % Connection refused by remote host " Without allowing Telnet access from PC-1, which action must be taken to permit the traffic?
Router A learns the same route from two different neighbors, one of the neighbor routers is an OSPF neighbor and the other is an EIGRP neighbor. What is the administrative distance of the route that will be installed in the routing table?
What are two reasons that cause late collisions to increment on an Ethernet interface? (Choose two)
Refer to the exhibit. An engineer must add a subnet for a new office that will add 20 users to the network. Which IPv4 network and subnet mask combination does the engineer assign to minimize wasting addresses?
An engineer observes high usage on the 2.4GHz channels and lower usage on the 5GHz channels. What must be configured to allow clients to preferentially use 5GH2 access points?
A user configured OSPF in a single area between two routers A serial interface connecting R1 and R2 is running encapsulation PPP By default which OSPF network type is seen on this interface when the user types show ip ospf interface on R1 or R2?
An engineer must configure traffic for a VLAN that is untagged by the switch as it crosses a trunk link. Which command should be used?
An engineer must configure a WLAN using the strongest encryption type for WPA2- PSK. Which cipher fulfills the configuration requirement?
Refer to the exhibit.
An administrator configures four switches for local authentication using passwords that are stored in a cryptographic hash. The four switches must also support SSH access for administrators to manage the network infrastructure. Which switch is configured correctly to meet these requirements?
Refer to the exhibit.
An engineer deploys a topology in which R1 obtains its IP configuration from DHCP. If
the switch and DHCP server configurations are complete and correct. Which two sets of commands must be configured on R1 and R2 to complete the task? (Choose two)
Refer to the exhibit.
Which configuration issue is preventing the OSPF neighbor relationship from being established between the two routers?
Refer to Exhibit.
How does SW2 interact with other switches in this VTP domain?
What is the difference between controller-based networks and traditional networks as they relate to control-plane and/or data-plane functions?
What does the implementation of a first-hop redundancy protocol protect against on a network?
Drag and drop the configuration management terms from the left onto the descriptions on the right. Not all terms are used.
Refer to the exhibit.
The image server and client A are running an application that transfers an extremely high volume of data between the two. An engineer is configuring a dedicated circuit between R1 and R2. Which set of commands must the engineer apply to the routers so that only traffic between the image server and client A is forces to use the new circuit?
What benefit does controller-based networking provide versus traditional networking?
Which two protocols are used by an administrator for authentication and configuration on access points?
With REST API, which standard HTTP header tells a server which media type is expected by the client?
A network administrator wants the syslog server to filter incoming messages into different files based on their Importance. Which filtering criteria must be used?
Which two statements distinguish authentication from accounting? (Choose two.)
Refer to the exhibit.
The administrator must configure a floating sialic default route that points to 2001:db8:1234:2::1 and replaces the current default route only if it fails. Which command must the engineer configure on the CPE?
Refer to the exhibit.
The loopback1 interface of the Atlanta router must reach the lookback3 interface of the Washington router.
Refer to the exhibit. A secondary route is required on router R1 to pass traffic to the LAN network on R2 if the primary link fails. Which command must be entered to configure the router?
Which type of DNS record is used to specify the mail server responsible for accepting email messages on behalf of a recipient ' s domain?
Refer to the exhibit. Which functionalities will this SSID have while being used by wireless clients?
Drag and drop the statements about networking from me left onto the corresponding networking types on the right
Which WLC interface provides out-of-band management in the Cisco Unified Wireless Network Architecture?
A network engineer is replacing the switches that belong to a managed-services client with new Cisco Catalyst switches. The new switches will be configured for updated security standards, including replacing Telnet services with encrypted connections and doubling the modulus size from 1024. Which two commands must the engineer configure on the new switches? (Choose two.)
Refer to the exhibit.
The given Windows PC is requesting the IP address of the host at www.cisco.com. To which IP address is the request sent?
Refer to the exhibit.
Which configuration establishes a Layer 2 LACP EtherChannel when applied to both switches?
Refer to the exhibit.
R1 has just received a packet from host A that is destined to host B. Which route in the routing table is used by R1 to reac B?
