option
Questions
ayuda
daypo
search.php

ERASED TEST, YOU MAY BE INTERESTED ON CCNA 200 301_2

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
CCNA 200 301_2

Description:
Prova 2

Author:
AVATAR
Adriano Veiga
Other tests from this author

Creation Date: 10/12/2024

Category: Computers

Number of questions: 100
Share the Test:
New CommentNuevo Comentario
No comments about this test.
Content:
Which purpose does a northbound API serve in a controller-based networking architecture? communicates between the controller and the physical network hardware reports device errors to a controller generates statistics for network hardware and traffic facilitates communication between the controller and the applications.
How do traditional campus device management and Cisco DNA Center device management differ in regards to deployment? Cisco DNA Center device management can be implemented at a lower cost than most traditional campus device management options. Traditional campus device management schemes can typically deploy patches and updates more quickly than Cisco DNA Center device management Cisco DNA Center device management can deploy a network more quickly than traditional campus device management. Traditional campus device management allows a network to scale more quickly than with Cisco DNA Center device management.
What are two fundamentals of virtualization? (Choose two.) It allows multiple operating systems and applications to run independently on one physical server. It allows a physical router to directly connect NICs from each virtual machine into the network. The environment must be configured with one hypervisor that serves solely as a network manager to monitor SNMP traffic. It allows logical network devices to move traffic between virtual machines and the rest of the physical network. It requires that some servers, virtual machines, and network gear reside on the Internet.
What is an advantage of Cisco DNA Center versus traditional campus device management? It supports numerous extensibility options, including cross-domain adapters and third-party SDKs. It enables easy autodiscovery of network elements in a brownfield deployment. It is designed primarily to provide network assurance It supports high availability for management functions when operating in cluster mode.
What occurs to frames during the process of frame flooding? Frames are sent to all ports, including those that are assigned to other VLANs. Frames are sent to every port on the switch that has a matching entry in MAC address table Frames are sent to every port on the switch in the same VLAN except from the originating port. Frames are sent to every port on the switch in the same VLAN.
Which action must be taken to assign a global unicast IPv6 address on an interface that is derived from the MAC address of that interface? explicitly assign a link-local address disable the EUI-64 bit process enable SLAAC on an interface configure a stateful DHCPv6 server on the network.
Several new coverage cells are required to improve the Wi-Fi network of an organization. Which two standard designs are recommended? (Choose two.) 5GHz provides increased network capacity with up to 23 nonoverlapping channels. 5GHz channel selection requires an autonomous access point. Cells that overlap one another are configured to use nonoverlapping channels. Adjacent cells with overlapping channels use a repeater access point For maximum throughput, the WLC is configured to dynamically set adjacent access points to the channel.
How do TCP and UDP differ in the way they provide reliability for delivery of packets? TCP does not guarantee delivery or error checking to ensure that there is no corruption of data, UDP provides message acknowledgement and retransmits data if lost. TCP provides flow control to avoid overwhelming a receiver by sending too many packets at once, UDP sends packets to the receiver in a continuous stream without checking. TCP is a connectionless protocol that does not provide reliable delivery of data; UDP is a connection- oriented protocol that uses sequencing to provide reliable delivery. TCP uses windowing to deliver packets reliably; UDP provides reliable message transfer between hosts by establishing a three-way handshake.
What are two differences between optical-fiber cabling and copper cabling? (Choose two.) A BNC connector is used for fiber connections The glass core component is encased in a cladding The data can pass through the cladding Light is transmitted through the core of the fiber Fiber connects to physical interfaces using RJ-45 connections.
How does CAPWAP communicate between an access point in local mode and a WLC? The access point must not be connected to the wired network, as it would create a loop The access point must be connected to the same switch as the WLC The access point must directly connect to the WLC using a copper cable The access point has the ability to link to any switch in the network, assuming connectivity to the WLC.
What are two descriptions of three-tier network topologies? (Choose two.) The distribution layer runs Layer 2 and Layer 3 technologies The network core is designed to maintain continuous connectivity when devices fail The core layer maintains wired connections for each host The core and distribution layers perform the same functions.
