Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

200-301 Implementing and Administering Cisco Solutions (200-301 CCNA) v1.1 Questions and Answers

Questions 4

When configuring a WLAN with WPA2 PSK in the Cisco Wireless LAN Controller GUI, which two formats are available to select? (Choose two)

Options:

A.

ASCII

B.

base64

C.

binary

D.

decimal

E.

hexadecimal

Buy Now
Questions 5

How do TCP and UDP differ in the way they guarantee packet delivery?

Options:

A.

TCP uses checksum, acknowledgement, and retransmissions, and UDP uses checksums only.

B.

TCP uses two-dimensional parity checks, checksums, and cyclic redundancy checks and UDP uses retransmissions only.

C.

TCP uses checksum, parity checks, and retransmissions, and UDP uses acknowledgements only.

D.

TCP uses retransmissions, acknowledgement and parity checks and UDP uses cyclic redundancy checks only.

Buy Now

200-301 Report Card

Questions 6

Refer to the exhibit.

What is the issue with the interface GigabitEthernet0/0/1?

Options:

A.

Port security

B.

High throughput

C.

Cable disconnect

D.

duplex mismatch

Buy Now
Questions 7

What mechanism carries multicast traffic between remote sites and supports encryption?

Options:

A.

ISATAP

B.

GRE over IPsec

C.

IPsec over ISATAP

D.

GRE

Buy Now
Questions 8

How is a configuration change made to a wirelesss AP in lightweight mode?

Options:

A.

SSH connection to the management IP of the AP

B.

EolP connection via the parent WLC

C.

CAPWAP/LWAPP connection via the parent WLC

D.

HTTPS connection directly to the out-of-band addresss of the AP

Buy Now
Questions 9

Refer to the exhibit. A network engineer updates the existing configuration on interface fastethernet1/1 switch SW1. It must establish an EtherChannel by using the same group designation with another vendor switch. Which configuration must be performed to complete the process?

Options:

A.

interface port-channel 2channel-group 2 mode desirable

B.

interface fasteinernet 1/1channel-group 2 mode active

C.

interface fasteinernet 1/1channel-group 2 mode on

D.

interface port-channel 2channel-group 2 mode auto

Buy Now
Questions 10

Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)

Options:

A.

It drops lower-priority packets before it drops higher-priority packets

B.

It can identify different flows with a high level of granularity

C.

It guarantees the delivery of high-priority packets

D.

It can mitigate congestion by preventing the queue from filling up

E.

It supports protocol discovery

Buy Now
Questions 11

What is a characteristic of private IPv4 addresssing?

Options:

A.

Reduces the forwarding table on network routers

B.

Used on the external interface of a firewall

C.

Used by ISPs when only one IP is needed to connect to the internet

D.

Address space which is isolated froin the internet

Buy Now
Questions 12

In which circumstance would a network architect decide to implement a global unicast subnet instead of a unique local unicast subnet?

Options:

A.

when the subnet must be available only within an organization

B.

when the subnet does not need to be routable

C.

when the addressses on the subnet must be equivalent to private IPv4 addressses

D.

when the subnet must be routable over the internet

Buy Now
Questions 13

What must be considered before deploying virtual machines?

Options:

A.

location of the virtual machines within the data center environment

B.

whether to leverage VSM to map multiple virtual processors to two or more virtual machines

C.

resource limitations, such as the number of CPU cores and the amount of memory

D.

support for physical peripherals, such as monitors, keyboards, and mice

Buy Now
Questions 14

A frame that enters a switch fails the Frame Check Sequence. Which two interface counters are incremented? (Choose two)

Options:

A.

runts

B.

giants

C.

frame

D.

CRC

E.

input errors

Buy Now
Questions 15

What are two fundamentals of virtualization? (Choose two)

Options:

A.

The environment must be configured with one hypervisor that serves solely as a network manager to monitor SNMP traffic

B.

It allows logical network devices to move traffic between virtual machines and the rest of the physical network

C.

It allows multiple operating systems and applications to run independently on one physical server.

D.

It allows a physical router to directly connect NICs from each virtual machine into the network

E.

It requires that some servers, virtual machines and network gear reside on the Internet

Buy Now
Questions 16

What protocol allows an engineer to back up 20 network router configurations globally while using the copy function?

Options:

A.

SMTP

B.

SNMP

C.

TCP

D.

FTP

Buy Now
Questions 17

When configuring IPv6 on an interface, which two IPv6 multicast groups are joined? (Choose two)

Options:

A.

2000::/3

B.

2002::5

C.

FC00::/7

D.

FF02::1

E.

FF02::2

Buy Now
Questions 18

Which mode must be used to configure EtherChannel between two switches without using a negotiation protocol?

Options:

A.

on

B.

auto

C.

active

D.

desirable

Buy Now
Questions 19

What is the function of a hub-and-spoke WAN topology?

Options:

A.

allows access restrictions to be implemented between subscriber sites.

B.

provides direct connections between subscribers

C.

supports Layer 2 VPNs

D.

supports application optimization

Buy Now
Questions 20

In which way does a spine-and-leaf architecture allow for scalability in a network when additional access ports are required?

Options:

A.

A spine switch and a leaf switch can be added with redundant connections between them

B.

A spine switch can be added with at least 40 GB uplinks

C.

A leaf switch can be added with a single connection to a core spine switch.

D.

A leaf switch can be added with connections to every spine switch

Buy Now
Questions 21

What is the function of the controller in a software-defined network?

Options:

A.

multicast replication at the hardware level

B.

fragmenting and reassembling packets

C.

making routing decisions

D.

forwarding packets

Buy Now
Questions 22

A network engineer is replacing the switches that belong to a managed-services client with new Cisco Catalyst switches. The new switches will be configured for updated security standards, including replacing Telnet services with encrypted connections and doubling the modulus size from 1024. Which two commands must the engineer configure on the new switches? (Choose two.)

Options:

A.

crypto key generate rsa general-keys modulus 1024

B.

transport input all

C.

crypto key generate rsa usage-keys

D.

crypto key generate rsa modulus 2048

E.

transport Input ssh

Buy Now
Questions 23

Drag and drop the DHCP snooping terms from the left onto the descriptions on the right.

Options:

Buy Now
Questions 24

Which function does the range of private IPv4 addresses perform?

Options:

A.

allows multiple companies to each use the same addresses without conflicts

B.

provides a direct connection for hosts from outside of the enterprise network

C.

ensures that NAT is not required to reach the internet with private range addressing

D.

enables secure communications to the internet for all external hosts

Buy Now
Questions 25

Which command prevents passwords from being stored in the configuration as plain text on a router or switch?

Options:

A.

enable secret

B.

service password-encryption

C.

username Cisco password encrypt

D.

enable password

Buy Now
Questions 26

How does MAC learning function?

Options:

A.

rewrites the source and destination MAC addresss

B.

adds unknown source MAC addressses to the CAM table

C.

sends the frame back to the source to verify availability

D.

drops received MAC addressses not listed in the addresss table

Buy Now
Questions 27

Refer to the exhibit. All routers in the network are configured. R2 must be the DR. After the engineer connected the devices, R1 was elected as the DR. Which command sequence must be configured on R2 to be elected as the DR in the network?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 28

Which role does AI play in monitoring network data flow?

Options:

A.

It analyzes patterns for anomaly detection.

B.

It exclusively predicts device malfunctions.

C.

It simplifies traffic route mapping.

D.

It enhances data packet delivery speeds.

Buy Now
Questions 29

An engineering team asks an implementer to configure syslog for warning conditions and error conditions. Which command does the implementer configure to achieve the desired result?

Options:

A.

logging trap 5

B.

logging trap 2

C.

logging trap 4

D.

logging trap 3

Buy Now
Questions 30

Refer to the exhibit.

Which outcome is expected when PC_A sends data to PC_B?

Options:

A.

The switch rewrites the source and destination MAC addresses with its own.

B.

The source MAC address is changed.

C.

The source and destination MAC addresses remain the same.

D.

The destination MAC address is replaced with ffff.ffff.ffff.

Buy Now
Questions 31

What does a switch use to build its MAC address table?

Options:

A.

VTP

B.

DTP

C.

egress traffic

D.

ingress traffic

Buy Now
Questions 32

Which configuration ensures that the switch is always the root for VLAN 750?

Options:

A.

Switch(config)#spanning-tree vlan 750 priority 38003685

B.

Switch(config)#spanning-tree vlan 750 root primary

C.

Switch(config)#spanning-tree vlan 750 priority 614440

D.

Switch(config)#spanning-tree vlan 750 priority 0

Buy Now
Questions 33

which purpose does a northbound API serve in a controller-based networking architecture?

Options:

A.

communicates between the controller and the physical network hardware

B.

reports device errors to a controller

C.

generates statistics for network hardware and traffic

D.

facilitates communication between the controller and the applications

Buy Now
Questions 34

Which network action occurs within the data plane?

Options:

A.

compare the destination IP address to the IP routing table.

B.

run routing protocols (OSPF, EIGRP, RIP, BGP)

C.

make a configuration change from an incoming NETCONF RPC

D.

reply to an incoming ICMP echo request

Buy Now
Questions 35

What occurs to frames during the process of frame flooding?

Options:

A.

Frames are sent to every port on the switch in the same VLAN except from the originating port

B.

Frames are sent to every port on the switch that has a matching entry in the MAC address table.

C.

Frames are sent to all ports, including those that are assigned to other VLANs.

D.

Frames are sent to every port on the switch in the same VLAN.

Buy Now
Questions 36

When using Rapid PVST+, which command guarantees the switch is always the root bridge for VLAN 200?

Options:

A.

spanning -tree vlan 200 priority 614440

B.

spanning -tree vlan 200 priority 38572422

C.

spanning -tree vlan 200 priority 0

D.

spanning -tree vlan 200 root primary

Buy Now
Questions 37

Which resource is able to be shared among virtual machines deployed on the same physical server?

Options:

A.

disk

B.

applications

C.

VM configuration file

D.

operating system

Buy Now
Questions 38

Refer to the Exhibit.

After the switch configuration the ping test fails between PC A and PC B Based on the output for switch 1. which error must be corrected?

Options:

A.

There is a native VLAN mismatch

B.

Access mode is configured on the switch ports.

C.

The PCs are in the incorrect VLAN

D.

All VLANs are not enabled on the trunk

Buy Now
Questions 39

Which output displays a JSON data representation?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 40

What is the default behavior of a Layer 2 switch when a frame with an unknown destination MAC address is received?

Options:

A.

The Layer 2 switch drops the received frame

B.

The Layer 2 switch floods packets to all ports except the receiving port in the given VLAN.

C.

The Layer 2 switch sends a copy of a packet to CPU for destination MAC address learning.

D.

The Layer 2 switch forwards the packet and adds the destination MAC address to its MAC address table

Buy Now
Questions 41

Which MAC address is recognized as a VRRP virtual address?

Options:

A.

0000.5E00.010a

B.

0005.3711.0975

C.

0000.0C07.AC99

D.

0007.C070/AB01

Buy Now
Questions 42

A manager asks a network engineer to advise which cloud service models are used so employees do not have to waste their time installing, managing, and updating software which is only used occasionally Which cloud service model does the engineer recommend?

Options:

A.

infrastructure-as-a-service

B.

platform-as-a-service

C.

business process as service to support different types of service

D.

software-as-a-service

Buy Now
Questions 43

How does HSRP provide first hop redundancy?

Options:

A.

It load-balances traffic by assigning the same metric value to more than one route to the same destination m the IP routing table.

B.

It load-balances Layer 2 traffic along the path by flooding traffic out all interfaces configured with the same VLAN.

C.

It forwards multiple packets to the same destination over different routed links n the data path

D.

It uses a shared virtual MAC and a virtual IP address to a group of routers that serve as the default gateway for hosts on a LAN

Buy Now
Questions 44

An engineer must configure a /30 subnet between two routers. Which usable IP address and subnet mask combination meets this criteria?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 45

Refer to the exhibit. Routers R1 and R2 have been configured with their respective LAN interfaces. The two circuits are operational and reachable across the WAN. Which command set establishes failover redundancy if the primary circuit goes down?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 46

Which device tracks the state of active connections in order to make a decision to forward a packet through?

Options:

A.

wireless access point

B.

firewall

C.

wireless LAN controller

D.

router

Buy Now
Questions 47

Refer to the exhibit. R1 has taken the DROTHER role in the OSPF DR/BDR election process. Which configuration must an engineer implement so that R1 is elected as the DR?

Options:

A.

R1(config)#interface FastEthernet 0/0R1(config-if)#ip ospf priority 1R1#clear ip ospf process

B.

R2(config)#interface FastEthernet 0/2R2(config-if)#ip ospf priority 1R2#clear ip ospf process

C.

R1(config)#interface FastEthernet 0/0R1(config-if)#ip ospf priority 200R1#clear ip ospf process

D.

R3(config)#interface FastEthernet 0/1R3(config-if)#ip ospf priority 200R3#clear ip ospf process

Buy Now
Questions 48

A DHCP pool has been created with the name NOCC. The pool is using 192.168.20.0/24 and must use the next to last usable IIP address as the default gateway for the DHCP clients. What is the next step in the process?

Options:

A.

default-router192.168.20.253

B.

network 192.168.20.254 255.255.255.0 secondary

C.

ip default-gateway 0.0.0.0 0.0.0.0 192.168.20.253

D.

next-server 192.168.20.254

Buy Now
Questions 49

Refer to the exhibit.