A network engineer is implementing a corporate SSID for WPA3-Personal security with a PSK. Which encryption cipher must be configured?
Drag and drop the characteristic from the left onto the IPv6 address type on the right.
A DHCP pool has been created with the name NOCC. The pool is using 192.168.20.0/24 and must use the next to last usable IP address as the default gateway for the DHCP clients. What is the next step in the process?
Refer to the exhibit.
Which format matches the Modified EUI-64 IPv6 interface address for the network 2001:db8::/64?
Refer to the exhibit.
A network engineer must configure the link with these requirements:
• Consume as few IP addresses as possible.
• Leave at least two additional useable IP addresses for future growth.
Which set of configurations must be applied?
A)
B)
C)
D)
Refer to the exhibit.
Rooter R1 is added to the network and configured with tie 10 0 0 64/26 and 10.0.20.0/24 subnets However traffic destined for the LAN on R3 is not access. Which command when executed on R1 defines a tunic route to reach the R3 LAN?
A)
B)
C)
When the LAG configuration is updated on a Cisco WLC which additional task must be performed when changes are complete?
What are two lacts that differentiate optical-fiber cabling from copper cabling? (Choose two.)
Drag and drop each characteristic of device-management technologies from the left onto the deployment type on the right.
Refer to the exhibit.
Which interface is chosen to forward traffic to the host at 192.168.0.55?
Refer to the exhibit.
Which set of commands must be applied to the two switches to configure an LACP Layer 2 EtherChannel?
A)
B)
C)
D)
Refer to the exhibit. This ACL is configured to allow client access only to HTTP, HTTPS, and DNS services via UDP. The new administrator wants to add TCP access to the DNS service. Which configuration updates the ACL efficiently?
Refer to the exhibit.
The SW1 and SW2 Gi0/0 ports have been preconfigured. An engineer is given these requirements:
• Allow all PCs to communicate with each other at Layer 3.
• Configure untagged traffic to use VLAN 5.
• Disable VLAN 1 from being used.
Which configuration set meets these requirements?
Refer to the exhibit.
Router R1 must be configured to reach the 10.0.3.0/24 network from the 10.0.1.0/24 segment.
Which command must be used to configure the route?
Which alternative to password authentication Is Implemented to allow enterprise devices to log in to the corporate network?
Why is UDP more suitable than TCP for applications that require low latency, such as VoIP?
Which switch technology establishes a network connection immediately when it is plugged in?
Which action does the router take as it forwards a packet through the network?
Refer to the exhibit. All routers in the network are configured R2 must be the DR. After the engineer connected the devices, R1 was elected as the DR. Which command sequence must be configure on R2 to Be elected as the DR in the network?
Drag and drop the IPv6 address type characteristics from the left to the right.
Drag and drop the DNS lookup components from the left onto the functions on the right.
Which mode allows access points to be managed by Cisco Wireless LAN Controllers?
Refer to the exhibit.
An administrator must turn off the Cisco Discovery Protocol on the port configured with address last usable address in the 10.0.0.0/30 subnet. Which command set meets the requirement?
On workstations running Microsoft Windows, which protocol provides the default gateway for the device?
An engineering team asks an implementer to configure syslog for warning conditions and error conditions. Which command does the implementer configure to achieve the desired result?
Which protocol does an IPv4 host use to obtain a dynamically assigned IP address?
In QoS, which prioritization method is appropriate for interactive voice and video?
What is an advantage of Cisco DNA Center versus traditional campus device management?
In software-defined architecture, which place handles switching for traffic through a Cisco router?
Refer to the exhibit.
How must router A be configured so that it only sends Cisco Discovery Protocol Information to router C?
What protocol allows an engineer to back up 20 network router configurations globally while using the copy function?
Two switches are connected and using Cisco Dynamic Trunking Protocol SW1 is set to Dynamic Desirable
What is the result of this configuration?
Which access layer threat-mitigation technique provides security based on identity?
Which mode must be used to configure EtherChannel between two switches without using a negotiation protocol?
When configuring a WLAN with WPA2 PSK in the Cisco Wireless LAN Controller GUI, which two formats are available to select? (Choose two)
Refer to exhibit.