Which type of ipv6 address is publicly routable in the same way as ipv4 public addresses? multicast unique local link-local global unicast.
A corporate office uses four floors in a building - Floor 1 has 24 users. - Floor 2 has 29 users. - Floor 3 has 28 users. - Floor 4 has 22 users. Which subnet summarizes and gives the most efficient distribution of IP addresses for the router configuration? 192.168.0.0/24 as summary and 192.168.0.0/28 for each floor 192.168.0.0/23 as summary and 192.168.0.0/25 for each floor 192.168.0.0/25 as summary and 192.168.0.0/27 for each floor 192.168.0.0/26 as summary and 192.168.0.0/29 for each floor.
Refer to the exhibit. An engineer must add a subnet for a new office that will add 20 users to the network. Which IPv4 network and subnet mask combination does the engineer assign to minimize wasting addresses? 10.10.225.48 255.255.255.240 10.10.225.32 255.255.255.240 10.10.225.48 255.255.255.224 10.10.225.32 255.255.255.224.
What is a characteristic of spine-and-leaf architecture? Each link between leaf switches allows for higher bandwidth. It provides greater predictability on STP blocked ports It provides variable latency Each device is separated by the same number of hops.
Refer to the exhibit. The network administrator wants VLAN 67 traffic to be untagged between Switch 1 and Switch 2, while all other VLANs are to remain tagged. Which command accomplishes this task? switchport access vlan 67 switchport trunk allowed vlan 67 switchport private-vlan association host 67 switchport trunk native vlan 67.
Which two command sequences must be configured on a switch to establish a Layer 3 EtherChannel with an open-standard protocol? (Choose two.) interface GigabitEthernet0/0/1 channel-group 10 mode auto interface GigabitEthernet0/0/1 channel-group 10 mode on interface port-channel 10 no switchport ip address 172.16.0.1 255.255.255.0 interface GigabitEthernet0/0/1 channel-group 10 mode active interface port-channel 10 switchport switchport mode trunk.
Refer to the exhibit. Which two commands were used to create port channel 10? (Choose two.) int range g0/0-1 channel-group 10 mode active int range g0/0-1 channel-group 10 mode desirable int range g0/0-1 channel-group 10 mode passive int range g0/0-1 channel-group 10 mode auto int range g0/0-1 channel-group 10 mode on.
Refer to the exhibit. An administrator is tasked with configuring a voice VLAN. What is the expected outcome when a Cisco phone is connected to the GigabitEthernet 3/1/4 port on a switch? The phone and a workstation that is connected to the phone do not have VLAN connectivity. The phone sends and receives data in VLAN 50, but a workstation connected to the phone sends and receives data in VLAN 1. The phone sends and receives data in VLAN 50, but a workstation connected to the phone has no VLAN connected. The phone and a workstation that is connected to the phone send and receive data in VLAN 50.
Refer to the exhibit. Which action is expected from SW1 when the untagged frame is received on the GigabitEthernet0/1 interface? The frame is processed in VLAN 1 The frame is processed in VLAN 11 The frame is processed in VLAN 5 The frame is dropped.
Refer to the exhibit. What two conclusions should be made about this configuration? (Choose two.) The root port is FastEthernet 2/1 The designated port is FastEthernet 2/1 The spanning-tree mode is PVST+ This is a root bridge The spanning-tree mode is Rapid PVST+ .
A network engineer must create a diagram of a multivendor network. Which command must be configured on the Cisco devices so that the topology of the network can be mapped? Device(config)#lldp run Device(config)#cdp run Device(config-if)#cdp enable Device(config)#flow-sampler-map topology.
How do AAA operations compare regarding user identification, user services, and access control? Authorization provides access control, and authentication tracks user services Authentication identifies users, and accounting tracks user services Accounting tracks user services, and authentication provides access control Authorization identifies users, and authentication provides access control.
