Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Refer to the exhibit.

An engineer must configure a floating static route on an external EIGRP network. The destination subnet is the /29 on the LAN Interface of R86. Which command must be executed on R14?

A.

ip route 10.80.65.0.255.255.248.0.10.73.65.66.1

B.

ip route 10.80.65.0.255.255.255..240 fa0/1 89

C.

ip route 10.80.65.0.255.255.248.0.10.73.65.66.171

D.

ip route 10.80.65.0.0.0.224.10.80.65.0. 255

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

Refer to the exhibit.

A network engineer configures the CCNA WLAN so that clients must authenticate hourly and to limit the number of simultaneous connections to the WLAN to Which two actions complete this configuration? (Choose two.)

A.

Enable the Enable Session Timeout option and set the value to 3600.

B.

Set the Maximum Allowed Clients value to 10.

C.

Enable the Client Exclusion option and set the value to 3600.

D.

Enable the Wi-Fi Direct Clients Policy option.

E.

Set the Maximum Allowed Clients Per AP Radio value to 10.

What are two protocols within the IPsec suite? (Choose two)

A.

AH

B.

3DES

C.

ESP

D.

TLS

E.

AES

What is a zero-day exploit?

A.

It is when a new network vulnerability is discovered before a fix is available

B.

It is when the perpetrator inserts itself in a conversation between two parties and captures or alters data.

C.

It is when the network is saturated with malicious traffic that overloads resources and bandwidth

D.

It is when an attacker inserts malicious code into a SOL server.

What differentiates the Cisco OfficeExtend AP mode from FlexConnect AP mode?

A.

FlexConnect allows a personal SSID to be configured on the AP, and personal SSIDs are not supported with OfficeExtend.

B.

OfficeExtend does not support DTLS tunneling of traffic to the WLC, and FlexConnect tunnels traffic to the WLC with DTLS.

C.

OfficeExtend tunnels all traffic through the WLC, and FlexConnect terminates client traffic at the AP switch port.

D.

FlexConnect must be deployed behind a router that NATs the client traffic, and OfficeExtend uses public IP sources.

Refer to the exhibit.

How many JSON objects are presented?

A.

1

B.

2

C.

3

D.

4

Refer to the exhibit.

A network engineer must configure R1 so that it sends all packets destined to the 10.0.0.0/24 network to R3, and all packets destined to PCI to R2. Which configuration must the engineer implement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Which Windows command is used instead of the route print command to display the contents of the IP routing table?

A.

netstat-n

B.

ipconfig

C.

ifconfig

D.

netstat-r

Refer to the exhibit.

An engineer is configuring a Layer 3 port-channel interface with LACP. The configuration on the first device is complete, and it is verified that both interfaces have registered the neighbor device in the CDP table. Which task on the neighbor device enables the new port channel to come up without negotiating the channel?

A.

Change the EtherChannel mode on the neighboring interfaces to auto.

B.

Configure the IP address of the neighboring device.

C.

Bring up the neighboring interfaces using the no shutdown command.

D.

Modify the static EtherChannel configuration of the device to passive mode.

A network engineer must migrate a router loopback interface to the IPv6 address space. If the current IPv4 address of the interface is 10.54.73.1/32, and the engineer configures IPv6 address 0.0.0.0.0:ffff:a36:4901, which prefix length must be used?

A.

/64

B.

/96

C.

/124

D.

/128

What is a characteristic of RSA?

A.

It uses preshared keys for encryption

B.

It requires both sides to have identical keys

C.

It is a private-key encryption algorithm

D.

It is a public-key cryptosystem

Refer to the exhibit.

Which switch becomes the root bridge?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

What is a function of an endpoint?

A.

It is used directly by an individual user to access network services

B.

It passes unicast communication between hosts in a network

C.

It transmits broadcast traffic between devices in the same VLAN

D.

It provides security between trusted and untrusted sections of the network.

A Cisco engineer notices thai two OSPF neighbors are connected using a crossover Ethernet cable. The neighbors are taking too long to become fully adjacent. Which command must be issued under the interface configuration on each router to reduce the time required for the adjacency to reach the FULL state?

A.

ip ospf network broadcast

B.

ip ospf dead-interval 40

C.

ip ospf network point-to-point

D.

ip ospf priority 0

Refer to the exhibit. A packet sourced from 10.10.10.32 is destined for the Internet. What is the administrative distance for the destination route?

A.

0

B.

1

C.

2

D.

32

Which feature, when used on a WLC, allows it to bundle its distribution system ports into one 802.3ad group?

A.

QinQ

B.

ISL

C.

PAgP

D.

LAG

How does MAC learning function?

A.

Enabled by default on all VLANs and interfaces

B.

Forwards frames to a neighbor port using CDP

C.

Overwrites the known source MAC address in the address table

D.

Protects against denial of service attacks

Which role do predictive Al models play in network load balancing?

A.

They anticipate future traffic spikes.

B.

They assign IP addresses to devices.

C.

They select correct cabling types for deployment.

D.

They solely monitor historical traffic volumes.

What are two benefits of private IPv4 addressing? (Choose two.)

A.

provides external internet network connectivity

B.

provides unlimited address ranges

C.

propagates routing information to WAN links

D.

reuses addresses at multiple sites

E.

conserves globally unique address space