option
Questions
ayuda
daypo
search.php

myaaaaaa

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
myaaaaaa

Description:
Material APOIO WYN

Creation Date: 2025/04/24

Category: Others

Number of questions: 106

Rating:(0)
Share the Test:
Nuevo ComentarioNuevo Comentario
New Comment
NO RECORDS
Content:

What is a function of Opportunistic Wireless Encryption in an environment?. protect traffic on open networks. offer compression. provide authentication. increase security by using a WEP connection.

What is represented by the word “ge3/36” within this JSON schema? [ 2 {'VPN concentrator': 'VPN36', 'interface':'ge3/36'}, 3 {'load balancer': 'LB33', 'interface':'te7/10'}, 4 {'switch': 'SW31', 'interface':'fe2/25'}, 5 ]. object. value. array. key.

What must be considered before deploying virtual machines?. location of the virtual machines within the data center environment. resource limitations, such as the number of CPU cores and the amount of memory. whether to leverage VSM to map multiple virtual processors to two or more virtual machines. support for physical peripherals, such as monitors, keyboards, and mice.

How does authentication differ from authorization?. Authentication is used to record what resource a user accesses, and authorization is used to determine what resources a user can access. Authentication is used to determine what resources a user is allowed to access, and authorization is used to track what equipment is allowed access to the network. Authentication verifies the identity of a person accessing a network, and authorization determines what resource a user can access. Authentication is used to verify a person’s identity, and authorization is used to create syslog messages for logins.

What is a requirement for nonoverlapping WI-FI channels?. unique SSIDs. different transmission speeds. discontinuous frequency ranges. different security settings.

When a site-to-site VPN is used, which protocol is responsible for the transport of user data?. IPsec. IKEv1. MD5. IKEv2.

In which two ways does a password manager reduce the chance of a hacker stealing a user’s password? (Choose two). It uses an internal firewall to protect the password repository from unauthorized access. It encourages users to create stronger passwords. It stores the password repository on the local workstation with built-in antivirus and anti-malware functionality. It protects against keystroke logging on a compromised device or web site. It automatically provides a second authentication factor that is unknown to the original user.

Which statement about the Cisco ACI fabric is most accurate?. An APIC is a cluster of at least three APIC controllers, providing a single point of management without a single point of failure. The fabric header carries the EPG from the egress to the ingress leaf switch. The spine switch rewrites the EPG from ingress to egress when it performs the forwarding proxy function. The APIC is able to enforce security by inserting itself into the data path.

Refer to the exhibit. R1#show ip route --output omitted-- Gateway of last resort is 192.168.14.4 to network 0.0.0.0 C 172.16.1.128/25 is directly connected, GigabitEthernet1/1/0 C 192.168.12.0/24 is directly connected, FastEthernet0/0 C 192.168.13.0/24 is directly connected, FastEthernet0/1 C 192.168.14.0/24 is directly connected, FastEthernet1/0 C 172.16.16.1 is directly connected, Loopback1 192.168.10.0/24 is variably subnetted, 3 subnets, 3 masks O 192.168.10.0/24 [110/2] via 192.168.14.4, 00:03:01, FastEthernet1/0 O 192.168.10.32/27 [110/11] via 192.168.13.3, 00:00:11, FastEthernet0/1 O 192.168.0.0/16 [110/2] via 192.168.15.5, 00:05:11, FastEthernet1/1 D 192.168.10.1/32 [90/52778] via 192.168.12.2, 00:05:11, FastEthernet0/0 O*E2 0.0.0.0/0 [110/1] via 192.168.14.4, 00:05:11, FastEthernet1/0 If R1 receives a packet destined to 172.16.1.1, to which IP address does it send the packet?. 192.168.15.5. 192.168.12.2. 192.168.14.4. 192.168.13.3.

What is the default port-security behavior on a trunk link?. It places the port in the err-disabled state after 10 MAC addresses are statically configured. It disables the native VLAN configuration as soon as port security is enabled. It causes a network loop when a violation occurs. It places the port in the err-disabled state if it learns more than one MAC address.

Refer to the exhibit. Gateway of last resort is not set 10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks C 10.1.1.0/30 is directly connected, GigabitEthernet0/0 L 10.1.1.2/32 is directly connected, GigabitEthernet0/0 S 192.168.0.0/20 [1/0] via 10.1.1.1 192.168.1.0/30 is subnetted, 1 subnets S 192.168.1.0/30 [1/0] via 10.1.1.1 192.168.2.0/24 is variably subnetted, 2 subnets, 2 masks S 192.168.2.0/28 [1/0] via 10.1.1.1 S 192.168.2.0/29 [1/0] via 10.1.1.1 An engineer is checking the routing table in the main router to identify the path to a server on the network. Which route does the router use to reach the server at 192.168.2.2?. S 192.168.0.0/20 [1/0] via 10.1.1.1. S 192.168.2.0/28 [1/0] via 10.1.1.1. S 192.168.1.0/30 [1/0] via 10.1.1.1. S 192.168.2.0/29 [1/0] via 10.1.1.1.