The New York router must be configured so that traffic to 2000::1 is sent primarily via the Atlanta site, with a secondary path via Washington that has an administrative distance of 2. Which two commands must be configured on the New York router? (Choose two.)

Options:

A.

ipv6 route 2000::1/128 2012::1

B.

ipv6 route 2000::1/128 2023::2 5

C.

ipv6 route 2000::1/128 2012::1 5

D.

ipv6 route 2000::1/128 2023::3 2

E.

ipv6 route 2000::1/128 2012::2

Buy Now
Questions 50

Which part of the HTTP request is used in REST API basic authentication to carry credentials?

Options:

A.

cookie

B.

content-type

C.

authorization

D.

accept

Buy Now
Questions 51

Which REST method updates an object in the Cisco DNA Center Intent API?

Options:

A.

CHANGE

B.

UPDATE

C.

POST

D.

PUT

Buy Now
Questions 52

Which action prevents debug messages from being sent via syslog while allowing other messages when an abnormally high number of syslog messages are generated by a device with the debug process turned on?

Options:

A.

Use an access list to filter out the syslog messages.

B.

Turn off the logging monitor in global configuration mode.

C.

Disable logging to the console.

D.

Set the logging trap severity level to informational.

Buy Now
Questions 53

Refer to the exhibit.

The SW1 and SW2 Gi0/0 ports have been preconfigured. An engineer is given these requirements:

• Allow all PCs to communicate with each other at Layer 3.

• Configure untagged traffic to use VLAN 5.

• Disable VLAN 1 from being used.

Which configuration set meets these requirements?

Options:

A.

SW1#interface Gi0/1switchport mode trunkswitchport trunk allowed vlan 5,7,9,108switchport trunk native vlan 5interface Gi0/2switchport mode trunkswitchport trunk allowed vlan 5,7,9,108SW2#interface Gi0/1switchport mode accessswitchport access vlan 7interface Gi0/7switchport mode trunkswitchport trunk allowed vlan 7,9,108

B.

SW1#interface Gi0/1switchport mode trunkswitchport trunk allowed vlan 5,7,9,108switchport trunk native vlan 5interface Gi0/2switchport mode accessswitchport trunk allowed vlan 7,9,108SW2#interface Gi0/1switchport mode accessno switchport access vlan 1switchport access vlan 7interface Gi0/7switchport mode trunkswitchport trunk allowed vlan 7,9,108switchport trunk native vlan 5

C.

SW#1 -interface Gi0/1switchport mode trunkswitchport trunk allowed vlan 5,7,9,108switchport trunk native vlan 5interface Gi0/2switchport mode trunkswitchport trunk allowed vlan 5,7,9,108SW2#interface Gi0/1switchport mode accessswitchport access vlan 7interface Gi0/7switchport mode trunkswitchport trunk allowed vlan 5,7,9,108switchport trunk native vlan 5

D.

SW1#interface Gi0/1switchport mode trunkswitchport trunk allowed vian 5,7,9,108interface Gi0/2switchport mode trunkswitchport trunk allowed vlan 7,9,108SW2#interface Gi0/1switchport mode trunkswitchport trunk allowed vlan 7interface Gi0/7switchport mode trunkswitchport trunk allowed vlan 5,7,9,108

Buy Now
Questions 54

Two switches are connected and using Cisco Dynamic Trunking Protocol. SW1 is set to dynamic desirable.

What is the result of this configuration?

Options:

A.

The link is in a down state.

B.

The link is in an err-disabled state.

C.

The link becomes an access port.

D.

The link becomes a trunk port.

Buy Now
Questions 55

Refer to the exhibit. Configurations for the switch and PCs are complete.

Which configuration must be applied so that VLANs 2 and 3 communicate back and forth?

Options:

A.

interface GigabitEthernet0/0 ip addresss 10.10.2.10 255.255.252.0

B.

interface GigabitEthernet0/0.3 encapsulation dot1Q 3 native ip addresss 10.10.2.10 255.255.252.0

C.

interface GigabitEthernet0/0.10 encapsulation dot1Q 3

D.

interface GigabitEthernet0/0.3 encapsulation dot1Q 10 ip addresss 10.10.2.10 255.255.252.0

Buy Now
Questions 56

A manager asks a network engineer to recommend a cloud service model so that employees do not spend time installing, managing, and updating software that is only used occasionally. Which cloud service model does the engineer recommend?

Options:

A.

Infrastructure-as-a-service

B.

software-as-a-service

C.

business process as a service

D.

platform-as-a-service

Buy Now
Questions 57

What are two roles of Domain Name Services (DNS)? (Choose Two)

Options:

A.

builds a flat structure of DNS names for more efficient IP operations

B.

encrypts network Traffic as it travels across a WAN by default

C.

improves security by protecting IP addresses under Fully Qualified Domain Names (FQDNs)

D.

enables applications to identify resources by name instead of IP address

E.

allows a single host name to be shared across more than one IP address

Buy Now
Questions 58

Which interface is used to send traffic to the destination network?

O 10.18.75.113/27 [110/6906] via GO/6

O 10.18.75.113/27 [110/23018] via GO/3

R 10.18.75.113/27 [120/16] via GO/16

R 10.18.75.113/27 [120/14] via GO/23

Options:

A.

G0/23

B.

G0/3

C.

G0/16

D.

G0/6

Buy Now
Questions 59

What happens when a switch receives a frame with a destination MAC addresss that recently aged out?

Options:

A.

The switch references the MAC addresss aging table for historical addressses on the port that received the frame.

B.

The switch floods the frame to all ports in all VLANs except the port that received the frame

C.

The switch drops the frame and learns the destination MAC addresss again froin the port that received the frame

D.

The switch floods the frame to all ports in the VLAN except the port that received the frame.

Buy Now
Questions 60

Which mechanism carries multicast traffic between remote sites and supports encryption?

Options:

A.

GRE over IPsec

B.

IPsec over ISATAP

C.

GRE

D.

ISATAP

Buy Now
Questions 61

Refer to the exhibit.

What is the next hop address for traffic that is destined to host 10.0.1.5?

Options:

A.

10.0.1.3

B.

10.0.1.50

C.

10.0.1.4

D.

Loopback D

Buy Now
Questions 62

What are two reasons to implement DHCP in a network? (Choose two.)

Options:

A.

reduce administration time in managing IP addressss ranges for clients

B.

control the length of time an IP addressss is used by a network device

C.

manually control and configure IP addresssses on network devices

D.

dynamic control over the best path to reach an IP addressss

E.

access a website by name instead of by IP addressss

Buy Now
Questions 63

What is a characteristic of a Layer 2 switch?

Options:

A.

Provides a single broadcast domain for all connected devices

B.

Performs packet fragmentation and reassembly

C.

Tracks the number of active TCP connections

D.

Uses the data link layer for communications

Buy Now
Questions 64

Which interface is used to send traffic to the destination network?

O 10.76.170 161/26 |110/102] via FO/17

O 10.76.170 161/26[110/27e31] via FO/20

R 10.76.170.161/261120/15] via FO/8

R 10.76.170.161/26 [120/10] via FO/12

Options:

A.

F0/8

B.

FO/20

C.

FO/12

D.

FO/17

Buy Now
Questions 65

Refer to the exhibit. Which next hop is used to route packets to the application server at 152.168.32.85?

Options:

A.

10.10.1.2

B.

10.10.2.2

C.

10.10.3.2

D.

10.10.4.2

Buy Now
Questions 66

What are two behaviors of a point-to-point WAN topology? (Choose two.)

Options:

A.

It uses a single router to route traffic between sites.

B.

It leverages a dedicated connection.

C.

It connects remote networks through a single line.

D.

t delivers redundancy between the central office and branch offices.

E.

It provides direct connections between each router in the topology.

Buy Now
Questions 67

What is the purpose of an SSID?

Options:

A.

It provides network security

B.

It differentiates traffic entering access points

C.

It identities an individual access point on a WLAN

D.

It identifies a WLAN

Buy Now
Questions 68

Refer to the exhibit.

Which command must be issued to enable a floating static default route on router A?

Options:

A.

ip route 0.0.0.0 0.0.0.0 192.168.1.2

B.

ip default-gateway 192.168.2.1

C.

ip route 0.0.0.0 0.0.0.0 192.168.2.1 10

D.

ip route 0.0.0.0 0.0.0.0 192.168.1.2 10

Buy Now
Questions 69

Refer to the exhibit.

Routers R1 and R3 have the default configuration The router R2 priority is set to 99 Which commands on R3 configure it as the DR in the 10.0.4.0/24 network?

Options:

A.

R3(config)#interface Gig0/1 R3(config-if)#ip ospf priority 100

B.

R3(config)#interface Gig0/0 R3(config-if)#ip ospf priority 100

C.

R3(config)#interface Gig0/0 R3(config-if)i=ip ospf priority 1

D.

R3(config)#interface Gig0/1 R3(config-if)#ip ospf priority 0

Buy Now
Questions 70

What is a benefit for external users who consume public cloud resources?

Options:

A.

implemented over a dedicated WAN

B.

located in the same data center as the users

C.

all hosted on physical servers

D.

accessed over the Internet

Buy Now
Questions 71

Refer to the exhibit.

What is the next hop for traffic entering R1 with a destination of 10.1.2.126?

Options:

A.

10.165.20.126

B.

10.165.20.146

C.

10.165.20.166

D.

10.165.20.226

Buy Now
Questions 72

A network administrator is setting up a new IPv6 network using the 64-bit address 2001 0EB8 00C1 2200:0001 0000 0000 0331/64 To simplify the configuration the administrator has decided to compress the address Which IP address must the administrator configure?

Options:

A.

ipv6 address 21:EB8:C1:2200:1::331/64

B.

ipv6 address 2001:EB8:C1:22:1::331/64

C.

ipv6 address 2001:EB8:C1:2200:1::331/64

D.

ipv6 address 2001:EB8:C1:2200:1:0000:331/64

Buy Now
Questions 73

Refer to the exhibit.

Which two commands when used together create port channel 10? (Choose two.)

Options:

A.

int range g0/0-1channel-group 10 mode active

B.

int range g0/0-1 channel-group 10 mode desirable

C.

int range g0/0-1channel-group 10 mode passive

D.

int range g0/0-1 channel-group 10 mode auto

E.

int range g0/0-1 channel-group 10 mode on

Buy Now
Questions 74

An engineer is configuring SSH version 2 exclusively on the R1 router. What is the minimum configuration required to permit remote management using the cryptographic protocol?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 75

What is a function of Opportunistic Wireless Encryption in an environment?

Options:

A.

offer compression

B.

increase security by using a WEP connection

C.

provide authentication

D.

protect traffic on open networks

Buy Now
Questions 76

Refer to the exhibit.

The following must be considered:

• SW1 is fully configured for all traffic

• The SW4 and SW9 links to SW1 have been configured

• The SW4 interface Gi0/1 and Gi0/0 on SW9 have been configured

• The remaining switches have had all VLANs adde d to their VLAN database

Which configuration establishes a successful ping from PC2 to PC7 without interruption to traffic flow between other PCs?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 77

Refer to the exhibit.

How does the router manage traffic to 192.168.12.16?

Options:

A.

It selects the RIP route because it has the longest prefix inclusive of the destination address.

B.

It chooses the OSPF route because it has the longest prefix inclusive of the destination address.

C.

it load-balances traffic between all three routes

D.

It chooses the EIGRP route because it has the lowest administrative distance

Buy Now
Questions 78

Refer to the exhibit.

The LACP EtherChannel is configured, and the last change is to modify the interfaces on SwitchA to respond to packets received, but not to initiate negotiation. The interface range gigabitethernet0/0-15 command is entered. What must be configured next?

Options:

A.

SwitchA(config-if-range) #channel-group 1 mode desirable

B.

SwitchA(config-if-range) #channel-group 1 mode auto

C.

SwitchA(config-if-range) #channel-group 1 mode active

D.

SwitchA(config-if-range) #channel-group 1 mode passive

Buy Now
Questions 79

Refer to the exhibit.

What is the metric for the route to the 192.168.10.33 host?

Options:

A.

84

B.

110

C.

192

D.

193

Buy Now
Questions 80

Refer to the exhibit. An LACP EtherChannel between two directly connected switches is in the configuration process.

Which command must be configured on switch SW2’s Gi0/1-2 interfaces to establish the channel to SW1?

Options:

A.

channel-group 1 mode desirable

B.

channel-group 1 mode on

C.

channel-group 1 mode auto

D.

channel-group 1 mode active

Buy Now
Questions 81

Refer to the exhibit.

What is the subnet mask of the route to the 10.10.13.160 prefix?

Options:

A.

255.255.255.240

B.

255.255.255.128

C.

255.255.255.248

D.

255.255.248.0

Buy Now
Questions 82

What is represented by the word " LB13 " within this JSDN schema?

Options:

A.

value

B.

object

C.

array

D.

key

Buy Now
Questions 83

A new DHCP server has been deployed in a corporate environment with lease time set to eight hours. Which CMD command on a Windows-based device allows the engineer to verify the DHCP lease expiration?

Options:

A.

ipconfig /renew

B.

ipconfig

C.

ipconfig /all

D.

ipconfig /displaydns

Buy Now
Questions 84

Which field within the access-request packet is encrypted by RADIUS?

Options:

A.

authorized services

B.

authenticator

C.

username

D.

password

Buy Now
Questions 85

Refer to the exhibit.

