Month End Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! 200-301 Cisco Certified Network Associate is now Stable and With Pass Result

200-301 Practice Question and Answers

Cisco Certified Network Associate

Last Update 6 days ago
Total Questions : 903

200-301 is stable now with all latest exam questions are added 6 days ago. Just download our Full package and start your journey with Cisco Certified Network Associate certification. All these Cisco 200-301 practice questions are real and verified by our Experts in the related industry fields.

200-301 PDF

200-301 PDF (Printable)
$53.2
$132.99

200-301 Testing Engine

200-301 PDF (Printable)
$58
$144.99

200-301 PDF + Testing Engine

200-301 PDF (Printable)
$72.8
$181.99
Question # 1

Question # 1

All physical cabling between the two switches is installed. Configure the network connectivity between the switches using the designated VLANs and interfaces.

1. Configure VLAN 100 named Compute and VLAN 200 named Telephony where required for each task.

2. Configure Ethernet0/1 on SW2 to use the existing VLAN named Available.

3. Configure the connection between the switches using access ports.

4. Configure Ethernet0/1 on SW1 using data and voice VLANs.

5. Configure Ethemet0/1 on SW2 so that the Cisco proprietary neighbor discovery protocol is turned off for the designated interface only.

Question # 1

Options:

Discussion 0
Question # 2

Physical connectivity is implemented between the two Layer 2 switches, and the network connectivity between them must be configured

1. Configure an LACP EtherChannel and number it as 1; configure it between switches SW1 and SVV2 using interfaces Ethernet0/0 and Ethernet0/1 on both sides. The LACP mode must match on both ends

2 Configure the EtherChannel as a trunk link.

3. Configure the trunk link with 802.1 q tags.

4. Configure the native VLAN of the EtherChannel as VLAN 15.

Question # 2Question # 2

Options:

Discussion 0
Question # 3

Connectivity between four routers has been established. IP connectivity must be configured in the order presented to complete the implementation. No dynamic routing protocols are included.

1. Configure static routing using host routes to establish connectivity from router R3 to the router R1 Loopback address using the source IP of 209.165.200.230.

2. Configure an IPv4 default route on router R2 destined for router R4.

3. Configure an IPv6 default router on router R2 destined for router R4.

Question # 3Question # 3

Options:

Discussion 0
Question # 4

Question # 4

Question # 4

Connectivity between three routers has been established, and IP services must be configured jn the order presented to complete the implementation Tasks assigned include configuration of NAT, NTP, DHCP, and SSH services.

1. All traffic sent from R3 to the R1 Loopback address must be configured for NAT on R2. All source addresses must be translated from R3 to the IP address of Ethernet0/0 on R2, while using only a standard access list named NAT To verify, a ping must be successful to the R1 Loopback address sourced from R3. Do not use NVI NAT configuration.

2. Configure R1 as an NTP server and R2 as a client, not as a peer, using the IP address of the R1 Ethernet0/2 interface. Set the clock on the NTP server for midnight on January 1, 2019.

3. Configure R1 as a DHCP server for the network 10.1.3.0/24 in a pool named TEST. Using a single command, exclude addresses 1-10 from the range. Interface Ethernet0/2 on R3 must be issued the IP address of 10.1.3.11 via DHCP.

4. Configure SSH connectivity from R1 to R3, while excluding access via other remote connection protocols. Access for user root and password Cisco must be set on router R3 using RSA and 1024 bits. Verify connectivity using an SSH session from router R1 using a destination address of 10.1.3.11. Do NOT modify console access or line numbers to accomplish this task.

Options:

Discussion 0
Question # 5

Which QoS traffic handling technique retains excess packets in a queue and reschedules these packets for later transmission when the configured maximum bandwidth has been surpassed?

Options:

A.  

weighted random early detection

B.  

traffic policing

C.  

traffic shaping

D.  

traffic prioritization

Discussion 0
Question # 6

Refer to the exhibit.

Question # 6

Which configuration enables DHCP addressing for hosts connected to interface FastEthernetO/1 on router R4?

Options:

A.  

interface FastEthernet0/0

ip helper-address 10.0.1.1

i

access-list 100 permit udp host 10.0.1.1 eq bootps host 10.148.2.1

B.  

interface FastEthernot0/1

ip helper-address 10.0.1.1

!

access-list 100 permit tcp host 10.0.1.1 eq 67 host 10.148.2.1

C.  

interface FastEthernetO/0

ip helper-address 10.0.1.1

I

access-list 100 permit host 10.0.1.1 host 10.148.2.1 eq bootps

D.  

interface FastEthernet0/1

ip helper-address 10.0.1.1

!

access-list 100 permit udp host 10.0.1.1 eq bootps host 10.148.2.1

Discussion 0
Question # 7

Which protocol is used for secure remote CLI access?

Options:

A.  

HTTPS

B.  

HTTP

C.  

Telnet

D.  

SSH

Discussion 0
Question # 8

What is one reason to implement LAG on a Cisco WLC?

Options:

A.  

to increase security and encrypt management frames

B.  

to provide link redundancy and load balancing

C.  

to allow for stateful and link-state failover

D.  

to enable connected switch ports to failover and use different VLANs

Discussion 0
Question # 9

What is a function of an endpoint on a network?

Options:

A.  

forwards traffic between VLANs on a network

B.  

connects server and client devices to a network

C.  

allows users to record data and transmit to a tile server

D.  

provides wireless services to users in a building

Discussion 0
Question # 10

What is the purpose of the ip address dhcp command?

Options:

A.  

to configure an Interface as a DHCP server

B.  

to configure an interface as a DHCP helper

C.  

to configure an interface as a DHCP relay

D.  

to configure an interface as a DHCP client

Discussion 0
Question # 11

Refer to the exhibit.

Question # 11

Switch A is newly configured. All VLANs are present in the VLAN database. The IP phone and PC A on Gi0/1 must be configured for the appropriate VLANs to establish connectivity between the PCs. Which command set fulfills the requirement?

A)

Question # 11

B)

Question # 11

C)

Question # 11

D)

Question # 11

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 12

What are two benefits of network automation? (Choose two)

Options:

A.  

reduced operational costs

B.  

reduced hardware footprint

C.  

faster changes with more reliable results

D.  

fewer network failures

E.  

increased network security

Discussion 0
Question # 13

An engineer is configuring remote access to a router from IP subnet 10.139.58.0/28. The domain name, crypto keys, and SSH have been configured. Which configuration enables the traffic on the destination router?

A)

Question # 13

B)

Question # 13

C)

Question # 13

D)

Question # 13

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 14

Which command must be entered when a device is configured as an NTP server?

Options:

A.  

ntp authenticate

B.  

ntp server

C.  

ntp peer

D.  

ntp master

Discussion 0
Question # 15

Where does wireless authentication happen?

Options:

A.  

SSID

B.  

radio

C.  

band

D.  

Layer 2

Discussion 0
Question # 16

Refer to the exhibit.

Question # 16

An administrator configures four switches for local authentication using passwords that are stored in a cryptographic hash. The four switches must also support SSH access for administrators to manage the network infrastructure. Which switch is configured correctly to meet these requirements?

Options:

A.  

SW1

B.  

SW2

C.  

SW3

D.  

SW4

Discussion 0
Question # 17

Refer to the exhibit.

Question # 17

The DHCP server and clients are connected to the same switch. What is the next step to complete the DHCP configuration to allow clients on VLAN 1 to receive addresses from the DHCP server?

Options:

A.  

Configure the ip dhcp snooping trust command on the interlace that is connected to the DHCP client.

B.  

Configure the ip dhcp relay information option command on the interface that is connected to the DHCP client.

C.  

Configure the ip dhcp snooping trust command on the interface that is connected to the DHCP server.

D.  

Configure the Ip dhcp relay information option command on the interface that is connected to the DHCP server.

Discussion 0
Question # 18

Refer to the exhibit.

Question # 18

Site A was recently connected to site B over a new single-mode fiber path. Users at site A report Intermittent connectivity Issues with applications hosted at site

B.  

What is the reason for the problem?

Options:

A.  

Heavy usage is causing high latency.

B.  

An incorrect type of transceiver has been inserted into a device on the link.

C.  

physical network errors are being transmitted between the two sites.

D.  

The wrong cable type was used to make the connection.

Discussion 0
Question # 19

What causes a port to be placed in the err-disabled state?

Options:

A.  

nothing plugged into the port

B.  

link flapping

C.  

shutdown command issued on the port

D.  

latency

Discussion 0
Question # 20

Question # 20

Question # 20

IP connectivity between the three routers is configured. OSPF adjacencies must be established.

1. Configure R1 and R2 Router IDs using the interface IP addresses from the link that is shared between them.

2. Configure the R2 links with a max value facing R1 and R3. R2 must become the DR. R1 and R3 links facing R2 must remain with the default OSPF configuration for DR election. Verify the configuration after clearing the OSPF process.

3. Using a host wildcard mask, configure all three routers to advertise their respective Loopback1 networks.

4. Configure the link between R1 and R3 to disable their ability to add other OSPF routers.

Options:

Discussion 0
Question # 21

Which action implements physical access control as part of the security program of an organization?

Options:

A.  

configuring a password for the console port

B.  

backing up syslogs at a remote location

C.  

configuring enable passwords on network devices

D.  

setting up IP cameras to monitor key infrastructure

Discussion 0
Question # 22

Which PoE mode enables powered-device detection and guarantees power when the device is detected?

Options:

A.  

dynamic

B.  

static

C.  

active

D.  

auto

Discussion 0
Question # 23

Which two network actions occur within the data plane? (Choose two.)

Options:

A.  

Add or remove an 802.1Q trunking header.

B.  

Make a configuration change from an incoming NETCONF RP

C.  

C.  

Run routing protocols.

D.  

Match the destination MAC address to the MAC address table.

E.  

Reply to an incoming ICMP echo request.

Discussion 0
Question # 24

Which characteristic differentiates the concept of authentication from authorization and accounting?

Options:

A.  

user-activity logging

B.  

service limitations

C.  

consumption-based billing

D.  

identity verification

Discussion 0
Question # 25

Refer to the exhibit.

Question # 25

Which two commands must be configured on router R1 to enable the router to accept secure remote-access connections? (Choose two)

Options:

A.  

transport input telnet

B.  

crypto key generate rsa

C.  

ip ssh pubkey-chain

D.  

login console

E.  

username cisco password 0 Cisco

Discussion 0
Question # 26

Refer to the exhibit.

Question # 26

Traffic that is flowing over interface TenGigabitEthernet0/0 experiences slow transfer speeds. What is the reason for the issue?

Options:

A.  

heavy traffic congestion

B.  

a duplex incompatibility

C.  

a speed conflict

D.  

queuing drops

Discussion 0
Question # 27

Refer to the exhibit.

Question # 27

An engineer is configuring a new router on the network and applied this configuration. Which additional configuration allows the PC to obtain its IP address from a DHCP server?

Options:

A.  

Configure the ip dhcp relay information command under interface Gi0/1.

B.  

Configure the ip dhcp smart-relay command globally on the router

C.  

Configure the ip helper-address 172.16.2.2 command under interface Gi0/0

D.  

Configure the ip address dhcp command under interface Gi0/0

Discussion 0
Question # 28

Refer to the exhibit.

Question # 28

An engineer assumes a configuration task from a peer Router A must establish an OSPF neighbor relationship with neighbor 172 1 1 1 The output displays the status of the adjacency after 2 hours. What is the next step in the configuration process for the routers to establish an adjacency?

Options:

A.  

Configure router A to use the same MTU size as router

B.  

B.  

Set the router B OSPF ID to a nonhost address.

C.  

Configure a point-to-point link between router A and router

B.  

D.  

Set the router B OSPF ID to the same value as its IP address

Discussion 0
Question # 29

Refer to the exhibit.

Question # 29

Which two configurations must the engineer apply on this network so that R1 becomes the DR? (Choose two.)