Which output displays a JSON data representation?. { “response”:{ “taskId”,{}; “url”,”string” }; “version”; “string” }. { “response”,{ “taskId”,{}; “url”,”string” }; “version”, “string” }. { “response”:{ “taskId”:{}, “url”:”string” }, “version”: “string” }. { “response”- { “taskId”- {}; “url”-“string” }, “version”-“string” }.

Refer to the exhibit. R7# 172.22.0.0/24 is subnetted, 1 subnets D 172.22.49.0 [90/284160] via 10.81.22.2, 04:55:53, FastEthernet0/0 10.0.0.0/8 is variably subnetted, 26 subnets, 5 masks D EX 10.10.10.10/32 [170/35840] via 10.3.5.1, 04:55:55, FastEthernet0/1 D 10.9.1.0/30 [90/33280] via 10.3.5.1, 04:55:56, FastEthernet0/1 B 10.111.99.0/24 [20/0] via 10.6.25.2, 03:58:52 D 10.14.3.0/30 [90/30720] via 10.3.5.1, 04:55:58, FastEthernet0/1 C 10.9.4.0/30 is directly connected, FastEthernet1/0 B 10.100.100.0/24 [20/0] via 10.6.25.2, 03:58:53 D 10.0.1.0/30 [90/30720] via 10.3.5.1, 04:55:58, FastEthernet0/1 D EX 10.10.10.70/32 [170/1612801 via 10.3.5.1, 04:55:57, FastEthernet0/1 B 10.90.0.0/16 [200/0] via 0.0.0.0, 03:57:59, Null0 D EX 10.90.1.0/24 [170/158720] via 10.3.5.1, 04:55:57, FastEthernet0/1 D EX 10.90.2.0/24 [170/158720] via 10.3.5.1, 04:55:57, FastEthernet0/1 D 10.90.3.0/29 [90/161280] via 10.3.5.1, 02:46:03, FastEthernet0/1 D EX 10.90.3.0/24 [170/158720] via 10.3.5.1, 02:46:04, FastEthernet0/1 D EX 10.90.4.0/24 [170/158720] via 10.3.5.1, 04:55:59, FastEthernet0/1 D EX 10.90.5.0/24 [170/158720] via 10.3.5.1, 04:55:59, FastEthernet0/1 B* 0.0.0.0/0 [20/0] via 10.6.25.2, 02:22:38 According to the output, which parameter set is validated using the routing table of R7?. R7 has a gateway of last resort available. R7 is receiving routes that were redistributed in EIGRP R7 will drop traffic destined to 10.90.8.0/24. R7 has a gateway of last resort available. R7 is receiving routes that were redistributed from BGP R7 will drop traffic destined to 10.90.8.0/24. R7 is missing a gateway of last resort. R7 is receiving routes that were redistributed from BGP R7 will forward traffic destined to 10.90.8.0/24. R7 is missing a gateway of last resort. R7 is receiving routes that were redistributed in EIGRP R7 will forward traffic destined to 10.90.8.0/24.

While examining excessive traffic on the network, it is noted that all incoming packets on an interface appear to be allowed even though an IPv4 ACL is applied to the interface. Which two misconfigurations cause this behavior? (Choose two). A matching deny statement is too high in the access list. The packets fail to match any permit statement. A matching permit statement is too broadly defined. The ACL is empty. A matching permit statement is too high in the access list.

Which technology allows for multiple operating systems to be run on a single host computer ?. network port ID visualization. virtual routing and forwarding. virtual device contexts. server virtualization.

What is a reason why a company would choose to use network automation in an enterprise ?. Mitigate spanning-tree loop avoidance. Provide data services faster. Enable network segmentation. Implement granular QoS.

Which action does the router take as it forwards a packet through the network ?. The router replaces the original source and destination MAC addresses with the sending router MAC address as the source and neighbor MAC address as the destination. The router encapsulates the original packet and then includes a tag that identifies the source router MAC address and transmit transparently to the destination. The router encapsulates the source and destination IP addresses with the sending router IP address as the source and the neighbor IP address as the destination. The router replaces the source and destination labels with the sending router interface label as a source and the next hop router label as a destination.

Which command is used to enable LLDP globally on a Cisco IOS ISR ?. lldp enable. lldp transmit. cdp enable. cdp run. lldp run.

Which SDN plane forwards user-generated traffic ?. management plane. policy plane. control plane. data plane.

Which technology is used to improve web traffic performance by proxy caching ?. FireSIGHT. WSA. Firepower. ASA.

Refer to the exhibit. A#show ip ospf neighbor Neighbor ID Pri State Dead Time Address Interface 172.1.1.1 1 EXCHANGE/- 00:00:36 172.16.32.1 Serial0.1 An engineer assumes a configuration task from a peer. Router A must establish an OSPF neighbor relationship with neighbor 172.1.1.1. The output displays the status of the adjacency after 2 hours. What is the next step in the configuration process for the routers to establish an adjacency?. Configure router A to use the same MTU size as router B. Set the router B OSPF ID to a nonhost address. Configure a point-to-point link between router A and router B. Set the router B OSPF ID to the same value as its IP address.

