Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which IPv6 address block sends packets to a group address rather than a single address?

A.

2000::/3

B.

FC00::/7

C.

FE80::/10

D.

FF00::/8

Refer to the exhibit.

Which command provides this output?

A.

show ip route

B.

show ip interface

C.

show interface

D.

show cdp neighbor

Drag and drop the statement about networking from the left into the Corresponding networking types on the right. Not all statements are used.

Refer to the exhibit.

R5 is the current DR on the network, and R4 is the BDR. Their interfaces are flapping, so a network engineer wants the OSPF network to elect a different DR and BDR. Which set of configurations must the engineer implement?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Refer to the exhibit.

If OSPF Is running on this network, how does Router2 handle traffic from Site B to 10.10.13.128/25 at Site A?

A.

It load-balances traffic out of Fa0/1 and Fa0/2.

B.

It is unreachable and discards the traffic.

C.

It sends packets out of interface FaO/2.

D.

It sends packets out of interface Fa0/1.

Refer to the exhibit.

Which password must an engineer use to enter the enable mode?

A.

adminadmin123

B.

default

C.

testing 1234

D.

cisco123

Which two encoding methods are supported by REST APIs? (Choose two)

A.

YAML

B.

JSON

C.

EBCDIC

D.

SGML

E.

XML

Refer to the exhibit.

which path is used by the router for internet traffic ?

A.

209.165.200.0/27

B.

10.10.10.0/28

C.

0.0.0.0/0

D.

10.10.13.0/24

Which security program element involves installing badge readers on data-center doors to allow workers to enter and exit based on their job roles?

A.

role-based access control

B.

biometrics

C.

multifactor authentication

D.

physical access control

Which two events occur automatically when a device is added to Cisco DNA Center? (Choose two. )

A.

The device Is assigned to the Global site.

B.

The device Is placed into the Unmanaged state.

C.

The device is placed into the Provisioned state.

D.

The device is placed into the Managed state.

E.

The device is assigned to the Local site.

An engineer is asked to protect unused ports that are configured in the default VLAN on a switch.

Which two steps will fulfill the request? (Choose two)

A.

Configure the ports in an EtherChannel.

B.

Administratively shut down the ports

C.

Configure the port type as access and place in VLAN 99

D.

Configure the ports as trunk ports

E.

Enable the Cisco Discovery Protocol

Refer to the exhibit.

Which type of configuration is represented in the output?

A.

Ansible

B.

JSON

C.

Chef

D.

Puppet

Refer to the exhibit.

After running the code in the exhibit, which step reduces the amount of data that the NETCONF server returns to the NETCONF client, to only the interface's configuration?

A.

Use the Ixml library to parse the data returned by the NETCONF server for the interface's configuration.

B.

Create an XML filter as a string and pass it to get_config() method as an argument.

C.

Create a JSON filter as a string and pass it to the get_config() method as an argument.

D.

Use the JSON library to parse the data returned by the NETCONF server for the interface's configuration.

What are network endpoints?

A.

act as routers to connect a user to the service prowler network

B.

a threat to the network if they are compromised

C.

support inter-VLAN connectivity

D.

enforce policies for campus-wide traffic going to the internet

Which attribute does a router use to select the best path when two or more different routes to the same destination exist from two different routing protocols.

A.

dual algorithm

B.

metric

C.

administrative distance

D.

hop count

Which two protocols are supported on service-port interfaces? (Choose two.)

A.

RADIUS

B.

TACACS+

C.

SCP

D.

Telnet

E.

SSH

Which technology is appropriate for communication between an SDN controller and applications running over the network?

A.

OpenFlow

B.

REST API

C.

NETCONF

D.

Southbound API

What is a DHCP client?

A.

a host that is configured to request an IP address automatically

B.

a server that dynamically assigns IP addresses to hosts

C.

a workstation that requests a domain name associated with its IP address

D.

a rooter that statically assigns IP addresses to hosts

Which 802.11 management frame type is sent when a client roams between access points on the same SSID?