A)

Question # 29

B)

Question # 29

C)

Question # 29

D)

Question # 29

E)

Question # 29

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

E.  

Option E

Discussion 0
Question # 30

A Cisco engineer must configure a single switch interface to meet these requirements

• accept untagged frames and place them in VLAN 20

• accept tagged frames in VLAN 30 when CDP detects a Cisco IP phone

Which command set must the engineer apply?

A)

Question # 30

B)

Question # 30

C)

Question # 30

D)

Question # 30

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 31

What is a requirement for nonoverlapping Wi-Fi channels?

Options:

A.  

different security settings

B.  

discontinuous frequency ranges

C.  

different transmission speeds

D.  

unique SSIDs

Discussion 0
Question # 32

Which two spanning-tree states are bypassed on an interface running PortFast? (Choose two.)

Options:

A.  

disabled

B.  

listening

C.  

forwarding

D.  

learning

E.  

blocking

Discussion 0
Question # 33

Refer to the exhibit.

Question # 33

A network engineer must update the configuration on Switch2 so that it sends LLDP packets every minute and the information sent via LLDP is refreshed every 3 minutes Which configuration must the engineer apply?

A)

Question # 33

B)

Question # 33

C)

Question # 33

D)

Question # 33

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 34

Refer to the exhibit.

Question # 34

An engineer has started to configure replacement switch SW1. To verify part of the configuration, the engineer issued the commands as shown and noticed that the entry for PC2 is missing. Which change must be applied to SW1 so that PC1 and PC2 communicate normally?

A)

Question # 34

B)

Question # 34

C)

Question # 34

D)

Question # 34

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 35

An administrator must secure the WLC from receiving spoofed association requests. Which steps must be taken to configure the WLC to restrict the requests and force the user to wait 10 ms to retry an association request?

Options:

A.  

Enable Security Association Teardown Protection and set the SA Query timeout to 10

B.  

Enable MAC filtering and set the SA Query timeout to 10

C.  

Enable 802.1x Layer 2 security and set me Comeback timer to 10

D.  

Enable the Protected Management Frame service and set the Comeback timer to 10

Discussion 0
Question # 36

What is a function of a Layer 3 switch?

Options:

A.  

move frames between endpoints limited to IP addresses

B.  

transmit broadcast traffic when operating in Layer 3 mode exclusively

C.  

forward Ethernet frames between VLANs using only MAC addresses

D.  

flood broadcast traffic within a VLAN

Discussion 0
Question # 37

Refer to the exhibit.

Question # 37

Which route type is configured to reach the internet?

Options:

A.  

host route

B.  

default route

C.  

floating static route

D.  

network route

Discussion 0
Question # 38

Which statement correctly compares traditional networks and controller-based networks?

Options:

A.  

Only traditional networks offer a centralized control plane

B.  

Only traditional networks natively support centralized management

C.  

Traditional and controller-based networks abstract policies from device configurations

D.  

Only controller-based networks decouple the control plane and the data plane

Discussion 0
Question # 39

Refer to the exhibit.

Question # 39

An engineer is required to verify that the network parameters are valid for the users wireless LAN connectivity on a /24 subnet. Drag and drop the values from the left onto the network parameters on the right. Not all values are used.

Question # 39

Options:

Discussion 0
Question # 40

An organization secures its network with multi-factor authentication using an authenticator app on employee smartphone. How is the application secured in the case of a user’s smartphone being lost or stolen?

Options:

A.  

The application requires an administrator password to reactivate after a configured Interval.

B.  

The application requires the user to enter a PIN before it provides the second factor.

C.  

The application challenges a user by requiring an administrator password to reactivate when the smartphone is rebooted.

D.  

The application verifies that the user is in a specific location before it provides the second factor.

Discussion 0
Question # 41

Which condition must be met before an NMS handles an SNMP trap from an agent?

Options:

A.  

The NMS software must be loaded with the MIB associated with the trap.

B.  

The NMS must be configured on the same router as the SNMP agent

C.  

The NMS must receive a trap and an inform message from the SNMP agent within a configured interval

D.  

The NMS must receive the same trap from two different SNMP agents to verify that it is reliable.

Discussion 0
Question # 42

Refer to the exhibit.

Question # 42

A packet is being sent across router R1 to host 172.163.3.14. To which destination does the router send the packet?

Options:

A.  

207.165.200.246 via Serial0/1/0

B.  

207.165.200.254 via Serial0/0/1

C.  

207.165.200.254 via Serial0/0/0

D.  

207.165.200.250 via Serial/0/0/0

Discussion 0
Question # 43

Drag and drop the AAA terms from the left onto the description on the right.

Question # 43

Options:

Discussion 0
Question # 44

A device detects two stations transmitting frames at the same time. This condition occurs after the first 64 bytes of the frame is received interface counter increments?

Options:

A.  

collision

B.  

CRC

C.  

runt

D.  

late collision

Discussion 0
Question # 45

Refer to the exhibit.

Question # 45

Router R4 is dynamically learning the path to the server. If R4 is connected to R1 via OSPF Area 20, to R2 v2ia R2 BGP, and to R3 via EIGRP 777, which path is installed in the routing table of R4?

Options:

A.  

the path through R1, because the OSPF administrative distance is 110

B.  

the path through R2. because the IBGP administrative distance is 200

C.  

the path through R2 because the EBGP administrative distance is 20

D.  

the path through R3. because the EIGRP administrative distance is lower than OSPF and BGP

Discussion 0
Question # 46

Refer to the exhibit.

Question # 46

Which change to the configuration on Switch?

allows the two switches to establish an GtherChannel?

Options:

A.  

Change the protocol to EtherChannel mode on.

B.  

Change the LACP mode to active

C.  

Change the LACP mode to desirable

D.  

Change the protocol to PAqP and use auto mode

Discussion 0
Question # 47

Using direct sequence spread spectrum, which three 2.4-GHz channels are used to limit collisions?

Options:

A.  

1,6,11

B.  

1,5,10

C.  

1,2,3

D.  

5,6,7

Discussion 0
Question # 48

Which statement identifies the functionality of virtual machines?

Options:

A.  

Virtualized servers run most efficiently when they are physically connected to a switch that is separate from the hypervisor

B.  

The hypervisor can virtualize physical components including CPU. memory, and storage

C.  

Each hypervisor can support a single virtual machine and a single software switch

D.  

The hypervisor communicates on Layer 3 without the need for additional resources

Discussion 0
Question # 49

Which port type supports the spanning-tree portfast command without additional configuration?

Options:

A.  

access ports

B.  

Layer 3 main Interfaces

C.  

Layer 3 suninterfaces

D.  

trunk ports

Discussion 0
Question # 50

Refer to the exhibit.

Question # 50

PC1 is trying to ping PC3 for the first time and sends out an ARP to S1 Which action is taken by S1?

Options:

A.  

It forwards it out G0/3 only

B.  

It is flooded out every port except G0/0.

C.  

It drops the frame.

D.  

It forwards it out interface G0/2 only.

Discussion 0
Question # 51

Which two components are needed to create an Ansible script that configures a VLAN on a switch? (Choose two.)

Options:

A.  

cookbook

B.  

task

C.  

playbook

D.  

model

E.  

recipe

Discussion 0
Question # 52

Which command on a port enters the forwarding state immediately when a PC is connected to it?

Options:

A.  

switch(config)#spanning-tree portfast default

B.  

switch(config)#spanning-tree portfast bpduguard default

C.  

switch(config-if)#spanning-tree portfast trunk

D.  

switch(config-if)#no spanning-tree portfast

Discussion 0
Question # 53

Refer to Exhibit.

Question # 53

The loopback1 interface of the Atlanta router must reach the loopback3 interface of the Washington router. Which two static host routes must be configured on the NEW York router? (Choose two)

Options:

A.  

ipv6 route 2000::1/128 2012::1

B.  

ipv6 route 2000::3/128 2023::3

C.  

ipv6 route 2000::3/128 s0/0/0

D.  

ipv6 route 2000::1/128 2012::2

E.  

ipv6 route 2000::1/128 s0/0/1

Discussion 0
Question # 54

How are the switches in a spine-and-leaf topology interconnected?

Options:

A.  

Each leaf switch is connected to one of the spine switches.

B.  

Each leaf switch is connected to two spine switches, making a loop.

C.  

Each leaf switch is connected to each spine switch.

D.  

Each leaf switch is connected to a central leaf switch, then uplinked to a core spine switch.

Discussion 0
Question # 55

Drag and drop the network protocols from the left onto the correct transport services on the right.

Question # 55

Options:

Discussion 0
Question # 56

What is a network appliance that checks the state of a packet to determine whether the packet is legitimate?

Options:

A.  

Layer 2 switch

B.  

load balancer

C.  

firewall

D.  

LAN controller

Discussion 0
Question # 57

A network analyst is tasked with configured the date and time on a router using EXEC mode. The date must be set to 12:00am. Which command should be used?

Options:

A.  

Clock timezone

B.  

Clock summer-time-recurring

C.  

Clock summer-time date

D.  

Clock set

Discussion 0
Question # 58

Which protocol does an IPv4 host use to obtain a dynamically assigned IP address?

Options:

A.  

ARP

B.  

DHCP

C.  

CDP

D.  

DNS

Discussion 0
Question # 59

Which two command sequences must you configure on switch to establish a Layer 3 EtherChannel with an open-standard protocol? (Choose two )

Options:

A.  

interface GigabitEthernet0/0/1

channel-group 10 mode on

B.  

interface GigabitEthernet0/0/1

channel-group 10 mode active

C.  

interface GigabitEthernet0/0/1

channel-group 10 mode auto

D.  

interface port-channel 10

switchport

switchport mode trunk

E.  

interface port-channel 10

no switchport

ip address 172.16.0.1.255.255.255.0

Discussion 0
Question # 60

What is a function of Wireless LAN Controller?

Options:

A.  

register with a single access point that controls traffic between wired and wireless endpoints.

B.  

use SSIDs to distinguish between wireless clients.

C.  

send LWAPP packets to access points.

D.  

monitor activity on wireless and wired LANs

Discussion 0
Question # 61

What are two functions of a server on a network? (Choose two)

Options:

A.  

achieves redundancy by exclusively using virtual server clustering

B.  

runs applications that send and retrieve data for workstations that make requests

C.  

handles requests from multiple workstations at the same time

D.  

runs the same operating system in order to communicate with other servers

E.  

housed solely in a data center that is dedicated to a single client

Discussion 0
Question # 62

in Which way does a spine and-leaf architecture allow for scalability in a network when additional access ports are required?

Options:

A.  

A spine switch and a leaf switch can be added with redundant connections between them

B.  

A spine switch can be added with at least 40 GB uplinks

C.  

A leaf switch can be added with a single connection to a core spine switch.

D.  

A leaf switch can be added with connections to every spine switch

Discussion 0
Question # 63

What must be considered when using 802:11 ta?

Options:

A.  

It is compatible with 802 lib- and 802 11-compliant wireless devices

B.  

It is used in place of 802 11b/g when many nonoverlapping channels are required

C.  

It is susceptible to interference from 2 4 GHz devices such as microwave ovens.

D.  

It is chosen over 802 11b/g when a lower-cost solution is necessary

Discussion 0
Question # 64

Question # 64

Question # 64

Question # 64

IP connectivity and OSPF are preconfigured on all devices where necessary. Do not make any changes to the IP addressing or OSP

F.  

The company policy uses connected interfaces and next hops when configuring static routes except for load balancing or redundancy without floating static. Connectivity must be established between subnet 172.20.20.128/25 on the Internet and the LAN at 192.168.0.0/24 connected to SW1:

1. Configure reachability to the switch SW1 LAN subnet in router R2.

2. Configure default reachability to the Internet subnet in router R1.

3. Configure a single static route in router R2 to reach to the Internet subnet considering both redundant links between routers R1 and R2. A default route is NOT allowed in router R2.