Refer to the exhibit. Output from R1 GigabitEthernet0/0/1 is up, line protocol is down Hardware is SPA—10X1GE-V2, address is 0023.33ee.7o00 (bia 0023.33ee.7c00) MTU 1500 bytes, BW 1000000 Kbit/sec, DLY 10 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive not supported Half Duplex, 1000Mbps, link type is auto, media type is LX output flow-control is off, input flow-control is off ARP type: ARPA, ARP Timeout 04:00:00 Last input 00:00:01, output 00:02:31, output hang never 10 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog, 314 multicast, 0 pause input 1 packets output, 77 bytes, 0 underruns 0 output errors, 50 collisions, 6 interface resets 17 unknown protocol drops 0 babbles, 0 late collision, 0 deferred What is the issue with the interface GigabitEthernet0/0/1 ?. port security. cable disconnect. duplex mismatch. high throughput.

Refer to the exhibit. Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP + - replicated route, % - next hop override, p - overrides from PfR Gateway of last resort is 0.0.0.0 to network 0.0.0.0 S* 0.0.0.0/0 is directly connected, Null0 10.0.0.0/8 is variably subnetted, 6 subnets, 2 masks C 10.0.12.0/24 is directly connected, GigabitEthernet0/1 L 10.0.12.1/32 is directly connected, GigabitEthernet0/1 C 10.0.13.0/24 is directly connected, GigabitEthernet0/2 L 10.0.13.1/32 is directly connected, GigabitEthernet0/2 C 10.0.14.0/24 is directly connected, GigabitEthernet0/3 L 10.0.14.1/32 is directly connected, GigabitEthernet0/3 D 192.168.0.0/16 [90/130816] via 10.0.13.3, 00:10:09, GigabitEthernet0/2 O 192.168.0.0/23 [110/2] via 10.0.14.4, 00:00:46, GigabitEthernet0/3 S 192.168.0.0/24 [100/0] via 10.0.12.2 Which interface is chosen to forward traffic to the host at 192.168.0.55?. Null0. GigabitEthernet0/1. GigabitEthernet0/2. GigabitEthernet0/3.

Which field within the access-request packet is encrypted by RADIUS ?. authenticator. authorized services. password. username.

A network engineer must configure the router R1 GigabitEthernet1/1 interface to connect to the router R2 GigabitEthernet1/1 interface. For the configuration to be applied the engineer must compress the address 2001:0db8:0000:0000:0500:000a:400F:583B. Which command must be issued on the interface?. ipv6 address 2001::db8:0000::500:a:400F:583B. ipv6 address 2001:db8::500:a:400F:583B. ipv6 address 2001:0db8::5:a:4F:583B. ipv6 address 2001 db8:0::500:a:4F:583B.

Which two host addresses are reserved for private use within an enterprise network? (Choose two). 172.15.2.250. 12.17.1.20. 10.172.76.200. 172.31.255.100. 192.169.32.10.

R1 has learned route 192.168.12.0/24 via IS-IS, OSPF, RIP and Internal EIGRP. Under normal operating conditions, which routing protocol is installed in the routing table ?. RIP. IS-IS. OSPF. Internal EIGRP.

What is the advantage of separating the control plane from the data plane within an SDN network ?. decreases overall network complexity. reduces cost. limits data queries to the control plane. offloads the creation of virtual machines to the data plane.

Refer to the exhibit. cisco_ospf_vrf {'R1 default': ensure => 'present', auto_cost => '100', } Which type of configuration is represented in the output?. Puppet. Chef. JSON. Ansible.

Which cable type must be used when connecting two like devices together using these criteria? – Pins 1 to 3 and 2 to 6 are required. – Auto detection MDI-X is unavailable. straight-through. rollover. crossover. console.

PC1 tries to send traffic to newly installed PC2. The PC2 MAC address is not listed in the MAC address table of the switch, so the switch sends the packet to all ports in the same VLAN. Which switching concept does this describe ?. frame flooding. MAC address aging. spanning-tree protocol. MAC address table.

What is a function of an endpoint ?. It passes unicast communication between hosts in a network. It is used directly by an individual user to access network services. It provides security between trusted and untrusted sections of the network. It transmits broadcast traffic between devices in the same VLAN.

Which type of IPv4 address type helps to conserve the globally unique address classes ?. loopback. private. multicast. public.

Which statement about the nature of NAT overload is true?. applies a many-to-many relationship to internal IP addresses. applies a one-to-many relationship to internal IP addresses. can be configured only on Gigabit interface. applies a one-to-one relationship to internal IP addresses.

What prevents a workstation from receiving a DHCP address?. VTP. DTP. 802.10. STP.

