Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A network administrator enabled port security on a switch interface connected to a printer. What is the next configuration action in order to allow the port to learn the MAC address of the printer and insert it into the table automatically?

A.

enable dynamic MAC address learning

B.

implement static MAC addressing.

C.

enable sticky MAC addressing

D.

implement auto MAC address learning

Which type of organization should use a collapsed-core architecture?

A.

large and requires a flexible, scalable network design

B.

large and must minimize downtime when hardware fails

C.

small and needs to reduce networking costs currently

D.

small but is expected to grow dramatically in the near future

What are two reasons for an engineer to configure a floating state route? (Choose two)

A.

to automatically route traffic on a secondary path when the primary path goes down

B.

to route traffic differently based on the source IP of the packet

C.

to enable fallback static routing when the dynamic routing protocol fails

D.

to support load balancing via static routing

E.

to control the return path of traffic that is sent from the router

Where does wireless authentication happen?

A.

SSID

B.

radio

C.

band

D.

Layer 2

An engineer must configure traffic for a VLAN that is untagged by the switch as it crosses a trunk link. Which command should be used?

A.

switchport trunk allowed vlan 10

B.

switchport trunk native vlan 10

C.

switchport mode trunk

D.

switchport trunk encapsulation dot1q

Which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?

A.

TKiP encryption

B.

AES encryption

C.

scrambled encryption key

D.

SAE encryption

Refer to the exhibit.

Which IPv6 configuration is required for R17 to successfully ping the WAN interface on R18?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Refer the exhibit.

What is the cause of poor performance on router R19?

A.

excessive collisions

B.

speed and duplex mismatch

C.

port oversubscription

D.

excessive CRC errors

What is the put method within HTTP?

A.

It is a read-only operation.

B.

It is a nonldempotent operation.

C.

It replaces data at the destination.

D.

It displays a web site.

Which group of channels in the 802.11b/g/n/ax 2.4 GHz frequency bands are non-overlapping channels?

A.

channels 1, 5, and 10

B.

channels 1, 5, and 11

C.

channels 1, 6, and 10

D.

channels 1, 6, and 11

Refer to the exhibit.

Which entry is the longest prefix match for host IP address 192.168.10.5?

A.

1

B.

2

C.

3

D.

4

Drag and drop the common functions from the left onto the cofresponding network topology architecture layer on the right. Not all common functions are used.

Which protocol is implemented when an organization must verify network performance, troubleshoot issues, and use an agent to communicate between monitoring tools and end devices?

A.

SNMP

B.

FTP

C.

NTP

D.

NFS

Refer to the exhibit.

The P2P blocking action option is disabled on the WLC.

A.

Enable the Static IP Tunneling option.

B.

Disable the Coverage Hole Detection option.

C.

Check the DHCP Addr. Assignment check box.

D.

Set the P2P Blocking Action option to Forward-UpStream.

Why would VRRP be implemented when configuring a new subnet in a multivendor environment?

A.

when a gateway protocol is required that support more than two Cisco devices for redundancy

B.

to enable normal operations to continue after a member failure without requiring a change In a host ARP cache

C.

to ensure that the spanning-tree forwarding path to the gateway is loop-free

D.

to interoperate normally with all vendors and provide additional security features for Cisco devices

Refer to the exhibit. Traffic from R1 to the 10.10.2.0/24 subnet uses 192.168.1.2 as its next hop. A network engineer wants to update the R1 configuration so that traffic with destination 10.10.2.1 passes through router R3, and all other traffic to the 10.10.2.0/24 subnet passes through R2.

Which command must be used?

A.

ip route 10.10.2.0 255.255.255.0 192.168.1.4 100

B.

ip route 10.10.2.0 255.255.255.0 192.168.1.4 115

C.

ip route 10.10.2.1 255.255.255.255 192.168.1.4 100

D.

ip route 10.10.2.1 255.255.255.255 192.168.1.4 115

The address block 192.168.32.0/24 must be subnetted into smaller networks. The engineer must meet these requirements:

Create 8 new subnets

Each subnet must accommodate 30 hosts

Interface VLAN 10 must use the last usable IP in the first new subnet.

A Layer 3 interface is used.

Which configuration must be applied to the interface?

A.

no switchport  ip address 192.168.32.30 255.255.255.224

B.

no switchport mode trunk  ip address 192.168.32.97 255.255.255.224

C.

no switchport mode access  ip address 192.168.32.62 255.255.255.240

D.

switchport  ip address 192.168.32.65 255.255.255.240

Drag and drop the AAA features from the left onto the corresponding AAA security services on the right. Not all options are used.

Which interface enables communication between a program on the controller and a program on the networking devices?

A.

northbound interface

B.

software virtual interface

C.

southbound interface

D.

tunnel Interface

Refer to the exhibit.

Router R1 must be configured to reach the 10.0.3.0/24 network from the 10.0.1.0/24 segment.

Which command must be used to configure the route?

A.

ip route 10.0.3.0 0.255255.255 10.0.4.2

B.

route add 10.0.3.0 mask 255.255.255.0 10.0.4.3

C.

Ip route 10.0.3.0 255.255.255.0 10.0.4.3

D.

route add 10.0.3.0 0.255.255.255 10.0.4.2