The router has been configured with a supernet to accommodate the requirement for 380 users on a subnet The requirement already considers 30% future growith. Which configuration verifies the IP subnet on router R4?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 86

Refer to the exhibit.

A static route must be configured on R14 to forward traffic for the 172.21.34.0/25 network that resides on R86 Which command must be used to fulfill the request?

Options:

A.

ip route 172.21.34.0 255.255.255.192 10.73.65.65

B.

ip route 172.21.34.0 255.255.255.0 10.73.65.65

C.

ip route 172.21.34.0 255.255.128.0 10.73.65.64

D.

ip route 172.21.34.0 255.255.255.128 10.73.65.66

Buy Now
Questions 87

Which interface is used to send traffic to the destination network?

10.90.207.87/26 [110/1912] via F0/7

10.90.207.87/26 [110/28968] via F0/6

10.90.207.87/26 [120/14] via F0/4

10.90.207.87/26 [120/11] via F0/5

Options:

A.

F0/7

B.

F0/5

C.

F0/4

D.

F0/6

Buy Now
Questions 88

Refer to the exhibit. A network engineer must replicate the AccessSw1 NTP configuration on a new switch. The engineer could not access privileged mode on AccessSw1 to view its configuration.

Which command must be applied to the new switch to replicate the configuration?

Options:

A.

ntp master

B.

ntp master 3

C.

ntp server 2001:db8:12::1

D.

ntp server 127.127.1.1

Buy Now
Questions 89

Which interface mode must be configured to connect the lightweight APs in a centralized architecture?

Options:

A.

WLAN dynamic

B.

management

C.

trunk

D.

access

Buy Now
Questions 90

Refer to the exhibit.

Which command configures OSPF on the point-to-point link between routers R1 and R2?

Options:

A.

router-id 10.0.0.15

B.

neighbor 10.1.2.0 cost 180

C.

ipospf priority 100

D.

network 10.0.0.0 0.0.0.255 area 0

Buy Now
Questions 91

An engineer has configured the domain name, user name, and password on the local router. What is the next step to complete the configuration tor a Secure Shell access RSA key?

Options:

A.

crypto key Import rsa pem

B.

crypto key pubkey-chain rsa

C.

crypto key generate rsa

D.

crypto key zeroize rsa

Buy Now
Questions 92

Refer to the exhibit.

Which prefix did router R1 learn from internal EIGRP?

Options:

A.

192.168.10/24

B.

192.168.3.0/24

C.

192.168.2.0/24

D.

172.16 1.0/24

Buy Now
Questions 93

Which interface on the WLC is used exclusively as a DHCP relay?

Options:

A.

distribution

B.

service

C.

AP-manager

D.

virtual

Buy Now
Questions 94

Which protocol uses the SSL?

Options:

A.

HTTP

B.

SSH

C.

HTTPS

D.

Telnet

Buy Now
Questions 95

What causes a port to be placed in the err-disabled state?

Options:

A.

nothing plugged into the port

B.

link flapping

C.

shutdown command issued on the port

D.

latency

Buy Now
Questions 96

Drag and drop the steps in a standard DNS lookup operation froin the let into the order on the right.

Options:

Buy Now
Questions 97

R1 has learned route 192.168.12.0/24 via IS-IS. OSPF, RIP. and Internal EIGRP Under normal operating conditions, which routing protocol is installed in the routing table?

Options:

A.

IS-IS

B.

RIP

C.

Internal EIGRP

D.

OSPF

Buy Now
Questions 98

An administrator must use the password complexity not manufacturer-name command to prevent users from adding “cisco” as a password. Which command must be issued before this command?

Options:

A.

Password complexity enable

B.

confreg 0x2142

C.

Login authentication my-auth-list

D.

service password-encryption

Buy Now
Questions 99

What is the purpose of the ip address dhcp command?

Options:

A.

to configure an Interface as a DHCP server

B.

to configure an interface as a DHCP helper

C.

to configure an interface as a DHCP relay

D.

to configure an interface as a DHCP client

Buy Now
Questions 100

Refer to the exhibit.

Which two commands must be added to update the configuration of router R1 so that it accepts only encrypted connections? (Choose two )

Options:

A.

username CNAC secret R!41!4319115@

B.

ip ssh version 2

C.

line vty 0 4

D.

crypto key generate rsa 1024

E.

transport input ssh

Buy Now
Questions 101

Refer to the exhibit.

What are two conclusions about this configuration? {Choose two.)

Options:

A.

The spanning-tree mode is Rapid PVST+.

B.

This is a root bridge.

C.

The root port is FastEthernet 2/1.

D.

The designated port is FastEthernet 2/1.

E.

The spanning-tree mode is PVST+.

Buy Now
Questions 102

Refer to the exhibit.

Which configuration enables DHCP addressing for hosts connected to interface FastEthernet0/1 on router R4?

Options:

A.

interface FastEthernet0/0ip helper-address 10.0.1.1iaccess-list 100 permit udp host 10.0.1.1 eq bootps host 10.148.2.1

B.

interface FastEthernet0/1ip helper-address 10.0.1.1!access-list 100 permit tcp host 10.0.1.1 eq 67 host 10.148.2.1

C.

interface FastEthernet0/0ip helper-address 10.0.1.1Iaccess-list 100 permit host 10.0.1.1 host 10.148.2.1 eq bootps

D.

interface FastEthernet0/1ip helper-address 10.0.1.1!access-list 100 permit udp host 10.0.1.1 eq bootps host 10.148.2.1

Buy Now
Questions 103

Refer to the exhibit.

What is the effect of this configuration?

Options:

A.

The switch port interface trust state becomes untrusted

B.

The switch port remains administratively down until the interface is connected to another switch

C.

Dynamic ARP inspection is disabled because the ARP ACL is missing

D.

The switch port remains down until it is configured to trust or untrust incoming packets

Buy Now
Questions 104

Refer to the exhibit.

For security reasons, automatic Neighbor Discovery must be disabled on the R5 Gi0/1 interface. These tasks must be completed:

• Disable all Neighbor Discovery methods on R5 interface GiO/1.

• Permit Neighbor Discovery on R5 interface GiO/2.

• Verify there are no dynamically learned neighbors on R5 interface Gi0/1.

• Display the IP address of R6*s interface Gi0/2.

Which configuration must be used?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 105

Drag and drop the HTTP methods used with REST-Based APIs from the left onto the descriptions on the right.

Options:

Buy Now
Questions 106

Which two practices are recommended for an acceptable security posture in a network? (Choose two)

Options:

A.

Backup device configurations to encrypted USB drives for secure retrieval

B.

maintain network equipment in a secure location

C.

Use a cryptographic keychain to authenticate to network devices

D.

Place internal email and file servers in a designated DMZ

E.

Disable unused or unnecessary ports, interfaces and services

Buy Now
Questions 107

Refer to the exhibit.

Which per-hop QoS behavior is R1 applying to incoming packets?

Options:

A.

queuing

B.

marking

C.

shaping

D.

policing

Buy Now
Questions 108

R1 has learned route 192.168.12.0/24 via IS-IS, OSPF, RIP, and Internal EIGRP. Under normal operating conditions, which routing protocol ' s route will be installed in the routing table?

Options:

A.

IS-IS

B.

RIP

C.

OSPF

D.

Internal EIGRP

Buy Now
Questions 109

Refer to the exhibit.

An engineer is asked to insert the new VLAN into the existing trunk without modifying anything previously configured Which command accomplishes this task?

Options:

A.

switchport trunk allowed vlan 100-104

B.

switchport trunk allowed vlan add 104

C.

switchport trunk allowed vlan all

D.

switchport trunk allowed vlan 104

Buy Now
Questions 110

Refer to the exhibit.

A network administrator has been tasked with securing VTY access to a router. Which access-list entry accomplishes this task?

Options:

A.

access-list 101 permit tcp 10.1.10 0.0.0.255 172.16.10 0.0.0.255 eq ssh

B.

access-list 101 permit tcp 10.11.0 0.0.0.255 172.16.10 0.0.0.255 eq scp

C.

access-list 101 permit tcp 10.11.0 0.0.0.255 172.16.10 0.0.0.255 eq telnet

D.

access-list 101 permit tcp 10.1.10 0.0.0.255 172.16.10 0.0.0.255 eq https

Buy Now
Questions 111

A network engineer must implement an IPv6 configuration on the VLAN 2000 interface to create a routable locally-unique unicast address that is blocked from being advertised to the internet. Which configuration must the engineer apply?

Options:

A.

interface VLAN 2000ipv6 address ffc0:0000:aaaa::1234:2343/64

B.

interface VLAN 2000ipv6 address fc00:0000:aaaa:a15d:1234:2343:8aca/64

C.

interface VLAN 2000ipv6 address fe80:0000:aaaa::1234:2343/64

D.

interface VLAN 2000ipv6 address fd00::1234:2343/64

Buy Now
Questions 112

Refer to the exhibit.

A network engineer must update the configuration on Switch2 so that it sends LLDP packets every minute and the information sent via LLDP is refreshed every 3 minutes Which configuration must the engineer apply?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 113

What are two characteristics of an SSID? (Choose Two)

Options:

A.

It can be hidden or broadcast in a WLAN

B.

It uniquely identifies an access point in a WLAN

C.

It uniquely identifies a client in a WLAN

D.

It is at most 32 characters long.

E.

IT provides secured access to a WLAN

Buy Now
Questions 114

What is an expected outcome when network management automation is deployed?

Options:

A.

A distributed management plane must be used.

B.

Software upgrades are performed from a central controller

C.

Complexity increases when new device configurations are added

D.

Custom applications are needed to configure network devices

Buy Now
Questions 115

An engineer is configuring switch SW1 to act an NTP server when all upstream NTP server connectivity fails. Which configuration must be used?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 116

What is the difference between IPv6 unicast and anycast addressing?

Options:

A.

IPv6 anycast nodes must be explicitly configured to recognize the anycast address, but IPv6 unicast nodes require no special configuration

B.

IPv6 unicast nodes must be explicitly configured to recognize the unicast address, but IPv6 anycast nodes require no special configuration

C.

An individual IPv6 unicast address is supported on a single interface on one node but an IPv6 anycast address is assigned to a group of interfaces on multiple nodes.

D.

Unlike an IPv6 anycast address, an IPv6 unicast address is assigned to a group of interfaces on multiple nodes

Buy Now
Questions 117

Refer to the exhibit.

Site A was recently connected to site B over a new single-mode fiber path. Users at site A report Intermittent connectivity Issues with applications hosted at site B. What is the reason for the problem?

Options:

A.

Heavy usage is causing high latency.

B.

An incorrect type of transceiver has been inserted into a device on the link.

C.

physical network errors are being transmitted between the two sites.

D.

The wrong cable type was used to make the connection.

Buy Now
Questions 118

How does Rapid PVST+ create a fast loop-free network topology?

Options:

A.

lt requires multiple links between core switches

B.

It generates one spanning-tree instance for each VLAN

C.

It maps multiple VLANs into the same spanning-tree instance

D.

It uses multiple active paths between end stations.

Buy Now
Questions 119

Refer to the exhibit.

What are the two steps an engineer must take to provide the highest encryption and authentication using domain credentials from LDAP?

Options:

A.

Select PSK under Authentication Key Management

B.

Select WPA+WPA2 on Layer 2 Security

C.

Select Static-WEP + 802.1X on Layer 2 Security

D.

Select WPA Policy with TKIP Encryption

E.

Select 802.1X from under Authentication Key Management

Buy Now
Questions 120

A Cisco engineer is configuring a factory-default router with these three passwords:

• The user EXEC password for console access is p4ssw0rd1

• The user EXEC password for Telnet access is s3cr3t2

• The password for privileged EXEC mode is pr1v4t3p4ss Which command sequence must the engineer configured

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 121

Refer to the exhibit.

Which next-hop IP address does Routed use for packets destined to host 10 10.13.158?

Options:

A.

10.10.10.5

B.

10.10.11.2

C.

10.10.12.2

D.

10.10.10.9

Buy Now
Questions 122

Refer to the exhibit.

A company is configuring a failover plan and must implement the default routes in such a way that a floating static route will assume traffic forwarding when the primary link goes down. Which primary route configuration must be used?

Options:

A.

ip route 0.0.0.0 0.0.0.0 192.168.0.2 GigabitEthernet1/0

B.

ip route 0.0.0.0 0.0.0.0 192.168.0.2 tracked

C.

ip route 0.0.0.0 0.0.0.0 192.168.0.2 floating

D.

ip route 0.0.0.0 0.0.0.0 192.168.0.2

Buy Now
Questions 123

What is a requirement when configuring or removing LAG on a WLC?

Options:

A.

The Incoming and outgoing ports for traffic flow must be specified If LAG Is enabled.

B.

The controller must be rebooted after enabling or reconfiguring LAG.

C.

The management interface must be reassigned if LAG disabled.

D.

Multiple untagged interfaces on the same port must be supported.

Buy Now
Questions 124

OSPF must be configured between routers R1 and R2. Which OSPF configuration must be applied to router R1 to avoid a DR/BDR election?

