11.11 Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

200-301 Cisco Certified Network Associate Questions and Answers

Questions 4

Refer to the exhibit.

An engineer is configuring the router to provide static NAT for the webserver Drag and drop the configuration commands from the left onto the letters that correspond to its position in the configuration on the right.

Options:

Buy Now
Questions 5

In QoS, which prioritization method is appropriate for interactive voice and video?

Options:

A.

expedited forwarding

B.

traffic policing

C.

round-robin scheduling

D.

low-latency queuing

Buy Now

200-301 Report Card

Questions 6

What is the function of a controller in controller-based networking?

Options:

A.

It serves as the centralized management point of an SDN architecture.

B.

It centralizes the data plane for the network.

C.

It is the card on a core router that maintains all routing decisions for a campus.

D.

It is a pair of core routers that maintain all routing decisions for a campus

Buy Now
Questions 7

Which WAN access technology is preferred for a small office / home office architecture?

Options:

A.

broadband cable access

B.

frame-relay packet switching

C.

dedicated point-to-point leased line

D.

Integrated Services Digital Network switching.

Buy Now
Questions 8

Which two functions are performed by the core layer in a three-tier architecture? (Choose two)

Options:

A.

Provide uninterrupted forwarding service.

B.

Police traffic that is sent to the edge of the network.

C.

Provide direct connectivity for end user devices.

D.

Ensure timely data transfer between layers.

E.

Inspect packets for malicious activity.

Buy Now
Questions 9

When a floating static route is configured, which action ensures that the backup route is used when the primary route fails?

Options:

A.

The floating static route must have a higher administrative distance than the primary route so it is used as a backup

B.

The administrative distance must be higher on the primary route so that the backup route becomes secondary.

C.

The floating static route must have a lower administrative distance than the primary route so it is used as a backup

D.

The default-information originate command must be configured for the route to be installed into the routing table

Buy Now
Questions 10

Which CRUD operation corresponds to the HTTP GET method?

Options:

A.

read

B.

update

C.

create

D.

delete

Buy Now
Questions 11

Connectivity between three routers has been established, and IP services must be configured jn the order presented to complete the implementation Tasks assigned include configuration of NAT, NTP, DHCP, and SSH services.

1. All traffic sent from R3 to the R1 Loopback address must be configured for NAT on R2. All source addresses must be translated from R3 to the IP address of Ethernet0/0 on R2, while using only a standard access list named NAT To verify, a ping must be successful to the R1 Loopback address sourced from R3. Do not use NVI NAT configuration.

2. Configure R1 as an NTP server and R2 as a client, not as a peer, using the IP address of the R1 Ethernet0/2 interface. Set the clock on the NTP server for midnight on January 1, 2019.

3. Configure R1 as a DHCP server for the network 10.1.3.0/24 in a pool named TEST. Using a single command, exclude addresses 1-10 from the range. Interface Ethernet0/2 on R3 must be issued the IP address of 10.1.3.11 via DHCP.

4. Configure SSH connectivity from R1 to R3, while excluding access via other remote connection protocols. Access for user root and password Cisco must be set on router R3 using RSA and 1024 bits. Verify connectivity using an SSH session from router R1 using a destination address of 10.1.3.11. Do NOT modify console access or line numbers to accomplish this task.

Options:

Buy Now
Questions 12

IP connectivity between the three routers is configured. OSPF adjacencies must be established.

1. Configure R1 and R2 Router IDs using the interface IP addresses from the link that is shared between them.

2. Configure the R2 links with a max value facing R1 and R3. R2 must become the DR. R1 and R3 links facing R2 must remain with the default OSPF configuration for DR election. Verify the configuration after clearing the OSPF process.

3. Using a host wildcard mask, configure all three routers to advertise their respective Loopback1 networks.

4. Configure the link between R1 and R3 to disable their ability to add other OSPF routers.

Options:

Buy Now
Questions 13

Physical connectivity is implemented between the two Layer 2 switches, and the network connectivity between them must be configured

1. Configure an LACP EtherChannel and number it as 1; configure it between switches SW1 and SVV2 using interfaces Ethernet0/0 and Ethernet0/1 on both sides. The LACP mode must match on both ends

2 Configure the EtherChannel as a trunk link.

3. Configure the trunk link with 802.1 q tags.

4. Configure the native VLAN of the EtherChannel as VLAN 15.

Options:

Buy Now
Questions 14

All physical cabling is in place. A company plans to deploy 32 new sites.

The sites will utilize both IPv4 and IPv6 networks.

1 . Subnet 172.25.0.0/16 to meet the subnet requirements and maximize

the number of hosts

Using the second subnet

• Assign the first usable IP address to e0/0 on Sw1O1

• Assign the last usable IP address to e0/0 on Sw102

2. Subnet to meet the subnet requirements and maximize

the number of hosts

c Using the second subnet

• Assign an IPv6 GUA using a unique 64-Bit interface identifier

on e0/0 on Sw101

• Assign an IPv6 GUA using a unique 64-Bit interface identifier

on eO/O on swi02

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using

the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Options:

Buy Now
Questions 15

Three switches must be configured for Layer 2 connectivity. The company requires only the designated VLANs to be configured on their respective switches and permitted accross any links between switches for security purposes. Do not modify or delete VTP configurations.

The network needs two user-defined VLANs configured:

VLAN 110: MARKETING

VLAN 210: FINANCE

1. Configure the VLANs on the designated switches and assign them as access ports to the interfaces connected to the PCs.