4. Configure a static route in router R1 toward the switch SW1 LAN subnet where the primary link must be through Ethernet0/1. and the backup link must be through Ethernet0/2 using a floating route. Use the minimal administrative distance value when required.

Options:

Discussion 0
Question # 65

Which technology is appropriate for communication between an SDN controller and applications running over the network?

Options:

A.  

OpenFlow

B.  

REST API

C.  

NETCONF

D.  

Southbound API

Discussion 0
Question # 66

Which command prevents passwords from being stored in the configuration as plain text on a router or switch?

Options:

A.  

enable secret

B.  

service password-encryption

C.  

username Cisco password encrypt

D.  

enable password

Discussion 0
Question # 67

R1 as an NTP server must have:

• NTP authentication enabled

• NTP packets sourced from Interface loopback 0

• NTP stratum 2

• NTP packets only permitted to client IP 209.165 200 225

How should R1 be configured?

A)

Question # 67

B)

Question # 67

C)

Question # 67

D)

Question # 67

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 68

Refer to the exhibit.

Question # 68

Which command provides this output?

Options:

A.  

show ip route

B.  

show ip interface

C.  

show interface

D.  

show cdp neighbor

Discussion 0
Question # 69

What is a benefit of VRRP?

Options:

A.  

It provides traffic load balancing to destinations that are more than two hops from the source.

B.  

It provides the default gateway redundancy on a LAN using two or more routers.

C.  

It allows neighbors to share routing table information between each other.

D.  

It prevents loops in a Layer 2 LAN by forwarding all traffic to a root bridge, which then makes the final forwarding decision.

Discussion 0
Question # 70

Refer to the exhibit.

Question # 70

Which switch becomes the root bridge?

Options:

A.  

S1

B.  

S2

C.  

S3

D.  

S4

Discussion 0
Question # 71

Which device controls the forwarding of authentication requests for users when connecting to the network using a lightweight access point?

Options:

A.  

TACACS server

B.  

wireless access point

C.  

RADIUS server

D.  

wireless LAN controller

Discussion 0
Question # 72

Which type of attack can be mitigated by dynamic ARP inspection?

Options:

A.  

worm

B.  

malware

C.  

DDoS

D.  

man-in-the-middle

Discussion 0
Question # 73

Which technology is used to improve web traffic performance by proxy caching?

Options:

A.  

WSA

B.  

Firepower

C.  

ASA

D.  

FireSIGHT

Discussion 0
Question # 74

Which WAN access technology is preferred for a small office / home office architecture?

Options:

A.  

broadband cable access

B.  

frame-relay packet switching

C.  

dedicated point-to-point leased line

D.  

Integrated Services Digital Network switching.

Discussion 0
Question # 75

What occurs to frames during the process of frame flooding?

Options:

A.  

Frames are sent to every port on the switch in the same VLAN except from the originating port

B.  

Frames are sent to every port on the switch that has a matching entry in the MAC address table.

C.  

Frames are sent to all ports, including those that are assigned to other VLANs.

D.  

Frames are sent to every port on the switch in the same VLAN.

Discussion 0
Question # 76

What is the purpose of using First Hop Redundancy Protocol in a specific subnet?

Options:

A.  

Filter traffic based on destination IP addressing

B.  

Sends the default route to the hosts on a network

C.  

ensures a loop-free physical topology

D.  

forwards multicast hello messages between routers

Discussion 0
Question # 77

Which statement about Link Aggregation when implemented on a Cisco Wireless LAN Controller is true?

Options:

A.  

To pass client traffic two or more ports must be configured.

B.  

The EtherChannel must be configured in "mode active"

C.  

When enabled the WLC bandwidth drops to 500 Mbps

D.  

One functional physical port is needed to pass client traffic

Discussion 0
Question # 78

Refer to the exhibit.

Question # 78

Router R1 is running three different routing protocols. Which route characteristic is used by the router to forward the packet that it receives for destination IP 172.16.32.1?

Options:

A.  

longest prefix

B.  

metric

C.  

cost

D.  

administrative distance

Discussion 0
Question # 79

Refer to Exhibit.

Question # 79

Which action do the switches take on the trunk link?

Options:

A.  

The trunk does not form and the ports go into an err-disabled status.

B.  

The trunk forms but the mismatched native VLANs are merged into a single broadcast domain.

C.  

The trunk does not form, but VLAN 99 and VLAN 999 are allowed to traverse the link.

D.  

The trunk forms but VLAN 99 and VLAN 999 are in a shutdown state.

Discussion 0
Question # 80

Refer to the exhibit.

Question # 80

An engineer deploys a topology in which R1 obtains its IP configuration from DHCP. If

the switch and DHCP server configurations are complete and correct. Which two sets of commands must be configured on R1 and R2 to complete the task? (Choose two)

Options:

A.  

R1(config)# interface fa0/0

R1(config-if)# ip helper-address 198.51.100.100

B.  

R2(config)# interface gi0/0

R2(config-if)# ip helper-address 198.51.100.100

C.  

R1(config)# interface fa0/0

R1(config-if)# ip address dhcp

R1(config-if)# no shutdown

D.  

R2(config)# interface gi0/0

R2(config-if)# ip address dhcp

E.  

R1(config)# interface fa0/0

R1(config-if)# ip helper-address 192.0.2.2

Discussion 0
Question # 81

Which configuration is needed to generate an RSA key for SSH on a router?

Options:

A.  

Configure the version of SSH

B.  

Configure VTY access.

C.  

Create a user with a password.

D.  

Assign a DNS domain name

Discussion 0
Question # 82

What is a function of TFTP in network operations?

Options:

A.  

transfers a backup configuration file from a server to a switch using a username and password

B.  

transfers files between file systems on a router

C.  

transfers a configuration files from a server to a router on a congested link

D.  

transfers IOS images from a server to a router for firmware upgrades

Discussion 0
Question # 83

Configure IPv4 and IPv6 connectivity between two routers. For IPv4, use a /28 network from the 192.168.1.0/24 private range. For IPv6, use the first /64 subnet from the 2001:0db8:aaaa::/48 subnet.

1. Using Ethernet0/1 on routers R1 and R2, configure the next usable/28 from the 192.168.1.0/24 range. The network 192.168.1.0/28 is unavailable.

2. For the IPv4 /28 subnet, router R1 must be configured with the first usable host address.

3. For the IPv4 /28 subnet, router R2 must be configured with the last usable host address.

4. For the IPv6 /64 subnet, configure the routers with the IP addressing provided from the topology.

5. A ping must work between the routers on the IPv4 and IPv6 address ranges.

Question # 83Question # 83

Options:

Discussion 0
Question # 84

Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.

Question # 84

Options:

Discussion 0
Question # 85

Refer to the exhibit.

Question # 85

The default-information originate command is configured under the R1 OSPF configuration After testing workstations on VLAN 20 at Site B cannot reach a DNS server on the Internet Which action corrects the configuration issue?

Options:

A.  

Add the default-information originate command onR2

B.  

Configure the ip route 0.0.0.0 0.0.0.0 10.10.10.18 command on R1

C.  

Configure the ip route 0.0.0.0 0.0.0.0 10.10.10.2 command on R2

D.  

Add the always keyword to the default-information originate command on R1

Discussion 0
Question # 86

Which unified access point mode continues to serve wireless clients after losing connectivity to the Cisco Wireless LAN Controller?

Options:

A.  

sniffer

B.  

mesh

C.  

flexconnect

D.  

local

Discussion 0
Question # 87

What are two benefits of FHRPs? (Choose two.)

Options:

A.  

They prevent (oops in the Layer 2 network.

B.  

They allow encrypted traffic.

C.  

They are able to bundle muftlple ports to increase bandwidth

D.  

They enable automatic failover of the default gateway.

E.  

They allow multiple devices lo serve as a single virtual gateway for clients in the network

Discussion 0
Question # 88

What does an SDN controller use as a communication protocol to relay forwarding changes to a southbound API?

Options:

A.  

OpenFlow

B.  

Java

C.  

REST

D.  

XML

Discussion 0
Question # 89

Question # 89

Three switches must be configured for Layer 2 connectivity. The company requires only the designated VLANs to be configured on their respective switches and permitted accross any links between switches for security purposes. Do not modify or delete VTP configurations.

The network needs two user-defined VLANs configured:

VLAN 110: MARKETING

VLAN 210: FINANCE

1. Configure the VLANs on the designated switches and assign them as access ports to the interfaces connected to the PCs.

2. Configure the e0/2 interfaces on Sw1 and Sw2 as 802.1q trunks with only the required VLANs permitted.

3. Configure the e0/3 interfaces on Sw2 and Sw3 as 802.1q trunks with only the required VLANs permitted.

Question # 89

Options:

Discussion 0
Question # 90

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

Question # 90

Options:

Discussion 0
Question # 91

Drag and drop the elements of a security program from the left onto the corresponding descriptions on the right.

Question # 91

Options:

Discussion 0
Question # 92

Question # 92

SW1 supports connectivity for a lobby conference room and must be secured. The engineer must limit the connectivity from PCI lo ma SW1 and SW2 network. The MAC addresses allowed must be Limited to two. Which configuration secures the conference room connectivity?

A)

Question # 92

B)

Question # 92

C)

Question # 92

D)

Question # 92

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 93

Refer to the exhibit.

Question # 93

A network engineer executes the show ip route command on router

D.  

What is the next hop to network 192.168 1 0/24 and why?

Options:

A.  

The next hop is 10.0.2.1 because it uses distance vector routing

B.  

The next hop is 10.0.2.1 because it is a link-state routing protocol

C.  

The next hop is 10.0.0.1 because it has a better administrative distance

D.  

The next hop is 10.0.0.1 because it has a higher metric.

Discussion 0
Question # 94

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

Question # 94

Options:

Discussion 0
Question # 95

Drag and drop each characteristic of device-management technologies from the left onto the deployment type on the right.

Question # 95

Options:

Discussion 0
Question # 96

Refer to the exhibit.

Question # 96

All interfaces are configured with duplex auto and ip ospf network broadcast. Which configuration allows routers R14 and R86 to form an OSPFv2 adjacency and act as a central point for exchanging OSPF information between routers?

Question # 96

Question # 96

Question # 96

Question # 96

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

option D

Discussion 0
Question # 97

Refer to the exhibit.

Question # 97

What must be configured to enable 802.11w on the WLAN?

Options:

A.  

Set PMF to Required.

B.  

Enable MAC Filtering.

C.  

Enable WPA Policy.

D.  

Set Fast Transition to Enabled

Discussion 0
Question # 98

Which channel-group mode must be configured when multiple distribution interfaces connected to a WLC are bundled?

Options:

A.  

Channel-group mode passive.

B.  

Channel-group mode on.

C.  

Channel-group mode desirable.

D.  

Channel-group mode active.

Discussion 0
Question # 99

What is the put method within HTTP?

Options:

A.  

It is a read-only operation.

B.  

It is a nonldempotent operation.

C.  

It replaces data at the destination.

D.  

It displays a web site.

Discussion 0
Question # 100

What is a benefit of a point-to-point leased line?

Options:

A.  

flexibility of design

B.  

simplicity of configurator

C.  

low cost

D.  

full-mesh capability

Discussion 0
Question # 101

Which security method is used to prevent man-in-the-middle attack?

Options:

A.  

authorization

B.  

authentication

C.  

anti-replay

D.  

accounting

Discussion 0
Question # 102

Refer to the exhibit.

Question # 102

The Router1 routing table has multiple methods to reach 10.10.10.0/24 as shown. The default Administrative Distance is used. Drag and drop the network conditions from the left onto the routing methods that Router1 uses on the right.

Question # 102

Options:

Discussion 0
Question # 103

Question # 103

Refer to the exhibit. An engineer is building a new Layer 2 LACP EtherChannel between SW1 and SW2. and they executed the given show commands to verify the work Which additional task must be performed so that the switches successfully bundle the second member in the LACP port-channel?

Options:

A.  

