|A network engineer is implementing a corporate SSID for WPA3-Personal security with a PSK. Which encryption cipher must be configured? GCMP128 CCMP256 CCMP128 GCMP256.
What is represented in line 2 of the JSON schema? object VALUE key array.
Which IP header field is changed by a Cisco device when QoS marking is enabled? ECN Type of Service DSCP Header Checksum.
Which cable type must be used to interconnect one switch using 1000 BASE-SX GBIC modules and another switch using 1000 BASE-SX SFP modules? LC to LC SC to ST LC to SC SC to SC.
Drag and drop the virtualization concepts from the left onto the matching statements on the right. Each core can run more than one process simultaneously
An operating system instance that is decoupled from the server hardware
Runs on a physical server, manages, and allocates the physical resources The software that manages the basic functions of the physical hardware The software that manages the basic functions of the virtual machine.
What are two protocols within the IPsec suite? (Choose two) ESP AES TLS AH 3DES.
Which signal frequency appears 60 times per minute? 1 GHz signal 1 Hz signal 60 GHz signal 60 Hz signal.
What is a characteristic of RSA? It is an asymmetric encryption algorithm It requires both sides to have identical keys for encryption It uses preshared keys for encryption It is a symmetric decryption algorithm.
Which port type does a lightweight AP use to connect to the wired network when it is configured in local mode? EtherChannel trunk LAG access.
Drag and drop the configuration management terms from the left onto the descriptions on the right. Not all terms are used. easy-to-manage deployment option that may lack scalability device hardware that runs without embedded management features to automatically install or deploy a configuration or update daemon that determines when the central authority has updates available model in which the central server sends updates to nodes on an as-needed basis unuused.
What are two differences between WPA2 and WPA3 wireless security? (Choose two) WPA2 uses 128-bit key encryption, and WPA3 supports 128-bit and 192-bit key encryption WPA3 uses AES for stronger protection than WPA2, which uses SAE WPA3 uses SAE for stronger protection than WPA2, which uses AESc WPA2 uses 192-bit key encryption, and WPA3 requires 256-bit key encryption WPA3 uses AES for stronger protection than WPA2, which uses TKIP.
Which two transport layer protocols carry syslog messages? (Choose two) RTP ARP IP TCP UDP.
Drag and drop the AAA features from the left onto the corresponding AAA security services on the right. Not all options are used It leverages a RADIUS server to grant user access to a reverse Telnet session It verifies the user before granting access to the device It enables the device to allow user- or group-based access It restricts the CLI commands that a user is able to perform It records the amount of time for which a user accesses the network on a remote server It uses TACACS+ to log the configuration commands entered by a network administrator.
What is the benefit of using private IPv4 addressing? to provide reliable connectivity between like devices to shield internal network devices from external access to be routable over an external network to enable secure connectivity over the Internet.
A company has each office using wireless access with multiple SSIDs while limiting roaming capabilities, covering different locations on the internal office LAN, guest networks, and BYOD access for employees. Which change must be enabled to improve the customer experience during SSID changes? Fast Transition Neighbor List Dual Band Assisted Roaming Prediction Optimization Fast SSID Change.
Which DSCP per-hop forwarding behavior is divided into subclasses based on drop probability? assured class-selector expedited default.
An engineer must configure traffic for a VLAN that is untagged by the switch as it crosses a trunk link. Which command should be used? switchport trunk native vlan 10 switchport trunk allowed vlan 10 switchport mode trunk switchport trunk encapsulation dot1q.
Which device tracks the state of active connections in order to make a decision to forward a packet through? router firewall wireless LAN controller wireless access point.
Which network action occurs within the data plane? make a configuration change from an incoming NETCONF RPC reply to an incoming ICMP echo request
compare the destination IP address to the IP routing table run routing protocols (OSPF, EIGRP, RIP, BGP).
Which WAN topology provides a combination of simplicity quality, and availability? full mesh hub-and-spoke partial mesh point-to-point.
Which JSON data type is an unordered set of attribute-value pairs? string object Boolean array.
When a site-to-site VPN is configured, which IPsec mode provides encapsulation and encryption of the entire original IP packet? IPsec tunnel mode with ESP IPsec transport mode with AH IPsec tunnel mode with AH IPsec transport mode with ESP.
