Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is a function of a remote access VPN?

A.

used cryptographic tunneling to protect the privacy of data for multiple users simultaneously

B.

used exclusively when a user is connected to a company's internal network

C.

establishes a secure tunnel between two branch sites

D.

allows the users to access company internal network resources through a secure tunnel

What causes a port to be placed in the err-disabled state?

A.

latency

B.

port security violation

C.

shutdown command issued on the port

D.

nothing plugged into the port

which purpose does a northbound API serve in a controller-based networking architecture?

A.

communicates between the controller and the physical network hardware

B.

reports device errors to a controller

C.

generates statistics for network hardware and traffic

D.

facilitates communication between the controller and the applications

Which type of security program is violated when a group of employees enters a building using the ID badge of only one person?

A.

intrusion detection

B.

user awareness

C.

physical access control

D.

network authorization

When DHCP is configured on a router, which command must be entered so the default gateway is automatically distributed?

A.

default-router

B.

default-gateway

C.

ip helper-address

D.

dns-server

What is a function of Wireless LAN Controller?

A.

register with a single access point that controls traffic between wired and wireless endpoints.

B.

use SSIDs to distinguish between wireless clients.

C.

send LWAPP packets to access points.

D.

monitor activity on wireless and wired LANs

What is the maximum bandwidth of a T1 point-to-point connection?

A.

1.544 Mbps

B.

2.048 Mbps

C.

34.368 Mbps

D.

43.7 Mbps

Which attribute does a router use to select the best path when two or more different routes to the same destination exist from two different routing protocols.

A.

dual algorithm

B.

metric

C.

administrative distance

D.

hop count

Drag and drop the QoS congestion management terms from the left onto the description on the right.

What is an appropriate use for private IPv4 addressing?

A.

on the public-facing interface of a firewall

B.

to allow hosts inside to communicate in both directions with hosts outside the organization

C.

on internal hosts that stream data solely to external resources

D.

on hosts that communicates only with other internal hosts

An engineer is configuring an encrypted password for the enable command on a router where the local user database has already been configured Drag and drop the configuration commands from the left into the correct sequence on the right Not all commands are used

Which configuration ensures that the switch is always the root for VLAN 750?

A.

Switch(config)#spanning-tree vlan 750 priority 38003685

B.

Switch(config)#spanning-tree vlan 750 root primary

C.

Switch(config)#spanning-tree vlan 750 priority 614440

D.

Switch(config)#spanning-tree vlan 750 priority 0

What is the primary effect of the spanning-tree portfast command?

A.

it enables BPDU messages

B.

It minimizes spanning-tree convergence time

C.

It immediately puts the port into the forwarding state when the switch is reloaded

D.

It immediately enables the port in the listening state

Which technology is appropriate for communication between an SDN controller and applications running over the network?

A.

OpenFlow

B.

REST API

C.

NETCONF

D.

Southbound API

What is a similarity between OM3 and OM4 fiber optic cable?

A.

Both have a 50 micron core diameter

B.

Both have a 9 micron core diameter

C.

Both have a 62.5 micron core diameter

D.

Both have a 100 micron core diameter

What are two improvements provided by automation for network management in an SDN environment? (Choose two)

A.

Data collection and analysis tools establish a baseline for the network

B.

Artificial intelligence identifies and prevents potential design failures.

C.

Machine learning minimizes the overall error rate when automating troubleshooting processes

D.

New devices are onboarded with minimal effort

E.

Proprietary Cisco APIs leverage multiple network management tools.

Which function does the range of private IPv4 addresses perform?

A.

allows multiple companies to each use the same addresses without conflicts

B.

provides a direct connection for hosts from outside of the enterprise network

C.

ensures that NAT is not required to reach the internet with private range addressing

D.

enables secure communications to the internet for all external hosts

Refer to the exhibit.

Which switch becomes the root bridge?

A.

S1

B.

S2

C.

S3

D.

S4

What is the function of a hub-and-spoke WAN topology?

A.

allows access restrictions to be implemented between subscriber sites.

B.

provides direct connections between subscribers

C.

supports Layer 2 VPNs

D.

supports application optimization

Refer to the exhibit.

which path is used by the router for internet traffic ?

A.

209.165.200.0/27

B.

10.10.10.0/28

C.

0.0.0.0/0

D.

10.10.13.0/24