2. Configure the e0/2 interfaces on Sw1 and Sw2 as 802.1q trunks with only the required VLANs permitted.

3. Configure the e0/3 interfaces on Sw2 and Sw3 as 802.1q trunks with only the required VLANs permitted.

Options:

Buy Now
Questions 16

Connectivity between four routers has been established. IP connectivity must be configured in the order presented to complete the implementation. No dynamic routing protocols are included.

1. Configure static routing using host routes to establish connectivity from router R3 to the router R1 Loopback address using the source IP of 209.165.200.230.

2. Configure an IPv4 default route on router R2 destined for router R4.

3. Configure an IPv6 default router on router R2 destined for router R4.

Options:

Buy Now
Questions 17

All physical cabling between the two switches is installed. Configure the network connectivity between the switches using the designated VLANs and interfaces.

1. Configure VLAN 100 named Compute and VLAN 200 named Telephony where required for each task.

2. Configure Ethernet0/1 on SW2 to use the existing VLAN named Available.

3. Configure the connection between the switches using access ports.

4. Configure Ethernet0/1 on SW1 using data and voice VLANs.

5. Configure Ethemet0/1 on SW2 so that the Cisco proprietary neighbor discovery protocol is turned off for the designated interface only.

Options:

Buy Now
Questions 18

When implementing a router as a DHCP server, which two features must be configured'? (Choose two)

Options:

A.

relay agent information

B.

database agent

C.

address pool

D.

smart-relay

E.

manual bindings

Buy Now
Questions 19

Refer to the exhibit. All routers in the network are configured R2 must be the DR. After the engineer connected the devices, R1 was elected as the DR. Which command sequence must be configure on R2 to Be elected as the DR in the network?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 20

An engineer needs to add an old switch back into a network. To prevent the switch from corrupting the VLAN database which action must be taken?

Options:

A.

Add the switch in the VTP domain with a lower revision number

B.

Add the switch with DTP set to dynamic desirable

C.

Add the switch in the VTP domain with a higher revision number

D.

Add the switch with DTP set to desirable

Buy Now
Questions 21

What facilitates a Telnet connection between devices by entering the device name?

Options:

A.

SNMP

B.

DNS lookup

C.

syslog

D.

NTP

Buy Now
Questions 22

How does a switch process a frame received on Fa0/1 with the destination MAC address of 0e38.7363.657b when the table is missing the address?

Options:

A.

lt drops the frame immediately.

B.

It forwards the frame back out of interface Fa0/1.

C.

It floods the frame to all interfaces except Fa0/1.

D.

It holds the frame until the MAC address timer expires and then drops the frame.

Buy Now
Questions 23

Configure IPv4 and IPv6 connectivity between two routers. For IPv4, use a /28 network from the 192.168.1.0/24 private range. For IPv6, use the first /64 subnet from the 2001:0db8:aaaa::/48 subnet.

1. Using Ethernet0/1 on routers R1 and R2, configure the next usable/28 from the 192.168.1.0/24 range. The network 192.168.1.0/28 is unavailable.

2. For the IPv4 /28 subnet, router R1 must be configured with the first usable host address.

3. For the IPv4 /28 subnet, router R2 must be configured with the last usable host address.

4. For the IPv6 /64 subnet, configure the routers with the IP addressing provided from the topology.

5. A ping must work between the routers on the IPv4 and IPv6 address ranges.

Options:

Buy Now
Questions 24

R1 as an NTP server must have:

• NTP authentication enabled

• NTP packets sourced from Interface loopback 0

• NTP stratum 2

• NTP packets only permitted to client IP 209.165 200 225

How should R1 be configured?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 25

Refer to the exhibit.

Which two commands must be added to update the configuration of router R1 so that it accepts only encrypted connections? (Choose two )

Options:

A.

username CNAC secret R!41!4319115@

B.

ip ssh version 2

C.

line vty 0 4

D.

crypto key generate rsa 1024

E.

transport input ssh

Buy Now
Questions 26

Refer to the exhibit.

An engineer is updating the R1 configuration to connect a new server to the management network. The PCs on the management network must be blocked from pinging the default gateway of the new server. Which command must be configured on R1 to complete the task?

Options:

A.

R1(config)#lp route 172.16.2.2 255.255.255.248 gi0/1

B.

R1(config)#jp route 172.16.2.2 255.255.255.255 gi0/0

C.

R1(config>#ip route 172.16.2.0 255.255.255.0 192.168.1.15

D.

R1(conflg)#ip route 172.16.2.0 255.255.255.0 192.168.1.5

Buy Now
Questions 27

A network engineer must implement an IPv6 configuration on the vlan 2000 interface to create a routable locally-unique unicast address that is blocked from being advertised to the internet. Which configuration must the engineer apply?

Options:

A.

interface vlan 2000

ipv6 address ffc0:0000:aaaa::1234:2343/64

B.

interface vlan 2000

Ipv6 address fc00:0000:aaaa:a15d:1234:2343:8aca/64

C.

interface vlan 2000

ipv6 address fe80;0000:aaaa::1234:2343/64

D.

interface vlan 2000

ipv6 address fd00::1234:2343/64

Buy Now
Questions 28

Refer to the exhibit.

An engineer is configuring the HO router. Which IPv6 address configuration must be applied to the router fa0'1 interface for the router to assign a unique 64-brt IPv6 address to Itself?