Which two primary drivers support the need for network automation? (Choose two) Providing a ship entry point for resource provisioning Policy-derived provisioning of resources Eliminating training needs Reducing hardware footprint Increasing reliance on self-diagnostic and self-healing.
In software-defined architecture, which place handles switching for traffic through a Cisco router? Data Application Control Management.
What are two characteristics of the distribution layer in a three-tier network architecture? (Choose two) serves as the network aggregation point provides a boundary between Layer 2 and Layer 3 communications physical connection point for a LAN printer is the backbone for the network topology designed to meet continuous, redundant uptime requirements.
Drag and drop the DNS lookup components from the left onto the functions on the right. in response to client requests, queries a name server for IP address information: disables DNS services on a Cisco device: component of a URL that indicates the location or organization type: local database of address mappings that improves name resolution performance: service that maps hostname to IP addresses: .
Which plane is centralized by an SDN controller? management plane control plane services plane data plane.
Which access layer threat-mitigation technique provides security based on identity? DHCP snooping using a non-default native VLAN 802.1x Dynamic ARP Inspection.
Which type of traffic is sent with pure IPsec? multicast traffic from a server at one site to hosts at another location spanning-tree updates between switches that are at two different sites broadcast packets from a switch that is attempting to locate a MAC address at one of several remote sites unicast messages from a host at a remote site to a server at headquarterscorrect.
What is a syslog facility? group of log messages associated with the configured severity level set of values that represent the processes that can generate a log message host that is configured for the system to send log messages password that authenticates a Network Management System to receive log messages.
What is a similarly between 1000BASE-LX and 1000BASE-T standards? Both support up to 550 meters between nodes Both cable types support LP connectors Both cable types support RJ-45 connectors Both use the same data-link header and trailer formats.
What are two benefits of FHRPs? (Choose two) They allow multiple devices to serve as a single virtual gateway for clients in the network They enable automatic failover of the default gateway. They prevent loops in the Layer 2 network. They allow encrypted traffic. They are able to bundle multiple ports to increase bandwidth.
Which type of organization should use a collapsed-core architecture? large and requires a flexible, scalable network design large and must minimize downtime when hardware fails small but is expected to grow dramatically in the near future small and needs to reduce networking costs currently.
What is a function of a Layer 3 switch? move frames between endpoints limited to IP addresses flood broadcast traffic within a VLAN forward Ethernet frames between VLANs using only MAC addresses transmit broadcast traffic when operating in Layer 3 mode exclusively.
Which 802.11 frame type is indicated by a probe response after a client sends a probe request? action management control data.
What is a DNS lookup operation? serves requests over destination port 53 DNS server pings the destination to verify that it is available DNS server forwards the client to an alternate IP address when the primary IP is down responds to a request for IP address to domain name resolution to the DNS server.
An engineer must configure R1 for a new user account. The account must meet these requirements:
* It must be configured in the local database.
* The username is engineer2
* It must use the strongest password configurable.
Which command must the engineer configure on the router? R1(config)# username engineer2 algorithm-type scrypt secret test2021 R1(config)# username engineer2 secret 5 password $1$bUu$kZbBS1Pyh4QzwXyZ R1(config)# username engineer2 privilege 1 password 7 test2021 R1(config)# username engineer2 secret 4 $1Sb1Ju$kZbBSlFyh4QxwXyZ.
An engineer is configuring remote access to a router from IP subnet 10.139.58.0/28. The domain name, crypto keys, and SSH have been configured. Which configuration enables the traffic on the destination router? line vty 0 15
access-class 120 in
ip access-list extended 120
permit tcp 10.139.58.0 0.0.0.15 any eq 22 line vty 0 15
access-group 120 in
ip access-list extended 120
permit tcp 10.139.58.0 0.0.0.15 any eq 22 interface FastEthernet0/0
ip address 10.122.49.1 255.255.255.252
ip access-group 110 in
ip access-list standard 110
permit tcp 10.139.58.0 0.0.0.15 eq 22 host 10.122.49.1 interface FastEthernet0/0
ip address 10.122.49.1 255.255.255.252
ip access-group 10 in
ip access-list standard 10
permit udp 10.139.58.0 0.0.0.7 host 10.122.49.1 eq 22.