Configure the switchport trunk allowed vlan 300 command on SW1 port-channel 1

B.  

Configure the switchport trunk allowed vlan 300 command on interface Fa0/2 on SW1.

C.  

Configure the switchport trunk allowtd vlan add 300 command on interface FaO 2 on SW2.

D.  

Configure the switchport trunk allowtd vlan add 300 command on SW1 port-channel 1

Discussion 0
Question # 104

How do UTP and STP cables compare?

Options:

A.  

STP cables are cheaper to procure and easier to install and UTP cables are more expensive and harder to install.

B.  

UTP cables are less prone to crosstalk and interference and STP cables are more prone to crosstalk and interference.

C.  

UTP cables provide taster and more reliable data transfer rates and STP cables are slower and less reliable.

D.  

STP cables are shielded and protect against electromagnetic interference and UTP lacks the same protection against electromagnetic interference.

Discussion 0
Question # 105

Refer to the exhibit.

Question # 105

What is represented by the word "switch’’ in line 2 of the JSON schema?

Options:

A.  

array

B.  

key

C.  

value

D.  

object

Discussion 0
Question # 106

Refer to the exhibit. Local access for R4 must be established and these requirements must be met:

• Only Telnet access is allowed.

• The enable password must be stored securely.

• The enable password must be applied in plain text.

• Full access to R4 must be permitted upon successful login.

Which configuration script meets the requirements?

A)

Question # 106

B)

Question # 106

C)

Question # 106

D)

Question # 106

Options:

A.  

Option

B.  

Option

C.  

Option

D.  

Option

Discussion 0
Question # 107

Which remote access protocol provides unsecured remote CLI access?

Options:

A.  

console

B.  

Telnet

C.  

Bash

D.  

SSH

Discussion 0
Question # 108

Which WPA mode uses PSK authentication?

Options:

A.  

Local

B.  

Client

C.  

Enterprise

D.  

Personal

Discussion 0
Question # 109

What is a similarity between OM3 and OM4 fiber optic cable?

Options:

A.  

Both have a 50 micron core diameter

B.  

Both have a 9 micron core diameter

C.  

Both have a 62.5 micron core diameter

D.  

Both have a 100 micron core diameter

Discussion 0
Question # 110

An engineer needs to add an old switch back into a network. To prevent the switch from corrupting the VLAN database which action must be taken?

Options:

A.  

Add the switch in the VTP domain with a lower revision number

B.  

Add the switch with DTP set to dynamic desirable

C.  

Add the switch in the VTP domain with a higher revision number

D.  

Add the switch with DTP set to desirable

Discussion 0
Question # 111

What event has occurred if a router sends a notice level message to a syslog server?

Options:

A.  

A TCP connection has been torn down

B.  

An ICMP connection has been built

C.  

An interface line has changed status

D.  

A certificate has expired.

Discussion 0
Question # 112

Refer to the exhibit.

Question # 112

What is the result if Gig1/11 receives an STP BPDU?

Options:

A.  

The port transitions to STP blocking

B.  

The port transitions to the root port

C.  

The port immediately transitions to STP forwarding.

D.  

The port goes into error-disable state

Discussion 0
Question # 113

Refer to the exhibit.

Question # 113

An engineer configured NAT translations and has verified that the configuration is correct.

Which IP address is the source IP?

Options:

A.  

10.4.4.4

B.  

10.4.4.5

C.  

172.23.103.10

D.  

172.23.104.4

Discussion 0
Question # 114

Refer to the exhibit.

Question # 114

Router R4 is dynamically learning the path to the server. If R4 is connected to R1 via OSPF Area 20, to R2 v2ia R2 BGP, and to R3 via EIGRP 777, which path is installed in the routing table of R4?

Options:

A.  

the path through R1, because the OSPF administrative distance is 110

B.  

the path through R2. because the IBGP administrative distance is 200

C.  

the path through R2 because the EBGP administrative distance is 20

D.  

the path through R3. because the EIGRP administrative distance is lower than OSPF and BGP

Discussion 0
Question # 115

A port security violation has occurred on a switch port due to the maximum MAC address count being exceeded. Which command must be configured to increment the security-violation count and forward an SNMP trap?

Options:

A.  

switchport port-security violation access

B.  

switchport port-security violation protect

C.  

switchport port-security violation restrict

D.  

switchport port-security violation shutdown

Discussion 0
Question # 116

Refer to the exhibit.

Question # 116

Which switch becomes the root of the spanning tree for VLAN 110?

Question # 116

Options:

A.  

Switch 1

B.  

Switch 2

C.  

Switch 3

D.  

Switch 4

Discussion 0
Question # 117

If a notice-level messaging is sent to a syslog server, which event has occurred?

Options:

A.  

A network device has restarted

B.  

An ARP inspection has failed

C.  

A routing instance has flapped

D.  

A debug operation is running

Discussion 0
Question # 118

Refer to the exhibit.

Question # 118

Which type of configuration is represented in the output?

Options:

A.  

Ansible

B.  

JSON

C.  

Chef

D.  

Puppet

Discussion 0
Question # 119

Which action does the router take as it forwards a packet through the network?

Options:

A.  

The router replaces the original source and destination MAC addresses with the sending router MAC address as the source and neighbor MAC address as the destination

B.  

The router encapsulates the original packet and then includes a tag that identifies the source router MAC address and transmits it transparently to the destination

C.  

The router encapsulates the source and destination IP addresses with the sending router IP address as the source and the neighbor IP address as the destination

D.  

The router replaces the source and destination labels with the sending router interface label as a source and the next hop router label as a destination

Discussion 0
Question # 120

Which type of address is the public IP address of a NAT device?

Options:

A.  

outside global

B.  

outsdwde local

C.  

inside global

D.  

insride local

E.  

outside public

F.  

inside public

Discussion 0
Question # 121

Drag and drop the IPv4 network subnets from the left onto the correct usable host ranges on the right

Question # 121

Options:

Discussion 0
Question # 122

Drag and drop the IPv6 address type characteristics from the left to the right.

Question # 122

Options:

Discussion 0
Question # 123

In software defined architectures, which plane is distributed and responsible for traffic forwarding?

Options:

A.  

management plane

B.  

control plane

C.  

policy plane

D.  

data plane

Discussion 0
Question # 124

Which global command encrypt all passwords in the running configuration?

Options:

A.  

password-encrypt

B.  

enable password-encryption

C.  

enable secret

D.  

service password-encryption

Discussion 0
Question # 125

Which two capacities of Cisco DNA Center make it more extensible as compared to traditional campus device management? (Choose two)

Options:

A.  

adapters that support all families of Cisco IOS software

B.  

SDKs that support interaction with third-party network equipment

C.  

customized versions for small, medium, and large enterprises

D.  

REST APIs that allow for external applications to interact natively with Cisco DNA Center

E.  

modular design that is upgradable as needed

Discussion 0
Question # 126

What does a switch use to build its MAC address table?

Options:

A.  

VTP

B.  

DTP

C.  

egress traffic

D.  

ingress traffic

Discussion 0
Question # 127

What criteria is used first during me root port selection process?

Options:

A.  

local port ID

B.  

lowest path cost to the root bridge

C.  

lowest neighbor's bridge ID

D.  

lowest neighbor's port ID

Discussion 0
Question # 128

Which network allows devices to communicate without the need to access the Internet?

Options:

A.  

1729.0.0/16

B.  

172.28.0.0/16

C.  

192.0.0.0/8

D.  

209.165.201.0/24

Discussion 0
Question # 129

What is the difference regarding reliability and communication type between TCP and UDP?

Options:

A.  

TCP is reliable and is a connection-oriented protocol UDP is not reliable and is a connectionless protocol

B.  

TCP is not reliable and is a connection-oriented protocol; UDP is reliable and is a connectionless protocol

C.  

TCP is not reliable and is a connectionless protocol; UDP is reliable and is a connection-oriented protocol

D.  

TCP is reliable and is a connectionless protocol; UDP is not reliable and is a connection-oriented protocol

Discussion 0
Question # 130

Which two functions are performed by the core layer in a three-tier architecture? (Choose two)

Options:

A.  

Provide uninterrupted forwarding service.

B.  

Police traffic that is sent to the edge of the network.

C.  

Provide direct connectivity for end user devices.

D.  

Ensure timely data transfer between layers.

E.  

Inspect packets for malicious activity.

Discussion 0
Question # 131

R1 has learned route 192.168.12.0/24 via IS-IS. OSPF, RIP. and Internal EIGRP Under normal operating conditions, which routing protocol is installed in the routing table?

Options:

A.  

IS-IS

B.  

RIP

C.  

Internal EIGRP

D.  

OSPF

Discussion 0
Question # 132

A router running EIGRP has learned the same route from two different paths. Which parameter does the router use to select the best path?

Options:

A.  

cost

B.  

adminstrative distance

C.  

metric

D.  

as-path

Discussion 0
Question # 133

Which command must be entered when a device is configured as an NTP server?

Options:

A.  

ntp authenticate

B.  

ntp server

C.  

ntp peer

D.  

ntp master

Discussion 0
Question # 134

Which design element is a best practice when deploying an 802.11b wireless infrastructure?

Options:

A.  

disabling TPC so that access points can negotiate signal levels with their attached wireless devices.

B.  

setting the maximum data rate to 54 Mbps on the Cisco Wireless LAN Controller

C.  

allocating nonoverlapping channels to access points that are in close physical proximity to one another

D.  

configuring access points to provide clients with a maximum of 5 Mbps

Discussion 0
Question # 135

What are two reasons that cause late collisions to increment on an Ethernet interface? (Choose two)

Options:

A.  

when the sending device waits 15 seconds before sending the frame again

B.  

when the cable length limits are exceeded

C.  

when one side of the connection is configured for half-duplex

D.  

when Carrier Sense Multiple Access/Collision Detection is used

E.  

when a collision occurs after the 32nd byte of a frame has been transmitted

Discussion 0
Question # 136

Which IPv6 address type provides communication between subnets and is unable to route on the Internet?

Options:

A.  

global unicast

B.  

unique local

C.  

link-local

D.  

multicast

Discussion 0
Question # 137

How do AAA operations compare regarding user identification, user services and access control?

Options:

A.  

Authorization provides access control and authentication tracks user services

B.  

Authentication identifies users and accounting tracks user services

C.  

Accounting tracks user services, and authentication provides access control

D.  

Authorization identifies users and authentication provides access control

Discussion 0
Question # 138

Which type of traffic is sent with pure iPsec?

Options:

A.  

broadcast packets from a switch that is attempting to locate a MAC address at one of several remote sites

B.  

multicast traffic from a server at one site to hosts at another location

C.  

spanning-tree updates between switches that are at two different sites

D.  

unicast messages from a host at a remote site to a server at headquarters

Discussion 0
Question # 139

Drag and drop to the characteristics of networking from the left onto the correct networking types on the right.

Question # 139

Options:

Discussion 0
Question # 140

The SW1 interface g0/1 is in the down/down state. Which two configurations are valid reasons for the interface conditions?(choose two)

Options:

A.  

There is a duplex mismatch

B.  

There is a speed mismatch

C.  

There is a protocol mismatch

D.  

The interface is shut down

E.  

The interface is error-disabled

Discussion 0
Question # 141

Which configuration management mechanism uses TCP port 22 by default when communicating with managed nodes?

Options:

A.  

Ansible

B.  

Python

C.  

Puppet

D.  

Chef

Discussion 0
Question # 142

What does an SDN controller use as a communication protocol to relay forwarding changes to a southbound API?

Options:

A.  

OpenFlow

B.  

Java

C.  

REST

D.  

XML

Discussion 0
Question # 143

A packet is destined for 10.10.1.22. Which static route does the router choose to forward the packet?