Which statement explains the configuration error message that is received?
Which WAN topology provides a combination of simplicity quality, and availability?
What is the difference in data transmission delivery and reliability between TCP and UDP?
Refer to the exhibit.
If OSPF is running on this network, how does Router 2 handle traffic from Site B to 10.10.13/25 at Site A?
After installing a new Cisco ISE server, which task must the engineer perform on the Cisco WLC to connect wireless clients on a specific VLAN based on their credentials?
An engineer needs to add an old switch back into a network. To prevent the switch from corrupting the VLAN database which action must be taken?
What is the purpose of using First Hop Redundancy Protocol in a specific subnet?
How do TCP and UDP differ in the way they provide reliability for delivery of packets?
Drag and drop the characteristics of network architectures from the left onto the type of architecture on the right.
Which two command sequences must you configure on switch to establish a Layer 3 EtherChannel with an open-standard protocol? (Choose two )
By default, how Does EIGRP determine the metric of a route for the routing table?
Refer to the exhibit.
Which switch in this configuration will be elected as the root bridge?
Drag and drop the functions of DHCP from the left onto any of the positions on the right Not all functions are used
An engineer must configure a/30 subnet between two routers. Which usable IP address and subnet mask combination meets this criteria?
Drag and drop the DHCP snooping terms from the left onto the descriptions on the right.
Refer to the exhibit.
An engineer configured NAT translations and has verified that the configuration is correct.
Which IP address is the source IP?
Which 802.11 management frame type is sent when a client roams between access points on the same SSID?
Which command on a port enters the forwarding state immediately when a PC is connected to it?
What are two roles of the Dynamic Host Configuration Protocol (DHCP)? (Choose two)
Drag and drop the network protocols from the left onto the correct transport services on the right.
Refer to the exhibit.
After the election process what is the root bridge in the HQ LAN?
What is the default behavior of a Layer 2 switch when a frame with an unknown destination MAC address is received?
Several new coverage cells are required to improve the Wi-Fi network of an organization. Which two standard designs are recommended? (choose two.)
Which resource is able to be shared among virtual machines deployed on the same physical server?
What is a recommended approach to avoid co-channel congestion while installing access points that use the 2.4 GHz frequency?
An email user has been lured into clicking a link in an email sent by their company ' s security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?
Refer to the exhibit.
What is the next hop address for traffic that is destined to host 10.0.1.5?
What mechanism carries multicast traffic between remote sites and supports encryption?
Drag and drop the functions from the left onto the correct network components on the right
Which technology allows for multiple operating systems to be run on a single host computer?
In which two ways does a password manager reduce the chance of a hacker stealing a users password? (Choose two.)
Refer to the exhibit.
Which two configurations must the engineer apply on this network so that R1 becomes the DR? (Choose two.)
A)
B)
C)
D)
E)
Refer to the exhibit.
An engineer assumes a configuration task from a peer Router A must establish an OSPF neighbor relationship with neighbor 172 1 1 1 The output displays the status of the adjacency after 2 hours. What is the next step in the configuration process for the routers to establish an adjacency?
A network engineer must implement an IPv6 configuration on the vlan 2000 interface to create a routable locally-unique unicast address that is blocked from being advertised to the internet. Which configuration must the engineer apply?
Which type of network attack overwhelms the target server by sending multiple packets to a port until the half-open TCP resources of the target are exhausted?
Refer to the exhibit.
Which action must be taken to ensure that router A is elected as the DR for OSPF area 0?
Which value is the unique identifier that an access point uses to establish and maintain wireless connectivity to wireless network devices?
Which interface mode must be configured to connect the lightweight APs in a centralized architecture?
Refer to the exhibit.
Which minimum configuration items are needed to enable Secure Shell version 2 access to R15?
A)
B)
C)
D)
A network engineer is configuring a switch so that it is remotely reachable via SSH. The engineer has already configured the host name on the router. Which additional command must the engineer configure before entering the command to generate the RSA key?
OSPF must be configured between routers R1 and R2. Which OSPF configuration must be applied to router R1 to avoid a DR/BDR election?