Refer to the exhibit.
EIGRP 10.10.10.0/24[90/1441] via F0/10
EIGRP 10.10.10.0/24[90/144] via F0/11
EIGRP 10.10.10.0/24[90/1441] via F0/12
OSPF 10.10.10.0/24[110/20] via F0/13
OSPF 10.10.10.0/24[110/30] via F0/14
Packets received by the router from BGP enter via a serial interface at 22.214.171.124. Each route is present within the routing table. Which interface is used to forward traffic with a destination IP of 10.10.10.24? F0/11 F0/10 F0/13 F0/12.
The DHCP server and clients are connected to the same switch. What is the next step to complete the DHCP configuration to allow clients on VLAN 1 to receive addresses from the DHCP server? Configure the ip dhcp snooping trust command on the interface that is connected to the DHCP server Configure the ip dhcp snooping trust command on the interface that is connected to the DHCP client Configure the ip dhcp relay information option command on the interface that is connected to the DHCP client Configure the ip dhcp relay information option command on the interface that is connected to the DHCP server.
What is a function of a Next-Generation IPS? integrates with a RADIUS server to enforce Layer 2 device authentication rules serves as a controller within a controller-based network correlates user activity with network events makes forwarding decisions based on learned MAC addresses.
Which two commands must be added to update the configuration of router R1 so that it accepts only encrypted connections? (Choose two) transport input ssh crypto key generate rsa 1024 ip ssh version 2 line vty 0 4 username CNAC secret R!41!4319115@.
How does Rapid PVST+ create a fast loop-free network topology? It uses multiple active paths between end stations It generates one spanning-tree instance for each VLAN It maps multiple VLANs into the same spanning-tree instance It requires multiple links between core switches.
Which interface mode must be configured to connect the lightweight APs in a centralized architecture? management WLAN dynamic access trunk.
An engineer is configuring a new router on the network and applied this configuration. Which additional configuration allows the PC to obtain its IP address from a DHCP server? Configure the ip address dhcp command under interface Gi0/0 Configure the ip helper-address 172.16.2.2 command under interface Gi0/0 Configure the ip dhcp relay information command under interface Gi0/1 Configure the ip dhcp smart-relay command globally on the router.
The link between PC1 and the switch is up, but it is performing poorly. Which interface condition is causing the performance problem? There is a duplex mismatch on the interface There is an interface type mismatch There is an issue with the fiber on the switch interface. There is a speed mismatch on the interface.
An engineer assumes a configuration task from a peer. Router A must establish an OSPF neighbor relationship with neighbor 126.96.36.199. The output displays the status of the adjacency after 2 hours. What is the next step in the configuration process for the routers to establish an adjacency? Configure router A to use the same MTU size as router B Configure a point-to-point link between router A and router B Set the router B OSPF ID to a nonhost address Set the router B OSPF ID to the same value as its IP address.
What is a function of Opportunistic Wireless Encryption in an environment? protect traffic on open networks provide authentication offer compression increase security by using a WEP connection.
Which PoE mode enables powered-device detection and guarantees power when the device is detected? dynamic auto static active.
SW2 is replaced due to a hardware failure. A network engineer starts to configure SW2 by copying the Fa0/1 interface configuration from SW1. Which command must be configured on the Fa0/1 interface of SW2 to enable PC1 to connect to PC2? switchport mode trunk switchport trunk allowed remove 10 switchport trunk native vlan 10 switchport mode access.
Which value is the unique identifier that an access point uses to establish and maintain wireless connectivity to wireless network devices? RFID SSID WLANID VLANID.
Which WAN topology has the highest degree of reliability? router-on-a-stick Point-to-point full mesh hub-and-spoke.
How does TFTP operate in a network? uses block numbers to identify and mitigate data-transfer errors provides secure data transfer requires two separate connections for control and data traffic relies on the well-known TCP port 20 to transmit data.
When should an engineer implement a collapsed-core architecture? for small networks with minimal need for growth only when using VSS technology the access and distribution layers must be on the same device for large networks that are connected to multiple remote sites.
A user configured OSPF and advertised the Gigabit Ethernet interface in OSPF. By default, to which type of OSPF network does this interface belong? point-to-multipoint point-to-point nonbroadcast broadcast.