Options:

A.

ipv6 address 2001:DB8:0:1:C601:42FF:FE0F:7/64

B.

ipv6 address 2001:DB8:0:1:C601:42FE:800F:7/64

C.

ipv6 address 2001 :DB8:0:1:FFFF:C601:420F:7/64

D.

iov6 address 2001 :DB8:0:1:FE80:C601:420F:7/64

Buy Now
Questions 29

What is a requirement when configuring or removing LAG on a WLC?

Options:

A.

The Incoming and outgoing ports for traffic flow must be specified If LAG Is enabled.

B.

The controller must be rebooted after enabling or reconfiguring LAG.

C.

The management interface must be reassigned if LAG disabled.

D.

Multiple untagged interfaces on the same port must be supported.

Buy Now
Questions 30

Refer to the exhibit.

Which action must be taken to ensure that router A is elected as the DR for OSPF area 0?

Options:

A.

Configure the OSPF priority on router A with the lowest value between the three routers.

B.

Configure router B and router C as OSPF neighbors of router A.

C.

Configure the router A interfaces with the highest OSPF priority value within the area.

D.

Configure router A with a fixed OSPF router ID

Buy Now
Questions 31

OSPF must be configured between routers R1 and R2. Which OSPF configuration must be applied to router R1 to avoid a DR/BDR election?

Options:

A.

router ospf 1

network 192.168.1.1 0.0.0.0 area 0

interface e1/1

ip address 192.168.1.1 255.255.255.252

ip ospf network broadcast

B.

router ospf 1

network 192.168.1.1 0.0.0.0 area 0

interface e1/1

ip address 192.168.1.1 255.255.255.252

ip ospf network point-to-point

C.

router ospf 1

network 192.168.1.1 0.0.0.0 area 0

interface e1/1

ip address 192.168.1.1 255.255.255.252

ip ospf cost 0

D.

router ospf 1

network 192.168.1.1 0.0.0.0 area 0

hello interval 15

interface e1/1

Ip address 192.168.1.1 255.255.255.252

Buy Now
Questions 32

Which protocol uses the SSL?

Options:

A.

HTTP

B.

SSH

C.

HTTPS

D.

Telnet

Buy Now
Questions 33

Which two spanning-tree states are bypassed on an interface running PortFast? (Choose two.)

Options:

A.

disabled

B.

listening

C.

forwarding

D.

learning

E.

blocking

Buy Now
Questions 34

Refer to the exhibit.

An IP subnet must be configured on each router that provides enough addresses for the number of assigned hosts and anticipates no more than 10% growth for now hosts. Which configuration script must be used?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 35

Refer to the exhibit.

Which configuration allows routers R14 and R86 to form an OSPFv2 adjacency while acting as a central point for exchanging OSPF information between routers?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 36

Which type of network attack overwhelms the target server by sending multiple packets to a port until the half-open TCP resources of the target are exhausted?

Options:

A.

SYIM flood

B.

reflection

C.

teardrop

D.

amplification

Buy Now
Questions 37

Which two components comprise part of a PKI? (Choose two.)

Options:

A.

preshared key that authenticates connections

B.

RSA token

C.

CA that grants certificates

D.

clear-text password that authenticates connections

E.

one or more CRLs

Buy Now
Questions 38

Which Layer 2 switch function encapsulates packets for different VLANs so that the packets traverse the same port and maintain traffic separation between the VLANs?

Options:

A.

VLAN numbering

B.

VLAN DSCP

C.

VLAN tagging

D.

VLAN marking

Buy Now
Questions 39

Refer to the exhibit.

Which two configurations must the engineer apply on this network so that R1 becomes the DR? (Choose two.)

A)

B)

C)

D)

E)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Buy Now
Questions 40

Which QoS traffic handling technique retains excess packets in a queue and reschedules these packets for later transmission when the configured maximum bandwidth has been surpassed?

Options:

A.

weighted random early detection

B.

traffic policing

C.

traffic shaping

D.

traffic prioritization

Buy Now
Questions 41

Refer to the exhibit.

The router has been configured with a supernet to accommodate the requirement for 380 users on a subnet The requirement already considers 30% future growth. Which configuration verifies the IP subnet on router R4?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 42

Refer to the exhibit.

An engineer is configuring a new router on the network and applied this configuration. Which additional configuration allows the PC to obtain its IP address from a DHCP server?

Options:

A.

Configure the ip dhcp relay information command under interface Gi0/1.

B.

Configure the ip dhcp smart-relay command globally on the router

C.

Configure the ip helper-address 172.16.2.2 command under interface Gi0/0

D.

Configure the ip address dhcp command under interface Gi0/0

Buy Now
Questions 43

Refer to the exhibit.

The DHCP server and clients are connected to the same switch. What is the next step to complete the DHCP configuration to allow clients on VLAN 1 to receive addresses from the DHCP server?

Options:

A.

Configure the ip dhcp snooping trust command on the interlace that is connected to the DHCP client.

B.

Configure the ip dhcp relay information option command on the interface that is connected to the DHCP client.

C.

Configure the ip dhcp snooping trust command on the interface that is connected to the DHCP server.

D.

Configure the Ip dhcp relay information option command on the interface that is connected to the DHCP server.

Buy Now
Questions 44

Refer to the exhibit.

All VLANs are present in the VLAN database. Which command sequence must be applied to complete the configuration?

Options:

A.