Drag and drop the statements about networking from the left onto the corresponding networking types on the right.
Refer to the exhibit.
An engineer is asked to insert the new VLAN into the existing trunk without modifying anything previously configured Which command accomplishes this task?
Refer to the exhibit.
Which route must be configured on R1 so that OSPF routing is used when OSPF is up. but the server is still reachable when OSPF goes down?
Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.
A network engineer must configure two new subnets using the address block 10 70 128 0/19 to meet these requirements:
• The first subnet must support 24 hosts
• The second subnet must support 472 hosts
• Both subnets must use the longest subnet mask possible from the address block
Which two configurations must be used to configure the new subnets and meet a requirement to use the first available address in each subnet for the router interfaces? (Choose two )
What provides centralized control of authentication and roaming In an enterprise network?
Drag and drop the Rapid PVST+ forwarding slate actions from the loft to the right. Not all actions are used.
Refer to the exhibit.
Router R1 currently is configured to use R3 as the primary route to the Internet, and the route uses the default administrative distance settings. A network engineer must configure R1 so that it uses R2 as a backup, but only if R3 goes down. Which command must the engineer configure on R1 so that it correctly uses R2 as a backup route, without changing the administrative distance configuration on the link to R3?
A network engineer is installing an IPv6-only capable device. The client has requested that the device IP address be reachable only from the internal network. Which type of IPv6 address must the engineer assign?
A network administrator is setting up a new IPv6 network using the 64-bit address 2001 0EB8 00C1 2200:0001 0000 0000 0331/64 To simplify the configuration the administrator has decided to compress the address Which IP address must the administrator configure?
Refer to the exhibit.
An engineer is configuring the HO router. Which IPv6 address configuration must be applied to the router fa0 ' 1 interface for the router to assign a unique 64-brt IPv6 address to Itself?
Refer to the exhibit.
Packets received by the router from BGP enter via a serial interface at 209.165.201.10. Each route is present within the routing table. Which interface is used to forward traffic with a destination IP of 10.10.10.24?
Refer to the exhibit.
Traffic sourced from the loopback0 Interface is trying to connect via ssh to the host at 10.0.1.15. What Is the next hop to the destination address?
Refer to the exhibit.
An engineer has started to configure replacement switch SW1. To verify part of the configuration, the engineer issued the commands as shown and noticed that the entry for PC2 is missing. Which change must be applied to SW1 so that PC1 and PC2 communicate normally?
A)
B)
C)
D)
Refer to the exhibit.
Which next-hop IP address does Routed use for packets destined to host 10 10.13.158?
R1 as an NTP server must have:
• NTP authentication enabled
• NTP packets sourced from Interface loopback 0
• NTP stratum 2
• NTP packets only permitted to client IP 209.165 200 225
How should R1 be configured?
A)
B)
C)
D)
Refer to the exhibit.
Which switch becomes the root of a spanning tree for VLAN 20 if all li links are of equal speed?
Refer to the exhibit.
How should the configuration be updated to allow PC1 and PC2 access to the Internet?
Refer to the exhibit.
Which two commands when used together create port channel 10? (Choose two.)
Refer to the exhibit.
Site A was recently connected to site B over a new single-mode fiber path. Users at site A report Intermittent connectivity Issues with applications hosted at site B. What is the reason for the problem?
Drag and drop the descriptions of AAA services from the left onto the corresponding services on the right.
Refer to the exhibit.
A network engineer must update the configuration on Switch2 so that it sends LLDP packets every minute and the information sent via LLDP is refreshed every 3 minutes Which configuration must the engineer apply?
A)
B)
C)
D)
Drag and drop the facts about wireless architectures from the left onto the types of access point on the right. Not all options are used.
Refer to the exhibit.
Users on existing VLAN 100 can reach sites on the Internet. Which action must the administrator take to establish connectivity to the Internet for users in VLAN 200?
Refer to the exhibit.
An engineer built a new L2 LACP EtherChannel between SW1 and SW2 and executed these show commands to verify the work. Which additional task allows the two switches to establish an LACP port channel?
Refer to the exhibit.