Drag and drop the traffic types from the left onto the QoS delivery mechanisms on the right. best effort: priority queue: traffic policing: shaping: .
What is a function of MAC learning on a switch? the MAC address table is used to populate the ARP table. Frames received for a destination MAC address not listed in the address table are dropped. MAC address learning is disabled by default on all VLANs. A static MAC address is manually added to the MAC table.
What is the primary purpose of a console port on a Cisco WLC? in-band management via an IP transport
out-of-band management via an IP transport in-band management via an asynchronous transport out-of-band management via an asynchronous transport.
What is a reason to configure a trunk port that connects to a WLC distribution port? Provide redundancy if there is a link failure for out-of-band management. Eliminate redundancy with a link failure in the data path. Allow multiple VLAN to be used in the data path Permit multiple VLANs to provide out-of-band management.
What is the collapsed layer in collapsed core architectures? distribution and access core and distribution access and WAN core and WAN.
Which command entered on a switch configured with Rapid-PVST+ listens and learns for a specific time period?
switch(config)#spanning-tree vlan 1 hello-time 10 switch(config)#spanning-tree vlan 1 forward-time 20 switch(config)#spanning-tree vlan 1 priority 4096 switch(config)#spanning-tree vlan 1 max-age 6.
Drag and drop the facts about wireless architectures from the left onto the types of access point on the right. Not all options are used. acccessible for management via Tenet SSH, or a Web GUI requires a management IP address configured and managed by a WLC supports different operational modes supports management deployment.
What is the MAC address used with VRRP as a virtual address? 00-07-C0-70-AB-01 00-00-5E-00-01-0a 00-00-0C-07-AD-89 00-C6-41-93-90-91.
Drag and drop the functions of SNMP fault-management from the left onto the definitions on the right. The network management system launches a preconfigured script to restore functionality: The administrator can manually intervene at the source of the fault: The system identifies performance degradation or service interruption: The system groups alarms from related issues: The system reports on the source of the issue: .
Drag and drop the IPv6 addresses from the left onto the corresponding address types on the right.
2001:db8:600d:cafe::123 fe80:a00:27ff:feeb:8eaa ff05::1:3 fcba:926a:e8e:7a25:b1:c6d2:1a76:8fdc .
What is a feature of TFTP? offers anonymous user login ability uses two separate connections for control and data traffic provides secure data transfer relies on the well-known TCP port 20 to transmit data.
An engineer is asked to configure router R1 so that it forms an OSPF single-area neighbor relationship with R2. Which command sequence must be implemented to configure the router? router ospf 10
network 10.0.0.0 0.0.0.3 area 0
network 10.0.1.0 0.0.0.255 area 0 router ospf 10
network 10.0.0.0 0.0.0.3 area 0
network 10.0.2.0 255.255.255.0 area 0 router ospf 10
network 10.0.0.0 0.0.0.3 area 0
network 10.0.2.0 0.0.0.255 area 0 router ospf 10
network 10.0.0.0 0.0.0.252 area 0
network 10.0.1.0 0.0.0.255 area 0.
Wi-Fi option based around one or more access points Wi-Fi option based around one or more access points: Wi-Fi option in which cells from different access points are linked together alphanumeric text string that identifies a wireless network: Wi-Fi option that enables two or more clients to communicate directly without a central access point: entire wireless cell of an access point and the linkage to the wired network: .
What is a function of spine-and-leaf architecture? offers predictable latency of the traffic path between end devices mitigates oversubscription by adding a layer of leaf switches limits payload size of traffic within the leaf layer exclusively sends multicast traffic between servers that are directly connected to the spine.
Which two REST API status-code classes represent errors? (Choose two) 4XX 1XX 3XX 5XX 2XX.
Which command implies the use of SNMPv3? snmp-server user snmp-server community snmp-server host snmp-server enable traps.
What is an advantage of using auto mode versus static mode for power allocation when an access point is connected to a PoE switch port? All four pairs of the cable are used The default level is used for the access point Power policing is enabled at the same time It detects the device is a powered device.
