Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which feature, when used on a WLC, allows it to bundle its distribution system ports into one 802.3ad group?

A.

QinQ

B.

ISL

C.

PAgP

D.

LAG

Which statement describes virtualization on containers?

A.

It is a type of operating system virtualization that allows the host operating system to control the different CPU memory processes.

B.

It emulates a physical computer and enables multiple machines to run with many operating systems on a physical machine.

C.

It separates virtual machines from each other and allocates memory, processors, and storage to compute.

D.

It contains a guest operating system and virtual partition of hardware for OS and requires application libraries.

Refer to the exhibit.

Which configuration is needed to configure a WLAN with WPA2 only and with a password that is 63 characters long?

A.

Disable WPA Policy and WPA Encryption and then enable PSK using ASCII.

B.

Enable PSK and FT PSK and then disable WPA Policy.

C.

Disable WPA Encryption and then enable FT PSK.

D.

Enable PSK using Hex format and then disable WPA Policy.

What is the main purpose of SSH management access?

A.

To support DES 56-bit and 3DES (168-bit) ciphers

B.

To enable secured access to the inbound management interface

C.

To validate management access with username and domain name only

D.

To allow passwords protected with HTTPS encryption to be sent

Why would a network administrator choose to implement RFC 1918 address space?

A.

to route traffic on the internet

B.

to provide flexibility in the IP network design

C.

to provide overlapping address space with another network

D.

to limit the number of hosts on the network

Refer to the exhibit. What is the administrative distance for the advertised prefix that includes the host IP address 10.30.0.1?

A.

10.0.0.2

B.

110

C.

30

D.

2

Connectivity between four routers has been established. IP connectivity must be configured in the order presented to complete the implementation. No dynamic routing protocols are included.

1. Configure static routing using host routes to establish connectivity from router R3 to the router R1 Loopback address using the source IP of 209.165.200.230.

2. Configure an IPv4 default route on router R2 destined for router R4.

3. Configure an IPv6 default router on router R2 destined for router R4.

How does MAC learning function?

A.

Enabled by default on all VLANs and interfaces

B.

Forwards frames to a neighbor port using CDP

C.

Overwrites the known source MAC address in the address table

D.

Protects against denial of service attacks

Three switches must be configured for Layer 2 connectivity. The company requires only the designated VLANs to be configured on their respective switches and permitted accross any links between switches for security purposes. Do not modify or delete VTP configurations.

The network needs two user-defined VLANs configured:

VLAN 110: MARKETING

VLAN 210: FINANCE

1. Configure the VLANs on the designated switches and assign them as access ports to the interfaces connected to the PCs.

2. Configure the e0/2 interfaces on Sw1 and Sw2 as 802.1q trunks with only the required VLANs permitted.

3. Configure the e0/3 interfaces on Sw2 and Sw3 as 802.1q trunks with only the required VLANs permitted.

All physical cabling between the two switches is installed. Configure the network connectivity between the switches using the designated VLANs and interfaces.

1. Configure VLAN 100 named Compute and VLAN 200 named Telephony where required for each task.

2. Configure Ethernet0/1 on SW2 to use the existing VLAN named Available.

3. Configure the connection between the switches using access ports.

4. Configure Ethernet0/1 on SW1 using data and voice VLANs.

5. Configure Ethemet0/1 on SW2 so that the Cisco proprietary neighbor discovery protocol is turned off for the designated interface only.

Refer to the exhibit. Which configuration enables SW2 to establish an LACP EtherChannel?

A.

B.

C.

D.

Refer to the exhibit. Configurations for the switch and PCs are complete.

Which configuration must be applied so that VLANs 2 and 3 communicate back and forth?

A.

interface GigabitEthernet0/0

ip address 10.10.2.10 255.255.252.0

B.

interface GigabitEthernet0/0.3

encapsulation dot1Q 3 native

ip address 10.10.2.10 255.255.252.0

C.

interface GigabitEthernet0/0.10

encapsulation dot1Q 3

D.

interface GigabitEthernet0/0.3

encapsulation dot1Q 10

ip address 10.10.2.10 255.255.252.0

An organization developed new security policies and decided to print the policies and distribute them to all personnel so that employees review and apply the policies. Which element of a security program is the organization implementing?

A.

Asset identification

B.

User training

C.

Physical access control

D.

Vulnerability control

Where are the real-time control functions processed in a split MAC architecture?

A.

Centralized cloud management platform

B.

Central WLC

C.

Individual AP

D.

Client device

Physical connectivity is implemented between the two Layer 2 switches,

and the network connectivity between them must be configured.

I . Configure an LACP EtherChanneI and number it as 44; configure it

between switches SWI and SW2 using interfaces EthernetO/O and

Ethernet0/1 on both sides. The LACP mode must match on both ends.

2. Configure the EtherChanneI as a trunk link.

3. Configure the trunk link with 802. Iq tags.

4. Configure VLAN 'MONITORING' as the untagged VLAN of the

EtherChannel.

==================

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using

the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

What is the total number of users permitted to simultaneously browse the controller management pages when using the AireOS GUI?

A.

2

B.

5

C.

8

D.

9

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

Refer to the exhibit. The routers R1-LAB and R2-LAB are configured with link-local addresses. What command must be applied to interface Gi0/0 on R1-LAB for an automated address self-assignment on the IPv6 network?

A.

ipv6 address 2001:db8:1:0FFA:0::/64

B.

ipv6 address 2001:db8:0:0FFA::1/64

C.

ipv6 address 2001:db8:0:0FFA::/64 eui-64

D.

ipv6 address 2001:db8:0:0FFA::/64 anycast

Refer to the exhibit. A secondary route is required on router R1 to pass traffic to the LAN network on R2 if the primary link fails. Which command must be entered to configure the router?

A.

ip route 10.0.2.0 255.255.255.240 10.0.0.7 92

B.

ip route 10.0.2.0 255.255.255.248 10.0.0.6 91

C.

ip route 10.0.2.0 256.255.255.240 10.0.0.6 91

D.

ip route 10.0.2.0 255.255.255.248 null0 93

What is the maximum length of characters used in an SSID?

A.

16

B.

32

C.

48

D.

64