Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Exhibit.

The switches are connected via a Cat5 Ethernet cable that was successfully tested. The Interfaces are configured as access ports and are both in a 'down" status. What is the cause of this issue?

A.

The switches are configured with incompatible duplex settings.

B.

The distance between the two switches is not supported by Cut5.

C.

The speed settings on the switches are mismatched.

D.

The portfast command is missing from the configuration.

Which two statements distinguish authentication from accounting? (Choose two.)

A.

Only authentication records the duration of a user's connection.

B.

Only authentication supports user-activity audits.

C.

Only authentication provides supporting information for billing users.

D.

Only authentication challenges users for their credentials and returns a response.

E.

Only authentication validates "who you are."

Refer to the exhibit.

The network engineer is configuring a new WLAN and is told to use a setup password for authentication instead of the RADIUS servers. Which additional set of tasks must the engineer perform to complete the configuration?

A.

Disable PMF Enable PSK Enable 802.1x

B.

Select WPA Policy Enable CCKM Enable PSK

C.

Select WPA Policy Select WPA2 Policy Enable FT PSK

D.

Select WPA2 Policy Disable PMF Enable PSK

Which AP mode serves as the primary hub in a point-to-multipoint network topology.

A.

FlexConnect

B.

SE-Connect

C.

bridge

D.

local

Refer to the exhibit.

Which type of JSON data is represented?

A.

string

B.

array

C.

number

D.

object

Which CRUD operation corresponds to me HTTP GET method?

A.

delete

B.

create

C.

update

D.

read

What are two reasons a switch experiences frame flooding? (Choose two.)

A.

A defective patch cable is connected to the switch port

B.

Topology changes are occurring within spanning-tree

C.

An aged MAC (able entry is causing excessive updates

D.

Port-security is configured globally

E.

The forwarding table has overflowed

What is the purpose of configuring different levels of syslog for different devices on the network?

A.

to rate-limit messages for different seventy levels from each device

B.

to set the severity of syslog messages from each device

C.

to identify the source from which each syslog message originated

D.

to control the number of syslog messages from different devices that are stored locally

Refer to the exhibit. A packet sourced from 172.16.32.254 is destined for 172.16.32.8. What is the subnet mask of the preferred destination route?

A.

255.255.224.0

B.

255.255.255.0

C.

255.255.255.192

D.

255.255.255.252

Refer to the exhibit. An engineer configured the New York router with static routes that point to the Atlanta and Washington sites. Which command must be configured on the Atlanta and Washington routers so that both sites are able to reach the Lo2 interface on the New York router?

A.

ipv6 route ::/0 Serial 0/0/0

B.

ipv6 route 0.0.0.0 0.0.0.0 Serial 0/0/0

C.

ipv6 route ::/0 2000::2

D.

ipv6 route ::/0 Serial 0/0/1

Refer to the exhibit.

A newly configured PC fails to connect to the internet using TCP port 80 to www cisco com Which setting must be modified for the connection to work?

A.

Subnet Mask

B.

DNS Servers

C.

Default Gateway

D.

DHCP Server

Refer to the exhibit. With a reference bandwidth of 100 Gb on all routers, which path does router Y use to get to network 192.168.1.0/24?

A.

router C > D > A > B > F

B.

router C > D > A > F

C.

router E > F

D.

router E > B > F

Refer to the exhibit.

The image server and client A are running an application that transfers an extremely high volume of data between the two. An engineer is configuring a dedicated circuit between R1 and R2. Which set of commands must the engineer apply to the routers so that only traffic between the image server and client A is forces to use the new circuit?

A.

R1(config)#ip route 10.10.13.10 255.255.255.255 10.10.10.6R2(config)#ip route 192.168.0.100 255.255.255.255 10.10.10.5

B.

R1(config)#ip route 10.10.13.10 255.255.255.128 10.10.10.6R2(config)#lp route 192.168.0.100 255.255.255.0 10.10.10.5

C.

R1(config)#ip route 10.10.13.10 255.255.255.252 10.10.10.6R2(config)#tp route 192.168.0.100 255.255.255.252 10.10.10.5

D.

R1(config)#ip route 10.10.13.10 255.255.255.255 10.10.10.2R2(config)#ip route 192.168.0.100 255.255.255.255 10.10.10.1

An engineer must configure a core router with a floating static default route to the backup router at 10.200.0.2. Which command meets the requirements?

A.

ip route 0.0.0.0 0.0.0.0 10.200.0.2 1

B.

Ip route 0.0.0.0 0.0.0.0 10.200.0.2 floating

C.

ip route 0.0.0.0 0.0.0.0 10.200.0.2

D.

Ip route 0.0.0.0 0.0.0.0 10.200.0.2 10

Which device separates networks by security domains?

A.

firewall

B.

access point

C.

intrusion protection system

D.

wireless controller

Refer to the exhibit.

What does the host do when using the IPv4 Preferred function?

A.

It continues to use a statically assigned IPv4 address

B.

It forces the DNS server to provide the same IPv4 address at each renewal.

C.

It requests the same IPv4 address when it renews its lease with the DHCP server.

D.

It prefers a pool of addresses when renewing the IPv4 host IP address

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Refer to the exhibit. Which type of JSON data is shown?

A.

sequence

B.

string

C.

object

D.

Boolean

What is the role of nonoverlapping channels in a wireless environment?

A.

to reduce interference

B.

to allow for channel bonding

C.

to stabilize the RF environment

D.

to increase bandwidth

Refer to the exhibit.

A network engineer must configure NETCONF. After creating the configuration, the engineer gets output from the command show line but not from show running- config. Which command completes the configuration?

A.

Device(config)# netconf lock-time 500

B.

Device(config)# netconf max-message 1000

C.

Device(config)# no netconf ssh acl 1

D.

Device(config)# netconf max-sessions 100