A.

Reassociation Request

B.

Probe Request

C.

Authentication Request

D.

Association Request

Which command prevents passwords from being stored in the configuration as plain text on a router or switch?

A.

enable secret

B.

service password-encryption

C.

username Cisco password encrypt

D.

enable password

What occurs when overlapping Wi-Fi channels are implemented?

A.

The wireless network becomes vulnerable to unauthorized access.

B.

Wireless devices are unable to distinguish between different SSIDs

C.

Users experience poor wireless network performance.

D.

Network communications are open to eavesdropping.

Refer to the exhibit.

An administrator must turn off the Cisco Discovery Protocol on the port configured with address last usable address in the 10.0.0.0/30 subnet. Which command set meets the requirement?

A.

interface gi0/1no cdp enable

B.

interface gi0/1clear cdp table

C.

interface gi0/0no cdp advertise-v2

D.

interface gi0/0no cdp run

Refer to the exhibit.

How does the router manage traffic to 192.168.12.16?

A.

It selects the RIP route because it has the longest prefix inclusive of the destination address.

B.

It chooses the OSPF route because it has the longest prefix inclusive of the destination address.

C.

it load-balances traffic between all three routes

D.

It chooses the EIGRP route because it has the lowest administrative distance

Refer to Exhibit.

The loopback1 interface of the Atlanta router must reach the loopback3 interface of the Washington router. Which two static host routes must be configured on the NEW York router? (Choose two)

A.

ipv6 route 2000::1/128 2012::1

B.

ipv6 route 2000::3/128 2023::3

C.

ipv6 route 2000::3/128 s0/0/0

D.

ipv6 route 2000::1/128 2012::2

E.

ipv6 route 2000::1/128 s0/0/1

How does QoS optimize voice traffic?

A.

reducing bandwidth usage

B.

by reducing packet loss

C.

by differentiating voice and video traffic

D.

by increasing jitter

Which CRUD operation modifies an existing table or view?

A.

read

B.

create

C.

replace

D.

update

Which implementation provides the strongest encryption combination for the wireless environment?

A.

WPA2 + AES

B.

WPA + AES

C.

WEP

D.

WPA + TKIP

What is the maximum bandwidth of a T1 point-to-point connection?

A.

1.544 Mbps

B.

2.048 Mbps

C.

34.368 Mbps

D.

43.7 Mbps

An organization has decided to start using cloud-provided services. Which cloud service allows the organization to install its own operating system on a virtual machine?

A.

platform-as-a-service

B.

software-as-a-service

C.

network-as-a-service

D.

infrastructure-as-a-service

What are two functions of a Layer 2 switch? (Choose two)

A.

acts as a central point for association and authentication servers

B.

selects the best route between networks on a WAN

C.

moves packets within a VLAN

D.

moves packets between different VLANs

E.

makes forwarding decisions based on the MAC address of a packet

Drag and drop the attack-mitigation techniques from the left onto the Types of attack that they mitigate on the right.

After installing a new Cisco ISE server, which task must the engineer perform on the Cisco WLC to connect wireless clients on a specific VLAN based on their credentials?

A.

Enable the allow AAA Override

B.

Enable the Even: Driven RRM.

C.

Disable the LAG Mode or Next Reboot.

D.

Enable the Authorized MIC APs against auth-list or AAA.

Refer to the exhibit.

What is the next hop address for traffic that is destined to host 10.0.1.5?

A.

10.0.1.3

B.

10.0.1.50

C.

10.0.1.4

D.

Loopback D

Refer to the exhibit.

A network engineer must configured communication between PC A and the File Server. To prevent interruption for any other communications, which command must be configured?

A.

Switch trunk allowed vlan 12

B.

Switchport trunk allowed vlan none

C.