What are two features of the DHCP relay agent? (Choose two)
permits one IP helper command under an individual Layer 3 interface minimizes the necessary number of DHCP servers allows only MAC-to-IP reservations to determine the local subnet of a client is configured under the Layer 3 interface of a router on the client subnet assigns DNS locally and then forwards request to DHCP server.
Which two IPv6 addresses are used to provide connectivity between two routers on a shared link? (Choose two) ::ffff:10.14.101.1/96 2002::512:1204b:1111::1/64 2001:701:104b:1111::1/64 ff06:bb43:cc13:dd16:1bb:ff14:7545:234d FF02::0001:FF00:0000/104.
Drag and drop the Ansible features from the left to the right. Not all features are used. uses the YAML language
executes modules via SSH by default pushes configurations to the client operates without agents uses agents to manage hosts requires clients to pull configuration from the server.
Which command configures the Cisco WLC to prevent a serial session with the WLC CLI from being automatically logged out? config sessions timeout 0 config serial timeout 9600 config serial timeout 0 config sessions maxsessions 0.
A public IPv6 address must be configured for internet access. Which command must be configured on the R2 WAN interface to the service provider? ipv6 address fe80: :/10 ipv6 address 2001:db8:123:45::4/64 ipv6 address 2001:db8:433:47:4620:ffff:ffff:ffff/64 anycast ipv6 address fe80::260:3EFF:FE11:6770 link-local.
LAB QUESTION 1 A B C D.
What is a function of Layer 3 switches? They route traffic between devices in different VLANs They transmit broadcast traffic when operating in Layer 3 mode exclusively. They forward Ethernet frames between VLANs using only MAC addresses. They move frames between endpoints limited to IP addresses.
PUPPET JSON QUESTION 1 array object Boolean string.
Which two functions does a WLC perform in the lightweight access-point architecture that an AP performs independently in an autonomous architecture? (Choose two) encrypting and decrypting traffic that uses the WAP protocol family managing RF channels, including transmission power handling the association, authentication, and roaming of wireless clients preventing collisions between wireless clients on the same RF channel sending and processing beacon frames.
Refer to the exhibit.
What is the cause of the issue? port security wrong cable type STP shutdown command.
LAB QUESTION 2
Which command set configures ROUTER-1 to allow Internet access for users on the 192.168.1.0/24 subnet while using 188.8.131.52 for Port Address Translation? CORRECT? WRONG?.
Drag and drop the device behaviors from the left onto the matching HSRP state on the right. is waiting to hear from the neighbor device is forwarding packets has heard from the neighbor device and is receiving hello packets is transmitting and receiving hello packets is ready to forward packets if the device that is currently forwarding packets fails.
Which function forwards frames to ports that have a matching destination MAC address?
frame switching frame pushing frame flooding frame filtering.
Which interface type enables an application running on a client to send data over an IP network to a server? southbound interface Representational State Transfer application programming interface application programming interface northbound interface.
A guest WLAN must be created that prompts the client for a username and password on the local web page of the WLC. Which two actions must be performed on the Layer 2 tab before enabling the Authentication option on the Layer 3 tab? (Choose two) Set the Layer 2 Security option to None Uncheck the MAC Filtering option check box Change the WPA Encryption option from TKIP to CCMP128(AES). Uncheck the WPA Policy option check box, and check the WPA2 Policy option check box. Set the Security Type option to Personal.
Drag and drop the RF terms from the left onto the corresponding statements on the right. deviation from the propagation path that occurs when a signal encounters an obstacle measure of the minimum power required to decode a radio signal without excessive errors reduction of energy in a signal as it travels away from the access point and encounters free space or obstacles measure of the total unwanted signals at the receiver relative power of the desired radio signal to unwanted signals at the receiver .
Which two actions are taken as the result of traffic policing? (Choose two) bursting remarking dropping buffering fragmentation.
Drag and drop the characteristics of device-management technologies from the left onto the corresponding deployment types on the right.
orchestrates background device configuration supports centralized software management supports open APIs provides greater flexibility for custom and non-standard configurations relies on per-device management uses individual software management.
Drag and drop the REST API call method for HTTP from the left onto the action they perform on the right. reads data from the server removes a resource from the server updates an entry in the database creates a resource on the server unused.
What is a purpose of traffic shaping? It provides best-effort service It limits bandwidth usage. It enables dynamic flow identification. It enables policy-based routing.