An engineer is configuring switch SW1 to act as an NTP server when all upstream NTP server connectivity fails. Which configuration must be used ?. SW1# config t SW1(config)#ntp backup SW1(config)#ntp server 192.168.1.1. SW1# config t SW1(config)#ntp server 192.168.1.1 SW1(config)#ntp access-group server accesslist1. SW1# config t SW1(config)#ntp master SW1(config)#ntp server 192.168.1.1. SW1# config t SW1(config)3 ntp peer 192.168.1.1 SW1(config)#ntp access-group peer accesslist1.

An engineer configured an OSPF neighbor as a designated router. Which state verifies the designated router is in the proper mode ?. 2-way. Exchange. Full. Init.

In a cloud-computing environment, what is rapid elasticity ?. pooling resources in a multitenant model based on need. automatic adjustment of capacity based on need. control and monitoring of resource consumption by the tenant. self-service of computing resources by the tenant.

Refer to the exhibit. SW1#show run Building configuration... ! hostname SW1 ! ip domain-name test ! username CCNA privilege 1 password 0 ciscol23 ! interface FastEthernet0/1 switchport access vlan 10 ! interface Vlan10 ip address 192.168.1.2 255.255.255.0 ! line vty 0 4 login local transport input telnet line vty 5 15 login local transport input telnet SW1#show crypto key mypubkey rsa % Key pair was generated at: 0:1:23 UTC Mar 1 2021 Key name: SW1.test An engineer is updating the management access configuration of switch SW1 to allow secured, encrypted remote configuration. Which two commands or command sequences must the engineer apply to the switch? (Choose two). SW1(config)#line vty 0 15 SW1(config-line)#transport input ssh. SW1(config)# crypto key generate rsa. SW1(config)#enable secret ccnaTest123. SW1(config)# username NEW secret R3mote123. SW1(config)# interface f0/1 SW1(config-if)# switch port mode trunk.

Which two tasks support the physical access control element of a security program ? (Choose two). Deploy a video surveillance system. Implement badge access to critical locations. Disperse information about how to protect the organization’s confidential data. Develop slideshows about new security regulations. Run a workshop on corporate security policies.

What are two fundamentals of virtualization? (Choose two). It allows a physical router to directly connect NICs from each virtual machine into the network. The environment must be configured with one hypervisor that serves solely as a network manager to monitor SNMP traffic. It requires that some servers, virtual machines and network gear reside on the Internet. It allows logical network devices to move traffic between virtual machines and the rest of the physical network. It allows multiple operating systems and applications to run independently on one physical server.

Which two tasks must be performed to configure NTP to a trusted server in client mode on a single network device ? (Choose two). Specify the IP address of the NTP server. Disable NTP broadcasts. Verify the time zone. Set the NTP server private key. Enable NTP authentication.

What is the name of the layer in the Cisco borderless switched network design that is considered to be the backbone used for high-speed connectivity and fault isolation ?. core. access. data link. network access. network.

What are two functions of a firewall within an enterprise ? (Choose two). It serves as an endpoint for a site-to-site VPN in standalone mode. It enables traffic filtering based on URLs. It enables wireless devices to connect to the network. It provides support as an endpoint for a remote access VPN in multiple context mode. It offers Layer 2 services between hosts.

Which statement about static and dynamic routes is true ?. Dynamic routes are manually configured by a network administrator, while static routes are automatically learned and adjusted by a routing protocol. Static routes tell the router how to forward packets to networks that are not directly connected, while dynamic routes tell the router how to forward packets to networks that are directly connected. Dynamic routes tell the router how to forward packets to networks that are not directly connected, while static routes tell the router how to forward packets to networks that are directly connected. Static routes are manually configured by a network administrator, while dynamic routes are automatically learned and adjusted by a routing protocol.

Which protocol uses the SSL ?. SSH. Telnet. HTTPS. HTTP.

Which command entered on a switch configured with Rapid-PVST+ listens and learns for a specific time period ?. switch(config)#spanning-tree vlan 1 priority 4096. switch(config)#spanning-tree vlan 1 hello-time 10. switch(config)#spanning-tree vlan 1 forward-time 20. switch(config)#spanning-tree vlan 1 max-age 6.

What does an SDN controller use as a communication protocol to relay forwarding changes to a southbound API ?. XML. Java. OpenFlow. REST.

What does WPA3 provide in wireless networking ?. increased security and requirement of a complex configuration. optional Protected Management Frame negotiation. backward compatibility with WPA and WPA2. safeguards against brute force attacks with SAE.

A network engineer must create a diagram of a multivendor network. Which command must be configured on the Cisco devices so that the topology of the network can be mapped ?. Device(Config-if)#cdp enable. Device(Config)#cdp run. Device(Config)#flow-sampler-map topology. Device(Config)#lldp run.

What are two characteristics of a controller-based network ? (Choose two). It uses northbound and southbound APIs to communicate between architectural layers. The administrator can make configuration updates from the CLI. It moves the control plane to a central point. It uses Telnet to report system issues. It decentralizes the control plane, which allows each device to make its own forwarding decisions.