Interface FastEthernet0/1 switchport trunk native vlan 10 switchport trunk allowed vlan 10,15

B.

Interface FastEthernet0/1 switchport mode trunk switchport trunk allowed vlan 10,15

C.

interface FastEthernet0/1 switchport mode access switchport voice vlan 10

D.

Interface FastEthernet0/1 switchport trunk allowed vlan add 10 vlan 10 private-vlan isolated

Buy Now
Questions 45

Refer to the exhibit.

An engineer is asked to insert the new VLAN into the existing trunk without modifying anything previously configured Which command accomplishes this task?

Options:

A.

switchport trunk allowed vlan 100-104

B.

switchport trunk allowed vlan add 104

C.

switchport trunk allowed vlan all

D.

switchport trunk allowed vlan 104

Buy Now
Questions 46

Refer to the exhibit.

Routers R1 and R3 have the default configuration The router R2 priority is set to 99 Which commands on R3 configure it as the DR in the 10.0 4.0/24 network?

Options:

A.

R3(config)#interface Gig0/1 R3(config-if)#ip ospf priority 100

B.

R3(config)#interface Gig0/0 R3(config-if)#ip ospf priority 100

C.

R3(config)#interface Gig0/0 R3(config-if)i=ip ospf priority 1

D.

R3(config)#interface Gig0/1 R3(config-if)#ip ospf priority 0

Buy Now
Questions 47

What is a requirement for nonoverlapping Wi-Fi channels?

Options:

A.

different security settings

B.

discontinuous frequency ranges

C.

different transmission speeds

D.

unique SSIDs

Buy Now
Questions 48

A network administrator is setting up a new IPv6 network using the 64-bit address 2001 0EB8 00C1 2200:0001 0000 0000 0331/64 To simplify the configuration the administrator has decided to compress the address Which IP address must the administrator configure?

Options:

A.

ipv6 address 21:EB8:C1:2200:1::331/64

B.

ipv6 address 2001:EB8:C1:22:1::331/64

C.

ipv6 address 2001 :EB8:C 1:2200.1 ::331-64

D.

ipv6 address 2001:EB8:C1:2200:1:0000:331/64

Buy Now
Questions 49

Refer to the exhibit.

Users on existing VLAN 100 can reach sites on the Internet. Which action must the administrator take to establish connectivity to the Internet for users in VLAN 200?

Options:

A.

Define a NAT pool on the router.

B.

Configure static NAT translations for VLAN 200.

C.

Configure the ip nat outside command on another interface for VLAN 200.

D.

Update the NAT INSIDF RANGFS ACL

Buy Now
Questions 50

Refer to the exhibit.

Which command configures OSPF on the point-to-point link between routers R1 and R2?

Options:

A.

router-id 10.0.0.15

B.

neighbor 10.1.2.0 cost 180

C.

ipospf priority 100

D.

network 10.0.0.0 0.0.0.255 area 0

Buy Now
Questions 51

Refer to the exhibit.

Which route must be configured on R1 so that OSPF routing is used when OSPF is up. but the server is still reachable when OSPF goes down?

Options:

A.

ip route 10.1.1.10 255.255.255.255 172.16.2.2 100

B.

ip route 10.1.1.0 255.255.255.0 gi0/1 125

C.

ip route 10.1.1.0 255.255.255.0 172.16.2.2 100

D.

ip route 10.1.1.10 255.255.255.255 gi0/0 125

Buy Now
Questions 52

Which characteristic differentiates the concept of authentication from authorization and accounting?

Options:

A.

user-activity logging

B.

service limitations

C.

consumption-based billing

D.

identity verification

Buy Now
Questions 53

Where does wireless authentication happen?

Options:

A.

SSID

B.

radio

C.

band

D.

Layer 2

Buy Now
Questions 54

Which statement about Link Aggregation when implemented on a Cisco Wireless LAN Controller is true?

Options:

A.

To pass client traffic two or more ports must be configured.

B.

The EtherChannel must be configured in "mode active"

C.

When enabled the WLC bandwidth drops to 500 Mbps

D.

One functional physical port is needed to pass client traffic

Buy Now
Questions 55

Refer to the exhibit.

How does router R1 handle traffic to 192.168.10.16?

Options:

A.

It selects the IS-IS route because it has the shortest prefix inclusive of the destination address.

B.

It selects the EIGRP route because it has the lowest administrative distance.

C.

It selects the OSPF route because it has the lowest cost.

D.

It selects the RIP route because it has the longest prefix inclusive of the destination address.

Buy Now
Questions 56

A wireless administrator has configured a WLAN; however, the clients need access to a less congested 5-GHz network for their voice quality. What action must be taken to meet the requirement?

Options:

A.

enable AAA override

B.

enable RX-SOP

C.

enable DTIM

D.

enable Band Select

Buy Now
Questions 57

Refer to the exhibit.

A network administrator has been tasked with securing VTY access to a router. Which access-list entry accomplishes this task?

Options:

A.

access-list 101 permit tcp 10.1.10 0.0.0.255 172.16.10 0.0.0.255 eq ssh

B.

access-list 101 permit tcp 10.11.0 0.0.0.255 172.16.10 0.0.0.255 eq scp

C.

access-list 101 permit tcp 10.11.0 0.0.0.255 172.16.10 0.0.0.255 eq telnet

D.

access-list 101 permit tcp 10.1.10 0.0.0.255 172.16.10 0.0.0.255 eq https

Buy Now
Questions 58

Which protocol requires authentication to transfer a backup configuration file from a router to a remote server?

