Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Refer to the exhibit. All routers in the network are configured conrectly, and the expected routes are being exchanged among the routers. Which set of routes are leamed from neighbors and installed on router 2?

A.

10.129.9.0/2310.139.2.0/3010.2.191.0/3010.129.9.0/25

B.

10.129.9.0/2310.40.1.0/3010.2.191.0/3010.129.9.0/25

C.

10.40.1.0/3010.139.2.0/3010.2.191.0/3010.129.9.0/25

D.

10.129.9.0/2310.139.2.0/3010.129.9.0/2510.22.1.0/24

What are two facts that differentiate optical fiber cabling from copper cabling? (Choose two.)

A.

It has a greater sensitivity to changes in temperature and moisture.

B.

It carries signals for longer distances.

C.

It carries electrical current further distances for PoE devices.

D.

It is less expensive when purchasing patch cables.

E.

It provides greater throughput options.

Which Cisco proprietary protocol ensures traffic recovers immediately, transparently, and automatically when edge devices or access circuits fail?

A.

SLB

B.

FHRP

C.

VRRP

D.

HSRP

Which functionality is provided by the console connection on a Cisco WLC?

A.

out-of-band management

B.

secure in-band connectivity for device administration

C.

unencrypted in-band connectivity for file transfers

D.

HTTP-based GUI connectivity

Which two protocols are used by an administrator for authentication and configuration on access points?

A.

Kerberos

B.

802.1Q

C.

802.1x

D.

TACACS+

E.

RADIUS

Refer to the exhibit.

What does route 10.0.1.3/32 represent in the routing table?

A.

a single destination address

B.

the source 10.0.1.100

C.

all hosts in the 10.0.1.0 subnet

D.

the 10.0.0.0 network

What is a function of Cisco Advanced Malware Protection for a Next-Generation IPS?

A.

authorizing potentially compromised wireless traffic

B.

inspecting specific files and file types for malware

C.

authenticating end users

D.

URL filtering

A client experiences slow throughput from a server that is directly connected to the core switch in a data center. A network engineer finds minimal latency on connections to the server, but data transfers are unreliable, and the output of the show Interfaces counters errors command shows a high FCS-Err count on the interface that is connected to the server. What is the cause of the throughput issue?

A.

high bandwidth usage

B.

a physical cable fault

C.

a speed mismatch

D.

a cable that is too long

Which protocol does Ansible use to push modules to nodes in a network?

A.

SSH

B.

SNMP

C.

Kerberos

D.

Telnet

Which interface is used for out-of-band management on a WLC?

A.

dynamic

B.

service port

C.

virtual

D.

management

Refer to the exhibit. IPv6 must be implemented on R1 to the ISP The uplink between R1 and the ISP must be configured with a manual assignment, and the LAN interface must be self-provisioned Both connections must use the applicable IPv6 networks Which two configurations must be applied to R1? (Choose two.)

A.

interface Gi0/1ipv6 address 2001:db8:0F1B:FCCB:ACCE:FCED:ABCD:FA02:/127

B.

interface Gi0/0ipv6 address 2001:db8:1:AFFF::/64 eui-64

C.

interface Gi0/1ipv6 address 2001:db8:0F1B:FCCB:ACCE:FCED:ABCD:FA00:/127

D.

interface Gi0/0ipv6 address 2001:db8:0:AFFF::/64 eui-64

E.

interface Gi0/0ipv6 address 2001:db8:0F1B:FCCB:ACCE:FCED:ABCD:FA03;/127

Refer to the exhibit.

The given Windows PC is requesting the IP address of the host at www.cisco.com. To which IP address is the request sent?

A.

192.168.1.226

B.

192.168.1.100

C.

192.168.1.254

D.

192.168.1.253

Which type of port is used to connect lo the wired network when an autonomous AP maps two VLANs to its WLANs?

A.

LAG

B.

EtherChannel

C.

trunk

D.

access

Refer to the exhibit.

A Cisco engineer creates a new WLAN called lantest. Which two actions must be performed so that only high-speed 2.4-Ghz clients connect? (Choose two.)

A.

Enable the Broadcast SSID option

B.

Enable the Status option.

C.

Set the Radio Policy option to 802 11g Only.

D.

Set the Radio Policy option to 802.11a Only.

E.

Set the Interface/Interface Group(G) to an interface other than guest

Drag and drop the REST API call method for HTTP from the left onto the action they perform on the right.

Drag and drop the Ansible features from the left to the right Not all features are used.

A network engineer must configure the router R1 GigabitEthernet1/1 interface to connect to the router R2 GigabitEthernet1/1 interface. For the configuration to be applied, the engineer must compress the address 2001:0db8:0000:0000:0500:000a:400F:583B. Which command must be issued on the interface?

A.

ipv6 address 2001:db8 :: 500:a:400F:583B

B.

ipv6 address 2001:0db8 :: 5:a:4F:583B

C.

ipv6 address 2001 :: db8:0000 :: 500:a:400F:583B

D.

ipv6 address 2001:db8:0 :: 500:a:4F:583B

Which IPsec transport mode encrypts the IP header and the payload?

A.

pipe

B.

control

C.

transport

D.

tunnel

What are two characteristics of a controller-based network? (Choose two.)

A.

It uses Telnet to report system issues

B.

It uses northbound and southbound APIs to communicate between architectural layers

C.

It decentralizes the control plane, which allows each device to make its own forwarding decisions

D.

It moves the control plane to a central point

E.

The administrator can make configuration updates from the CLI