Options:

A.  

ip route 10.10.1.0 255.255.255.240 10.10.255.1

B.  

ip route 10.10.1.16 255.255.255.252 10.10.255.1

C.  

ip route 10.10.1.20 255.255.255.252 10.10.255.1

D.  

ip route 10.10.1.20 255.255.255.254 10.10.255.1

Discussion 0
Question # 144

Refer to the exhibit.

Question # 144

An engineer is bringing up a new circuit to the MPLS provider on the Gi0/1 interface of Router1 The new circuit uses eBGP and teams the route to VLAN25 from the BGP path What s the expected behavior for the traffic flow for route 10.10.13.0/25?

Options:

A.  

Traffic to 10.10.13.0.25 is load balanced out of multiple interfaces

B.  

Route 10.10.13.0/25 is updated in the routing table as being learned from interface Gi0/1.

C.  

Traffic to 10.10.13.0/25 is asymmeteical

D.  

Route 10.10.13.0/25 learned via the GiO/0 interface remains in the routing table

Discussion 0
Question # 145

An engineer is configuring NAT to translate the source subnet of 10.10.0.0/24 to any of three addresses 192.168.30.1, 192.168.3.2, 192.168.3.3 Which configuration should be used?

Question # 145

Question # 145

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 146

Refer to the exhibit.

Question # 146

An administrator must configure interfaces Gi1/1 and Gi1/3 on switch SW11 PC-1 and PC-2 must be placed in the Data VLAN and Phone-1 must be placed in the Voice VLAN Which configuration meets these requirements?

Question # 146

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 147

Refer to the exhibit.

Question # 147

Which IPv6 configuration is required for R17 to successfully ping the WAN interface on R18?

A)

Question # 147

B)

Question # 147

C)

Question # 147

D)

Question # 147

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 148

An engineer observes high usage on the 2.4GHz channels and lower usage on the 5GHz channels. What must be configured to allow clients to preferentially use 5GH2 access points?

Options:

A.  

Re- Anchor Roamed Clients

B.  

11ac MU-MIMO

C.  

OEAP Split Tunnel

D.  

Client Band Select

Discussion 0
Question # 149

Which action does the router take as rt forwards a packet through the network?

Options:

A.  

The router replaces the source and desinaoon labels wth the sending router uterface label as a source and the next hop router label as a desbnabon

B.  

The router encapsulates the source and destination IP addresses with the sending router P address as the source and the neighbor IP address as the destination

C.  

The router replaces the original source and destination MAC addresses with the sending router MAC address as the source and neighbor MAC address as the destination

D.  

The router encapsulates the original packet and then includes a tag that identifies the source router MAC address and transmit transparently to the destination

Discussion 0
Question # 150

Which action must be taken to assign a global unicast IPv6 address on an interface that is derived from the MAC address of that interface?

Options:

A.  

configure a stateful DHCPv6 server on the network

B.  

enable SLAAC on an interface

C.  

disable the EUI-64 bit process

D.  

explicitly assign a link-local address

Discussion 0
Question # 151

Which two actions influence the EIGRP route selection process? (Choose two)

Options:

A.  

The router calculates the reported distance by multiplying the delay on the exiting Interface by 256.

B.  

The router calculates the best backup path to the destination route and assigns it as the feasible successor.

C.  

The router calculates the feasible distance of all paths to the destination route

D.  

The advertised distance is calculated by a downstream neighbor to inform the local router of the bandwidth on the link

E.  

The router must use the advertised distance as the metric for any given route

Discussion 0
Question # 152

A user configured OSPF in a single area between two routers A serial interface connecting R1 and R2 is running encapsulation PPP By default which OSPF network type is seen on this interface when the user types show ip ospf interface on R1 or R2?

Options:

A.  

port-to-multipoint

B.  

broadcast

C.  

point-to-point

D.  

nonbroadcast

Discussion 0
Question # 153

Which technology must be implemented to configure network device monitoring with the highest security?

Options:

A.  

IP SLA

B.  

syslog

C.  

NetFlow

D.  

SNMPv3

Discussion 0
Question # 154

What is the purpose of an SSID?

Options:

A.  

It provides network security

B.  

It differentiates traffic entering access posits

C.  

It identities an individual access point on a WLAN

D.  

It identifies a WLAN

Discussion 0
Question # 155

Refer to the exhibit.

Question # 155

An administrator is tasked with configuring a voice VLAN. What is the expected outcome when a Cisco phone is connected to the GigabitEfriemet3/1/4 port on a switch?

Options:

A.  

The phone and a workstation that is connected to the phone do not have VLAN connectivity

B.  

The phone and a workstation that is connected to the phone send and receive data in VLAN 50.

C.  

The phone sends and receives data in VLAN 50, but a workstation connected to the phone has no VLAN connectivity

D.  

The phone sends and receives data in VLAN 50, but a workstation connected to the phone sends and receives data in VLAN 1

Discussion 0
Question # 156

Which technology can prevent client devices from arbitrarily connecting to the network without state remediation?

Options:

A.  

802.1x

B.  

IP Source Guard

C.  

MAC Authentication Bypass

D.  

802.11n

Discussion 0
Question # 157

Which protocol prompts the Wireless LAN Controller to generate its own local web administration SSL certificate for GUI access?

Options:

A.  

HTTPS

B.  

RADIUS

C.  

TACACS+

D.  

HTTP

Discussion 0
Question # 158

What Is the path for traffic sent from one user workstation to another workstation on a separate switch In a Ihree-lter architecture model?

Options:

A.  

access - core - distribution - access

B.  

access - distribution - distribution - access

C.  

access - core - access

D.  

access -distribution - core - distribution - access

Discussion 0
Question # 159

Which result occurs when PortFast is enabled on an interface that is connected to another switch?

Options:

A.  

Spanning tree may fail to detect a switching loop in the network that causes broadcast storms

B.  

VTP is allowed to propagate VLAN configuration information from switch to switch automatically.

C.  

Root port choice and spanning tree recalculation are accelerated when a switch link goes down

D.  

After spanning tree converges PortFast shuts down any port that receives BPDUs.

Discussion 0
Question # 160

Refer to Exhibit.

Question # 160

An engineer is configuring the NEW York router to reach the Lo1 interface of the Atlanta router using interface Se0/0/0 as the primary path. Which two commands must be configured on the New York router so that it can reach the Lo1 interface of the Atlanta router via Washington when the link between New York and Atlanta goes down? (Choose two)

Options:

A.  

ipv6 router 2000::1/128 2012::1

B.  

ipv6 router 2000::1/128 2012::1 5

C.  

ipv6 router 2000::1/128 2012::2

D.  

ipv6 router 2000::1/128 2023::2 5

E.  

ipv6 router 2000::1/128 2023::3 5

Discussion 0
Question # 161

Drag the descriptions of device management from the left onto the types of device management on the right.

Question # 161

Options:

Discussion 0
Question # 162

What makes Cisco DNA Center different from traditional network management applications and their management of networks?

Options:

A.  

It omits supports auto-discovery of network elements in a greenfield deployment.

B.  

It modular design allows someone to implement different versions to meet the specific needs of an organization

C.  

It abstracts policy from the actual device configuration

D.  

It does not support high availability of management functions when operating in cluster mode

Discussion 0
Question # 163

Refer to the exhibit.

Question # 163

An engineer is required to verify that the network parameters are valid for the users wireless LAN connectivity on a /24 subnet. Drag and drop the values from the left onto the network parameters on the right. Not all values are used.

Question # 163

Options:

Discussion 0
Question # 164

Which type of API allows SDN controllers to dynamically make changes to the network?

Options:

A.  

northbound API

B.  

REST API

C.  

SOAP API

D.  

southbound API

Discussion 0
Question # 165

Refer to the exhibit.

Question # 165

Which configuration issue is preventing the OSPF neighbor relationship from being established between the two routers?

Options:

A.  

R2 is using the passive-interface default command

B.  

R1 has an incorrect network command for interface Gi1/0

C.  

R2 should have its network command in area 1

D.  

R1 interface Gil/0 has a larger MTU size

Discussion 0
Question # 166

Which goal is achieved by the implementation of private IPv4 addressing on a network?

Options:

A.  

provides an added level of protection against Internet exposure

B.  

provides a reduction in size of the forwarding table on network routers

C.  

allows communication across the Internet to other private networks

D.  

allows servers and workstations to communicate across public network boundaries

Discussion 0
Question # 167

Which protocol does an access point use to draw power from a connected switch?

Options:

A.  

Internet Group Management Protocol

B.  

Adaptive Wireless Path Protocol

C.  

Cisco Discovery Protocol

D.  

Neighbor Discovery Protocol

Discussion 0
Question # 168

What are two benefits of using the PortFast feature? (Choose two )

Options:

A.  

Enabled interfaces are automatically placed in listening state

B.  

Enabled interfaces come up and move to the forwarding state immediately

C.  

Enabled interfaces never generate topology change notifications.

D.  

Enabled interfaces that move to the learning state generate switch topology change notifications

E.  

Enabled interfaces wait 50 seconds before they move to the forwarding state

Discussion 0
Question # 169

Refer to the exhibit.

Question # 169

The New York router is configured with static routes pointing to the Atlanta and Washington sites. Which two tasks must be performed so that the Serial0/0/0 interfaces on the Atlanta and Washington routers can reach one another?

(Choose two.)

Options:

A.  

Configure the ipv6 route 2012::/126 2023::1 command on the Washington router.

B.  

Configure the ipv6 route 2023::/126 2012::1 command on the Atlanta router.

C.  

Configure the Ipv6 route 2012::/126 s0/0/0 command on the Atlanta router.

D.  

Configure the ipv6 route 2023::/126 2012::2 command on the Atlanta router.

E.  

Configure the ipv6 route 2012::/126 2023::2 command on the Washington router.

Discussion 0
Question # 170

Which two protocols must be disabled to increase security for management connections to a Wireless LAN Controller? (Choose two )

Options:

A.  

Telnet

B.  

SSH

C.  

HTTP

D.  

HTTPS

E.  

TFTP

Discussion 0
Question # 171

An engineer must configure a WLAN using the strongest encryption type for WPA2- PSK. Which cipher fulfills the configuration requirement?

Options:

A.  

WEP

B.  

RC4

C.  

AES

D.  

TKIP

Discussion 0
Question # 172

Refer to the exhibit.

Question # 172

Which action is expected from SW1 when the untagged frame is received on the GigabitEthernet0/1 interface?

Options:

A.  

The frame is processed in VLAN 5.

B.  

The frame is processed in VLAN 11

C.  

The frame is processed in VLAN 1

D.  

The frame is dropped

Discussion 0
Question # 173

When a site-to-site VPN is used, which protocol is responsible for the transport of user data?

Options:

A.  

IKEv2

B.  

IKEv1

C.  

IPsec

D.  

MD5

Discussion 0
Question # 174

Refer to the exhibit.

Question # 174

A network administrator has been tasked with securing VTY access to a router. Which access-list entry accomplishes this task?

Options:

A.  

access-list 101 permit tcp 10.1.10 0.0.0.255 172.16.10 0.0.0.255 eq ssh

B.  

access-list 101 permit tcp 10.11.0 0.0.0.255 172.16.10 0.0.0.255 eq scp

C.  

access-list 101 permit tcp 10.11.0 0.0.0.255 172.16.10 0.0.0.255 eq telnet

D.  

access-list 101 permit tcp 10.1.10 0.0.0.255 172.16.10 0.0.0.255 eq https

Discussion 0
Question # 175

Refer to the exhibit.

Question # 175

To which device does Router1 send packets that are destined to host 10.10.13.165?

Options:

A.  

Router2

B.  

Router3

C.  

Router4

D.  

Router5

Discussion 0
Question # 176

How do traditional campus device management and Cisco DNA Center device management differ in regards to deployment?

Options:

A.  

Cisco DNA Center device management can deploy a network more quickly than traditional campus device management

B.  

Traditional campus device management allows a network to scale more quickly than with Cisco DNA Center device management

C.  

Cisco DNA Center device management can be implemented at a lower cost than most traditional campus device management options

D.  