The DHCP server and clients are connected to the same switch. What is the next step to complete the DHCP configuration to allow clients on VLAN 1 to receive addresses from the DHCP server?
Refer to the exhibit.
An engineer is configuring an EtherChannel using LACP between Switches 1 and 2 Which configuration must be applied so that only Switch 1 sends LACP initiation packets?
Which PoE mode enables powered-device detection and guarantees power when the device is detected?
Refer to the exhibit.
All traffic enters the CPE router from interface Serial0/3 with an IP address of 192 168 50 1 Web traffic from the WAN is destined for a LAN network where servers are load-balanced An IP packet with a destination address of the HTTP virtual IP of 192 1681 250 must be forwarded Which routing table entry does the router use?
Refer to the exhibit.
Routers R1 and R3 have the default configuration The router R2 priority is set to 99 Which commands on R3 configure it as the DR in the 10.0 4.0/24 network?
An engineer must configure R1 for a new user account. The account must meet these requirements:
* It must be configured in the local database.
* The username is engineer.
* It must use the strongest password configurable. Which command must the engineer configure on the router?
Drag and drop the characteristics of networking from the left onto the networking types on the right.
Refer to the exhibit.
The following must be considered:
• SW1 is fully configured for all traffic
• The SW4 and SW9 links to SW1 have been configured
• The SW4 interface Gi0/1 and Gi0/0 on SW9 have been configured
• The remaining switches have had all VLANs adde d to their VLAN database
Which configuration establishes a successful ping from PC2 to PC7 without interruption to traffic flow between other PCs?
A)
B)
C)
D)
Refer to the exhibit.
Which command configures OSPF on the point-to-point link between routers R1 and R2?
Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right.
Refer to the exhibit.
A company is configuring a failover plan and must implement the default routes in such a way that a floating static route will assume traffic forwarding when the primary link goes down. Which primary route configuration must be used?
Refer to the exhibit.
The link between PC1 and the switch is up. but it is performing poorly. Which interface condition is causing the performance problem?
A Cisco engineer must configure a single switch interface to meet these requirements
• accept untagged frames and place them in VLAN 20
• accept tagged frames in VLAN 30 when CDP detects a Cisco IP phone
Which command set must the engineer apply?
A)
B)
C)
D)
Refer to the exhibit.
The router has been configured with a supernet to accommodate the requirement for 380 users on a subnet The requirement already considers 30% future growth. Which configuration verifies the IP subnet on router R4?
A)
B)
C)
D)
Refer to the exhibit.
A static route must be configured on R14 to forward traffic for the 172 21 34 0/25 network that resides on R86 Which command must be used to fulfill the request?
An engineer is tasked to configure a switch with port security to ensure devices that forward unicasts multicasts and broadcasts are unable to flood the port The port must be configured to permit only two random MAC addresses at a time Drag and drop the required configuration commands from the left onto the sequence on the right Not all commands are used.
Which WLC management connection type is vulnerable to man-in-the-middle attacks?
Refer to the exhibit.
Which two commands must be added to update the configuration of router R1 so that it accepts only encrypted connections? (Choose two )
Refer to the exhibit.
Router R1 resides in OSPF Area 0. After updating the R1 configuration to influence the paths that it will use to direct traffic, an engineer verified that each of the four Gigabit interfaces has the same route to 10.10.0.0/16. Which interface will R1 choose to send traffic to reach the route?
Refer to the exhibit.
Users need to connect to the wireless network with IEEE 802. 11r-compatible devices. The connection must be maintained as users travel between floors or to other areas in the building What must be the configuration of the connection?
An engineer is configuring remote access to a router from IP subnet 10.139.58.0/28. The domain name, crypto keys, and SSH have been configured. Which configuration enables the traffic on the destination router?
A)
B)
C)
D)
Refer to the exhibit.
Traffic that is flowing over interface TenGigabitEthernet0/0 experiences slow transfer speeds. What is the reason for the issue?
Which characteristic differentiates the concept of authentication from authorization and accounting?
Refer to the exhibit.
An IP subnet must be configured on each router that provides enough addresses for the number of assigned hosts and anticipates no more than 10% growth for now hosts. Which configuration script must be used?