What is difference between RADIUS and TACACS+? RADIUS logs all commands that are entered by the administrator, but TACACS+ logs only start, stop, and interim commands. TACACS+ separates authentication and authorization, and RADIUS merges them. TACACS+ encrypts only password information, and RADIUS encrypts the entire payload. RADIUS is most appropriate for dial authentication, but TACACS+ can be used for multiple types of authentication. .
What is a difference between local AP mode and FlexConnect AP mode? Local AP mode creates two CAPWAP tunnels per AP to the WLC Local AP mode causes the AP to behave as if it were an autonomous AP FlexConnect AP mode fails to function if the AP loses connectivity with the WLC FlexConnect AP mode bridges the traffic from the AP to the WLC when local switching is configured.
Refer to the exhibit. Which configuration issue is preventing the OSPF neighbor from being established between the two routers? R1 has an incorrect network command for interface Gi1/0. R2 should have its network command in area 1. R1 interface Gi1/0 has a larger MTU size. R2 is using the passive-interface default command.
QUESTION 227 Refer to the exhibit. Router R1 is running three different routing protocols. Which route characteristic is used by the router to forward the packet that it receives for destination IP 172.16.32.1? longest prefix administrative distance cost metric.
Refer to the exhibit. Router R1 Fa0/0 cannot ping router R3 Fa0/1. Which action must be taken in router R1 to help resolve the configuration issue? set the default gateway as 20.20.20.2 configure a static route with Fa0/1 as the egress interface to reach the 20.20.2.0/24 network configure a static route with 10.10.10.2 as the next hop to reach the 20.20.20.0/24 network set the default network as 20.20.20.0/24.
By default, how does EIGRP determine the metric of a route for the routing table? It uses the bandwidth and delay values of the path to calculate the route metric. It uses a default metric of 10 for all routes that are learned by the router. It counts the number of hops between the receiving and destination routers and uses that value as the metric. It uses a reference bandwidth and the actual bandwidth of the connected link to calculate the route metric.
A packet is destined for 10.10.1.22. Which static route does the router choose to forward the packet? ip route 10.10.1.0 255.255.255.240 10.10.255.1 ip route 10.10.1.20 255.255.255.252 10.10.255.1 ip route 10.10.1.16 255.255.255.252 10.10.255.1 ip route 10.10.1.20 255.255.255.254 10.10.255.1 .
Refer to the exhibit. How does the router manage traffic to 192.168.12.16? It chooses the EIGRP route because it has the lowest administrative distance. It load-balances traffic between all three routes It chooses the OSPF route because it has the longest prefix inclusive of the destination address It selects the RIP route because it has the longest prefix inclusive of the destination address.
What are two reasons for an engineer to configure a floating static route? (Choose two.) to enable fallback static routing when the dynamic routing protocol fails to route traffic differently based on the source IP of the packet to automatically route traffic on a secondary path when the primary path goes down to support load balancing via static routing to control the return path of traffic that is sent from the router.
Refer to the exhibit. How does router R1 handle traffic to 192.168.10.16? It selects the IS-IS route because it has the shortest prefix inclusive of the destination address It selects the RIP route because it has the longest prefix inclusive of the destination address It selects the OSPF route because it has the lowest cost It selects the EIGRP route because it has the lowest administrative distance.
Refer to the exhibit. A router reserved these five routes from different routing information sources. Which two routes does the router install in its routing table? (Choose two) OSPF route 10.0.0.0/30 IBGP route 10.0.0.0/30 OSPF route 10.0.0.0/16 EIGRP route 10.0.0.1/32 RIP route 10.0.0.0/30.
Refer to the exhibit. To which device does Router1 send packets that are destined to host 10.10.13.165? Router2 Router3 Router4 Router5.
R1 has learned route 10.10.10.0/24 via numerous routing protocols. Which route is installed? route with the next hop that has the highest IP route with the lowest cost route with the lowest administrative distance route with the shortest prefix length.
Which two minimum parameters must be configured on an active interface to enable OSPFV2 to operate? (Choose two.) OSPF process ID OSPF MD5 authentication key OSPF stub flag IPv6 address OSPF area.