Options:

A.

router ospf 1network 192.168.1.1 0.0.0.0 area 0interface e1/1ip address 192.168.1.1 255.255.255.252ip ospf network broadcast

B.

router ospf 1network 192.168.1.1 0.0.0.0 area 0interface e1/1ip address 192.168.1.1 255.255.255.252ip ospf network point-to-point

C.

router ospf 1network 192.168.1.1 0.0.0.0 area 0interface e1/1ip address 192.168.1.1 255.255.255.252ip ospf cost 0

D.

router ospf 1network 192.168.1.1 0.0.0.0 area 0hello interval 15interface e1/1Ip address 192.168.1.1 255.255.255.252

Buy Now
Questions 125

Which wireless security protocol relies on Perfect Forward Secrecy?

Options:

A.

WPA3

B.

WPA

C.

WEP

D.

WPA2

Buy Now
Questions 126

Refer to the exhibit.

Host A sent a data frame destined for host D

What does the switch do when it receives the frame from host A?

Options:

A.

It drops the frame from the switch CAM table.

B.

It floods the frame out of all ports except port Fa0/1.

C.

It shuts down the port Fa0/1 and places it in err-disable mode.

D.

It experiences a broadcast storm.

Buy Now
Questions 127

Refer to the exhibit.

Router R1 must be configured to reach the 10.0.3.0/24 network from the 10.0.1.0/24 segment.

Which command must be used to configure the route?

Options:

A.

ip route 10.0.3.0 255.255.255.0 10.0.4.2

B.

route add 10.0.3.0 mask 255.255.255.0 10.0.4.3

C.

ip route 10.0.3.0 255.255.255.0 10.0.4.3

D.

route add 10.0.3.0 0.255.255.255 10.0.4.2

Buy Now
Questions 128

What is a capability of FTP in network management operations?

Options:

A.

encrypts data before sending between data resources

B.

devices are directly connected and use UDP to pass file information

C.

uses separate control and data connections to move files between server and client

D.

offers proprietary support at the session layer when transferring data

Buy Now
Questions 129

Which characteristic differentiates the concept of authentication from authorization and accounting?

Options:

A.

user-activity logging

B.

service limitations

C.

consumption-based billing

D.

identity verification

Buy Now
Questions 130

Which type of API allows SDN controllers to dynamically make changes to the network?

Options:

A.

northbound API

B.

REST API

C.

SOAP API

D.

southbound API

Buy Now
Questions 131

Refer to the exhibit.

An engineer is configuring an EtherChannel using LACP between Switches 1 and 2 Which configuration must be applied so that only Switch 1 sends LACP initiation packets?

Options:

A.

Switch 1 (config-if)#channel-group 1 mode onSwrtch2(config-if)#channel-group 1 mode passive

B.

Switch1(config-if)#channel-group 1 mode passiveSwitch2(config-if)#channel-group 1 mode active

C.

Switch1{config-if)£channel-group 1 mode activeSwitch2(config-if)#channel-group 1 mode passive

D.

Switch1(config-if)#channel-group 1 mode onSwitch2(config-if)#channel-group 1 mode active

Buy Now
Questions 132

A network engineer is configuring a switch so that it is remotely reachable via SSH. The engineer has already configured the host name on the router. Which additional command must the engineer configure before entering the command to generate the RSA key?

Options:

A.

password password

B.

crypto key generate rsa modulus 1024

C.

ip domain-name domain

D.

ip ssh authentication-retries 2

Buy Now
Questions 133

Refer to the exhibit.

A network engineer configures the Cisco WLC to authenticate local wireless clients against a RADIUS server Which task must be performed to complete the process?

Options:

A.

Change the Server Status to Disabled

B.

Select Enable next to Management

C.

Select Enable next to Network User

D.

Change the Support for CoA to Enabled.

Buy Now
Questions 134

Why does a switch flood a frame to all ports?

Options:

A.

The frame has zero destination MAC addresses.

B.

The source MAC address of the frame is unknown

C.

The source and destination MAC addresses of the frame are the same

D.

The destination MAC address of the frame is unknown.

Buy Now
Questions 135

Which protocol is used for secure remote CLI access?

Options:

A.

HTTPS

B.

HTTP

C.

Telnet

D.

SSH

Buy Now
Questions 136

Drag and drop the QoS terms from the left onto the descriptions on the right.

Options:

Buy Now
Questions 137

What are two features of the DHCP relay agent? (Choose two.)

Options:

A.

assigns DNS locally and then forwards request to DHCP server

B.

permits one IP helper command under an individual Layer 3 interface

C.

allows only MAC-to-IP reservations to determine the local subnet of a client

D.

minimizes the necessary number of DHCP servers

E.

configured under the Layer 3 interface of a router on the client subnet

Buy Now
Questions 138

What is a reason to configure a trunk port that connects to a WLC distribution port?

Options:

A.

Eliminate redundancy with a link failure in the data path.

B.

Allow multiple VLAN to be used in the data path.

C.

Provide redundancy if there is a link failure for out-of-band management.

D.

Permit multiple VLANs to provide out-of-band management.

Buy Now
Questions 139

Refer to the exhibit.

R1 learns all routes via OSPF Which command configures a backup static route on R1 to reach the 192 168.20.0/24 network via R3?

Options:

A.

R1(config)#ip route 192.168.20.0 255.255.0.0 192.168.30.2

B.

R1(config)#ip route 192.168.20.0 255.255.255.0 192.168.30.2 90

C.

R1(config)#ip route 192.168.20.0 255.255.255.0 192.168.30.2 111

D.

R1(config)#ip route 192.168.20.0 255.255.255.0 192.168.30.2

Buy Now
Questions 140

Refer to the exhibit.

Traffic sourced from the loopback0 Interface is trying to connect via ssh to the host at 10.0.1.15. What Is the next hop to the destination address?

Options:

A.

192.168.0.7

B.

192.168.0.4

C.

192.168.0.40

D.

192.168.3.5

Buy Now
Questions 141

Which WPA mode uses PSK authentication?

Options:

A.

Local

B.

Client

C.

Enterprise

D.

Personal

Buy Now
Questions 142

Refer to the exhibit.

The EtherChannel is configured with a speed of 1000 and duplex as full on both ends of channel group 1. What is the next step to configure the channel on switch A to respond to but not initiate LACP communication?

Options:

A.

interface range gigabitethernet0/0/0-15 channel-group 1 mode on

B.

interface range gigabitethernet0/0/0-15 channel-group 1 mode desirable

C.

interface port-channel 1 channel-group 1 mode auto

D.

interface port-channel 1 channel-group 1 mode passive

Buy Now
Questions 143

A network analyst is tasked with configuring the date and time on a router using EXEC mode. The date must be set to January 1. 2020 and the time must be set to 12:00 am. Which command should be used?

Options:

A.

clock summer-time recurring

B.

clock timezone

C.

clock summer-time date

D.

clock set

Buy Now
Questions 144

What is a reason to implement IPv4 private addressing?

Options:

A.

Reduce the risk of a network security breach

B.

Comply with PCI regulations

C.

Comply with local law

D.

Reduce the size of the forwarding table on network routers

Buy Now
Questions 145

What is an advantage of using auto mode versus static mode for power allocation when an access point is connected to a PoE switch port?

Options:

A.

All four pairs of the cable are used

B.

It detects the device is a powered device

C.

The default level is used for the access point

D.

Power policing is enabled at the same time

Buy Now
Questions 146

Refer to the exhibit.

How many objects are present in the given JSON-encoded data?

Options:

A.

one

B.

four

C.

seven

D.

nine

Buy Now
Questions 147

Drag and drop the use cases for device-management technologies from the left onto the corresponding.

Options:

Buy Now
Questions 148

What is a characteristic of a collapsed-core network topology?

Options:

A.

It allows the core and distribution layers to run as a single combined layer.

B.

It enables the core and access layers to connect to one logical distribution device over an EtherChannel.

C.

It enables all workstations in a SOHO environment to connect on a single switch with internet access.

D.

It allows wireless devices to connect directly to the core layer, which enables faster data transmission.

Buy Now
Questions 149

Refer to the exhibit.

Routers R1 and R2 are configured with RIP as the dynamic routing protocol. A network engineer must configure R1 with a floating static route to serve as a backup route to network 192.168.23. Which command must the engineer configure on R1?

Options:

A.

ip route 192.168.23.0 255.255.255.0 192.168.13.3 100

B.

ip route 192.168.23.0 255.255.255.0 192.168.13.3 121

C.

ip route 192.168.23.0 255.255.255.255 192.168.13.3 121

D.

ip route 192.168.23.0 255.255.255.0 192.168.13.3

Buy Now
Questions 150

Refer to the exhibit.

A newly configured PC fails to connect to the internet using TCP port 80 to www cisco com Which setting must be modified for the connection to work?

Options:

A.

Subnet Mask

B.

DNS Servers

C.

Default Gateway

D.

DHCP Server

Buy Now
Questions 151

Which IPsec transport mode encrypts the IP header and the payload?

Options:

A.

pipe

B.

control

C.

transport

D.

tunnel

Buy Now
Questions 152

Why is a first-hop redundancy protocol implemented?

Options:

A.

to protect against default gateway failures

B.

to prevent loops in a network

C.

to enable multiple switches to operate as a single unit

D.

to provide load-sharing for a multilink segment

Buy Now
Questions 153

Which type of address is shared by routers in a HSRP implementation and used by hosts on the subnet as their default gateway address?

Options:

A.

multicast address

B.

loopback IP address

C.

virtual IP address

D.

broadcast address

Buy Now
Questions 154

Refer to the exhibit.

Which entry is the longest prefix match for host IP address 192.168.10.5?

Options:

A.

1

B.

2

C.

3

D.

4

Buy Now
Questions 155

A network engineer must configure an interface with IIP address 10.10.10.145 and a subnet mask equivalent to 11111111.11111111.11111111.11111000. Which subnet mask must the engineer use?

Options:

A.

/29

B.

/30

C.

/27

D.

/28

Buy Now
Questions 156

Which protocol is used in Software Defined Access (SDA) to provide a tunnel between two edge nodes in different fabrics?

Options:

A.

Generic Router Encapsulation (GRE)

B.

Virtual Local Area Network (VLAN)

C.

Virtual Extensible LAN (VXLAN)

D.

Point-to-Point Protocol

Buy Now
Questions 157

An engineer must configure a core router with a floating static default route to the backup router at 10.200.0.2.

Options:

Buy Now
Questions 158

Refer to the exhibit

.

After configuring a new static route on the CPE. the engineer entered this series of commands to verify that the new configuration is operating normally When is the static default route installed into the routing table?

Options:

A.

when 203 0 113.1 is no longer reachable as a next hop B. when the default route learned over external BGP becomes invalid

B.

when a route to 203.0 113 1 is learned via BGP

C.

when the default route over external BGP changes its next hop

Buy Now
Questions 159

Which enhancement is implemented in WPA3?

Options:

A.

applies 802.1x authentication

B.

uses TKIP

C.

employs PKI to identify access points

D.

protects against brute force attacks

Buy Now
Questions 160

Refer to the exhibit.

A Cisco engineer creates a new WLAN called lantest. Which two actions must be performed so that only high-speed 2.4-GHz clients connect? (Choose two.)

Options:

A.

Enable the Broadcast SSID option

B.

Enable the Status option.

C.

Set the Radio Policy option to 802.11g Only.

D.

Set the Radio Policy option to 802.11a Only.

E.

Set the Interface/Interface Group(G) to an interface other than guest

Buy Now
Questions 161

Refer to the exhibit.

An engineer is updating the management access configuration of switch SW1 to allow secured, encrypted remote configuration. Which two commands or command sequences must the engineer apply to the switch? (Choose two.)

Options:

A.

SW1(config)#enable secret ccnaTest123

B.

SW1(config)#username NEW secret R3mote123

C.

SW1(config)#line vty 0 15 SW1(config-line)#transport input ssh

D.

SW1(config)# crypto key generate rsa

E.

SW1(config)# interface f0/1 SW1(config-if)# switchport mode trunk

Buy Now
Questions 162

Refer to the exhibit.

PC1 regularly sends 1800 Mbps of traffic to the server. A network engineer needs to configure the EtherChannel to disable Port Channel 1 between SW1 and SW2 when the Ge0/0 and Ge0/1 ports on SW2 go down. Which configuration must the engineer apply to the switch?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 163

What is the role of nonoverlapping channels in a wireless environment?

Options:

A.

to reduce interference

B.

to allow for channel bonding

C.

to stabilize the RF environment

D.

to increase bandwidth

Buy Now
Questions 164

Refer to the exhibit.

An engineer assigns IP addressing to the current VLAN with three PCs. The configuration must also account for the expansion of 30 additional VLANS using the same Class C subnet for subnetting and host count. Which command set fulfills the request while reserving address space for the expected growth?

Options:

A.

Switch(config)#interface vlan 10Switch(config-if)#ip address 192.168.0.1 255.255.255.252

B.

Switch(config)#interface vlan 10Switch(config-if)#ip address 192.168.0.1 255.255.255.248

C.

Switch(config)#interface vlan 10Switch(config-if)#ip address 192.168.0.1 255.255.255.0

D.

Switch(config)#interface vlan 10Switch(config-if)#ip address 192.168.0.1 255.255.255.128

Buy Now
Questions 165

Refer to the exhibit.

Rapid PVST+ mode is on the same VLAN on each switch. Which switch becomes the root bridge and why?

Options:

A.

SW2, because its MAC address is the highest

B.

SW3, because its priority is the highest

C.

SW4, because its priority is highest and its MAC address is lower

D.

SW1, because its priority is the lowest and its MAC address is higher

Buy Now
Questions 166

What is a function of an endpoint?

Options:

A.

It is used directly by an individual user to access network services

B.