What are two characteristics of an SSID ? (Choose two). It provides secured access to a WLAN. It uniquely identifies an access point in a WLAN. It can be hidden or broadcast in a WLAN. It is at most 32 characters long. It uniquely identifies a client in a WLAN.

Which IP header field is changed by a Cisco device when QoS marking is enabled ?. Type of Service. ECN. Header Checksum. DSCP.

What does the implementation of a first-hop redundancy protocol protect against on a network ?. root-bridge loss. default gateway failure. spanning-tree loops. BGP neighbor flapping.

What is the maximum number of concurrent Telnet sessions that a Cisco WLC supports ?. 6. 15. 5. 3.

When more than one AP-Manager interface is provisioned on a wireless LAN controller, how is the request handled by the AP ?. The first AP-Manager interface to respond is chosen by the AP. The AP join request fails and must be configured statically on the AP-Manager interface. The discovery response from the AP to the AP-Manager interface disables the WLAN port. The AP-Manager with the fewest number of APs is used by the AP to join.

Router R1 must send all traffic without a matching routing-table entry to 192.168.1.1. Which configuration accomplishes this task ?. 1#config t R1(config)#ip routing R1(config)#ip default-gateway 192.168.1.1. R1#config t R1(config)#ip routing R1(config)#ip route 192.168.1.1 0.0.0.0 0.0.0.0. R1#config t R1(config)#ip routing R1(config)#ip route default-route 192.168.1.1. R1#config t R1(config)#ip routing R1(config)#ip route 0.0.0.0 0.0.0.0 192.168.1.1.

An engineer must update the configuration on two PCs in two different subnets to communicate locally with each other. One PC is configured with IP address 192.168.25.128/25 and the other with 192.168.25.100/25. Which network mask must the engineer configure on both PCs to enable the communication?. 255.255.255.248. 255.255.255.252. 255.255.255.224. 255.255.255.0.

Which two network actions occur within the data plane ? (Choose two). Make a configuration change from an incoming NETCONF RPC. Run routing protocols. Reply to an incoming ICMP echo request. Match the destination MAC address to the MAC address table. Add or remove an 802.1Q trunking header.

What is a feature of WPA ?. 802.1x authentication. small Wi-Fi application. TKIP/MIC encryption. preshared key.

Refer to the exhibit. How does router R1 handle traffic to 192.168.12.16? EIGRP: 192.168.12.0/24 RIP: 192.168.12.0/27 OSPF: 192.168.12.0/26. It selects the OSPF route because it has the lowest cost. It selects the RIP route because it has the longest prefix inclusive of the destination address. It selects the IS-IS route because it has the shortest prefix inclusive of the destination address. It selects the EIGRP route because it has the lowest administrative distance.

Which state does the switch port move to when PortFast is enabled ?. listening. blocking. learning. forwarding.

What is a role of access points in an enterprise network ?. integrate with SNMP in preventing DDoS attacks. connect wireless devices to a wired network. serve as a first line of defense in an enterprise network. support secure user logins to devices or the network.

What is a characteristic of private IPv4 addressing ?. used without tracking or registration. composed of up to 65,536 available addresses. traverse the Internet when an outbound ACL is applied. issued by IANA in conjunction with an autonomous system number.

A network analyst is tasked with configuring the date and time on a router using EXEC mode. The date must be set to January 1,2020 and the time must be set to 12:00 am. Which command should be used ?. clock summer-time recurring. clock timezone. clock summer-time date. clock set.

Refer to the exhibit. Gateway of last resort is 0.0.0.0 to network 0.0.0.0 10.0.0.0/8 is variably subnetted, 6 subnets, 5 masks S 10.0.0.0/8 is directly connected, GigabitEthernet0/0 C 10.1.1.0/24 is directly connected, GigabitEthernet0/0 L 10.1.1.1/32 is directly connected, GigabitEthernet0/0 S 10.10.0.0/22 is directly connected, GigabitEthernet0/0 S 10.10.10.0/28 is directly connected, GigabitEthernet0/0 S 10.10.10.1/32 is directly connected, GigabitEthernet0/0 S* 0.0.0.0/0 is directly connected, GigabitEthernet0/0 Which IP route command created the best path for a packet destined for 10.10.10.3?. ip route 10.10.10.0 255.255.255.240 g0/0. ip route 10.10.10.1 255.255.255.255 g0/0. ip route 10.10.0.0 255.255.252.0 g0/0. ip route 10.0.0.0 255.0.0.0 g0/0.

Which type of security program is violated when a group of employees enters a building using the ID badge of only one person ?. network authorization. user awareness. intrusion detection. physical access control.

Which protocol does an IPv4 host use to obtain a dynamically assigned IP address ?. DNS. DHCP. CDP. ARP.

Which QoS Profile is selected in the GUI when configuring a voice over WLAN deployment ?. Platinum. Gold. Bronze. Silver.

Refer to the exhibit. ['red', 'one'] Which type of JSON data is represented ?. number. string. array. object.