Refer to the exhibit. What commands are needed to add a subinterface to Ethernet0/0 on R1 to allow for VLAN 20, with IP address 10.20.20.1/24? R1(config)#interface ethernet0/0 R1(config)#encapsulation dot1q 20 R1(config)#ip address 10.20.20.1 255.255.255.0 R1(config)#interface ethernet0/0.20 R1(config)#encapsulation dot1q 20 R1(config)#ip address 10.20.20.1 255.255.255.0 R1(config)#interface ethernet0/0.20 R1(config)#ip address 10.20.20.1 255.255.255.0 R1(config)#interface ethernet0/0 R1(config)#ip address 10.20.20.1 255.255.255.0.
Which function does an SNMP agent perform? It sends information about MIB variables in response to requests from the NMS It manages routing between Layer 3 devices in a network It coordinates user authentication between a network device and a TACACS+ or RADIUS server It requests information from remote network nodes about catastrophic system events .
What are two roles of the Dynamic Host Configuration Protocol (DHCP)? (Choose two.) The DHCP server assigns IP addresses without requiring the client to renew them. The DHCP server leases client IP addresses dynamically. The DHCP client can request up to four DNS server addresses. The DHCP server offers the ability to exclude specific IP addresses from a pool of IP addresses. The DHCP client maintains a pool of IP addresses it can assign.
Which command must be entered when a device is configured as an NTP server? ntp peer ntp master ntp authenticate ntp server.
What event has occurred if a router sends a notice level message to a syslog server? A certificate has expired An interface line has changed status A TCP connection has been torn down An ICMP connection has been built.
Refer to the exhibit. An engineer deploys a topology in which R1 obtains its IP configuration from DHCP. If the switch and DHCP server configurations are complete and correct. Which two sets of commands must be configured on R1 and R2 to complete the task? (Choose two) R1(config)# interface fa0/0 R1(config-if)# ip helper-address 198.51.100.100 R2(config)# interface gi0/0 R2(config-if)# ip helper-address 198.51.100.100 R1(config)# interface fa0/0 R1(config-if)# ip address dhcp R1(config-if)# no shutdown R2(config)# interface gi0/0 R2(config-if)# ip address dhcp R1(config)# interface fa0/0 R1(config-if)# ip helper-address 192.0.2.2.
Refer to the exhibit. What configuration on RTR-1 denies SSH access from PC-1 to any RTR-1 interface and allows all other traffic? Anser.
While examining excessive traffic on the network, it is noted that all incoming packets on an interface appear to be allowed even though an IPv4 ACL is applied to the interface. Which two misconfigurations cause this behavior? (Choose two.) The ACL is empty A matching permit statement is too broadly defined The packets fail to match any permit statement A matching deny statement is too high in the access list A matching permit statement is too high in the access list.
The service password-encryption command is entered on a router. What is the effect of this configuration? restricts unauthorized users from viewing clear-text passwords in the running configuration prevents network administrators from configuring clear-text passwords protects the VLAN database from unauthorized PC connections on the switch encrypts the password exchange when a VPN tunnel is established.
Which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network? SAE encryption TKIP encryption scrambled encryption key AES encryption.
Refer to the exhibit. If the network environment is operating normally, which type of device must be connected to interface FastEthernet 0/1? DHCP client access point router PC.
Refer to the exhibit. An administrator configures four switches for local authentication using passwords that are stored as a cryptographic hash. The four switches must also support SSH access for administrators to manage the network infrastructure. Which switch is configured correctly to meet these requirements? SW1 SW2 SW3 SW4.
What benefit does controller-based networking provide versus traditional networking? allows configuration and monitoring of the network from one centralized point provides an added layer of security to protect from DDoS attacks combines control and data plane functionality on a single device to minimize latency moves from a two-tier to a three-tier network architecture to provide maximum redundancy.
How does Cisco DNA Center gather data from the network? Devices use the call-home protocol to periodically send data to the controller Devices establish an IPsec tunnel to exchange data with the controller The Cisco CLI Analyzer tool gathers data from each licensed network device and streams it to the controller Network devices use different services like SNMP, syslog, and streaming telemetry to send data to the controller.
