Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is a difference between local AP mode and FiexConnet AP mode?

A.

Local AP mode creates two CAPWAP tunnels per AP to the WLC

B.

FiexConnect AP mode fails to function if the AP loses connectivity with the WLC

C.

FlexConnect AP mode bridges the traffic from the AP to the WLC when local switching is configured

D.

Local AP mode causes the AP to behave as if it were an autonomous AP

What does a router do when configured with the default DNS lookup settings, and a URL is entered on the CLI?

A.

initiates a ping request to the URL

B.

prompts the user to specify the desired IP address

C.

continuously attempts to resolve the URL until the command is cancelled

D.

sends a broadcast message in an attempt to resolve the URL

What are two similarities between UTP Cat 5e and Cat 6a cabling? (Choose two.)

A.

Both operate at a frequency of 500 MHz.

B.

Both support runs of up to 55 meters.

C.

Both support runs of up to 100 meters.

D.

Both support speeds of at least 1 Gigabit.

E.

Both support speeds up to 10 Gigabit.

What are two functions of a server on a network? (Choose two)

A.

achieves redundancy by exclusively using virtual server clustering

B.

runs applications that send and retrieve data for workstations that make requests

C.

handles requests from multiple workstations at the same time

D.

runs the same operating system in order to communicate with other servers

E.

housed solely in a data center that is dedicated to a single client

Which two WAN architecture options help a business scalability and reliability for the network? (Choose two)

A.

asychronous routing

B.

single-homed branches

C.

dual-homed branches

D.

static routing

E.

dynamic routing

How do servers connect to the network in a virtual environment?

A.

wireless to an access point that is physically connected to the network

B.

a cable connected to a physical switch on the network

C.

a virtual switch that links to an access point that is physically connected to the network

D.

a software switch on a hypervisor that is physically connected to the network

Drag and drop the QoS congestion management terms from the left onto the description on the right.

Drag and drop the network protocols from the left onto the correct transport services on the right.

Drag and drop the statement about networking from the left into the Corresponding networking types on the right. Not all statements are used.

When configuring IPv6 on an interface, which two IPv6 multicast groups are joined? (Choose two)

A.

2000::/3

B.

2002::5

C.

FC00::/7

D.

FF02::1

E.

FF02::2

An email user has been lured into clicking a link in an email sent by their company's security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?

A.

Physical access control

B.

Social engineering attack

C.

brute force attack

D.

user awareness

Which QoS Profile is selected in the GUI when configuring a voice over WLAN deployment?

A.

Bronze

B.

Platinum

C.

Silver

D.

Gold

What is an appropriate use for private IPv4 addressing?

A.

on the public-facing interface of a firewall

B.

to allow hosts inside to communicate in both directions with hosts outside the organization

C.

on internal hosts that stream data solely to external resources

D.

on hosts that communicates only with other internal hosts

How do TCP and UDP differ in the way they provide reliability for delivery of packets?

A.

TCP is a connectionless protocol that does not provide reliable delivery of data, UDP is a connection-oriented protocol that uses sequencing to provide reliable delivery.

B.

TCP does not guarantee delivery or error checking to ensure that there is no corruption of data UDP provides message acknowledgement and retransmits data if lost.

C.

TCP provides flow control to avoid overwhelming a receiver by sending too many packets at once, UDP sends packets to the receiver in a continuous stream without checking for sequencing

D.

TCP uses windowing to deliver packets reliably; UDP provides reliable message transfer between hosts by establishing a three-way handshake

A port security violation has occurred on a switch port due to the maximum MAC address count being exceeded. Which command must be configured to increment the security-violation count and forward an SNMP trap?

A.

switchport port-security violation access

B.

switchport port-security violation protect

C.

switchport port-security violation restrict

D.

switchport port-security violation shutdown

What is a similarity between OM3 and OM4 fiber optic cable?

A.

Both have a 50 micron core diameter

B.

Both have a 9 micron core diameter

C.

Both have a 62.5 micron core diameter

D.

Both have a 100 micron core diameter

Which security program element involves installing badge readers on data-center doors to allow workers to enter and exit based on their job roles?

A.

role-based access control

B.

biometrics

C.

multifactor authentication

D.

physical access control

What is the purpose of an SSID?

A.

It provides network security

B.

It differentiates traffic entering access posits

C.

It identities an individual access point on a WLAN

D.

It identifies a WLAN

When the active router in an HSRP group fails, what router assumes the role and forwards packets?

A.

backup

B.

standby

C.

listening

D.

forwarding

What are two characteristics of a public cloud Implementation? (Choose two.)

A.

It is owned and maintained by one party, but it is shared among multiple organizations.

B.

It enables an organization to fully customize how It deploys network resources.

C.

It provides services that are accessed over the Internet.

D.

It Is a data center on the public Internet that maintains cloud services for only one company.

E.

It supports network resources from a centralized third-party provider and privately-owned virtual resources