A Cisco engineer is configuring a factory-default router with these three passwords: * The user EXEC password for console access is p4ssw0rd1. * The user EXEC password for Telnet access is s3cr3t2. * The password for privileged EXEC mode is priv4t3p4ss. Which command sequence must the engineer configure ?. Option A enable secret priv4t3p4ss ! line con 0 password p4ssw0rd1 login ! line vty 0 15 password s3cr3t2 login. Option B enable secret privilege 15 priv4t3p4ss ! line con 0 password p4ssw0rdi login ! line vty 0 15 password s3cr3t2 login. Option C enable secret priv413p4ss ! line con 0 password login p4ssw0rd1 ! line vty 0 15 password login s3cr3t2 login. Option D enable secret priv4t3p4ss ! line con 0 password p4ssw0rd1 ! line vty 0 15 password s3cr3t2.

How does Chef configuration management enforce a required device configuration ?. The Chef Infra Server uses its configured cookbook to alert each remote device when it is time for the device to pull a new configuration. The installed agent on the device connects to the Chef Infra Server and pulls its required configuration from the cookbook. The installed agent on the device queries the Chef Infra Server and the server responds by pushing the configuration from the cookbook. The Chef Infra Server uses its configured cookbook to push the required configuration to the remote device requesting updates.

How does a hub handle a frame traveling to a known destination MAC address differently than a switch ?. The hub forwards the frame only to the port connected to the known MAC address,and a switch forwards the frame to all ports. The hub forwards the frame to all ports in the FIB table, and a switch forwards the frame the destination MAC is known. The hub forwards the frame using the information in the MAC table, and a switch uses data in its routing table. The hub forwards the frame to all ports, and a switch forwards the frame to the known destination.

Router-Y#show ip route Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP + - replicated route, % - next hop override, p - overrides from PfR Gateway of last resort is not set 10.0.0.0/8 is variably subnetted B 10.0.0.0/8 [1/0] via 10.224.1.2 B 10.27.150.224/27 [20/0] via 10.224.1.3, 1w6d S 10.128.0.0/9 [1/0] via 10.224.1.3 B 10.224.0.0/11 [20/0] via 10.224.1.5, 5d18h B 10.224.0.0/15 [20/0] via 10.224.1.4, 5d18h C 10.223.0.0/24 is directly connected, GigabitEthernet0/1 C 10.224.0.0/24 is directly connected, GigabitEthernet0/0 B 10.226.34.0/24 [20/0] via 10.224.1.5, 5d18h PC A is communicating with another device at IP address 10.225.34.225. Through which router does router Y route the traffic?. router B. router A. router C. router D.

A newly configured PC fails to connect to the internet using TCP port 80 to www.cisco.com. Which setting must be modified for the connection to work ?. Default Gateway. DHCP Server. Subnet Mask. DNS Servers.

Refer to the exhibit. Router R1 Fa0/0 cannot ping router R3 Fa0/1. Which action must be taken in router R1 to help resolve the configuration issue ?. set the default gateway as 20.20.20.2. set the default network as 20.20.20.0/24. configure a static route with Fa0/1 as the egress interface to reach the 20.20.20.0/24 network. configure a static route with 10.10.10.2 as the next hop to reach the 20.20.20.0/24 network.

Refer to the exhibit An engineer is using the Cisco WLC GUI to configure a WLAN for WPA2 encryption with AES and preshared key Cisc0123456. After the engineer selects the WPA + WPA2 option from the Layer 2 Security drop-down list, which two tasks must they perform to complete the process ? (Choose two). Select the WPA2 Policy and AES check boxes. Select ASCII from the PSK Format drop-down list, enter the key, and leave the Auth Key Mgmt setting blank. Select PSK from the Auth Key Mgmt drop-down list, set the PSK Format to ASCII, and enter the key. Select CCKM from the Auth Key Mgmt drop-down list, set the PSK Format to Hex, and enter the key. Select the WPA2 Policy, AES, and TKIP check boxes.

An engineer is configuring an EtherChannel using LACP between Switches 1 and 2. Which configuration must be applied so that only Switch 1 sends LACP initiation packets ?. Switch1(config-if)#channel-group 1 mode on Switch2(config-if)#channel-group 1 mode active. Switch1(config-if)#channel-group 1 mode on Switch2(config-if)#channel-group 1 mode passive. Switch1(config-if)#channel-group 1 mode passive Switch2(config-if)#channel-group 1 mode active. Switch1(config-if)#channel-group 1 mode active Switch2(config-if)#channel-group 1 mode passive.

User traffic originating within site B is failing to reach an application hosted on IP address 192.168.0.10, which is located within site A. What is determined by the routing table ?. The lack of a default route prevents delivery of the traffic. The traffic to 192.168.0.10 requires a static route to be configured in router1. The traffic is blocked by an implicit deny in an ACL on router2. The default gateway for site B is configured incorrectly.

Please type the corresponding numbers of each item on the left to the blank below and sort them in ascending order. For example: 13425 (which means 134 for first group, 25 for second group). 12345. 53421. 23415. 34152.