Options:

A.

DTP

B.

FTP

C.

SMTP

D.

TFTP

Buy Now
Questions 59

Which unified access point mode continues to serve wireless clients after losing connectivity to the Cisco Wireless LAN Controller?

Options:

A.

sniffer

B.

mesh

C.

flexconnect

D.

local

Buy Now
Questions 60

When a client and server are not on the same physical network, which device is used to forward requests and replies between client and server for DHCP?

Options:

A.

DHCP relay agent

B.

DHCP server

C.

DHCPDISCOVER

D.

DHCPOFFER

Buy Now
Questions 61

Which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?

Options:

A.

TKiP encryption

B.

AES encryption

C.

scrambled encryption key

D.

SAE encryption

Buy Now
Questions 62

Which action does the router take as rt forwards a packet through the network?

Options:

A.

The router replaces the source and desinaoon labels wth the sending router uterface label as a source and the next hop router label as a desbnabon

B.

The router encapsulates the source and destination IP addresses with the sending router P address as the source and the neighbor IP address as the destination

C.

The router replaces the original source and destination MAC addresses with the sending router MAC address as the source and neighbor MAC address as the destination

D.

The router encapsulates the original packet and then includes a tag that identifies the source router MAC address and transmit transparently to the destination

Buy Now
Questions 63

What are two characteristics of an SSID? (Choose Two)

Options:

A.

It can be hidden or broadcast in a WLAN

B.

It uniquely identifies an access point in a WLAN

C.

It uniquely identifies a client in a WLAN

D.

It is at most 32 characters long.

E.

IT provides secured access to a WLAN

Buy Now
Questions 64

Refer to the exhibit. After the configuration is applied, the two routers fail to establish an OSPF neighbor relationship. what is the reason for the problem?

Options:

A.

The OSPF router IDs are mismatched.

B.

Router2 is using the default hello timer.

C.

The network statement on Router1 is misconfigured.

D.

The OSPF process IDs are mismatched.

Buy Now
Questions 65

How do AAA operations compare regarding user identification, user services and access control?

Options:

A.

Authorization provides access control and authentication tracks user services

B.

Authentication identifies users and accounting tracks user services

C.

Accounting tracks user services, and authentication provides access control

D.

Authorization identifies users and authentication provides access control

Buy Now
Questions 66

R1 has learned route 10.10.10.0/24 via numerous routing protocols. Which route is installed?

Options:

A.

route with the lowest cost

B.

route with the next hop that has the highest IP

C.

route with the shortest prefix length

D.

route with the lowest administrative distance

Buy Now
Questions 67

Which goal is achieved by the implementation of private IPv4 addressing on a network?

Options:

A.

provides an added level of protection against Internet exposure

B.

provides a reduction in size of the forwarding table on network routers

C.

allows communication across the Internet to other private networks

D.

allows servers and workstations to communicate across public network boundaries

Buy Now
Questions 68

Refer to the exhibit.

A packet is being sent across router R1 to host 172.163.3.14. To which destination does the router send the packet?

Options:

A.

207.165.200.246 via Serial0/1/0

B.

207.165.200.254 via Serial0/0/1

C.

207.165.200.254 via Serial0/0/0

D.

207.165.200.250 via Serial/0/0/0

Buy Now
Questions 69

What are two reasons that cause late collisions to increment on an Ethernet interface? (Choose two)

Options:

A.

when the sending device waits 15 seconds before sending the frame again

B.

when the cable length limits are exceeded

C.

when one side of the connection is configured for half-duplex

D.

when Carrier Sense Multiple Access/Collision Detection is used

E.

when a collision occurs after the 32nd byte of a frame has been transmitted

Buy Now
Questions 70

Which condition must be met before an NMS handles an SNMP trap from an agent?

Options:

A.

The NMS software must be loaded with the MIB associated with the trap.

B.

The NMS must be configured on the same router as the SNMP agent

C.

The NMS must receive a trap and an inform message from the SNMP agent within a configured interval

D.

The NMS must receive the same trap from two different SNMP agents to verify that it is reliable.

Buy Now
Questions 71

An engineer requires a scratch interface to actively attempt to establish a trunk link with a neighbor switch. What command must be configured?

Options:

A.

switchport mode trunk

B.

switchport mode dynamic desirable

C.

switchport mode dynamic auto

D.

switchport nonegotiate

Buy Now
Questions 72

Refer to the exhibit.

Which command configures a floating static route to provide a backup to the primary link?

Options:

A.

ip route 0.0.0.0 0.0.0.0 209.165.202.131

B.

ip route 209.165.201.0 255.255.255.224 209.165.202.130

C.

ip route 0.0.0.0 0.0.0.0 209.165.200.224

D.

ip route 209.165.200.224 255.255.255.224 209.165.202.129 254

Buy Now
Questions 73

Refer to the exhibit.

A packet is being sent across router R1 to host 172.16.0.14. What is the destination route for the packet?

Options:

A.

209.165.200.254 via Serial0/0/1

B.

209.165.200.254 via Serial0/0/0

C.

209.165.200.246 via Serial0/1/0

D.

209.165.200.250 via Serial0/0/0

Buy Now
Questions 74

An office has 8 floors with approximately 30-40 users per floor What command must be configured on the router Switched Virtual Interface to use address space efficiently?