Which statement about LLDP is true? It is a Cisco proprietary protocol It is configured in global configuration mode. The LLDP update frequency is a fixed value. It runs over the transport layer.
What are two benefits of private IPv4 IP addresses? (Choose two.) They are routed the same as public IP addresses. They are less costly than public IP addresses They can be assigned to devices without Internet connections They eliminate the necessity for NAT policies. They eliminate duplicate IP conflicts.
What is the authoritative source for an address lookup? a recursive DNS search the operating system cache the ISP local cache the browser cache.
What are two benefits that the UDP protocol provide for application traffic?(Choose two) UDP traffic has lower overhead than TCP traffic UDP provides a built-in recovery mechanism to retransmit lost packets. The CTL field in the UDP packet header enables a three-way handshake to establish the connection UDP maintains the connection state to provide more stable connections than TCP The application can use checksums to verify the integrity of application data.
Which two goals reasons to implement private IPv4 addressing on your network? (Choose two) Comply with PCI regulations Conserve IPv4 address Reduce the size of the forwarding table on network routers Reduce the risk of a network security breach Comply with local law.
Which command is used to verify the DHCP relay agent address that has been set up on your Cisco IOS router? show ip interface brief show ip dhcp bindings show ip route show ip interface show interface show ip dhcp pool.
What is the primary purpose of a First Hop Redundancy Protocol? It allows directly connected neighbors to share configuration information. It allows a router to use bridge priorities to create multiple loop-free paths to a single destination. It reduces routing failures by allowing Layer 3 load balancing between OSPF neighbors that have the same link metric. It reduces routing failures by allowing more than one router to represent itself, as the default.
Which technology must be implemented to configure network device monitoring with the highest security? IP SLA syslog NetFlow SNMPv3.
What role does a hypervisor provide for each virtual machine in server virtualization? infrastructure-as-a-service. Software-as-a-service control and distribution of physical resources services as a hardware controller.
The SW1 interface g0/1 is in the down/down state. Which two configurations are valid reasons for the interface conditions?(choose two) There is a duplex mismatch There is a speed mismatch There is a protocol mismatch The interface is shut down The interface is error-disabled.
Refer to Exhibit. The loopback1 interface of the Atlanta router must reach the loopback3 interface of the Washington router. Which two static host routes must be configured on the NEW York router? (Choose two) ipv6 route 2000::1/128 2012::1 ipv6 route 2000::3/128 2023::3 ipv6 route 2000::3/128 s0/0/0 ipv6 route 2000::1/128 2012::2 ipv6 route 2000::1/128 s0/0/1.
What is the function of a server? It transmits packets between hosts in the same broadcast domain. It provides shared applications to end users It routes traffic between Layer 3 devices. It Creates security zones between trusted and untrusted networks.
What is a function of Wireless LAN Controller? register with a single access point that controls traffic between wired and wireless endpoints use SSIDs to distinguish between wireless clients send LWAPP packets to access points monitor activity on wireless and wired LANs.
In which two ways does a password manager reduce the chance of a hacker stealing a users password? (Choose two.) It automatically provides a second authentication factor that is unknown to the original user It uses an internal firewall to protect the password repository from unauthorized access. It protects against keystroke logging on a compromised device or web site. It stores the password repository on the local workstation with built-in antivirus and anti-malware functionality It encourages users to create stronger passwords.
Which type of information resides on a DHCP server? a list of the available IP addresses in a pool a list of public IP addresses and their corresponding names usernames and passwords for the end users in a domain a list of statically assigned MAC addresses.
Which technology is used to improve web traffic performance by proxy caching? WSA Firepower ASA FireSIGHT.
Which type of attack can be mitigated by dynamic ARP inspection? worm malware DDoS man-in-the-middle.
Which goal is achieved by the implementation of private IPv4 addressing on a network? provides an added level of protection against Internet exposure provides a reduction in size of the forwarding table on network routers allows communication across the Internet to other private networks allows servers and workstations to communicate across public network boundaries.