It passes unicast communication between hosts in a network

C.

It transmits broadcast traffic between devices in the same VLAN

D.

It provide security between trusted and untrusted sections of the network.

Buy Now
Questions 167

The clients and DHCP server reside on different subnets. Which command must be used to forward requests and replies between clients on the 10.10.0.1/24 subnet and the DHCP server at 192.168.10.1?

Options:

A.

ip route 192.168.10.1

B.

ip default-gateway 192.168.10.1

C.

ip helper-address 192.168.10.1

D.

ip dhcp address 192.168.10.1

Buy Now
Questions 168

Under which condition is TCP preferred over UDP?

Options:

A.

UDP is used when low latency is optimal, and TCP is used when latency is tolerable.

B.

TCP is used when dropped data is more acceptable, and UDP is used when data is accepted out- of-order.

C.

TCP is used when data reliability is critical, and UDP is used when missing packets are acceptable.

D.

UDP is used when data is highly interactive, and TCP is used when data is time-sensitive.

Buy Now
Questions 169

Which syslog severity level is considered the most severe and results in the system being considered unusable?

Options:

A.

Alert

B.

Error

C.

Emergency

D.

Critical

Buy Now
Questions 170

Refer to the exhibit.

What is represented by the word " switch’’ in line 2 of the JSON schema?

Options:

A.

array

B.

key

C.

value

D.

object

Buy Now
Questions 171

Refer to the exhibit.

A network engineer executes the show ip route command on router D. What is the next hop to network 192.168.1.0/24 and why?

Options:

A.

The next hop is 10.0.2.1 because it uses distance vector routing

B.

The next hop is 10.0.2.1 because it is a link-state routing protocol

C.

The next hop is 10.0.0.1 because it has a better administrative distance

D.

The next hop is 10.0.0.1 because it has a higher metric.

Buy Now
Questions 172

Which channel-group mode must be configuredd when multiple distribution interfaces connected to a WLC are bundled?

Options:

A.

Channel-group mode passive.

B.

Channel-group mode on.

C.

Channel-group mode desirable.

D.

Channel-group mode active.

Buy Now
Questions 173

Which two server types support domain name to IP address resolution? (Choose two >

Options:

A.

ESX host

B.

resolver

C.

web

D.

file transfer

E.

authentication

Buy Now
Questions 174

A packet from a company s branch office is destined to host 172.31.0.1 at headquarters. The sending router has three possible matches in its routing table for the packet prefixes: 172.31.0.0/16, 172.31.0.0/24, and 172.31.0.0/25. How does the router handle the packet?

Options:

A.

It sends the traffic via prefix 172.31.0.0/16

B.

It sends the traffic via the default gateway 0.0.0.0/0.

C.

It sends the traffic via prefix 172.31.0.0/24

D.

It sends the traffic via prefix 172.31.0.0/25

Buy Now
Questions 175

What is a benefit of using private IPv4 addressing?

Options:

A.

Multiple companies can use the same addresses without conflicts.

B.

Direct connectivity is provided to internal hosts from outside an enterprise network.

C.

Communication to the internet Is reachable without the use of NAT.

D.

All external hosts are provided with secure communication to the Internet.

Buy Now
Questions 176

NO: 346

What must a network administrator consider when deciding whether to configure a new wireless network with APs in autonomous mode or APs running in cloud-based mode?

Autonomous mode APs are less dependent on an underlay but more complex to maintain than APs in cloud-based mode.

Cloud-based mode APs rely on underlays and are more complex to maintain than APs in autonomous mode.

Options:

A.

Cloud-based mode APs are easy to deploy but harder to automate than APs in autonomous mode.

B.

Autonomous mode APs are easy to deploy and automate than APs in cloud-based mode.

Buy Now
Questions 177

Refer to the exhibit.

Which two values does router R1 use to determine the best path to reach destinations in network 10.0.0.0/8? (Choose two.)

Options:

A.

longest prefix match

B.

highest administrative distance

C.

highest metric

D.

lowest metric

E.

lowest cost to reach the next hop

Buy Now
Questions 178

What are two reasons a switch experiences frame flooding? (Choose two.)

Options:

A.

A defective patch cable is connected to the switch port

B.

Topology changes are occurring within spanning-tree

C.

An aged MAC table entry is causing excessive updates

D.

Port-security is configured globally

E.

The forwarding table has overflowed

Buy Now
Questions 179

What is the definition of backdoor malware?

Options:

A.

malicious code that is installed onto a computer to allow access by an unauthorized user

B.

malicious code with the main purpose of downloading other malicious code

C.

malicious program that is used to launch other malicious programs

D.

malicious code that infects a user machine and then uses that machine to send spam

Buy Now
Questions 180

Refer to the exhibit.

R1 has just received a packet from host A that is destined to host B. Which route in the routing table is used by R1 to reach host B?

Options:

A.

10.10.13.0/25 [108/0] via 10.10.10.10

B.

10.10.13.0/25 [110/2] via 10.10.10.2

C.

10.10.13.0/25 [110/2] via 10.10.10.6

D.

10.10.13.0/25 [1/0] via 10.10.10.2

Buy Now
Questions 181

Which cipher is supported for wireless encryption only with the WPA2 standard?

Options:

A.

AES256

B.

AES

C.

RC4

D.

SHA

Buy Now
Questions 182

Refer the exhibit.

What is the cause of poor performance on router R19?

Options:

A.

excessive collisions

B.

speed and duplex mismatch

C.

port oversubscription

D.

excessive CRC errors

Buy Now
Questions 183

Drag and drop the IPv6 address types from the left onto their description on the right.

Options:

Buy Now
Questions 184

Which advantage does the network assurance capability of Cisco DNA Center provide over traditional campus management?

Options:

A.

Cisco DNA Center correlates information from different management protocols to obtain insights, and traditional campus management requires manual analysis.

B.

Cisco DNA Center handles management tasks at the controller to reduce the load on infrastructure devices, and traditional campus management uses the data backbone.

C.

Cisco DNA Center leverages YANG and NETCONF to assess the status of fabric and nonfabric devices, and traditional campus management uses CLI exclusively.

D.

Cisco DNA Center automatically compares security postures among network devices, and traditional campus management needs manual comparisons.

Buy Now
Questions 185

Which encryption method is used by WPA3?

Options:

A.

PSK

B.

TKIP

C.

SAE

D.

AES

Buy Now
Questions 186

Refer to the exhibit.

What is the prefix length for the route that router1 will use to reach host A?

Options:

A.

/25

B.

/27

C.

/28

D.

/29

Buy Now
Questions 187

Refer to the exhibit. An engineer is using the Cisco WLC GUI to configure a WLAN for WPA2 encryption with AES and pre-shared key Cisc0123456. After the engineer selects the WPA + WPA2 option froin the Layer 2 Security drop-down, which two tasks must they perform to complete the process? (Choose two)

Options:

A.

Select the WPA2 Policy and AES check boxes

B.

Select ASCII froin the PSK Format drop-down list, enter the key, and leave the Auth Key Mgmt setting blank

C.

Select the WPA2 Policy, AES, and TKIP check boxes

D.

Select CCKM for the Auth Key Mgmt drop-down list, set the PSK Format to Hex, and enter the key

E.

Select PSK froin the Auth Key Mgmt drop-down list, set the PSK Format to ASCII, and enter the key

Buy Now
Questions 188

Refer to the exhibit Routers R1 R2 and R3 use a protocol to identify their neighbors ' IP addresssses hardware platforms, and software versions. A network engineer must configure R2 to avoid sharing any neighbor information with R3, and maintain its relationship with R1. What action meets this requirement?

Options:

A.

Configure the no cdp enable command on gO/2.

B.

Configure the no cdp run command globally.

C.

Configure the no lldp run command globally.

D.

Configure the no lldp receive command on gQV1.

Buy Now
Questions 189

What is the function of generative AI in network operations?

Options:

A.

It disables unused services.

B.

It deploys network firmware updates.

C.

It creates synthetic network configurations.

D.

It computes optimal data storage solutions.

Buy Now
Questions 190

Which key function is provided by the data plane?

Options:

A.

Making routing decisions

B.

Originating packets

C.

Forwarding traffic to the next hop

D.

Exchanging routing table data

Buy Now
Questions 191

Drag and drop the IPv4 network subnets from the left onto the correct usable host ranges on the right

Options:

Buy Now
Questions 192

Refer to the exhibit.

An extended ACL has been configured and applied to router R2 The configuration failed to work as intended Which two

changes stop outbound traffic on TCP ports 25 and 80 to 10.0.20 0 26 from the 10.0.10 0/26 subnet while still allowing all other traffic? (Choose

two )

Options:

A.

Add a " permit ip any any " statement to the beginning of ACL 101 for allowed traffic.

B.

Add a " permit ip any any " statement at the end of ACL 101 for allowed traffic

C.

The source and destination IPs must be swapped in ACL 101

D.

The ACL must be configured the Gi0/2 interface inbound on R1

E.

The ACL must be moved to the Gi0/1 interface outbound on R2

Buy Now
Questions 193

What causes a port to be placed in the err-disabled state?

Options:

A.

latency

B.

port security violation

C.

shutdown command issued on the port

D.

nothing plugged into the port

Buy Now
Questions 194

What is a similarity between OM3 and OM4 fiber optic cable?

Options:

A.

Both have a 50 micron core diameter

B.

Both have a 9 micron core diameter

C.

Both have a 62.5 micron core diameter

D.

Both have a 100 micron core diameter

Buy Now
Questions 195

In which two ways does a password manager reduce the chance of a hacker stealing a users password? (Choose two.)

Options:

A.

It automatically provides a second authentication factor that is unknown to the original user.

B.

It uses an internal firewall to protect the password repository from unauthorized access.

C.

It protects against keystroke logging on a compromised device or web site.

D.

It stores the password repository on the local workstation with built-in antivirus and anti-malware functionality

E.

It encourages users to create stronger passwords.

Buy Now
Questions 196

Which interface IP addressss serves as the tunnel source for CAPWAP packets froin the WLC to an AP?

Options:

A.

service

B.

trunk

C.

AP-manager

D.

virtual AP connection

Buy Now
Questions 197

Refer to the exhibit. A network engineer is adding another physical interface as a new member to the existing Port-Channel1 bundle.

Which command set must be configured on the new interface to complete the process?

Options:

A.

switchport mode trunk channel-group 1 mode active

B.

no switchport channel-group 1 mode active

C.

no switchport channel-group 1 mode on

D.

switchport switchport mode trunk

Buy Now
Questions 198

Refer to the exhibit.

An engineer must document all Wi-Fi services on a new wirelesss LAN controller. The Wi-Fi SSID " Office_WLan " has Layer 2 Security. What is determined by this configuration?

Options:

A.

There is a strong mutual authentication used between NAC and the network devices using x.509 standard.

B.

There is an extra layer of security that ensures only authorized devices with known MAC addressses connect to the network.

C.

There is a robust security mechanism configured to protect against various Layer 2 and Layer 3 attacks.

D.

There is Galois cache algorithm configured that provides strong encryption and authentication.

Buy Now
Questions 199

Which command creates a static NAT binding for a PC addresss of 10.1.1.1 to the public routable addresss 209.165.200.225 assigned to the PC?

Options:

A.

R1(config)#ip nat inside source static 10.1.1.1 209.165.200.225

B.

R1(config)#ip nat inside source static 209.165.200.225 10.1.1.1

C.

R1(config)#ip nat outside source static 10.1.1.1 209.165.200.225

D.

R1(config)#ip nat outside source static 209.165.200.225 10.1.1.1

Buy Now
Questions 200

Refer to the exhibit.

An engineer configures interface fa0/1 on SW1 and SW2 to pass traffic from two different VLANs. For security reasons, company policy requires the native VLAN to be set to a nondefault value. Which configuration meets this requirement?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 201

Refer to the exhibit.

What does route 10.0.1.3/32 represent in the routing table?

Options:

A.

a single destination addresss

B.

the source 10.0.1.100

C.

all hosts in the 10.0.1.0 subnet

D.

the 10.0.0.0 network

Buy Now
Questions 202

Refer to the exhibit. The My_WLAN wirelesss LAN was configured with WPA2 Layer 2 PSK security. Which additional configuration must the administrator perform to allow users to connect to this WKAN on a different subnet called Data?

Options:

A.

Enable Broadcast SSID and select data froin the Interface/Interface Group drop-down list.

B.

Enable Status and select data froin the Interface/Interface Group drop-down list.

C.

Enable Status and set the NAS-ID to data.

D.

Enable Status and enable Broadcast SSID.

Buy Now
Questions 203

A switch is forwarding a frame out of all interfaces except the interface that received the frame. What is the technical term for this process?

Options:

A.

ARP

B.

Multicast

C.

CDP

D.

Flooding

Buy Now
Questions 204

Which technology allows multiple operating systems to run a single physical server?

Options:

A.

Containers

B.

Cloud computing

C.

Application hosting

D.

Virtualization

Buy Now
Questions 205

Which EtherChannel mode must be configured when using LAG on a WLC?

Options:

A.

on

B.

active

C.

auto

D.

passive

Buy Now
Questions 206

Refer to the exhibit. A network engineer must configure the CPE router to allow computers in the 172.20.1.0/24 network to obtain their IP configurations froin the central DHCP server. Which configuration must the engineer apply to the CPE?