A)
B)
C)
D)
Two switches have been implemented and all interfaces are at the default configuration level. A trunk link must be implemented between two switches with these requirements:
• using an industry-standard trunking protocol
• permitting VLANs 1 -10 and denying other VLANs
How must the interconnecting ports be configured?
A)
B)
C)
D)
Refer to the exhibit. A static route must be configured on R14 to forward traffic for the 172.21.34.0/25 network that resides on R86. Which command must be used to fulfill the request?
Which fact must the engineer consider when implementing syslog on a new network?
Which syslog message logging level displays interface line protocol up/down events?
Which interface is used to send traffic to the destination network?
O 10.18.75.113/27 [110/6906] via GO/6
O 10.18.75.113/27 [110/23018] via GO/3
R 10.18.75.113/27 [120/16] via GO/16
R 10.18.75.113/27 [120/14] via GO/23
Refer to the exhibit. What is the administrative distance for the advertised prefix that includes the host IP address 192.168.20.1?
Three switches must be configured for Layer 2 connectivity. The company requires only the designated VLANs to be configured on their respective switches and permitted accross any links between switches for security purposes. Do not modify or delete VTP configurations.
The network needs two user-defined VLANs configured:
VLAN 110: MARKETING
VLAN 210: FINANCE
1. Configure the VLANs on the designated switches and assign them as access ports to the interfaces connected to the PCs.
2. Configure the e0/2 interfaces on Sw1 and Sw2 as 802.1q trunks with only the required VLANs permitted.
3. Configure the e0/3 interfaces on Sw2 and Sw3 as 802.1q trunks with only the required VLANs permitted.
Refer to the exhibit. How will router R1 handle packets destined to 192.168.64.22?
An engineer must update the configuration on two PCs in two different subnets to communicate locally with each other. One PC is configured with IP address 192.168.25.128/25 and the other with 192.168.25.100/25. Which network mask must the engineer configure on both PCs to enable the communication?
Refer to the exhibit. OSPF neighbors routers A, B, C, and D are sending a route for 10.227.150.160/27. When the current route for 10.227.150.160/27 becomes unavailable, which cost will router Y use to route traffic to 10.227.150.160/27?
Drag and drop the AAA features from the left onto the corresponding AAA security services on the right Not all options are used.
Refer to the exhibit.
Which configuration is needed to configure a WLAN with WPA2 only and with a password that is 63 characters long?
Which IP address is used when an administrator must open a web-based management session with a lightweight AP?
Refer to the exhibit. A network engineer is adding another physical interface as a new member to the existing Port-Channel1 bundle.
Which command set must be configured on the new interface to complete the process?
Three switches must be configured for Layer 2 connectivity. The company requires only the designated VLANs to be configured on their respective switches and permitted accross any links between switches for security purposes. Do not modify or delete VTP configurations.
The network needs two user-defined VLANs configured:
VLAN 110: MARKETING
VLAN 210: FINANCE
1. Configure the VLANs on the designated switches and assign them as access ports to the interfaces connected to the PCs.
2. Configure the e0/2 interfaces on Sw1 and Sw2 as 802.1q trunks with only the required VLANs permitted.
3. Configure the e0/3 interfaces on Sw2 and Sw3 as 802.1q trunks with only the required VLANs permitted.
Refer to the exhibit. OSPF neighbors routers A, B, C, and D are sending a route for 10.227.150.160/27. When the current route for 10.227.150.160/27 becomes unavailable, which cost will router Y use to route traffic to 10.227.150.160/27?
IP connectivity between the three routers is configured. OSPF adjacencies must be established.
1. Configure R1 and R2 Router IDs using the interface IP addresses from the link that is shared between them.
2. Configure the R2 links with a max value facing R1 and R3. R2 must become the DR. R1 and R3 links facing R2 must remain with the default OSPF configuration for DR election. Verify the configuration after clearing the OSPF process.
3. Using a host wildcard mask, configure all three routers to advertise their respective Loopback1 networks.
4. Configure the link between R1 and R3 to disable their ability to add other OSPF routers.