Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Refer to the exhibit.

Rapid PVST+ mode is on the same VLAN on each switch. Which switch becomes the root bridge and why?

A.

SW2, because its MAC address is the highest

B.

SW3, because its priority is the highest

C.

SW4, because its priority is highest and its MAC address is lower

D.

SW1, because its priority is the lowest and its MAC address is higher

Which properly is shared by 10GBase-SR and 10GBase-LR interfaces?

A.

Both require fiber cable media for transmission.

B.

Both require UTP cable media for transmission.

C.

Both use the single-mode fiber type.

D.

Both use the multimode fiber type.

What is the role of syslog level 7 in network device health monitoring?

A.

It provides information about error conditions visible on the network device.

B.

It shares normal operational messages from the network equipment.

C.

It sends outputs from various debug commands on the device.

D.

It warns about emergency conditions on the network appliance.

What is a reason to implement LAG on a Cisco WLC?

A.

Increase the available throughput on the link.

B.

Increase security by encrypting management frames

C.

Allow for stateful failover between WLCs

D.

Enable the connected switch ports to use different Layer 2 configurations

Refer to the exhibit. Local access for R4 must be established and these requirements must be met:

• Only Telnet access is allowed.

• The enable password must be stored securely.

• The enable password must be applied in plain text.

• Full access to R4 must be permitted upon successful login.

Which configuration script meets the requirements?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Refer to the exhibit. A multivendor network exists and the company is implementing VoIP over the network for the first time.

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

An engineer must configure a core router with a floating static default route to the backup router at 10.200.0.2. Which command meets the requirements?

A.

ip route 0.0.0.0 0.0.0.0 10.200.0.2 1

B.

Ip route 0.0.0.0 0.0.0.0 10.200.0.2 floating

C.

ip route 0.0.0.0 0.0.0.0 10.200.0.2

D.

Ip route 0.0.0.0 0.0.0.0 10.200.0.2 10

Refer to the exhibit. This ACL is configured to allow client access only to HTTP, HTTPS, and DNS services via UDP. The new administrator wants to add TCP access to the DNS service. Which configuration updates the ACL efficiently?

A.

ip access-list extended Services35 permit tcp 10.0.0.0 0.255.255.255 host 198.51.100.11 eq domain

B.

no ip access-list extended Servicesip access-list extended Services30 permit tcp 10.0.0.0 0.255.255.255 host 198.51.100.11 eq domain

C.

ip access-list extended Servicespermit tcp 10.0.0.0 0.255.255.255 host 198.51.100.11 eq domain

D.

no ip access-list extended Servicesip access-list extended Servicespermit udp 10.0.0.0 0.255.255.255 any eq 53permit tcp 10.0.0.0 0.255.255.255 host 198.51.100.11 eq domaindeny ip any any log

Drag and drop the statements about networking from the left onto the corresponding networking types on the right

Refer the exhibit.

What is the cause of poor performance on router R19?

A.

excessive collisions

B.

speed and duplex mismatch

C.

port oversubscription

D.

excessive CRC errors

Two switches have been implemented and all interfaces are at the default configuration level. A trunk link must be implemented between two switches with these requirements:

• using an industry-standard trunking protocol

• permitting VLANs 1 -10 and denying other VLANs

How must the interconnecting ports be configured?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.

What is the operating mode and role of a backup port on a shared LAN segment in Rapid PVST+?

A.

forwarding mode and provides the lowest-cost path to the root bridge for each VLAN

B.

learning mode and provides the shortest path toward the root bridge handling traffic away from the LAN

C.

blocking mode and provides an alternate path toward the designated bridge

D.

listening mode and provides an alternate path toward the root bridge

What is the default port-security behavior on a trunk link?

A.

It causes a network loop when a violation occurs.

B.

It disables the native VLAN configuration as soon as port security is enabled.

C.

It places the port in the err-disabled state if it learns more than one MAC address.

D.

It places the port in the err-disabled slate after 10 MAC addresses are statically configured.

The address block 192.168.32.0/24 must be subnetted into smaller networks. The engineer must meet these requirements:

Create 8 new subnets

Each subnet must accommodate 30 hosts

Interface VLAN 10 must use the last usable IP in the first new subnet.

A Layer 3 interface is used.

Which configuration must be applied to the interface?

A.

no switchport  ip address 192.168.32.30 255.255.255.224

B.

no switchport mode trunk  ip address 192.168.32.97 255.255.255.224

C.

no switchport mode access  ip address 192.168.32.62 255.255.255.240

D.

switchport  ip address 192.168.32.65 255.255.255.240

An engineer is installing a new wireless printer with a static IP address on the Wi-Fi network. Which feature must be enabled and configured to prevent connection issues with the printer?

A.

client exclusion

B.

passive client

C.

DHCP address assignment

D.

static IP tunneling

A WLC sends alarms about a rogue AP, and the network administrator verifies that the alarms are caused by a legitimate autonomous AP.

A.

Place the AP into manual containment.

B.

Remove the AP from WLC management.

C.

Manually remove the AP from Pending state.

D.

Set the AP Class Type to Friendly.

When is the PUT method used within HTTP?

A.

when a nonidempotent operation is needed

B.

to update a DNS server

C.

to display a web site

D.

when a read-only operation it required