Traditional campus device management schemes can typically deploy patches and updates more quickly than Cisco DNA Center device management

Discussion 0
Question # 177

When deploying syslog, which severity level logs informational message?

Options:

A.  

0

B.  

2

C.  

4

D.  

6

Discussion 0
Question # 178

Refer to the exhibit.

Question # 178

How does router R1 handle traffic to 192.168.10.16?

Options:

A.  

It selects the IS-IS route because it has the shortest prefix inclusive of the destination address.

B.  

It selects the EIGRP route because it has the lowest administrative distance.

C.  

It selects the OSPF route because it has the lowest cost.

D.  

It selects the RIP route because it has the longest prefix inclusive of the destination address.

Discussion 0
Question # 179

A Cisco IP phone receive untagged data traffic from an attached P

C.  

Which action is taken by the phone?

Options:

A.  

It allows the traffic to pass through unchanged

B.  

It drops the traffic

C.  

It tags the traffic with the default VLAN

D.  

It tags the traffic with the native VLAN

Discussion 0
Question # 180

Which JSON data type is an unordered set of attribute- value pairs?

Options:

A.  

array

B.  

string

C.  

object

D.  

Boolean

Discussion 0
Question # 181

Refer to the exhibit.

Question # 181

Between which zones do wireless users expect to experience intermittent connectivity?

Options:

A.  

between zones 1 and 2

B.  

between zones 2 and 5

C.  

between zones 3 and 4

D.  

between zones 3 and 6

Discussion 0
Question # 182

Drag the descriptions of IP protocol transmissions from the left onto the IP traffic types on the right.

Question # 182

Options:

Discussion 0
Question # 183

Which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?

Options:

A.  

TKiP encryption

B.  

AES encryption

C.  

scrambled encryption key

D.  

SAE encryption

Discussion 0
Question # 184

Refer to Exhibit.

Question # 184

Which action do the switches take on the trunk link?

Options:

A.  

The trunk does not form and the ports go into an err-disabled status.

B.  

The trunk forms but the mismatched native VLANs are merged into a single broadcast domain.

C.  

The trunk does not form, but VLAN 99 and VLAN 999 are allowed to traverse the link.

D.  

The trunk forms but VLAN 99 and VLAN 999 are in a shutdown state.

Discussion 0
Question # 185

Refer to the exhibit.

Question # 185

Routers R1 and R3 have the default configuration The router R2 priority is set to 99 Which commands on R3 configure it as the DR in the 10.0 4.0/24 network?

Options:

A.  

R3(config)#interface Gig0/1 R3(config-if)#ip ospf priority 100

B.  

R3(config)#interface Gig0/0 R3(config-if)#ip ospf priority 100

C.  

R3(config)#interface Gig0/0 R3(config-if)i=ip ospf priority 1

D.  

R3(config)#interface Gig0/1 R3(config-if)#ip ospf priority 0

Discussion 0
Question # 186

A network engineer must implement an IPv6 configuration on the vlan 2000 interface to create a routable locally-unique unicast address that is blocked from being advertised to the internet. Which configuration must the engineer apply?

Options:

A.  

interface vlan 2000

ipv6 address ffc0:0000:aaaa::1234:2343/64

B.  

interface vlan 2000

Ipv6 address fc00:0000:aaaa:a15d:1234:2343:8aca/64

C.  

interface vlan 2000

ipv6 address fe80;0000:aaaa::1234:2343/64

D.  

interface vlan 2000

ipv6 address fd00::1234:2343/64

Discussion 0
Question # 187

What is the difference between IPv6 unicast and anycast addressing?

Options:

A.  

IPv6 anycast nodes must be explicitly configured to recognize the anycast address, but IPv6 unicast nodes require no special configuration

B.  

IPv6 unicast nodes must be explicitly configured to recognize the unicast address, but IPv6 anycast nodes require no special configuration

C.  

An individual IPv6 unicast address is supported on a single interface on one node but an IPv6 anycast address is assigned to a group of interfaces on multiple nodes.

D.  

Unlike an IPv6 anycast address, an IPv6 unicast address is assigned to a group of interfaces on multiple nodes

Discussion 0
Question # 188

Drag and drop the statements about networking from the left onto the corresponding networking types on the right.

Question # 188

Options:

Discussion 0
Question # 189

What provides centralized control of authentication and roaming In an enterprise network?

Options:

A.  

a lightweight access point

B.  

a firewall

C.  

a wireless LAN controller

D.  

a LAN switch

Discussion 0
Question # 190

Refer to the exhibit.

Question # 190

Which minimum configuration items are needed to enable Secure Shell version 2 access to R15?

A)

Question # 190

B)

Question # 190

C)

Question # 190

D)

Question # 190

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 191

Refer to the exhibit.

Question # 191

Traffic sourced from the loopback0 Interface is trying to connect via ssh to the host at 10.0.1.15. What Is the next hop to the destination address?

Options:

A.  

192.168.0.7

B.  

192.168.0.4

C.  

192.168.0.40

D.  

192.168.3.5

Discussion 0
Question # 192

Refer to the exhibit.

Question # 192

What is a reason for poor performance on the network interface?

Options:

A.  

The interface is receiving excessive broadcast traffic.

B.  

The cable connection between the two devices is faulty.

C.  

The interface is operating at a different speed than the connected device.

D.  

The bandwidth setting of the interface is misconfigured

Discussion 0
Question # 193

Which field within the access-request packet is encrypted by RADIUS?

Options:

A.  

authorized services

B.  

authenticator

C.  

username

D.  

password

Discussion 0
Question # 194

What is an expected outcome when network management automation is deployed?

Options:

A.  

A distributed management plane must be used.

B.  

Software upgrades are performed from a central controller

C.  

Complexity increases when new device configurations are added

D.  

Custom applications are needed to configure network devices

Discussion 0
Question # 195

Refer to the exhibit.

Question # 195

An IP subnet must be configured on each router that provides enough addresses for the number of assigned hosts and anticipates no more than 10% growth for now hosts. Which configuration script must be used?

A)

Question # 195

B)

Question # 195

C)

Question # 195

D)

Question # 195

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 196

What is a function of an endpoint on a network?

Options:

A.  

forwards traffic between VLANs on a network

B.  

connects server and client devices to a network

C.  

allows users to record data and transmit to a tile server

D.  

provides wireless services to users in a building

Discussion 0
Question # 197

Refer to the exhibit.

Question # 197

How should the configuration be updated to allow PC1 and PC2 access to the Internet?

Options:

A.  

Modify the configured number of the second access list.

B.  

Add either the ip nat {inside|outside} command under both interfaces.

C.  

Remove the overload keyword from the ip nat inside source command.

D.  

Change the ip nat inside source command to use interface GigabitEthernet0/0.

Discussion 0
Question # 198

Refer to the exhibit.

Question # 198

An engineer is asked to insert the new VLAN into the existing trunk without modifying anything previously configured Which command accomplishes this task?

Options:

A.  

switchport trunk allowed vlan 100-104

B.  

switchport trunk allowed vlan add 104

C.  

switchport trunk allowed vlan all

D.  

switchport trunk allowed vlan 104

Discussion 0
Question # 199

Which type of network attack overwhelms the target server by sending multiple packets to a port until the half-open TCP resources of the target are exhausted?

Options:

A.  

SYIM flood

B.  

reflection

C.  

teardrop

D.  

amplification

Discussion 0
Question # 200

Refer to the exhibit.

Question # 200

Which configuration enables DHCP addressing for hosts connected to interface FastEthernetO/1 on router R4?

Options:

A.  

interface FastEthernet0/0

ip helper-address 10.0.1.1

i

access-list 100 permit udp host 10.0.1.1 eq bootps host 10.148.2.1

B.  

interface FastEthernot0/1

ip helper-address 10.0.1.1

!

access-list 100 permit tcp host 10.0.1.1 eq 67 host 10.148.2.1

C.  

interface FastEthernetO/0

ip helper-address 10.0.1.1

I

access-list 100 permit host 10.0.1.1 host 10.148.2.1 eq bootps

D.  

interface FastEthernet0/1

ip helper-address 10.0.1.1

!

access-list 100 permit udp host 10.0.1.1 eq bootps host 10.148.2.1

Discussion 0
Question # 201

Refer to the exhibit.

Question # 201

Which configuration allows routers R14 and R86 to form an OSPFv2 adjacency while acting as a central point for exchanging OSPF information between routers?

A)

Question # 201

B)

Question # 201

C)

Question # 201

D)

Question # 201

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 202

What are two benefits of FHRPs? (Choose two.)

Options:

A.  

They enable automatic failover of the default gateway.

B.  

They allow multiple devices to serve as a single virtual gateway for clients in the network.

C.  

They are able to bundle multiple ports to increase bandwidth.

D.  

They prevent loops in the Layer 2 network.

E.  

They allow encrypted traffic.

Discussion 0
Question # 203

Refer to the exhibit.

Question # 203

Site A was recently connected to site B over a new single-mode fiber path. Users at site A report Intermittent connectivity Issues with applications hosted at site

B.  

What is the reason for the problem?

Options:

A.  

Heavy usage is causing high latency.

B.  

An incorrect type of transceiver has been inserted into a device on the link.

C.  

physical network errors are being transmitted between the two sites.

D.  

The wrong cable type was used to make the connection.

Discussion 0
Question # 204

Drag and drop the characteristics of networking from the left onto the networking types on the right.

Question # 204

Options:

Discussion 0
Question # 205

Refer to the exhibit.

Question # 205

Which action must be taken to ensure that router A is elected as the DR for OSPF area 0?

Options:

A.  

Configure the OSPF priority on router A with the lowest value between the three routers.

B.  

Configure router B and router C as OSPF neighbors of router

A.  

C.  

Configure the router A interfaces with the highest OSPF priority value within the area.

D.  

Configure router A with a fixed OSPF router ID

Discussion 0
Question # 206

Refer to the exhibit.

Question # 206

Users need to connect to the wireless network with IEEE 802. 11r-compatible devices. The connection must be maintained as users travel between floors or to other areas in the building What must be the configuration of the connection?

Options:

A.  

Select the WPA Policy option with the CCKM option.

B.  

Disable AES encryption.

C.  

Enable Fast Transition and select the FT 802.1x option.

D.  

Enable Fast Transition and select the FT PSK option.

Discussion 0
Question # 207

Refer to the exhibit.

Question # 207

The DHCP server and clients are connected to the same switch. What is the next step to complete the DHCP configuration to allow clients on VLAN 1 to receive addresses from the DHCP server?

Options:

A.  

Configure the ip dhcp snooping trust command on the interlace that is connected to the DHCP client.

B.  

Configure the ip dhcp relay information option command on the interface that is connected to the DHCP client.

C.  

Configure the ip dhcp snooping trust command on the interface that is connected to the DHCP server.

D.  

Configure the Ip dhcp relay information option command on the interface that is connected to the DHCP server.

Discussion 0
Question # 208

Which two components comprise part of a PKI? (Choose two.)

Options:

A.  

preshared key that authenticates connections

B.  

RSA token

C.  

CA that grants certificates

D.  

clear-text password that authenticates connections

E.  

one or more CRLs

Discussion 0
Question # 209

Which WLC management connection type is vulnerable to man-in-the-middle attacks?

Options:

A.  

SSH

B.  

HTTPS

C.  

Telnet

D.  

console

Discussion 0
Question # 210

Refer to the exhibit.

Question # 210

A company is configuring a failover plan and must implement the default routes in such a way that a floating static route will assume traffic forwarding when the primary link goes down. Which primary route configuration must be used?

Options:

A.  

ip route 0.0.0.0 0.0.0.0 192.168.0.2 GigabitEthernetl/0

B.  

ip route 0.0.0.0 0.0.0.0 192.168.0.2 tracked

C.  

ip route 0.0.0.0 0.0.0.0 192.168.0.2 floating

D.  

ip route 0.0.0.0 0.0.0.0 192.168.0.2

Discussion 0
Question # 211

Refer to the exhibit.

