Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

How does a Cisco Unified Wireless network respond to Wi-Fi channel overlap?

A.

It alternates automatically between 2.4 GHz and 5 GHz on adjacent access points

B.

It allows the administrator to assign channels on a per-device or per-interface basis.

C.

It segregates devices from different manufacturers onto different channels.

D.

It analyzes client load and background noise and dynamically assigns a channel.

Which CRUD operation corresponds to the HTTP GET method?

A.

read

B.

update

C.

create

D.

delete

When a WPA2-PSK WLAN is configured in the wireless LAN Controller, what is the minimum number of characters that in ASCll format?

A.

6

B.

8

C.

12

D.

18

Which protocol requires authentication to transfer a backup configuration file from a router to a remote server?

A.

DTP

B.

FTP

C.

SMTP

D.

TFTP

When OSPF learns multiple paths to a network, how does it select a route?

A.

It multiple the active K value by 256 to calculate the route with the lowest metric.

B.

For each existing interface, it adds the metric from the source router to the destination to calculate the route with the lowest bandwidth.

C.

It divides a reference bandwidth of 100 Mbps by the actual bandwidth of the existing interface to calculate the router with the lowest cost.

D.

It count the number of hops between the source router and the destination to determine the router with the lowest metric

Refer to the exhibit.

For security reasons, automatic neighbor discovery must be disabled on the R5 Gi0/1 interface. These tasks must be completed:

• Disable all neighbor discovery methods on R5 interface GiO/1.

• Permit neighbor discovery on R5 interface GiO/2.

• Verify there are no dynamically learned neighbors on R5 interface Gi0/1.

• Display the IP address of R6*s interface Gi0/2.

Which configuration must be used?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

What are two characteristics of a controller-based network? (Choose two)

A.

The administrator can make configuration updates from the CLI

B.

It uses northbound and southbound APIs to communicate between architectural layers

C.

It moves the control plane to a central point.

D.

It decentralizes the control plane, which allows each device to make its own forwarding decisions

E.

It uses Telnet to report system issues.

Refer to the exhibit.

An engineer must configure GigabitEthernet1/1 to accommodate voice and data traffic Which configuration accomplishes this task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Which type of IPv6 address is publicly routable in the same way as IPv4 public address?

A.

global unicast

B.

link-local

C.

unique local

D.

multicast

Using direct sequence spread spectrum, which three 2.4-GHz channels are used to limit collisions?

A.

1,6,11

B.

1,5,10

C.

1,2,3

D.

5,6,7

A wireless administrator has configured a WLAN; however, the clients need access to a less congested 5-GHz network for their voice quality. What action must be taken to meet the requirement?

A.

enable AAA override

B.

enable RX-SOP

C.

enable DTIM

D.

enable Band Select

Which command must be entered to configure a DHCP relay?

A.

ip helper-address

B.

ip address dhcp

C.

ip dhcp pool

D.

ip dhcp relay

Which function does an SNMP agent perform?

A.

it sends information about MIB variables in response to requests from the NMS

B.

it requests information from remote network nodes about catastrophic system events.

C.

it manages routing between Layer 3 devices in a network

D.

it coordinates user authentication between a network device and a TACACS+ or RADIUS server

When a client and server are not on the same physical network, which device is used to forward requests and replies between client and server for DHCP?

A.

DHCP relay agent

B.

DHCP server

C.

DHCPDISCOVER

D.

DHCPOFFER

Which two actions influence the EIGRP route selection process? (Choose two)

A.

The router calculates the reported distance by multiplying the delay on the exiting Interface by 256.

B.

The router calculates the best backup path to the destination route and assigns it as the feasible successor.

C.

The router calculates the feasible distance of all paths to the destination route

D.

The advertised distance is calculated by a downstream neighbor to inform the local router of the bandwidth on the link

E.

The router must use the advertised distance as the metric for any given route

Refer to the exhibit.

An administrator configures four switches for local authentication using passwords that are stored in a cryptographic hash. The four switches must also support SSH access for administrators to manage the network infrastructure. Which switch is configured correctly to meet these requirements?

A.

SW1

B.

SW2

C.

SW3

D.

SW4

Refer to the exhibit.

An engineer booted a new switch and applied this configuration via the console port. Which additional configuration must be applied to allow administrators to authenticate directly to enable privilege mode via Telnet using a local username and password?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Which set of action satisfy the requirement for multifactor authentication?

A.

The user swipes a key fob, then clicks through an email link

B.

The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device

C.

The user enters a PIN into an RSA token, and then enters the displayed RSA key on a login screen

D.

The user enters a user name and password and then re-enters the credentials on a second screen

Refer to the exhibit.

A packet is being sent across router R1 to host 172.16.0.14. What is the destination route for the packet?

A.

209.165.200.254 via Serial0/0/1

B.

209.165.200.254 via Serial0/0/0

C.

209.165.200.246 via Serial0/1/0

D.

209.165.200.250 via Serial0/0/0

Which configuration is needed to generate an RSA key for SSH on a router?

A.

Configure the version of SSH

B.

Configure VTY access.

C.

Create a user with a password.

D.

Assign a DNS domain name