Options:

A.

interface GigabitEthernet0/1ip helper-addresss 172.20.254.1

B.

interface GigabitEthernet0/0ip helper-addresss 172.20.1.1

C.

interface GigabitEthernet0/0ip helper-addresss 172.20.255.1

D.

interface GigabitEthernet0/ip helper-addresss 172.20.255.11

Buy Now
Questions 207

What is a DHCP client?

Options:

A.

a server that dynamically assigns IP addresssses to hosts

B.

a router that statically assigns IP addresssses to hosts

C.

a host that is configured to request an IP addressss automatically

D.

a workstation that requests a domain name associated with its IP addressss

Buy Now
Questions 208

Which IPsec mode encapsulates the entire IP packet?

Options:

A.

tunnel

B.

Q-in-Q

C.

SSL VPN

D.

transport

Buy Now
Questions 209

A default route must be configured to temporarily use a local broadband modem with the IP addressss of 192.168.1.1 until a WAN circuit is installed. The WAN circuit will use an external routing protocol that exchanges network prefixes between two separate autonomous systems on the Internet. Only a default route will be received by the ISP Which configuration must be applied to allow the new WAN circuit to take precedence when It Is In place?

Options:

A.

Ip route 0.0.0.0 0.0.0.0 192.168.1.1

B.

Ip route 0.0.0.0 0.0.0.0 192.168.1.1 25

C.

Ip route 0.0.0.0 0.0.0.0 192.168.1.1 track 1

D.

Ip route 0.0.0.0 0.0.0.0 192.168.1.1 20

Buy Now
Questions 210

A network engineer starts to implement a new wirelesss LAN by configuring the authentication server and creating the dynamic Interface. What must be performed next to complete the basic configuration?

Options:

A.

Install the management interface and add the management IP.

B.

Configure high availability and redundancy tor the access points.

C.

Enable Telnet and RADIUS access on the management interface.

D.

Create the new WLAN and bind the dynamic interface to It.

Buy Now
Questions 211

Refer to the exhibit.

PC A and the file server. Which command must be configured on switch A to prevent interruption of other communications?

Options:

A.

switch port trunk allowed vlan 12

B.

switchport trunk allowed vlan none

C.

switchport trunk allowed vlan add 13

D.

switch port trunk allowed vlan remove 10-11

Buy Now
Questions 212

What are two benefits of network automation? (Choose two.)

Options:

A.

Faster changes with more reliable results

B.

Reduced operational costs

C.

Fewer network failures

D.

Reduced hardware footprint

E.

Increased network security

Buy Now
Questions 213

Drag and drop the TCP and UDP characteristics froin the left onto the supporting protocols on the right. Not all options are used.

Options:

Buy Now
Questions 214

How is Al used to identify issues within network traffic?

Options:

A.

II exclusively predicts device malfunctions.

B.

It enhances data packet delivery speeds.

C.

It simplifies traffic route mapping.

D.

It analyzes patterns for anomaly detection.

Buy Now
Questions 215

Refer to the exhibit.

A new VLAN and switch are added to the network. A remote engineer configures OldSwitch and must ensure that the configuration meets these requirements:

• accommodates current configured VLANs

• expands the range to include VLAN 20

• allows for IEEE standard support for virtual LANs

Which configuration on the NewSwitch side of the link meets these requirements?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 216

Refer to the exhibit. Clients on the WLAN are required to use 802.11r. What action must be taken to meet the requirement?

Options:

A.

Set the Fast Transition option to Enable and enable FT 802.1X under Authentication Key Management

B.

Set the Fast Transition option and the WPA gik-randomize State to disable

C.

Under Protected Management Frames, set the PMF option to Required

D.

Enable CCKM under Authentication Key Management

Buy Now
Questions 217

Refer to the exhibit. The Wi-Fi SSID " Office_WLAN " has Layer 2 Security configured with MAC filtering enabled. What additional security is provided by this specific feature?

Options:

A.

There is an extra layer of security that ensures only authorized devices with known MAC addressses connect to the network

B.

There is strong mutual authentication used between NAC and the network devices using X.509 standard

C.

All data frames exchanged between the client and the access point are encrypted

D.

There is a Galcis cache algorithm configured that provides strong encryption and authentication

Buy Now
Questions 218

Drag and drop the statements about access-point modes from the left onto the corresponding modes on the right.

Options:

Buy Now
Questions 219

Refer to the exhibit.

How many JSON objects are presented?

Options:

A.

1

B.

2

C.

3

D.

4

Buy Now
Questions 220

Refer to the exhibit.

Which action by the router when a packet is sourced from 10.10.10.2 and destined 10.10.10.16?

Options:

A.

It queues the packets waiting for the route to be learned.

B.

It floods packets to all learned next hops.

C.

It discards the packets.

D.

It uses a route that is similar to the destination address.

Buy Now
Questions 221

Which security method is used to prevent man-in-the-middle attack?

Options:

A.

authorization

B.

authentication

C.

anti-replay

D.

accounting

Buy Now
Questions 222

A router has two static routes to the same destination network under the same OSPF process. How does the router forward packets to the destination if the next-hop devices are different?

Options:

A.

The router chooses the route with the oldest age.

B.

The router load-balances traffic over all routes to the destination.

C.

The router chooses the next hop with the lowest MAC address.

D.

The router chooses the next hop with the lowest IP address.

Buy Now
Questions 223

Refer to the exhibit.

An engineer is configuring a Layer 3 port-channel interface with LACP. The configuration on the first device is complete, and it is verified that both interfaces have registered the neighbor device in the CDP table. Which task on the neighbor device enables the new port channel to come up without negotiating the channel?

Options:

A.

Change the EtherChannel mode on the neighboring interfaces to auto.

B.

Configure the IP address of the neighboring device.

C.

Bring up the neighboring interfaces using the no shutdown command.

D.

Modify the static EtherChannel configuration of the device to passive mode.

Buy Now
Questions 224

An engineer is configuring a switch port that is connected to a VoIP handset. Which command must the engineer configure to enable port security with a manually assigned MAC address of abcd.abcd.abcd on voice VLAN 4?

Options:

A.

switchport port-security mac-address abcd.abcd.abcd

B.

switchport port-security mac-address abed.abed.abed vlan 4

C.

switchport port-security mac-address sticky abcd.abcd.abcd vlan 4

D.

switchport port-security mac-address abcd.abcd.abcd vlan voice

Buy Now
Questions 225

Which action implements physical access control as part of the security program of an organization??

Options:

A.

backing up syslogs at a remote location

B.

configuring a password for the console port

C.

configuring enable passwords on network devices

D.

setting up IP cameras to monitor key infrastructure

Buy Now
Questions 226

Which command configures the Cisco WLC to prevent a serial session with the WLC CLI from being automatical togged out?

Options:

A.

config sessions maxsessions 0

B.

config sessions timeout 0

C.

config serial timeout 0

D.

config serial timeout 9600

Buy Now
Questions 227

Refer to the exhibit. An engineer is building a new Layer 2 LACP EtherChannel between SW1 and SW2. and they executed the given show commands to verify the work Which additional task must be performed so that the switches successfully bundle the second member in the LACP port-channel?

Options:

A.

Configure the switchport trunk allowed vlan 300 command on SW1 port-channel 1

B.

Configure the switchport trunk allowed vlan 300 command on interface Fa0/2 on SW1.

C.

Configure the switchport trunk allowed vlan add 300 command on interface Fa0/2 on SW2.

D.

Configure the switchport trunk allowed vlan add 300 command on SW1 port-channel 1

Buy Now
Questions 228

Drag and drop the TCP/IP protocols from the left onto their primary transmission protocols on the right.

Options:

Buy Now
Questions 229

When a switch receives a frame for an unknown destination MAC address, how is the frame handled?

Options:

A.

broadcast to all ports on the switch

B.

flooded to all ports except the origination port

C.

forwarded to the first available port

D.

inspected and dropped by the switch

Buy Now
Questions 230

To improve corporate security, an organization is planning to implement badge authentication to limit access to the data center. Which element of a security program is being deployed?

Options:

A.

user training

B.

user awareness

C.

vulnerability verification

D.

physical access control

Buy Now
Questions 231

What is the purpose of using First Hop Redundancy Protocol on a specific subnet?

Options:

A.

ensures a loop-free physical topology

B.

filters traffic based on destination IP addressing

C.

sends the default route to the hosts on a network

D.

forwards multicast hello messages between routers

Buy Now
Questions 232

Refer to the exhibit.

A network administrator must permit SSH access to remotely manage routers in a network. The operations team resides on the 10.20.1.0/25 network. Which command will accomplish this task?

Options:

A.

access-list 2699 permit udp 10.20.1.0 0.0.0.255

B.

no access-list 2699 deny tcp any 10.20.1.0 0.0.0.127 eq 22

C.

access-list 2699 permit tcp any 10.20.1.0 0.0.0.255 eq 22

D.

no access-list 2699 deny ip any 10.20.1.0 0.0.0.255

Buy Now
Questions 233

What is the difference regarding reliability and communication type between TCP and UDP?

Options:

A.

TCP is reliable and is a connection-oriented protocol UDP is not reliable and is a connectionless protocol

B.

TCP is not reliable and is a connection-oriented protocol; UDP is reliable and is a connectionless protocol

C.

TCP is not reliable and is a connectionless protocol; UDP is reliable and is a connection-oriented protocol

D.

TCP is reliable and is a connectionless protocol; UDP is not reliable and is a connection-oriented protocol

Buy Now
Questions 234

Which type of information resides on a DHCP server?

Options:

A.

a list of the available IP addresses in a pool

B.

a list of public IP addresses and their corresponding names

C.

usernames and passwords for the end users in a domain

D.

a list of statically assigned MAC addresses

Buy Now
Questions 235

Which two minimum parameters must be configured on an active interface to enable OSPFv2 to operate? (Choose two)

Options:

A.

OSPF area

B.

OSPF MD5 authentication key

C.

IPv6 address

D.

OSPF process ID

E.

OSPF stub flag

Buy Now
Questions 236

What are two southbound APIs? (Choose two)

Options:

A.

OpenFlow

B.

NETCONF

C.

Thrift

D.

CORBA

E.

DSC

Buy Now
Questions 237

Refer to the exhibit.

An engineer configured NAT translations and has verified that the configuration is correct.

Which IP address is the source IP?

Options:

A.

10.4.4.4

B.

10.4.4.5

C.

172.23.103.10

D.

172.23.104.4

Buy Now
Questions 238

What is a function of Wireless LAN Controller?

Options:

A.

register with a single access point that controls traffic between wired and wireless endpoints.

B.

use SSIDs to distinguish between wireless clients.

C.

send LWAPP packets to access points.

D.

monitor activity on wireless and wired LANs

Buy Now
Questions 239

Refer to the exhibit.

which path is used by the router for internet traffic ?

Options:

A.

209.165.200.0/27

B.

10.10.10.0/28

C.

0.0.0.0/0

D.

10.10.13.0/24

Buy Now
Questions 240

Which device performs stateful inspection of traffic?

Options:

A.

firewall

B.

switch

C.

access point

D.

wireless controller

Buy Now
Questions 241

An email user has been lured into clicking a link in an email sent by their company ' s security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?

Options:

A.

Physical access control

B.

Social engineering attack

C.

brute force attack

D.

user awareness

Buy Now
Questions 242

Drag and drop the SNMP manager and agent identifier commands from the left onto the functions on the right

Options:

Buy Now
Questions 243

Refer to the exhibit.

Which type of route does R1 use to reach host 10.10.13.10/32?

Options:

A.

floating static route

B.

host route

C.

default route

D.

network route

Buy Now
Questions 244

Which network allows devices to communicate without the need to access the Internet?

Options:

A.

172.9.0.0/16

B.

172.28.0.0/16

C.

192.0.0.0/8

D.

209.165.201.0/24

Buy Now
Questions 245

Which IPv6 address block sends packets to a group address rather than a single address?

Options:

A.

2000::/3

B.

FC00::/7

C.

FE80::/10

D.

FF00::/8

Buy Now
Questions 246

Refer to the exhibit.

An access list is required to permit traffic from any host on interface G0/0 and deny traffic from interface G/0/1. Which access list must be applied?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 247

What is a network appliance that checks the state of a packet to determine whether the packet is legitimate?

Options:

A.

Layer 2 switch

B.

load balancer

C.

firewall

D.

LAN controller

Buy Now
Questions 248

Refer to the exhibit.

Which switch in this configuration will be elected as the root bridge?

Options:

A.

SW1

B.

SW2

C.

SW3

D.

SW4

Buy Now
Questions 249

A network engineer must configure the router R1 GigabitEthernet1/1 interface to connect to the router R2 GigabitEthernet1/1 interface. For the configuration to be applied the engineer must compress the address 2001:0db8:0000:0000:0500:000a:400F:583B. Which command must be issued on the interface?

Options:

A.

ipv6 address 2001:0db8::5: a: 4F 583B

B.

ipv6 address 2001:db8::500:a:400F:583B

C.

ipv6 address 2001 db8:0::500:a:4F:583B

D.

ipv6 address 2001::db8:0000::500:a:400F:583B

Buy Now
Questions 250

What is a function of TFTP in network operations?

Options:

A.

transfers a backup configuration file from a server to a switch using a username and password

B.

transfers files between file systems on a router

C.

transfers a configuration files from a server to a router on a congested link

D.

transfers IOS images from a server to a router for firmware upgrades

Buy Now
Questions 251

Refer to the exhibit.

Which configuration issue is preventing the OSPF neighbor relationship from being established between the two routers?