Question # 211

An engineer is updating the R1 configuration to connect a new server to the management network. The PCs on the management network must be blocked from pinging the default gateway of the new server. Which command must be configured on R1 to complete the task?

Options:

A.  

R1(config)#lp route 172.16.2.2 255.255.255.248 gi0/1

B.  

R1(config)#jp route 172.16.2.2 255.255.255.255 gi0/0

C.  

R1(config>#ip route 172.16.2.0 255.255.255.0 192.168.1.15

D.  

R1(conflg)#ip route 172.16.2.0 255.255.255.0 192.168.1.5

Discussion 0
Question # 212

Refer to the exhibit.

Question # 212

Router R1 resides in OSPF Area 0. After updating the R1 configuration to influence the paths that it will use to direct traffic, an engineer verified that each of the four Gigabit interfaces has the same route to 10.10.0.0/16. Which interface will R1 choose to send traffic to reach the route?

Options:

A.  

GigabitEthernet0/0

B.  

GigabltEthornet0/1

C.  

GigabitEthernet0/2

D.  

GigabitEthernet0/3

Discussion 0
Question # 213

Refer to the exhibit.

Question # 213

An engineer has started to configure replacement switch SW1. To verify part of the configuration, the engineer issued the commands as shown and noticed that the entry for PC2 is missing. Which change must be applied to SW1 so that PC1 and PC2 communicate normally?

A)

Question # 213

B)

Question # 213

C)

Question # 213

D)

Question # 213

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 214

What is the purpose of the ip address dhcp command?

Options:

A.  

to configure an Interface as a DHCP server

B.  

to configure an interface as a DHCP helper

C.  

to configure an interface as a DHCP relay

D.  

to configure an interface as a DHCP client

Discussion 0
Question # 215

What is a function of a Next-Generation IPS?

Options:

A.  

makes forwarding decisions based on learned MAC addresses

B.  

serves as a controller within a controller-based network

C.  

integrates with a RADIUS server to enforce Layer 2 device authentication rules

D.  

correlates user activity with network events

Discussion 0
Question # 216

A network engineer is installing an IPv6-only capable device. The client has requested that the device IP address be reachable only from the internal network. Which type of IPv6 address must the engineer assign?

Options:

A.  

unique local address

B.  

link-local address

C.  

aggregatable global address

D.  

IPv4-compatible IPv6 address

Discussion 0
Question # 217

A Cisco engineer is configuring a factory-default router with these three passwords:

• The user EXEC password for console access is p4ssw0rd1

• The user EXEC password for Telnet access is s3cr3t2

• The password for privileged EXEC mode is pnv4t3p4ss Which command sequence must the engineer configured

A)

Question # 217

B)

Question # 217

C)

Question # 217

D)

Question # 217

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 218

Refer to the exhibit.

Question # 218

All traffic enters the CPE router from interface Serial0/3 with an IP address of 192 168 50 1 Web traffic from the WAN is destined for a LAN network where servers are load-balanced An IP packet with a destination address of the HTTP virtual IP of 192 1681 250 must be forwarded Which routing table entry does the router use?

Options:

A.  

192.168.1.0/24 via 192.168.12.2

B.  

192.168.1.128/25 via 192.168.13.3

C.  

192.168.1.192/26 via 192.168.14.4

D.  

192.168.1.224/27 via 192.168.15.5

Discussion 0
Question # 219

Refer to the exhibit.

Question # 219

Switch A is newly configured. All VLANs are present in the VLAN database. The IP phone and PC A on Gi0/1 must be configured for the appropriate VLANs to establish connectivity between the PCs. Which command set fulfills the requirement?

A)

Question # 219

B)

Question # 219

C)

Question # 219

D)

Question # 219

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 220

An engineer is configuring remote access to a router from IP subnet 10.139.58.0/28. The domain name, crypto keys, and SSH have been configured. Which configuration enables the traffic on the destination router?

A)

Question # 220

B)

Question # 220

C)

Question # 220

D)

Question # 220

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 221

Which wireless security protocol relies on Perfect Forward Secrecy?

Options:

A.  

WPA3

B.  

WPA

C.  

WEP

D.  

WPA2

Discussion 0
Question # 222

What causes a port to be placed in the err-disabled state?

Options:

A.  

nothing plugged into the port

B.  

link flapping

C.  

shutdown command issued on the port

D.  

latency

Discussion 0
Question # 223

Refer to the exhibit.

Question # 223

Which plan must be Implemented to ensure optimal QoS marking practices on this network?

Options:

A.  

As traffic traverses MLS1 remark the traffic, but trust all markings at the access layer.

B.  

Trust the IP phone markings on SW1 and mark traffic entering SW2 at SW2.

C.  

Remark traffic as it traverses R1 and trust all markings at the access layer.

D.  

As traffic enters from the access layer on SW1 and SW2. trust all traffic markings.

Discussion 0
Question # 224

An engineer is tasked to configure a switch with port security to ensure devices that forward unicasts multicasts and broadcasts are unable to flood the port The port must be configured to permit only two random MAC addresses at a time Drag and drop the required configuration commands from the left onto the sequence on the right Not all commands are used.

Question # 224

Options:

Discussion 0
Question # 225

Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.

Question # 225

Options:

Discussion 0
Question # 226

Refer to the exhibit.

Question # 226

Traffic that is flowing over interface TenGigabitEthernet0/0 experiences slow transfer speeds. What is the reason for the issue?

Options:

A.  

heavy traffic congestion

B.  

a duplex incompatibility

C.  

a speed conflict

D.  

queuing drops

Discussion 0
Question # 227

Which protocol uses the SSL?

Options:

A.  

HTTP

B.  

SSH

C.  

HTTPS

D.  

Telnet

Discussion 0
Question # 228

Which QoS per-hop behavior changes the value of the ToS field in the IPv4 packet header?

Options:

A.  

shaping

B.  

classification

C.  

policing

D.  

marking

Discussion 0
Question # 229

Which characteristic differentiates the concept of authentication from authorization and accounting?

Options:

A.  

user-activity logging

B.  

service limitations

C.  

consumption-based billing

D.  

identity verification

Discussion 0
Question # 230

Refer to the exhibit.

Question # 230

Drag and drop the prefix lengths from the left onto the corresponding prefixes on the right Not all prefixes are used

Options:

Discussion 0
Question # 231

Refer to the exhibit.

Question # 231

Which next-hop IP address does Routed use for packets destined to host 10 10.13.158?

Options:

A.  

10.10.10.5

B.  

10.10.11.2

C.  

10.10.12.2

D.  

10.10.10.9

Discussion 0
Question # 232

Which protocol is used for secure remote CLI access?

Options:

A.  

HTTPS

B.  

HTTP

C.  

Telnet

D.  

SSH

Discussion 0
Question # 233

Refer to the exhibit.

Question # 233

Packets received by the router from BGP enter via a serial interface at 209.165.201.10. Each route is present within the routing table. Which interface is used to forward traffic with a destination IP of 10.10.10.24?

Options:

A.  

F0/10

B.  

F0/11

C.  

F0/12

D.  

F0/13

Discussion 0
Question # 234

What is a requirement when configuring or removing LAG on a WLC?

Options:

A.  

The Incoming and outgoing ports for traffic flow must be specified If LAG Is enabled.

B.  

The controller must be rebooted after enabling or reconfiguring LA

G.  

C.  

The management interface must be reassigned if LAG disabled.

D.  

Multiple untagged interfaces on the same port must be supported.

Discussion 0
Question # 235

Refer to the exhibit.

Question # 235

Packets received by the router from BGP enter via a serial interface at 209 165 201 1 Each route is present within the routing table Which interface is used to forward traffic with a destination IP of 10.1.1.19?

Options:

A.  

F0/4

B.  

F0/0

C.  

F0/1

D.  

F0/3

Discussion 0
Question # 236

Which QoS traffic handling technique retains excess packets in a queue and reschedules these packets for later transmission when the configured maximum bandwidth has been surpassed?

Options:

A.  

weighted random early detection

B.  

traffic policing

C.  

traffic shaping

D.  

traffic prioritization

Discussion 0
Question # 237

Refer to the exhibit.

Question # 237

A static route must be configured on R14 to forward traffic for the 172 21 34 0/25 network that resides on R86 Which command must be used to fulfill the request?

Options:

A.  

ip route 172.21.34.0 255.255.255.192 10.73.65.65

B.  

ip route 172.21.34.0 255.255.255.0 10.73.65.65

C.  

ip route 172.21.34.0 255.255.128.0 10.73.65.64

D.  

ip route 172.21.34.0 255.255.255.128 10.73.65.66

Discussion 0
Question # 238

Refer to the exhibit.

Question # 238

The router has been configured with a supernet to accommodate the requirement for 380 users on a subnet The requirement already considers 30% future growth. Which configuration verifies the IP subnet on router R4?

A)

Question # 238

B)

Question # 238

C)

Question # 238

D)

Question # 238

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 239

Refer to the exhibit.

Question # 239

A network engineer must configure R1 so that it sends all packets destined to the 10.0.0.0/24 network to R3, and all packets destined to PCI to R2. Which configuration must the engineer implement?

A)

Question # 239

B)

Question # 239

C)

Question # 239

D)

Question # 239

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 240

Drag and drop the AAA lerms from the left onto the descriptions on the right.

Question # 240

Options:

Discussion 0
Question # 241

Question # 241

A)

Question # 241

B)

Question # 241

C)

Question # 241

D)

Question # 241

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 242

Which interface enables communication between a program on the controller and a program on the networking devices?

Options:

A.  

northbound interface

B.  

software virtual interface

C.  

southbound interface

D.  

tunnel Interface

Discussion 0
Question # 243

Drag and drop the WLAN components from the left onto the component details on the right.

Question # 243

Options:

Discussion 0
Question # 244

Refer to the exhibit.

Question # 244

A)

Question # 244

B)

Question # 244

C)

Question # 244

D)

Question # 244

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 245

Drag and drop the functions of AAA supporting protocols from the left onto the protocols on the right.

Question # 245

Options:

Discussion 0
Question # 246

Which is a fact related to FTP?

Options:

A.  

It uses block numbers to identify and mitigate data-transfer errors

B.  

It always operates without user authentication

C.  

It relies on the well-known UDP port 69.

D.  

It uses two separate connections for control and data traffic

Discussion 0
Question # 247

What is the function of a controller in a software-defined network?

Options:

A.  

multicast replication at the hardware level

B.  

forwarding packets

C.  

fragmenting and reassembling packets

D.  

setting packet-handling policies

Discussion 0
Question # 248

Drag and drop the IPv6 address description from the left onto the IPv6 address types on the right. Not all options are used.

Question # 248

Options:

Discussion 0
Question # 249

Drag and drop the steps in a standard DNS lookup operation from the left into the order on the right.

Question # 249

Options:

Discussion 0
Question # 250

Which type of port is used to connect lo the wired network when an autonomous AP maps two VLANs to its WLANs?

Options:

A.  

LAG

B.  

EtherChannel

C.  

trunk

D.  

access

Discussion 0
Question # 251

Question # 251

Refer to the exhibit. An engineer is asked to confère router R1 so that it forms an OSPF single-area neighbor relationship with R2. Which command sequence must be implemented to configure the router?

Question # 251

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 252

Drag and drop the statement about AAA services from the left to the corresponding AAA services on the right.

Question # 252

Options:

Discussion 0
Question # 253

Refer to the exhibit.

Question # 253

A network engineer configures the Cisco WLC to authenticate local wireless clients against a RADIUS server Which task must be performed to complete the process?

Options:

A.  

Change the Server Status to Disabled

B.  

Select Enable next to Management

C.  

Select Enable next to Network User

D.  

Change the Support for CoA to Enabled.

Discussion 0
Question # 254

Refer to the exhibit. User traffic originating within site 0 is failing to reach an application hosted on IP address 192.168 0 10. Which is located within site A What is determined by the routing table?