Which interface enables communication between a program on the controller and a program on the networking devices? tunnel interface
northbound interface software virtual interface southbound interface.
Drag and drop the Ansible terms from the left onto the right. ollection of actions to perform on target devices, expressed in YAML format device with Ansible installed that manages target devices network device, without Ansible installed, upon which commands can be executed specific action to be performed on one or more target devices unit of Python code to be executed Ansible file that defines the target devices upon which commands and tasks can be executed .
Drag and drop the DNS commands from the left onto their effects on the right. nables host-to-IP-address translation adds an entry to the host table displays address-mapping information specifies the IP address of the DNS server completes the FQDN of the DNS server .
Drag and drop the statement about AAA services from the left to the corresponding AAA services on the right. It records the duration of each connection It supports User Access Reporting It restricts the CLI commands that a user is able to perform It performs user validation via TACACS+ It verifies "who you are" It grants access to network assets, such as FTP servers.
What are two reasons a switch experiences frame flooding? (Choose two) The forwarding table has overflowed A defective patch cable is connected to the switch port Port-security is configured globally An aged MAC table entry is causing excessive updates Topology changes are occurring within spanning-tree.
Which two protocols are used by an administrator for authentication and configuration on access points? (Choose two) RADIUS 802.1x TACACS+ Kerberos 802.1Q.
An engineer is configuring a switch port that is connected to a VoIP handset. Which command must the engineer configure to enable port security with a manually assigned MAC address of abcd-bcd on voice VLAN 4? switchport port-security mac-address sticky abcd.abcd.abcd vlan 4 switchport port-security mac-address abcd.abcd.abcd vlan 4 switchport port-security mac-address abcd.abcd.abcd switchport port-security mac-address abcd.abcd.abcd vlan voice.
Which type of address is shared by routers in a HSRP implementation and used by hosts on the subnet as their default gateway address? broadcast address multicast address loopback IP address virtual IP address.
The address block 192.168.32.0/24 must be subnetted into smaller networks. The engineer must meet these requirements:
* Create 8 new subnets
* Each subnet must accommodate 30 hosts
* Interface VLAN 10 must use the last usable IP in the first new subnet
* A Layer 3 interface is used
Which configuration must be applied to the interface? no switchport
ip address 192.168.32.30 255.255.255.224 no switchport mode access
ip address 192.168.32.62 255.255.255.240 no switchport mode trunk
ip address 192.168.32.97 255.255.255.224 switchport
ip address 192.168.32.65 255.255.255.240.
How does encryption protect the wireless network? via specific ciphers to detect and prevent zero-day network attacks via integrity checks to identify wireless forgery attacks in the frame via an algorithm to change wireless data so that only the access point and client understand it via a policy to prevent unauthorized users from communicating on the wireless network.
When deploying a new network that includes both Cisco and third-party network devices, which redundancy protocol avoids the interruption of network traffic if the default gateway router fails? GLBP FHRP VRRP HSRP.
The EtherChannel is configured with a speed of 1000 and duplex as full on both ends of channel group 1. What is the next step to configure the channel on switch A to respond to but not initiate LACP communication? interface port-channel 1
channel-group 1 mode auto interface port-channel 1
channel-group 1 mode passive interface range gigabitethernet0/0/0 -15
channel-group 1 mode desirable interface range gigabitethernet0/0/0 -15
channel-group 1 mode on.
LAB Q3 A B C D E.
SIP-based Call Admission Control must be configured in the Cisco WLC GUI. SIP call-snooping ports are configured. Which two actions must be completed next? (Choose two) Enable traffic shaping for the LAN interface of the WLC Enable Media Session Snooping on the WLAN Set the QoS level to platinum for voice traffic Configure two different QoS roles for data and voice traffic Set the QoS level to silver or greater for voice traffic.
Which device separates networks by security domains? firewall access point wireless controller intrusion protection system.
When an access point is seeking to join a wireless LAN controller, which message is sent to the AP-Manager interface? discovery request DHCP request DHCP discover discovery response.
LAB QUESTION 4 a b c d e.
Drag and drop the SNMP components from the left onto the descriptions on the right. network node controlled by SNMP: collection of uniquely identifiable objects whose state can be interrogated over SNMP: system that runs monitoring applications and controls network nodes: SNMP component that captures and translates device and network data: .