Options:

A.

R2 is using the passive-interface default command

B.

R1 has an incorrect network command for interface Gi1/0

C.

R2 should have its network command in area 1

D.

R1 interface Gil/0 has a larger MTU size

Buy Now
Questions 252

Which action does the router take as it forwards a packet through the network?

Options:

A.

The router replaces the original source and destination MAC addresses with the sending router MAC address as the source and neighbor MAC address as the destination

B.

The router encapsulates the original packet and then includes a tag that identifies the source router MAC address and transmits it transparently to the destination

C.

The router encapsulates the source and destination IP addresses with the sending router IP address as the source and the neighbor IP address as the destination

D.

The router replaces the source and destination labels with the sending router interface label as a source and the next hop router label as a destination

Buy Now
Questions 253

Refer to the exhibit.

Only four switches are participating in the VLAN spanning-tree process.

Branch-1 priority 614440

Branch-2: priority 39082416

Branch-3: priority 0

Branch-4: root primary

Which switch becomes the permanent root bridge for VLAN 5?

Options:

A.

Branch-1

B.

Branch-2

C.

Branch-3

D.

Branch-4

Buy Now
Questions 254

If a switch port receives a new frame while it is actively transmitting a previous frame, how does it process the frames?

Options:

A.

The new frame is delivered first, the previous frame is dropped, and a retransmission request is sent.

B.

The previous frame is delivered, the new frame is dropped, and a retransmission request is sent.

C.

The new frame is placed in a queue for transmission after the previous frame.

D.

The two frames are processed and delivered at the same time.

Buy Now
Questions 255

Drag and drop the statement about networking from the left into the Corresponding networking types on the right. Not all statements are used.

Options:

Buy Now
Questions 256

Refer to the exhibit.

Which action is expected from SW1 when the untagged frame is received on the GigabitEthernet0/1 interface?

Options:

A.

The frame is processed in VLAN 5.

B.

The frame is processed in VLAN 11

C.

The frame is processed in VLAN 1

D.

The frame is dropped

Buy Now
Questions 257

Which two primary drivers support the need for network automation? (Choose two.)

Options:

A.

Eliminating training needs

B.

Increasing reliance on self-diagnostic and self-healing

C.

Policy-derived provisioning of resources

D.

Providing a ship entry point for resource provisioning

E.

Reducing hardware footprint

Buy Now
Questions 258

Router A learns the same route from two different neighbors, one of the neighbor routers is an OSPF neighbor and the other is an EIGRP neighbor. What is the administrative distance of the route that will be installed in the routing table?

Options:

A.

20

B.

90

C.

110

D.

115

Buy Now
Questions 259

Which statement correctly compares traditional networks and controller-based networks?

Options:

A.

Only traditional networks offer a centralized control plane

B.

Only traditional networks natively support centralized management

C.

Traditional and controller-based networks abstract policies from device configurations

D.

Only controller-based networks decouple the control plane and the data plane

Buy Now
Questions 260

Refer to Exhibit.

An engineer is configuring the NEW York router to reach the Lo1 interface of the Atlanta router using interface Se0/0/0 as the primary path. Which two commands must be configured on the New York router so that it can reach the Lo1 interface of the Atlanta router via Washington when the link between New York and Atlanta goes down? (Choose two)

Options:

A.

ipv6 router 2000::1/128 2012::1

B.

ipv6 router 2000::1/128 2012::1 5

C.

ipv6 router 2000::1/128 2012::2

D.

ipv6 router 2000::1/128 2023::2 5

E.

ipv6 router 2000::1/128 2023::3 5

Buy Now
Questions 261

What is the same for both copper and fiber interfaces when using SFP modules?

Options:

A.

They support an inline optical attenuator to enhance signal strength

B.

They provide minimal interruption to services by being hot-swappable

C.

They offer reliable bandwidth up to 100 Mbps in half duplex mode

D.

They accommodate single-mode and multi-mode in a single module

Buy Now
Questions 262

How does the dynamically-learned MAC address feature function?

Options:

A.

The CAM table is empty until ingress traffic arrives at each port

B.

Switches dynamically learn MAC addresses of each connecting CAM table.

C.

The ports are restricted and learn up to a maximum of 10 dynamically-learned addresses

D.

It requires a minimum number of secure MAC addresses to be filled dynamically

Buy Now
Questions 263

Which configuration is needed to generate an RSA key for SSH on a router?

Options:

A.

Configure the version of SSH

B.

Configure VTY access.

C.

Create a user with a password.

D.

Assign a DNS domain name

Buy Now
Questions 264

Refer to the exhibit.

An engineer deploys a topology in which R1 obtains its IP configuration from DHCP. If

the switch and DHCP server configurations are complete and correct. Which two sets of commands must be configured on R1 and R2 to complete the task? (Choose two)

Options:

A.

R1(config)# interface fa0/0R1(config-if)# ip helper-address 198.51.100.100

B.

R2(config)# interface gi0/0R2(config-if)# ip helper-address 198.51.100.100

C.

R1(config)# interface fa0/0R1(config-if)# ip address dhcpR1(config-if)# no shutdown

D.

R2(config)# interface gi0/0R2(config-if)# ip address dhcp

E.

R1(config)# interface fa0/0R1(config-if)# ip helper-address 192.0.2.2

Buy Now
Questions 265

How do traditional campus device management and Cisco DNA Center device management differ in regards to deployment?

Options:

A.

Cisco DNA Center device management can deploy a network more quickly than traditional campus device management

B.

Traditional campus device management allows a network to scale more quickly than with Cisco DNA Center device management

C.

Cisco DNA Center device management can be implemented at a lower cost than most traditional campus device management options

D.

Traditional campus device management schemes can typically deploy patches and updates more quickly than Cisco DNA Center device management

Buy Now
Questions 266

Which communication interaction takes place when a southbound API Is used?

Options:

A.

between the SDN controller and PCs on the network

B.

between the SON controller and switches and routers on the network

C.

between the SON controller and services and applications on the network

D.

between network applications and switches and routers on the network

Buy Now
Questions 267

What is a difference between RADIUS and TACACS+?

Options:

A.

RADIUS is most appropriate for dial authentication, but TACACS+ can be used for multiple types of authentication

B.

TACACS+ encrypts only password information and RADIUS encrypts the entire payload

C.

TACACS+ separates authentication and authorization, and RADIUS merges them

D.

RADIUS logs all commands that are entered by the administrator, but TACACS+ logs only start, stop, and interim commands

Buy Now
Questions 268

What is a role of access points in an enterprise network?

Options:

A.

connect wireless devices to a wired network

B.

support secure user logins to devices or the network

C.

integrate with SNMP in preventing DDoS attacks

D.

serve as a first line of defense in an enterprise network

Buy Now
Questions 269

Refer to the exhibit.

Which two commands, when configured on router R1, fulfill these requirements? (Choose two.)

Packets towards the entire network 2001:db8:2::/64 must be forwarded through router R2.

Packets toward host 2001:db8:23::14 preferably must be forwarded through R3.

Options:

A.

Ipv6 route 2001:db8:23::/128 fd00:12::2

B.

Ipv6 route 2001:db8:23::14/128 fd00:13::3

C.

Ipv6 route 2001:db8:23::14/64 fd00:12::2

D.

Ipv6 route 2001:db8:23::/64 fd00:12::2

E.

Ipv6 route 2001:db8:23::14/64 fd00:12::2 200

Buy Now
Questions 270

A network analyst is tasked with configure the date and time on a router using EXEC mode. The date must be set to 12:00am. Which command should be used?

Options:

A.

Clock timezone

B.

Clock summer-time-recurring

C.

Clock summer-time date

D.

Clock set

Buy Now
Questions 271

Which HTTP status code is returned after a successful REST API request?

Options:

A.

200

B.

301

C.

404

D.

500

Buy Now
Questions 272

What is a syslog facility?

Options:

A.

Host that is configured for the system to send log messages

B.

password that authenticates a network management system to receive log messages

C.

group of log messages associated with the configured severity level

D.

set of values that represent the processes that can generate a log message

Buy Now
Questions 273

Which type of IPv6 address is publicly routable in the same way as IPv4 public address?

Options:

A.

global unicast

B.

link-local

C.

unique local

D.

multicast

Buy Now
Questions 274

Refer to the exhibit.

A packet is being sent across router R1 to host 172.163.3.14. To which destination does the router send the packet?

Options:

A.

207.165.200.246 via Serial0/1/0

B.

207.165.200.254 via Serial0/0/1

C.

207.165.200.254 via Serial0/0/0

D.

207.165.200.250 via Serial/0/0/0

Buy Now
Questions 275

Refer to Exhibit.

How does SW2 interact with other switches in this VTP domain?

Options:

A.

It processes VTP updates from any VTP clients on the network on its access ports.

B.

It receives updates from all VTP servers and forwards all locally configured VLANs out all trunk ports

C.

It forwards only the VTP advertisements that it receives on its trunk ports.

D.

It transmits and processes VTP updates from any VTP Clients on the network on its trunk ports

Buy Now
Questions 276

After installing a new Cisco ISE server, which task must the engineer perform on the Cisco WLC to connect wireless clients on a specific VLAN based on their credentials?

Options:

A.

Enable the allow AAA Override

B.

Enable the Event Driven RRM.

C.

Disable the LAG Mode or Next Reboot.

D.

Enable the Authorized MIC APs against auth-list or AAA.

Buy Now
Questions 277

What is a characteristic of spine-and-leaf architecture?

Options:

A.

Each device is separated by the same number of hops

B.

It provides variable latency

C.

It provides greater predictability on STP blocked ports.

D.

Each link between leaf switches allows for higher bandwidth.

Buy Now
Questions 278

which IPv6 address block forwards packets to a multicast address rather than a unicast address?

Options:

A.

2000::/3

B.

FC00::/7

C.

FE80::/10

D.

FF00::/12

Buy Now
Questions 279

Which goal is achieved by the implementation of private IPv4 addressing on a network?

Options:

A.

provides an added level of protection against Internet exposure

B.

provides a reduction in size of the forwarding table on network routers

C.

allows communication across the Internet to other private networks

D.

allows servers and workstations to communicate across public network boundaries

Buy Now
Questions 280

Which unified access point mode continues to serve wireless clients after losing connectivity to the Cisco Wireless LAN Controller?

Options:

A.

sniffer

B.

mesh

C.

flexconnect

D.

local

Buy Now
Questions 281

An engineer requires a scratch interface to actively attempt to establish a trunk link with a neighbor switch. What command must be configured?

Options:

A.

switchport mode trunk

B.

switchport mode dynamic desirable

C.

switchport mode dynamic auto

D.

switchport nonegotiate

Buy Now
Questions 282

When the active router in an HSRP group fails, what router assumes the role and forwards packets?

Options:

A.

backup

B.

standby

C.

listening

D.

forwarding

Buy Now
Questions 283

When deploying syslog, which severity level logs informational message?

Options:

A.

0

B.

2

C.

4

D.

6

Buy Now
Questions 284

An engineer must configure an OSPF neighbor relationship between router R1 and R3 The authentication configuration has been configured and the connecting interfaces are in the same 192.168 1.0/30 sublet. What are the next two steps to complete the configuration? (Choose two.)

Options:

A.

configure the helto and dead timers to match on both sides

B.

configure the same process ID for the router OSPF process

C.

configure the same router ID on both routing processes

D.

Configure the interfaces as OSPF active on both sides.

E.

configure both interfaces with the same area ID

Buy Now
Questions 285

An engineer is configuring NAT to translate the source subnet of 10.10.0.0/24 to any of three addresses 192.168.30.1, 192.168.3.2, 192.168.3.3 Which configuration should be used?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 286

Refer to the exhibit.

An engineer configured the New York router with static routes that point to the Atlanta and Washington sites. When command must be configured on the Atlanta and Washington routers so that both sites are able to reach the loopback2 interface on the New York router?

Options:

A.

ipv6 route ::/0 Serial 0/0/1

B.

ipv6 route 0/0 Serial 0/0/0

C.

ipv6 route ::/0 Serial 0/0/0

D.

ip route 0.0.0.0.0.0.0.0 Serial 0/0/0

E.

ipv6 route ::/0 2000::2

Buy Now
Questions 287

Which configuration management mechanism uses TCP port 22 by default when communicating with managed nodes?

Options:

A.

Ansible

B.

Python

C.

Puppet

D.

Chef

Buy Now
Questions 288

What is a function of the Cisco DNA Center Overall Health Dashboard?

Options:

A.

It provides a summary of the top 10 global issues.

B.

It provides detailed activity logging for the 10 devices and users on the network.

C.

It summarizes the operational status of each wireless device on the network.

D.

It summarizes daily and weekly CPU usage for servers and workstations in the network.

Buy Now
Questions 289

Which two must be met before SSH can operate normally on a Cisco IOS switch? (Choose two)

Options:

A.

The switch must be running a k9 (crypto) IOS image

B.

The IP domain-name command must be configured on the switch

C.

IP routing must be enabled on the switch

D.

A console password must be configured on the switch

E.

Telnet must be disabled on the switch

Buy Now
Questions 290

Which 802.11 frame type is indicated by a probe response after a client sends a probe request?

Options:

A.

action

B.

management

C.

control

D.

data

Buy Now
Questions 291

A wireless administrator has configured a WLAN; however, the clients need access to a less congested 5-GHz network for their voice quality. What action must be taken to meet the requirement?