Options:

A.

ip address 192.168.0.0 255.255.0.0

B.

ip address 192.168.0.0 255.255.254.0

C.

ip address 192.168.0.0 255.255.255.128

D.

ip address 192.168.0.0 255.255.255.224

Buy Now
Questions 75

Refer to the exhibit.

Which action is expected from SW1 when the untagged frame is received on the GigabitEthernet0/1 interface?

Options:

A.

The frame is processed in VLAN 5.

B.

The frame is processed in VLAN 11

C.

The frame is processed in VLAN 1

D.

The frame is dropped

Buy Now
Questions 76

Which QoS tool is used to optimize voice traffic on a network that is primarily intended for data traffic?

Options:

A.

FIFO

B.

WFQ

C.

PQ

D.

WRED

Buy Now
Questions 77

Refer to the exhibit.

Site A was recently connected to site B over a new single-mode fiber path. Users at site A report Intermittent connectivity Issues with applications hosted at site B. What is the reason for the problem?

Options:

A.

Heavy usage is causing high latency.

B.

An incorrect type of transceiver has been inserted into a device on the link.

C.

physical network errors are being transmitted between the two sites.

D.

The wrong cable type was used to make the connection.

Buy Now
Questions 78

Which action is taken by the data plane within a network device?

Options:

A.

forwards traffic to the next hop

B.

constructs a routing table based on a routing protocol

C.

provides CLI access to the network device

D.

looks up an egress interface in the forwarding information base

Buy Now
Questions 79

Which configuration ensures that the switch is always the root for VLAN 750?

Options:

A.

Switch(config)#spanning-tree vlan 750 priority 38003685

B.

Switch(config)#spanning-tree vlan 750 root primary

C.

Switch(config)#spanning-tree vlan 750 priority 614440

D.

Switch(config)#spanning-tree vlan 750 priority 0

Buy Now
Questions 80

Which PoE mode enables powered-device detection and guarantees power when the device is detected?

Options:

A.

dynamic

B.

static

C.

active

D.

auto

Buy Now
Questions 81

Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right.

Options:

Buy Now
Questions 82

Which QoS per-hop behavior changes the value of the ToS field in the IPv4 packet header?

Options:

A.

shaping

B.

classification

C.

policing

D.

marking

Buy Now
Questions 83

Refer to the exhibit.

Web traffic is coming in from the WAN interface. Which route takes precedence when the router is processing traffic destined for the LAN network at 10 0.10.0/24?

Options:

A.

via next-hop 10.0.1.5

B.

via next-hop 10 0 1.4

C.

via next-hop 10.0 1.50

D.

via next-hop 10.0 1 100

Buy Now
Questions 84

Refer to the exhibit.

What is a reason for poor performance on the network interface?

Options:

A.

The interface is receiving excessive broadcast traffic.

B.

The cable connection between the two devices is faulty.

C.

The interface is operating at a different speed than the connected device.

D.

The bandwidth setting of the interface is misconfigured

Buy Now
Questions 85

What are two benefits of FHRPs? (Choose two.)

Options:

A.

They enable automatic failover of the default gateway.

B.

They allow multiple devices to serve as a single virtual gateway for clients in the network.

C.

They are able to bundle multiple ports to increase bandwidth.

D.

They prevent loops in the Layer 2 network.

E.

They allow encrypted traffic.

Buy Now
Questions 86

What is a function of a Next-Generation IPS?

Options:

A.

makes forwarding decisions based on learned MAC addresses

B.

serves as a controller within a controller-based network

C.

integrates with a RADIUS server to enforce Layer 2 device authentication rules

D.

correlates user activity with network events

Buy Now
Questions 87

Refer to the exhibit.

Packets received by the router from BGP enter via a serial interface at 209.165.201.10. Each route is present within the routing table. Which interface is used to forward traffic with a destination IP of 10.10.10.24?

Options:

A.

F0/10

B.

F0/11

C.

F0/12

D.

F0/13

Buy Now
Questions 88

Refer to the exhibit.

Traffic sourced from the loopback0 Interface is trying to connect via ssh to the host at 10.0.1.15. What Is the next hop to the destination address?

Options:

A.

192.168.0.7

B.

192.168.0.4

C.

192.168.0.40

D.

192.168.3.5

Buy Now
Questions 89

Refer to the exhibit.

An engineer assumes a configuration task from a peer Router A must establish an OSPF neighbor relationship with neighbor 172 1 1 1 The output displays the status of the adjacency after 2 hours. What is the next step in the configuration process for the routers to establish an adjacency?

Options:

A.

Configure router A to use the same MTU size as router B.

B.

Set the router B OSPF ID to a nonhost address.

C.

Configure a point-to-point link between router A and router B.

D.

Set the router B OSPF ID to the same value as its IP address

Buy Now
Questions 90

Refer to the exhibit.

Packets received by the router from BGP enter via a serial interface at 209 165 201 1 Each route is present within the routing table Which interface is used to forward traffic with a destination IP of 10.1.1.19?

Options:

A.

F0/4

B.

F0/0

C.

F0/1

D.