Which two values does router R1 use to identify valid routes for the R3 loopback address 184.108.40.206/32? (Choose two) highest metric lowest cost to reach the next hop lowest metric lowest administrative distance highest administrative distance.
The network engineer is configuring a new WLAN and is told to use a setup password for authentication instead of the RADIUS servers. Which additional set of tasks must the engineer perform to complete the configuration? Select WPA Policy
Enable PSK Disable PMF
Enable 802.1x Select WPA Policy
Select WPA2 Policy
Enable FT PSK Select WPA2 Policy
What are two benefits of private IPv4 addressing? (Choose two) propagates routing information to WAN links provides unlimited address ranges reuses addresses at multiple sites provides external internet network connectivity conserves globally unique address space.
Drag and drop the statements about device management from the left onto the corresponding types on the right. requires manual configuration of complex protocols lacks support for SDA leverages Cisco Prime Infrastructure reduces the workload for enterprise customers uses algorithms to detect security threats uses northbound APIs.
Which advantage does the network assurance capability of Cisco DNA Center provide over traditional campus management? Cisco DNA Center automatically compares security postures among network devices, and traditional campus management needs manual comparisons Cisco DNA Center correlates information from different management protocols to obtain insights, and traditional campus management requires manual analysis Cisco DNA Center leverages YANG and NETCONF to assess the status of fabric and nonfabric devices, and traditional campus management uses CLI exclusively Cisco DNA Center handles management tasks at the controller to reduce the load on infrastructure devices, and traditional campus management uses the data backbone.
What uses HTTP messages to transfer data to applications residing on different hosts? OpenStack REST OpenFlow OpFlex.
Which two server types support domain name to IP address resolution? (Choose two) authoritative file transfer ESX host resolver web.
What is the function of a controller in a software-defined network? multicast replication at the hardware level forwarding packets setting packet-handling policies fragmenting and reassembling packets.
Which channel-group mode must be configured when multiple distribution switch interfaces connected to a WLC are bundled? channel-group mode active channel-group mode passive channel-group mode on channel-group mode desirable.
LABS QUESTION 5 a b c d.
LABS QUESTION 6 a b c d.
Which two northbound APIs are found in a software-defined network? (Choose two) OpenFlow SOAP REST NETCONF OpFLEX.
Which switching feature removes unused MAC addresses from the MAC address table, which allows new MAC addresses to be added? MAC move dynamic MAC address learning MAC address auto purge MAC address aging.
Which command enables HTTP access to the Cisco WLC? config network secureweb enable config network webmode enable config certificate generate webadmin config network telnet enable.
When is the PUT method used within HTTP? to display a web site to update a DNS server when a nonidempotent operation is needed when a read-only operation is required.
What is the primary purpose of a console port on a Cisco WLC? out-of-band management via an asynchronous transport out-of-band management via an IP transport in-band management via an asynchronous transport in-band management via an IP transport.
A Cisco engineer notices that two OSPF neighbors are connected using a crossover Ethernet cable. The neighbors are taking too long to become fully adjacent. Which command must be issued under the interface configuration on each router to reduce the time required for the adjacency to reach the FULL state? ip ospf priority 0 ip ospf network point-to-point p ospf dead-interval 40 ip ospf network broadcast.
SW_1 and SW_12 represent two companies that are merging. They use separate network vendors. The VLANs on both sides have been migrated to share IP subnets. Which command sequence must be issued on both sides to join the two companies and pass all VLANs between the companies? switchport mode trunk
switch port trunk encapsulation dot1q switchport dynamic auto
switchport nonegotiate switchport mode dynamic desirable
switchport trunk allowed vlan all
switchport trunk native vlan 7 switchport mode trunk
switchport trunk allowed vlan all
switchport dot1q ethertype 0800.
What is a benefit of a point-to-point leased line? simplicity of configuration low cost full-mesh capability flexibility of design.
Drag and drop the elements of a security program from the left onto the corresponding descriptions on the right. training security standard security policy education awareness.
Drag and drop the QoS terms from the left onto the descriptions on the right.
Class-based weighted fair queuing Classification Congestion Policing Shaping.