A company is configuring a failover plan and must implement the default routes in such a way that a floating static route will assume traffic forwarding when the primary link goes down. Which primary route configuration must be used ?. ip route 0.0.0.0 0.0.0.0 192.168.0.2 GigabitEthernet1/0. ip route 0.0.0.0 0.0.0.0 192.168.0.2 tracked. ip route 0.0.0.0 0.0.0.0 192.168.0.2. ip route 0.0.0.0 0.0.0.0 192.168.0.2 floating.

Please type the corresponding numbers of each item on the left to the blank below and sort them in ascending order. For example: 1324 (which means 13 for first group, 24 for second group). 3412. 1423. 1234. 4123.

SW1 supports connectivity for a lobby conference room and must be secured. The engineer must limit the connectivity from PC1 to the SW1 and SW2 network. The MAC addresses allowed must be limited to two. Which configuration secures the conference room connectivity ?. interface gi1/0/15 switchport port-security mac-address 0000.abcd.0004 vlan 100 interface switchport secure-mac limit 2. interface gi1/0/15 switchport port-security mac-address 0000.abcd.0004 vlan 100. interface gi1/0/15 switchport port-security switchport port-security mac-address 0000.abcd.0004 vlan 100. interface gi1/0/15 switchport port-security switchport port-security maximum 2.

Connections must be blocked from PC2 to the file server while still allowing PC2 to connect to other network hosts and devices. Which configuration must be used to complete the task ?. R1(config)#access-list 1 permit 192.168.2.10 R1(config)#access-list 1 deny any R1(config)#interface g0/1 R1(config-if)#ip access-group 1 out. R2(config)#access-list 1 deny 192.168.2.10 R2(config)#access-list 1 permit any R2(config)#interface g0/1 R2(config-if)#ip access-group 1 out. R2(config)#access-list 1 permit 192.168.2.10 R2(config)#access-list 1 deny 192.168.2.0 0.0.0.255 R2(config)#interface g0/1 R2(config)#ip access-group 1 in. R1(config)#access-list 1 deny 192.168.2.10 R1(config)#access-list 1 permit 192.168.2.0 0.0.0.255 R1(config)#interface g0/0 R1(config-if)#ip access-group 1 in.

A secondary route is required on router R1 to pass traffic to the LAN network on R2 if the primary link fails. Which command must be entered to configure the router ?. ip route 10.0.2.0 255.255.255.240 10.0.0.7 92. ip route 10.0.2.0 255.255.255.240 10.0.0.6 91. ip route 10.0.2.0 255.255.255.248 10.0.0.6 91. ip route 10.0.2.0 256.255.255.248 null0 93.

Refer to the exhibit. What commands are needed to add a subinterface to Ethernet0/0 on R1 to allow for VLAN 20, with IP address 10.20.20.1/24 ?. R1 (config)#interface ethernet0/0.20 R1(config)#ip address 10.20.20.1 255.255.255.0. R1 (config)#interface ethernet0/0 R1 (config)#encapsulation dot1q 20 R1(config)#ip address 10.20.20.1 255.255.255.0. R1 (config)#interface ethernet0/0.20 R1 (config)#encapsulation dot1q 20 R1(config)#ip address 10.20.20.1 255.255.255.0. R1 (config)#interface ethernet0/0 R1(config)#ip address 10.20.20.1 255.255.255.0.

Refer to the exhibit. A network administrator has been tasked with securing VTY access to a router. Which access-list entry accomplishes this task ?. access-list 101 permit tcp 10.1.1.0 0.0.0.255 172.16.10.0 0.0.0.255 eq https. access-list 101 permit tcp 10.1.1.0 0.0.0.255 172.16.10.0 0.0.0.255 eq ssh. access-list 101 permit tcp 10.1.1.0 0.0.0.255 172.16.10.0 0.0.0.255 eq scp. access-list 101 permit tcp 10.1.1.0 0.0.0.255 172.16.10.0 0.0.0.255 eq telnet.

Refer to the exhibit. Which type of route does R1 use to reach host 10.10.13.10/32 ? R1#show ip route Gateway of last resort is 10.10.10.18 to network 0.0.0.0 10.0.0.0/8 is variably subnetted, 4 subnets. 3 Masks C 10.10.10.0/30 is directly connected. FastEthernet0/1 O 10.10.13.0/25 [110/4576] via 10.10.10.1, 02:53:11, FastEthernet0/1 C 10.10.10.16/30 is directly connected, FastEthernet0/24 0 10.10.13.144/28 [110/110] via 10.10.10.1, 03:51:21, FastEthernet0/1 B* 0.0.0.0/0 [20/0] via 10.10.10.18, 02:17:53. default route. network route. floating static route. host route.

IPv6 is being implemented within the enterprise. The command ipv6 unicast-routing is configured. Interface Gig0/0 on R1 must be configured to provide a dynamic assignment using the assigned IPv6 block. Which command accomplishes this task ?. ipv6 address 2001:DB8:FFFF:FCF3::/64 eui-64. ipv6 address 2001:0B8:FFFF:FCF3::1/64. ipv6 address autoconfig 2001:DB8:FFFF:FCF2::/64. ipv6 address 2001:DB8:FFFF:FCF3::/64 link-local.