F0/3

Buy Now
Questions 91

A network engineer must configure two new subnets using the address block 10 70 128 0/19 to meet these requirements:

• The first subnet must support 24 hosts

• The second subnet must support 472 hosts

• Both subnets must use the longest subnet mask possible from the address block

Which two configurations must be used to configure the new subnets and meet a requirement to use the first available address in each subnet for the router interfaces? (Choose two )

Options:

A.

interface vlan 1234

ip address 10.70.159.1 255.255.254.0

B.

interface vlan 1148

ip address 10.70.148.1 255.255.254.0

C.

interface vlan 4722

ip address 10.70.133.17 255.255.255.192

D.

interface vlan 3002

ip address 10.70.147.17 255.255.255.224

E.

interface vlan 155

ip address 10.70.155.65 255.255.255.224

Buy Now
Questions 92

What provides centralized control of authentication and roaming In an enterprise network?

Options:

A.

a lightweight access point

B.

a firewall

C.

a wireless LAN controller

D.

a LAN switch

Buy Now
Questions 93

Refer to the exhibit.

Which next-hop IP address does Routed use for packets destined to host 10 10.13.158?

Options:

A.

10.10.10.5

B.

10.10.11.2

C.

10.10.12.2

D.

10.10.10.9

Buy Now
Questions 94

Drag and drop the statements about networking from the left onto the corresponding networking types on the right.

Options:

Buy Now
Questions 95

Refer to the exhibit.

Host A sent a data frame destined for host D

What does the switch do when it receives the frame from host A?

Options:

A.

It drops the frame from the switch CAM table.

B.

It floods the frame out of all ports except port Fa0/1.

C.

It shuts down the port Fa0/1 and places it in err-disable mode.

D.

It experiences a broadcast storm.

Buy Now
Questions 96

Refer to the exhibit.

An engineer is configuring an EtherChannel using LACP between Switches 1 and 2 Which configuration must be applied so that only Switch 1 sends LACP initiation packets?

Options:

A.

Switch 1 (config-if)#channel-group 1 mode on

Swrtch2(config-if)#channel-group 1 mode passive

B.

Switch1(config-if)#channel-group 1 mode passive

Switch2(config-if)#channel-group 1 mode active

C.

Switch1{config-if)£channel-group 1 mode active

Switch2(config-if)#channel-group 1 mode passive

D.

Switch1(config-if)#channel-group 1 mode on

Switch2(config-if)#channel-group 1 mode active

Buy Now
Questions 97

Refer to the exhibit.

Which configuration enables DHCP addressing for hosts connected to interface FastEthernetO/1 on router R4?

Options:

A.

interface FastEthernet0/0

ip helper-address 10.0.1.1

i

access-list 100 permit udp host 10.0.1.1 eq bootps host 10.148.2.1

B.

interface FastEthernot0/1

ip helper-address 10.0.1.1

!

access-list 100 permit tcp host 10.0.1.1 eq 67 host 10.148.2.1

C.

interface FastEthernetO/0

ip helper-address 10.0.1.1

I

access-list 100 permit host 10.0.1.1 host 10.148.2.1 eq bootps

D.

interface FastEthernet0/1

ip helper-address 10.0.1.1

!

access-list 100 permit udp host 10.0.1.1 eq bootps host 10.148.2.1

Buy Now
Questions 98

Refer to the exhibit.

An engineer has started to configure replacement switch SW1. To verify part of the configuration, the engineer issued the commands as shown and noticed that the entry for PC2 is missing. Which change must be applied to SW1 so that PC1 and PC2 communicate normally?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 99

Refer to the exhibit.

An engineer built a new L2 LACP EtherChannel between SW1 and SW2 and executed these show commands to verify the work. Which additional task allows the two switches to establish an LACP port channel?

Options:

A.

Change the channel-group mode on SW2 to auto

B.

Change the channel-group mode on SW1 to desirable.

C.

Configure the interface port-channel 1 command on both switches.

D.

Change the channel-group mode on SW1 to active or passive.

Buy Now
Questions 100

Refer to the exhibit.

Switch A is newly configured. All VLANs are present in the VLAN database. The IP phone and PC A on Gi0/1 must be configured for the appropriate VLANs to establish connectivity between the PCs. Which command set fulfills the requirement?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 101

Drag and drop the Rapid PVST+ forwarding slate actions from the loft to the right. Not all actions are used.

Options:

Buy Now
Questions 102

Refer to the exhibit.

Which plan must be Implemented to ensure optimal QoS marking practices on this network?

Options:

A.

As traffic traverses MLS1 remark the traffic, but trust all markings at the access layer.

B.

Trust the IP phone markings on SW1 and mark traffic entering SW2 at SW2.

C.

Remark traffic as it traverses R1 and trust all markings at the access layer.

D.

As traffic enters from the access layer on SW1 and SW2. trust all traffic markings.

Buy Now
Questions 103

Refer to the exhibit.

The link between PC1 and the switch is up. but it is performing poorly. Which interface condition is causing the performance problem?

Options:

A.

There is a duplex mismatch on the interface

B.

There is an issue with the fiber on the switch interface.

C.

There is a speed mismatch on the interface.

D.

There is an interface type mismatch

Buy Now
Questions 104

What is a function of an endpoint on a network?

Options:

A.

forwards traffic between VLANs on a network

B.

connects server and client devices to a network

C.

allows users to record data and transmit to a tile server

D.

provides wireless services to users in a building

Buy Now
Questions 105

Which two network actions occur within the data plane? (Choose two.)

Options:

A.

Add or remove an 802.1Q trunking header.

B.

Make a configuration change from an incoming NETCONF RPC.

C.

Run routing protocols.

D.

Match the destination MAC address to the MAC address table.

E.

