Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

When a client and server are not on the same physical network, which device is used to forward requests and replies between client and server for DHCP?

A.

DHCP relay agent

B.

DHCP server

C.

DHCPDISCOVER

D.

DHCPOFFER

A corporate office uses four floors in a building

• Floor 1 has 24 users

• Floor 2 has 29 users

• Floor 3 has 28 users

•Floor 4 has 22 users

Which subnet summarizes and gives the most efficient distribution of IP addresses for the router configuration?

A.

192.168.0.0/26 as summary and 192.168.0.0/29 for each floor

B.

192.168.0.0.24 as summary and 192.168.0.0/28 for each floor

C.

192.168.0.0/23 as summary and 192.168.0.0/25 for each floor

D.

l92.168.0.0/25 as summary and 192.168.0.0/27 for each floor

An engineer configured an OSPF neighbor as a designated router. Which state verifies the designated router is in the proper mode?

A.

Exchange

B.

2-way

C.

Full

D.

Init

Which 802.11 frame type is indicated by a probe response after a client sends a probe request?

A.

action

B.

management

C.

control

D.

data

What is the primary function of a Layer 3 device?

A.

to analyze traffic and drop unauthorized traffic from the Internet

B.

to transmit wireless traffic between hosts

C.

to pass traffic between different networks

D.

forward traffic within the same broadcast domain

Refer to Exhibit.

How does SW2 interact with other switches in this VTP domain?

A.

It processes VTP updates from any VTP clients on the network on its access ports.

B.

It receives updates from all VTP servers and forwards all locally configured VLANs out all trunk ports

C.

It forwards only the VTP advertisements that it receives on its trunk ports.

D.

It transmits and processes VTP updates from any VTP Clients on the network on its trunk ports

A network administrator must to configure SSH for remote access to router R1 The requirement is to use a public and private key pair to encrypt management traffic to and from the connecting client.

Which configuration, when applied, meets the requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Refer to the exhibit.

An access list is created to deny Telnet access from host PC-1 to RTR-1 and allow access from all other hosts A Telnet attempt from PC-2 gives this message:"% Connection refused by remote host" Without allowing Telnet access from PC-1, which action must be taken to permit the traffic?

A.

Add the access-list 10 permit any command to the configuration

B.

Remove the access-class 10 in command from line vty 0.4.

C.

Add the ip access-group 10 out command to interface g0/0.

D.

Remove the password command from line vty 0 4.

Refer to Exhibit.

Which configuration must be applied to the router that configures PAT to translate all addresses in VLAN 200 while allowing devices on VLAN 100 to use their own IP addresses?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Which two outcomes are predictable behaviors for HSRP? (Choose two)

A.

The two routers share a virtual IP address that is used as the default gateway for devices on the LAN.

B.

The two routers negotiate one router as the active router and the other as the standby router

C.

Each router has a different IP address both routers act as the default gateway on the LAN, and traffic is load balanced between them.

D The two routers synchronize configurations to provide consistent packet forwarding

D.

The two routed share the same IP address, and default gateway traffic is load-balanced between them

Which two protocols must be disabled to increase security for management connections to a Wireless LAN Controller? (Choose two.)

A.

Telnet

B.

SSH

C.

HTTP

D.

HTTPS

E.

TFTP

A network administrator enabled port security on a switch interface connected to a printer. What is the next configuration action in order to allow the port to learn the MAC address of the printer and insert it into the table automatically?

A.

enable dynamic MAC address learning

B.

implement static MAC addressing.

C.

enable sticky MAC addressing

D.

implement auto MAC address learning

Where is the interface between the control plane and data plane within the software-defined architecture?

A.

control layer and the infrastructure layer

B.

application layer and the infrastructure layer

C.

application layer and the management layer

D.

control layer and the application layer

A packet is destined for 10.10.1.22. Which static route does the router choose to forward the packet?

A.

ip route 10.10.1.0 255.255.255.240 10.10.255.1

B.

ip route 10.10.1.16 255.255.255.252 10.10.255.1

C.

ip route 10.10.1.20 255.255.255.252 10.10.255.1

D.

ip route 10.10.1.20 255.255.255.254 10.10.255.1

A router running EIGRP has learned the same route from two different paths. Which parameter does the router use to select the best path?

A.

cost

B.

adminstrative distance

C.

metric

D.

as-path

Refer to the exhibit.

An engineer must configure GigabitEthernet1/1 to accommodate voice and data traffic Which configuration accomplishes this task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Refer to the exhibit.

An engineer is required to verify that the network parameters are valid for the users wireless LAN connectivity on a /24 subnet. Drag and drop the values from the left onto the network parameters on the right. Not all values are used.

When a site-to-site VPN is used, which protocol is responsible for the transport of user data?

A.

IKEv2

B.

IKEv1

C.

IPsec

D.

MD5

Which statement about Link Aggregation when implemented on a Cisco Wireless LAN Controller is true?

A.

To pass client traffic two or more ports must be configured.

B.

The EtherChannel must be configured in "mode active"

C.

When enabled the WLC bandwidth drops to 500 Mbps

D.

One functional physical port is needed to pass client traffic

What is the difference between the TCP and UDP protocols?

A.

TCP ensures ordered, reliable data delivery, and UDP offers low latency and high throughput.

B.

TCP is used for transmitting data over the internet, and UDP is used for transmitting data over a local network.

C.

TCP manages multicast and broadcast data transfers, and UDP only handles unicast communications.

D.

TCP is used to ensure data integrity in a file transfer, and UDP is used to broadcast a message to multiple recipients.