Using direct sequence spread spectrum, which three 2.4-GHz channels are used to limit collisions? 1,6.11 1,5,10 1,2,3 5,6,7.
A device detects two stations transmitting frames at the same time. This condition occurs after the first 64 bytes of the frame is received interface counter increments? collision CRC runt late collision.
What are two roles of Domain Name Services (DNS)? (Choose Two) builds a flat structure of DNS names for more efficient IP operations encrypts network Traffic as it travels across a WAN by default improves security by protecting IP addresses under Fully Qualified Domain Names (FQDNs) enables applications to identify resources by name instead of IP address allows a single host name to be shared across more than one IP address.
When a WPA2-PSK WLAN is configured in the wireless LAN Controller, what is the minimum number of characters that in ASCll format? 6 8 12 18.
An engineer is configuring NAT to translate the source subnet of 10.10.0.0/24 to any of three addresses 192.168.30.1, 192.168.3.2, 192.168.3.3. Which configuration should be used? enable configure terminal ip nat pool mypool 192.168.3.1 192.168.3.3 prefix-length 30 route-map permit 10.10.0.0 255.255.255.0 ip nat outside destination list 1 pool mypool interface g1/1 ip nat inside interface g1/2 ip nat outside enable configure terminal ip nat pool mypool 192.168.3.1 192.168.3.3 prefix-length 30 access-list 1 permit 10.10.0.0 0.0.0.255 ip nat outside destination list 1 pool mypool interface g1/1 ip nat inside interface g1/2 ip nat outside enable configure terminal ip nat pool mypool 192.168.3.1 192.168.3.3 prefix-length 30 access-list 1 permit 10.10.0.0 0.0.0.255 ip nat inside source list 1 pool mypool interface g1/1 ip nat inside interface g1/2 ip nat outside.
How do TCP and UDP differ in the way they guarantee packet delivery? TCP uses checksum, acknowledgement, and retransmissions, and UDP uses checksums only. TCP uses two-dimensional parity checks, checksums, and cyclic redundancy checks and UDP uses retransmissions only. TCP uses checksum, parity checks, and retransmissions, and UDP uses acknowledgements only TCP uses retransmissions, acknowledgement and parity checks and UDP uses cyclic redundancy checks only.
Refer to the exhibit. A network administrator assumes a task to complete the connectivity between PC A and the File Server. Switch A and Switch B have been partially configured with VLAN 10, 11, 12, and 13. What is the next step in the configuration? Add PC A to VLAN 10 and the File Server to VLAN 11 fa VLAN segmentation Add VLAN 13 to the trunk links on Switch A and Switch B for VLAN propagation Add a router on a stick between Switch A and Switch B allowing for Inter-VLAN routing. Add PC A to the same subnet as the Fie Server allowing for intra-VLAN communication.
Refer to the exhibit. What is the next hop address for traffic that is destined to host 10.0.1.5? 10.0.1.3 10.0.1.50 10.0.1.4 Loopback D.
What are two benefits of controller-based networking compared to traditional networking? controller-based increases network bandwidth usage, while traditional lightens the load on the network controller-based inflates software costs, while traditional decreases individual licensing costs Controller-based reduces network configuration complexity, while traditional increases the potential for errors Controller-based provides centralization of key IT functions. While traditional requires distributes management function controller-based allows for fewer network failure, while traditional increases failure rates.
Refer to the exhibit. What action establishes the OSPF neighbor relationship without forming an adjacency? modify hello interval modify process ID modify priority modify network type.
What mechanism carries multicast traffic between remote sites and supports encryption? ISATAP GRE over iPsec iPsec over ISATAP GRE.
Refer to the exhibit. Which outcome is expected when PC_A sends data to PC_B? The switch rewrites the source and destination MAC addresses with its own. The source MAC address is changed. The source and destination MAC addresses remain the same. The destination MAC address is replaced with ffff.ffff.ffff.
How will Link Aggregation be Implemented on a Cisco Wireless LAN Controller? One functional physical port is needed to pass client traffic. The EthernetChannel must be configured in "mode active" When enabled, the WLC bandwidth drops to 500 Mbps. To pass client traffic, two or more ports must be configured.