Switchport trunk allowed vlan add 13

D.

Switchport trunk allowed vlan remove 10-11

Drag drop the descriptions from the left onto the correct configuration-management technologies on the right.

What is a recommended approach to avoid co-channel congestion while installing access points that use the 2.4 GHz frequency?

A.

different nonoverlapping channels

B.

different overlapping channels

C.

one overlapping channel

D.

one nonoverlapping channel

Refer to the exhibit.

If OSPF is running on this network, how does Router 2 handle traffic from Site B to 10.10.13/25 at Site A?

A.

It sends packets out of interface Fa0/2 only.

B.

It sends packets out of interface Fa0/1 only.

C.

It cannot send packets to 10.10.13 128/25

D.

It load-balances traffic out of Fa0/1 and Fa0/2

Which command on a port enters the forwarding state immediately when a PC is connected to it?

A.

switch(config)#spanning-tree portfast default

B.

switch(config)#spanning-tree portfast bpduguard default

C.

switch(config-if)#spanning-tree portfast trunk

D.

switch(config-if)#no spanning-tree portfast

Which type of information resides on a DHCP server?

A.

a list of the available IP addresses in a pool

B.

a list of public IP addresses and their corresponding names

C.

usernames and passwords for the end users in a domain

D.

a list of statically assigned MAC addresses

What does physical access control regulate?

A.

access to spec fie networks based on business function

B.

access to servers to prevent malicious activity

C.

access to computer networks and file systems

D.

access to networking equipment and facilities

Drag and drop the QoS congestion management terms from the left onto the description on the right.

An engineer needs to add an old switch back into a network. To prevent the switch from corrupting the VLAN database which action must be taken?

A.

Add the switch in the VTP domain with a lower revision number

B.

Add the switch with DTP set to dynamic desirable

C.

Add the switch in the VTP domain with a higher revision number

D.

Add the switch with DTP set to desirable

Refer to the exhibit.

What two conclusions should be made about this configuration? (Choose two )

A.

The designated port is FastEthernet 2/1

B.

This is a root bridge

C.

The spanning-tree mode is Rapid PVST+

D.

The spanning-tree mode is PVST+

E.

The root port is FastEthernet 2/1

How is the native VLAN secured in a network?

A.

separate from other VLANs within the administrative domain

B.

give it a value in the private VLAN range

C.

assign it as VLAN 1

D.

configure it as a different VLAN ID on each end of the link

Which QoS Profile is selected in the GUI when configuring a voice over WLAN deployment?

A.

Bronze

B.

Platinum

C.

Silver

D.

Gold

Where does the configuration reside when a helper address Is configured lo support DHCP?

A.

on the router closest to the server

B.

on the router closest to the client

C.

on every router along the path

D.

on the switch trunk interface

Which action does the router take as it forwards a packet through the network?

A.

The router replaces the original source and destination MAC addresses with the sending router MAC address as the source and neighbor MAC address as the destination

B.

The router encapsulates the original packet and then includes a tag that identifies the source router MAC address and transmits it transparently to the destination

C.

The router encapsulates the source and destination IP addresses with the sending router IP address as the source and the neighbor IP address as the destination

D.

The router replaces the source and destination labels with the sending router interface label as a source and the next hop router label as a destination

Refer to the exhibit.

Which outcome is expected when PC_A sends data to PC_B?

A.

The switch rewrites the source and destination MAC addresses with its own.

B.

The source MAC address is changed.

C.

The source and destination MAC addresses remain the same.

D.

The destination MAC address is replaced with ffff.ffff.ffff.

Refer to the exhibit Routers R1 and R2 have been configured with their respective LAN interfaces The two circuits are operational and reachable across WAN Which command set establishes failover redundancy if the primary circuit goes down?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Refer to the exhibit.

What is the metric of the route to the 192.168.10.33/28 subnet?

A.

84

B.

110

C.

128

D.

192

E.

193