Please type the corresponding numbers of each item on the left to the blank below and sort them in ascending order. For example: 1324 (which means 13 for first group, 24 for second group). 4321. 1324. 2413. 3241.

Please type the corresponding numbers of each item on the left to the blank below and sort them in ascending order. For example: 136245 (which means 136 for first group, 245 for second group). 635124. 435612. 124356. 214365.

Please type the corresponding numbers of each item on the left to the blank below and sort them in ascending order. For example: 1324 (which means 13 for first group, 24 for second group). 2314. 4132. 3124. 4231.

Router R14 is in the process of being configured. Which configuration must be used to establish a host route to PC 10?. ip route 10.80.65.10 255.255.255.255 10.73.65.66. ip route 10.73.65.66 0.0.0.255 10.80.65.10. ip route 10.80.65.10 255.255.255.254 10.80.65.1. ip route 10.73.65.65 255.0.0.0 10.80.65.10.

A Cisco engineer creates a new WLAN called lantest. Which two actions must be performed so that only high-speed 2.4-Ghz clients connect? (Choose two). Set the Interface/Interface Group(G) to an interface other than guest. Set the Radio Policy option to 802.11g only. Enable the Broadcast SSID option. Enable the Status option. Set the Radio Policy option to 802.11a only.

Please type the corresponding numbers of each item on the left to the blank below and arrange them ascendingly. For example: 136245 (which means 136 for first group, 245 for second group). 156234. 431562. 561234. 234156.

Which type of information resides on a DHCP server ?. a list of statically assigned MAC addresses. usernames and passwords for the end users in a domain. a list of public IP addresses and their corresponding names. a list of the available IP addresses in a pool.

What are two roles of the Dynamic Host Configuration Protocol (DHCP) ? (Choose two). The DHCP server leases client IP addresses dynamically. The DHCP client can request up to four DNS server addresses. The DHCP server offers the ability to exclude specific IP addresses from a pool of IP addresses. The DHCP server assigns IP addresses without requiring the client to renew them. The DHCP client maintains a pool of IP addresses it can assign.

Which command enables a router to become a DHCP client ?. ip dhcp client. ip address dhcp. ip helper-address. ip dhcp pool.

Refer to the exhibit. A network engineer must block access for all computers on VLAN 20 to the web server via HTTP. All other computers must be able to access the web server. Which configuration when applied to switch A accomplishes this task ?. config t ip access-list extended wwwblock deny tcp any host 10.30.0.100 eq 80 int vlan 20 ip access-group wwwblock in. config t ip access-list extended wwwblock deny tcp any host 10.30.0.100 eq 80 int vlan 100 ip access-group wwwblock in. config t ip access-list extended wwwblock deny tcp any host 10.30.0.100 eq 80 permit ip any any int vlan 20 ip access-group wwwblock in. config t ip access-list extended wwwblock permit ip any any deny tcp any host 10.30.0.100 eq 80 int vlan 30 ip access-group wwwblock in.

Refer to the exhibit. An extended ACL has been configured and applied to router R2. The configuration failed to work as intended. Which two changes stop outbound traffic on TCP ports 25 and 80 to 10.0.20.0/26 from the 10.0.10.0/26 subnet while still allowing all other traffic? (Choose two). The ACL must be configured the Gi0/2 interface inbound on R1. Add a “permit ip any any” statement at the end of ACL 101 for allowed traffic. Add a “permit ip any any” statement to the beginning of ACL 101 for allowed traffic. The source and destination IPs must be swapped in ACL 101. The ACL must be moved to the Gi0/1 interface outbound on R2.

What are two southbound APIs ? (Choose two). Open Flow. DSC. NETCONF. Thrift. CORBA.

A wireless administrator has configured a WLAN; however, the clients need access to a less congested 5-GHz network for their voice quality. What action must be taken to meet the requirement ?. enable Band Select. enable DTIM. enable RX-SOP. enable AAA override.

Using direct sequence spread spectrum, which three 2.4-GHz channels are used to limit collisions ?. 5,6,7. 1,6,11. 1,5,10. 1,2,3.

Which interface enables communication between a program on the controller and a program on the networking devices ?. software virtual interface. southbound interface. northbound interface. tunnel interface.

Refer to the exhibit A network engineer is configuring a WLAN to connect with the 172.16.10.0/24 network on VLAN 20. The engineer wants to limit the number of devices that connect to the WLAN on the USERWL SSID to 125. Which configuration must the engineer perform on the WLC?. In the Controller IPv6 configuration, set the Throttle value to 125. In the Advanced configuration, set the DTIM value to 125. In the WLAN configuration, set the Maximum Allowed Clients value to 125. In the Management Software activation configuration, set the Clients value to 125.

Refer to the exhibit. How many JSON objects are presented?. 1. 4. 2. 3.

Report abuse