Options:

A.

enable AAA override

B.

enable RX-SOP

C.

enable DTIM

D.

enable Band Select

Buy Now
Questions 292

A network administrator is asked to configure VLANs 2, 3 and 4 for a new implementation. Some ports must be assigned to the new VLANs with unused remaining. Which action should be taken for the unused ports?

Options:

A.

configure port in the native VLAN

B.

configure ports in a black hole VLAN

C.

configure in a nondefault native VLAN

D.

configure ports as access ports

Buy Now
Questions 293

What is the primary function of a Layer 3 device?

Options:

A.

to analyze traffic and drop unauthorized traffic from the Internet

B.

to transmit wireless traffic between hosts

C.

to pass traffic between different networks

D.

forward traffic within the same broadcast domain

Buy Now
Questions 294

What are two characteristics of a public cloud implementation? (Choose two.)

Options:

A.

It is owned and maintained by one party, but it is shared among multiple organizations.

B.

It enables an organization to fully customize how It deploys network resources.

C.

It provides services that are accessed over the Internet.

D.

It Is a data center on the public Internet that maintains cloud services for only one company.

E.

It supports network resources from a centralized third-party provider and privately-owned virtual resources

Buy Now
Questions 295

What are two similarities between UTP Cat 5e and Cat 6a cabling? (Choose two.)

Options:

A.

Both operate at a frequency of 500 MHz.

B.

Both support runs of up to 55 meters.

C.

Both support runs of up to 100 meters.

D.

Both support speeds of at least 1 Gigabit.

E.

Both support speeds up to 10 Gigabit.

Buy Now
Questions 296

What is a characteristic of cloud-based network topology?

Options:

A.

wireless connections provide the sole access method to services

B.

onsite network services are provided with physical Layer 2 and Layer 3 components

C.

services are provided by a public, private, or hybrid deployment

D.

physical workstations are configured to share resources

Buy Now
Questions 297

The service password-encryption command is entered on a router. What is the effect of this configuration?

Options:

A.

restricts unauthorized users from viewing clear-text passwords in the running configuration

B.

encrypts the password exchange when a VPN tunnel is established

C.

prevents network administrators from configuring clear-text passwords

D.

protects the VLAN database from unauthorized PC connections on the switch

Buy Now
Questions 298

On workstations running Microsoft Windows, which protocol provides the default gateway for the device?

Options:

A.

DHCP

B.

STP

C.

SNMP

D.

DNS

Buy Now
Questions 299

Refer to the exhibit.

What action establishes the OSPF neighbor relationship without forming an adjacency?

Options:

A.

modify helto interval

B.

modify process ID

C.

modify priority

D.

modify network type

Buy Now
Questions 300

Drag the descriptions of IP protocol transmissions from the left onto the IP traffic types on the right.

Options:

Buy Now
Questions 301

A Cisco IP phone receive untagged data traffic from an attached PC. Which action is taken by the phone?

Options:

A.

It allows the traffic to pass through unchanged

B.

It drops the traffic

C.

It tags the traffic with the default VLAN

D.

It tags the traffic with the native VLAN

Buy Now
Questions 302

What is the function of a controller in controller-based networking?

Options:

A.

It serves as the centralized management point of an SDN architecture.

B.

It centralizes the data plane for the network.

C.

It is the card on a core router that maintains all routing decisions for a campus.

D.

It is a pair of core routers that maintain all routing decisions for a campus

Buy Now
Questions 303

Refer to the exhibit.

Based on the LACP neighbor status, in which mode is the SW1 port channel configured?

Options:

A.

passive

B.

mode on

C.

auto

D.

active

Buy Now
Questions 304

Refer to Exhibit.

Which configuration must be applied to the router that configures PAT to translate all addresses in VLAN 200 while allowing devices on VLAN 100 to use their own IP addresses?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 305

What is a characteristic of private IPv4 addressing?

Options:

A.

traverse the Internet when an outbound ACL is applied

B.

issued by IANA in conjunction with an autonomous system number

C.

composed of up to 65.536 available addresses

D.

used without tracking or registration

Buy Now
Questions 306

What makes Cisco DNA Center different from traditional network management applications and their management of networks?

Options:

A.

It omits supports auto-discovery of network elements in a greenfield deployment.

B.

It modular design allows someone to implement different versions to meet the specific needs of an organization

C.

It abstracts policy from the actual device configuration

D.

It does not support high availability of management functions when operating in cluster mode

Buy Now
Questions 307

What role does a hypervisor provide for each virtual machine in server virtualization?

Options:

A.

infrastructure-as-a-service.

B.

Software-as-a-service

C.

control and distribution of physical resources

D.

services as a hardware controller.

Buy Now
Questions 308

Refer to the exhibit.

Router R2 is configured with multiple routes to reach network 10 1.1 0/24 from router R1. What protocol is chosen by router R2 to reach the destination network 10.1 1 0/24?

Options:

A.

eBGP

B.

static

C.

OSPF

D.

EIGRP

Buy Now
Questions 309

Refer to the exhibit.

An administrator is tasked with configuring a voice VLAN. What is the expected outcome when a Cisco phone is connected to the GigabitEthernet3/1/4 port on a switch?

Options:

A.

The phone and a workstation that is connected to the phone do not have VLAN connectivity

B.

The phone and a workstation that is connected to the phone send and receive data in VLAN 50.

C.

The phone sends and receives data in VLAN 50, but a workstation connected to the phone has no VLAN connectivity

D.

The phone sends and receives data in VLAN 50, but a workstation connected to the phone sends and receives data in VLAN 1

Buy Now
Questions 310

Refer to the exhibit.

Which two prefixes are included in this routing table entry? (Choose two.)

Options:

A.

192.168.1.17

B.

192.168.1.61

C.

192.168.1.64

D.

192.168.1.127

E.

192.168.1.254

Buy Now
Questions 311

Physical connectivity is implemented between the two Layer 2 switches, and the network connectivity between them must be configured

1. Configure an LACP EtherChannel and number it as 1; configure it between switches SW1 and SVV2 using interfaces Ethernet0/0 and Ethernet0/1 on both sides. The LACP mode must match on both ends

2 Configure the EtherChannel as a trunk link.

3. Configure the trunk link with 802.1 q tags.

4. Configure the native VLAN of the EtherChannel as VLAN 15.

Options:

Buy Now
Questions 312

Three switches must be configured for Layer 2 connectivity. The company requires only the designated VLANs to be configured on their respective switches and permitted accross any links between switches for security purposes. Do not modify or delete VTP configurations.

The network needs two user-defined VLANs configured:

VLAN 110: MARKETING

VLAN 210: FINANCE

1. Configure the VLANs on the designated switches and assign them as access ports to the interfaces connected to the PCs.

2. Configure the e0/2 interfaces on Sw1 and Sw2 as 802.1q trunks with only the required VLANs permitted.

3. Configure the e0/3 interfaces on Sw2 and Sw3 as 802.1q trunks with only the required VLANs permitted.

Options:

Buy Now
Questions 313

IP connectivity and OSPF are preconfigured on all devices where necessary. Do not make any changes to the IP addressing or OSPF. The company policy uses connected interfaces and next hops when configuring static routes except for load balancing or redundancy without floating static. Connectivity must be established between subnet 172.20.20.128/25 on the Internet and the LAN at 192.168.0.0/24 connected to SW1:

1. Configure reachability to the switch SW1 LAN subnet in router R2.

2. Configure default reachability to the Internet subnet in router R1.

3. Configure a single static route in router R2 to reach to the Internet subnet considering both redundant links between routers R1 and R2. A default route is NOT allowed in router R2.

4. Configure a static route in router R1 toward the switch SW1 LAN subnet where the primary link must be through Ethernet0/1. and the backup link must be through Ethernet0/2 using a floating route. Use the minimal administrative distance value when required.

Options:

Buy Now
Questions 314

All physical cabling is in place. Router R4 and PCI are fully configured and

inaccessible. R4 ' s WAN interfaces use .4 in the last octet for each subnet.

Configurations should ensure that connectivity is established end-to-end.

1 . Configure static routing to ensure RI prefers the path through R2 to

reach only PCI on R4 ' s LAN

2. Configure static routing that ensures traffic sourced from RI will take

an alternate path through R3 to PCI in the event of an outage along

the primary path

3. Configure default routes on RI and R3 to the Internet using the least number of hops

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using

the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Options:

Buy Now
Questions 315

Connectivity between four routers has been established. IP connectivity must be configured in the order presented to complete the implementation. No dynamic routing protocols are included.

1. Configure static routing using host routes to establish connectivity from router R3 to the router R1 Loopback address using the source IP of 209.165.200.230.

2. Configure an IPv4 default route on router R2 destined for router R4.

3. Configure an IPv6 default router on router R2 destined for router R4.

Options:

Buy Now
Questions 316

Physical connectivity is implemented between the two Layer 2 switches,

and the network connectivity between them must be configured.

I . Configure an LACP EtherChanneI and number it as 44; configure it

between switches SWI and SW2 using interfaces EthernetO/O and

Ethernet0/1 on both sides. The LACP mode must match on both ends.

2. Configure the EtherChanneI as a trunk link.

3. Configure the trunk link with 802. Iq tags.

4. Configure VLAN ' MONITORING ' as the untagged VLAN of the

EtherChannel.

==================

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using

the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Options:

Buy Now
Questions 317

Configure IPv4 and IPv6 connectivity between two routers. For IPv4, use a /28 network from the 192.168.1.0/24 private range. For IPv6, use the first /64 subnet from the 2001:0db8:aaaa::/48 subnet.

1. Using Ethernet0/1 on routers R1 and R2, configure the next usable/28 from the 192.168.1.0/24 range. The network 192.168.1.0/28 is unavailable.

2. For the IPv4 /28 subnet, router R1 must be configured with the first usable host address.

3. For the IPv4 /28 subnet, router R2 must be configured with the last usable host address.

4. For the IPv6 /64 subnet, configure the routers with the IP addressing provided from the topology.

5. A ping must work between the routers on the IPv4 and IPv6 address ranges.

Options:

Buy Now
Questions 318

IP connectivity between the three routers is configured. OSPF adjacencies must be established.

1. Configure R1 and R2 Router IDs using the interface IP addresses from the link that is shared between them.

2. Configure the R2 links with a max value facing R1 and R3. R2 must become the DR. R1 and R3 links facing R2 must remain with the default OSPF configuration for DR election. Verify the configuration after clearing the OSPF process.

3. Using a host wildcard mask, configure all three routers to advertise their respective Loopback1 networks.

4. Configure the link between R1 and R3 to disable their ability to add other OSPF routers.

Options:

Buy Now
Questions 319

All physical cabling is in place. A company plans to deploy 32 new sites.

The sites will utilize both IPv4 and IPv6 networks.

1 . Subnet 172.25.0.0/16 to meet the subnet requirements and maximize

the number of hosts

Using the second subnet

• Assign the first usable IP address to e0/0 on Sw1O1

• Assign the last usable IP address to e0/0 on Sw102

2. Subnet to meet the subnet requirements and maximize

the number of hosts

c Using the second subnet

• Assign an IPv6 GUA using a unique 64-Bit interface identifier

on e0/0 on Sw101

• Assign an IPv6 GUA using a unique 64-Bit interface identifier

on eO/O on swi02

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using

the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Options:

Buy Now
Questions 320

Connectivity between three routers has been established, and IP services must be configured jn the order presented to complete the implementation Tasks assigned include configuration of NAT, NTP, DHCP, and SSH services.

1. All traffic sent from R3 to the R1 Loopback address must be configured for NAT on R2. All source addresses must be translated from R3 to the IP address of Ethernet0/0 on R2, while using only a standard access list named NAT To verify, a ping must be successful to the R1 Loopback address sourced from R3. Do not use NVI NAT configuration.

2. Configure R1 as an NTP server and R2 as a client, not as a peer, using the IP address of the R1 Ethernet0/2 interface. Set the clock on the NTP server for midnight on January 1, 2019.

3. Configure R1 as a DHCP server for the network 10.1.3.0/24 in a pool named TEST. Using a single command, exclude addresses 1-10 from the range. Interface Ethernet0/2 on R3 must be issued the IP address of 10.1.3.11 via DHCP.

4. Configure SSH connectivity from R1 to R3, while excluding access via other remote connection protocols. Access for user root and password Cisco must be set on router R3 using RSA and 1024 bits. Verify connectivity using an SSH session from router R1 using a destination address of 10.1.3.11. Do NOT modify console access or line numbers to accomplish this task.

Options:

Buy Now
Questions 321

All physical cabling between the two switches is installed. Configure the network connectivity between the switches using the designated VLANs and interfaces.

1. Configure VLAN 100 named Compute and VLAN 200 named Telephony where required for each task.

2. Configure Ethernet0/1 on SW2 to use the existing VLAN named Available.

3. Configure the connection between the switches using access ports.

4. Configure Ethernet0/1 on SW1 using data and voice VLANs.

5. Configure Ethemet0/1 on SW2 so that the Cisco proprietary neighbor discovery protocol is turned off for the designated interface only.

Options:

Buy Now
Exam Code: 200-301
Exam Name: Implementing and Administering Cisco Solutions (200-301 CCNA) v1.1
Last Update: May 12, 2026
Questions: 1240
200-301 pdf

200-301 PDF

$28.5  $94.99
200-301 Engine

200-301 Testing Engine

$33  $109.99
200-301 PDF + Engine

200-301 PDF + Testing Engine

$43.5  $144.99