Options:

A.  

The default gateway for site B is configured incorrectly

B.  

The lack of a default route prevents delivery of the traffic

C.  

The traffic is blocked by an implicit deny in an ACL on router2

D.  

The traffic to 192 168 010 requires a static route to be configured in router 1.

Discussion 0
Question # 255

Drag and drop the Rapid PVST+ forwarding state actions from the left to the right. Not all actions are used.

Question # 255

Options:

Discussion 0
Question # 256

Why is TCP desired over UDP for application that require extensive error checking, such as HTTPS?

Options:

A.  

UDP operates without acknowledgments, and TCP sends an acknowledgment for every packet received.

B.  

UDP reliably guarantees delivery of all packets, and TCP drops packets under heavy load.

C.  

UDP uses flow control mechanisms for the delivery of packets, and TCP uses congestion control for efficient packet delivery.

D.  

UDP uses sequencing data tor packets to arrive in order, and TCP offers trie capability to receive packets in random order.

Discussion 0
Question # 257

Options:

A.  

LAG

B.  

EtherChannel

C.  

trunk

D.  

access

Discussion 0
Question # 258

Refer to the exhibit.

Question # 258

Which two values does router R1 use to determine the best path to reach destinations in network 1,0.0.0/8? (Choose two.)

Options:

A.  

longest prefix match

B.  

highest administrative distance

C.  

highest metric

D.  

lowest metric

E.  

lowest cost to reach the next hop

Discussion 0
Question # 259

What is a reason to configure a trunk port that connects to a WLC distribution port?

Options:

A.  

Eliminate redundancy with a link failure in the data path.

B.  

Allow multiple VLAN to be used in the data path.

C.  

Provide redundancy if there is a link failure for out-of-band management.

D.  

Permit multiple VLANs to provide out-of-band management.

Discussion 0
Question # 260

Refer to the exhibit.

Question # 260

Clients on the WLAN are required to use 802.11r. What action must be taken to meet the requirement?

Options:

A.  

Under Protected Management Frames, set the PMF option to Required.

B.  

Enable CCKM under Authentication Key Management.

C.  

Set the Fast Transition option and the WPA gtk-randomize State to disable.

D.  

Set the Fast Transition option to Enable and enable FT 802.1X under Authentication Key Management.

Discussion 0
Question # 261

Which two protocols are used by an administrator for authentication and configuration on access points?

Options:

A.  

Kerberos

B.  

802.1Q

C.  

802.1x

D.  

TACACS+

E.  

RADIUS

Discussion 0
Question # 262

What is the advantage of separating the control plane from the data plane within an SDN network?

Options:

A.  

decreases overall network complexity

B.  

limits data queries to the control plane

C.  

reduces cost

D.  

offloads the creation of virtual machines to the data plane

Discussion 0
Question # 263

Which component controls and distributes physical resources for each virtual machine?

Options:

A.  

OS

B.  

hypervisor

C.  

CPU

D.  

physical enclosure

Discussion 0
Question # 264

Which channel-group mode must be configured when multiple distribution interfaces connected to a WLC are bundled?

Options:

A.  

Channel-group mode passive.

B.  

Channel-group mode on.

C.  

Channel-group mode desirable.

D.  

Channel-group mode active.

Discussion 0
Question # 265

What is a link-local all-nodes IPv6 multicast address?

Options:

A.  

ff02:0:0:0:0:0:0:1

B.  

2004:31c:73d9:683e:255::

C.  

fffe:034:0dd:45d6:789e::

D.  

fe80:4433:034:0dd::2

Discussion 0
Question # 266

How do TCP and UDP fit into a query-response model?

Options:

A.  

TCP establishes a connection prior to sending data, and UDP sends immediately.

B.  

TCP uses error detection for packets, and UDP uses error recovery.

C.  

TCP avoids using sequencing, and UDP avoids using acknowledgments.

D.  

TCP encourages out-of-order packet delivery, and UDP prevents re-ordering.

Discussion 0
Question # 267

Which command enables HTTP access to the Cisco WLC?

Options:

A.  

config network secureweb enable

B.  

config certificate generate web admin

C.  

config network webmode enable

D.  

config network telnet enable

Discussion 0
Question # 268

How does authentication differ from authorization?

Options:

A.  

Authentication verifies the identity of a person accessing a network, and authorization determines what resource a user can access.

B.  

Authentication is used to record what resource a user accesses, and authorization is used to determine what resources a user can access

C.  

Authentication is used to determine what resources a user is allowed to access, and authorization is used to track what equipment is allowed access to the network

D.  

Authentication is used to verify a person's identity, and authorization is used to create syslog messages for logins.

Discussion 0
Question # 269

Drag and drop the statements about access-point modes from the left onto the corresponding modes on the right.

Question # 269

Options:

Discussion 0
Question # 270

Refer to the exhibit.

Question # 270

How many JSON objects are represented?

Options:

A.  

1

B.  

2

C.  

3

D.  

4

Discussion 0
Question # 271

Question # 271

Refer to the exhibit. Drag and drop the learned prefixes from the left onto the preferred route methods from which they were learned on the right.

Question # 271

Options:

Discussion 0
Question # 272

What are two purposes of HSRP? (Choose two.)

Options:

A.  

It groups two or more routers to operate as one virtual router.

B.  

It improves network availability by providing redundant gateways.

C.  

It passes configuration information to hosts in a TCP/IP network.

D.  

It helps hosts on the network to reach remote subnets without a default gateway.

E.  

It provides a mechanism for diskless clients to autoconfigure their IP parameters during boot.

Discussion 0
Question # 273

Drag and drop the device behaviors from the left onto the matching HSRP slate on the right.

Question # 273

Options:

Discussion 0
Question # 274

Refer to the exhibit.

Question # 274

Which switch becomes the root bridge?

A)

Question # 274

B)

Question # 274

C)

Question # 274

D)

Question # 274

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 275

SIP-based Call Admission Control must be configured in the Cisco WLC GUI. SIP call-snooping ports are configured. Which two actions must be completed next? (Choose two.)

Options:

A.  

Set the QoS level to silver or greater for voice traffic.

B.  

Set the QoS level to platinum for voice traffic.

C.  

Enable Media Session Snooping on re WLAN.

D.  

Enable traffic shaping for the LAN interlace of the WL

C.  

E.  

Configure two different QoS rotes tor data and voice traffic.

Discussion 0
Question # 276

Refer to the exhibit.

Question # 276

The given Windows PC is requesting the IP address of the host at www.cisco.com. To which IP address is the request sent?

Options:

A.  

192.168.1.226

B.  

192.168.1.100

C.  

192.168.1.254

D.  

192.168.1.253

Discussion 0
Question # 277

Drag and drop the virtualization concepts from the left onto the matching statements on the right.

Question # 277

Options:

Discussion 0
Question # 278

Refer to the exhibit.

Question # 278

An engineer is configuring a Layer 3 port-channel interface with LACP. The configuration on the first device is complete, and it is verified that both interfaces have registered the neighbor device in the CDP table. Which task on the neighbor device enables the new port channel to come up without negotiating the channel?

Options:

A.  

Change the EtherChannel mode on the neighboring interfaces to auto.

B.  

Configure the IP address of the neighboring device.

C.  

Bring up the neighboring interfaces using the no shutdown command.

D.  

Modify the static EtherChannel configuration of the device to passive mode.

Discussion 0
Question # 279

Refer to the exhibit.

Question # 279

An engineer must configure a floating static route on an external EIGRP network. The destination subnet is the /29 on the LAN Interface of R86. Which command must be executed on R14?

Options:

A.  

ip route 10.80.65.0.255.255.248.0.10.73.65.66.1

B.  

ip route 10.80.65.0.255.255.255..240 fa0/1 89

C.  

ip route 10.80.65.0.255.255.248.0.10.73.65.66.171

D.  

ip route 10.80.65.0.0.0.224.10.80.65.0. 255

Discussion 0
Question # 280

Refer to the exhibit.

How does router R1 handle traffic to the 172.16.1.4/30 subnet?

Options:

A.  

It sends all traffic over the path via 172.16.9.5 using 172.16.4.4 as a backup.

B.  

It sends all traffic over the path via 10.0.1.100.

C.  

It load-balances traffic over 172.16.9.5 and 172.16.4.4.

D.  

It sends all traffic over the path via 172.16.4.4.

Discussion 0
Question # 281

What is an enhancement implemented in WPA3?

Options:

A.  

employs PKI and RADIUS to identify access points

B.  

applies 802.1x authentication and AES-128 encryption

C.  

uses TKIP and per-packet keying

D.  

defends against deauthentication and disassociation attacks

Discussion 0
Question # 282

What is a specification for SSIDS?

Options:

A.  

They are a Cisco proprietary security feature.

B.  

They must include one number and one letter.

C.  

They define the VLAN on a switch.

D.  

They are case sensitive.

Discussion 0
Question # 283

Why would VRRP be implemented when configuring a new subnet in a multivendor environment?

Options:

A.  

when a gateway protocol is required that support more than two Cisco devices for redundancy

B.  

to enable normal operations to continue after a member failure without requiring a change In a host ARP cache

C.  

to ensure that the spanning-tree forwarding path to the gateway is loop-free

D.  

to interoperate normally with all vendors and provide additional security features for Cisco devices

Discussion 0
Question # 284

What is the MAC address used with VRRP as a virtual address?

Options:

A.  

00-00-0C-07-AD-89

B.  

00-00-5E-00-01-0a

C.  

00-07-C0-70-AB-01

D.  

00-C6-41-93-90-91

Discussion 0
Question # 285

Which type of address is shared by routers in a HSRP implementation and used by hosts on the subnet as their default gateway address?

Options:

A.  

multicast address

B.  

loopback IP address

C.  

virtual IP address

D.  

broadcast address

Discussion 0
Question # 286

Question # 286

Refer to the exhibit. What is represented by “R1” and “SW1” within the JSON output?

Options:

A.  

object

B.  

value

C.  

key

D.  

array

Discussion 0
Question # 287

Refer to the exhibit.

Question # 287

A network administrator must permit traffic from the 10.10.0.0/24 subnet to the WAN on interlace Seria10. What is the effect of the configuration as the administrator applies the command?

Options:

A.  

The permit command fails and returns an error code.

B.  

The router accepts all incoming traffic to Seria10 with the last octet of the source IP set to 0.

C.  

The sourced traffic from IP range 10.0.0.0 -10.0.0.255 is allowed on Seria10.

D.  

The router fails to apply the access list to the interface.

Discussion 0
Question # 288

A switch is a forwarding a frame out of an interfaces except the interface that received the frame. What is the technical term for this process?

Options:

A.  

ARP

B.  

CDP

C.  

flooding

D.  

multicast

Discussion 0
Question # 289

Refer to the exhibit.

Question # 289

The loopback1 interface of the Atlanta router must reach the lookback3 interface of the Washington router.

Options:

A.  

ipv6 route 2000::1/128 2012::2

B.  

ipv6 route 2000::1/128 2012::1

C.  

ipv6 route 2000:3 123 s0/0/0

D.  

ipv6 route 2000::3/128 2023::3

E.  

ipv6 route 2000::1/128 s0/0/1

Discussion 0
Question # 290

Refer to the exhibit.

Question # 290

Which next-hop IP address has the least desirable metric when sourced from R1?

Options:

A.  

10.10.10.5

B.  

10.10.10.3

C.  

10.10.10.4

D.  

10.10.10.2

Discussion 0
Question # 291

Refer to the exhibit.

Question # 291

What is represented by "R1" and "SW1" within the JSON output?

Options:

A.  

key

B.  

array

C.  

value

D.  

object

Discussion 0
Question # 292

Drag and drop the IPv6 address details from the left onto the corresponding types on the right.

Question # 292

Options:

Discussion 0
Get 200-301 dumps and pass your exam in 24 hours!

Free Exams Sample Questions