An organization secures its network with multi-factor authentication using an authenticator app on employee smartphone. How is the application secured in the case of a user's smartphone being lost or stolen? The application requires an administrator password to reactivate after a configured Interval. The application requires the user to enter a PIN before it provides the second factor. The application challenges a user by requiring an administrator password to reactivate when the smartphone is rebooted. The application verifies that the user is in a specific location before it provides the second factor.
When the active router in an HSRP group fails, what router assumes the role and forwards packets? backup standby listening forwarding.
Refer to the exhibit. Router R2 is configured with multiple routes to reach network 10 1.1 0/24 from router R1. What protocol is chosen by router R2 to reach the destination network 10.1 1 0/24? eBGP static OSPF EIGRP.
An engineer needs to configure LLDP to send the port description time length value (TLV). What command sequence must be implemented? switch(config-line)#IIdp port-description switch(config)#IIdp port-description switch(config-if)#IIdp port-description switch#IIdp port-description.
Refer to the exhibit. Which switch in this configuration will be elected as the root bridge? SW1 SW2 SW3 SW4.
Which device performs stateful inspection of traffic? firewall switch access point wireless controller.
An office has 8 floors with approximately 30-40 users per floor. What command must be configured on the router Switched Virtual Interface to use address space efficiently? ip address 192.168.0.0 255.255.0.0 ip address 192.168.0.0 255.255.254.0 ip address 192.168.0.0 255.255.255.128 ip address 192.168.0.0 255.255.255.224.
A wireless administrator has configured a WLAN; however, the clients need access to a less congested 5-GHz network for their voice quality. What action must be taken to meet the requirement? enable AAA override enable RX-SOP enable DTIM enable Band Select.
Refer to the exhibit. A packet is being sent across router R1 to host 172.16.0.14. What is the destination route for the packet? 209.165.200.254 via Serial0/0/1 209.165.200.254 via Serial0/0/0 209.165.200.246 via Serial0/1/0 209.165.200.250 via Serial0/0/0.
Which configuration ensures that the switch is always the root for VLAN 750? Switch(config)#spanning-tree vlan 750 priority 38003685 Switch(config)#spanning-tree vlan 750 root primary Switch(config)#spanning-tree vlan 750 priority 614440 Switch(config)#spanning-tree vlan 750 priority 0.
Refer to the exhibit. An engineer booted a new switch and applied this configuration via the console port. Which additional configuration must be applied to allow administrators to authenticate directly to enable privilege mode via Telnet using a local username and password? Option A Option B Option C Option D.
Refer to the exhibit. Which switch becomes the root bridge? S1 S2 S3 S4.
Refer to the exhibit. Which route type does the routing protocol Code D represent in the output? internal BGP route /24 route of a locally configured IP statically assigned route route learned through EIGRP.
What protocol allows an engineer to back up 20 network router configurations globally while using the copy function? SMTP SNMP TCP FTP.
An engineer must configure an OSPF neighbor relationship between router R1 and R3 The authentication configuration has been configured and the connecting interfaces are in the same 192.168 1.0/30 sublet. What are the next two steps to complete the configuration? (Choose two.) configure the hello and dead timers to match on both sides configure the same process ID for the router OSPF process configure the same router ID on both routing processes Configure the interfaces as OSPF active on both sides. configure both interfaces with the same area ID.
What software defined architecture plane assists network devices with making packet-forwarding decisions by providing Layer 2 reachability and Layer 3 routing information? data plane control plane policy plane management plane.
Which WAN access technology is preferred for a small office / home office architecture? broadband cable access frame-relay packet switching dedicated point-to-point leased line Integrated Services Digital Network switching.
A network administrator enabled port security on a switch interface connected to a printer. What is the next configuration action in order to allow the port to learn the MAC address of the printer and insert it into the table automatically? enable dynamic MAC address learning implement static MAC addressing. enable sticky MAC addressing implement auto MAC address learning.
Report abuse