Reply to an incoming ICMP echo request.

Buy Now
Questions 106

Which set of 2.4 GHz nonoverlapping wireless channels is standard in the United States?

Options:

A.

channels 2, 7, 9, and 11

B.

channels 1, 6, 11, and 14

C.

channels 2, 7, and 11

D.

channels 1, 6, and 11

Buy Now
Questions 107

What is a purpose of traffic shaping?

Options:

A.

It enables dynamic flow identification.

B.

It enables policy-based routing.

C.

It provides best-effort service.

D.

It limits bandwidth usage.

Buy Now
Questions 108

Refer to the exhibit.

All traffic enters the CPE router from interface Serial0/3 with an IP address of 192 168 50 1 Web traffic from the WAN is destined for a LAN network where servers are load-balanced An IP packet with a destination address of the HTTP virtual IP of 192 1681 250 must be forwarded Which routing table entry does the router use?

Options:

A.

192.168.1.0/24 via 192.168.12.2

B.

192.168.1.128/25 via 192.168.13.3

C.

192.168.1.192/26 via 192.168.14.4

D.

192.168.1.224/27 via 192.168.15.5

Buy Now
Questions 109

Drag and drop the characteristics of device-management technologies from the left onto the corresponding deployment types on the right.

Options:

Buy Now
Questions 110

Which port type does a lightweight AP use to connect to the wired network when it is configured in local mode?

Options:

A.

EtherChannel

B.

LAG

C.

trunk

D.

access

Buy Now
Questions 111

Refer to the exhibit.

A network engineer must update the configuring on switch2 so that it sends LLDP packets.

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 112

What is the difference between IPv6 unicast and anycast addressing?

Options:

A.

IPv6 anycast nodes must be explicitly configured to recognize the anycast address, but IPv6 unicast nodes require no special configuration

B.

IPv6 unicast nodes must be explicitly configured to recognize the unicast address, but IPv6 anycast nodes require no special configuration

C.

An individual IPv6 unicast address is supported on a single interface on one node but an IPv6 anycast address is assigned to a group of interfaces on multiple nodes.

D.

Unlike an IPv6 anycast address, an IPv6 unicast address is assigned to a group of interfaces on multiple nodes

Buy Now
Questions 113

What is the function of northbound API?

Options:

A.

It upgrades software and restores files.

B.

It relies on global provisioning and configuration.

C.

It supports distributed processing for configuration.

D.

It provides a path between an SDN controller and network applications.

Buy Now
Questions 114

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

Options:

Buy Now
Questions 115

Refer to the exhibit.

In which structure does the word "warning" directly reside?

Options:

A.

array

B.

object

C.

Boolean

D.

string

Buy Now
Questions 116

Which two IPv6 addresses are used to provide connectivity between two routers on a shared link? (Choose two)

Options:

A.

::ffif 1014 1011/96

B.

2001 7011046:1111:1/64

C.

;jff06bb43cd4dd111bbff02 4545234d

D.

2002 5121204b 1111:1/64

E.

FF02::0WlFF00:0l)00/104

Buy Now
Questions 117

Drag and chop the TCP/IP protocols from the left onto their primary transmission protocols on the right.

Options:

Buy Now
Questions 118

Which signal frequency appears 60 times per minute?

Options:

A.

1 Hz signal

B.

1 GHz signal

C.

60 Hz signal

D.

60 GHz signal

Buy Now
Questions 119

Refer to the exhibit.

What is the subnet mask of the route to the 10.10.13.160 prefix?

Options:

A.

255.255.255.240

B.

255.255.255.128

C.

255.255.248.

D.

255.255.255.248

Buy Now
Questions 120

Refer to the exhibit.

All routers in the network are configured correctly, and the expected routes are being exchanged among the routeis. Which set or routes are learned from neighbors and Installed on router 2?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 121

Refer to the exhibit.

What is represented beginning with line 1 and ending with line 5?

Options:

A.

value

B.

object

C.

key

D.

array

Buy Now
Questions 122

What is a role of access points in an enterprise network?

Options:

A.

connect wireless devices to a wired network

B.

support secure user logins to devices or the network

C.

integrate with SNMP in preventing DDoS attacks

D.

serve as a first line of defense in an enterprise network

Buy Now
Questions 123

Refer to Exhibit.

Which configuration must be applied to the router that configures PAT to translate all addresses in VLAN 200 while allowing devices on VLAN 100 to use their own IP addresses?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 124

Which command must be entered to configure a DHCP relay?

Options:

A.

ip helper-address

B.

ip address dhcp

C.

ip dhcp pool

D.

ip dhcp relay

Buy Now
Questions 125

What is the primary function of a Layer 3 device?

Options:

A.

to analyze traffic and drop unauthorized traffic from the Internet

B.

to transmit wireless traffic between hosts

C.

to pass traffic between different networks

D.

forward traffic within the same broadcast domain

Buy Now
Questions 126

What are two differences between optical-fiber cabling and copper cabling? (Choose two)

Options:

A.

Light is transmitted through the core of the fiber

B.

A BNC connector is used for fiber connections

C.

The glass core component is encased in a cladding

D.

Fiber connects to physical interfaces using Rj-45 connections

E.

The data can pass through the cladding

Buy Now
Questions 127

Refer to the exhibit.

What action establishes the OSPF neighbor relationship without forming an adjacency?

Options:

A.

modify hello interval

B.

modify process ID

C.

modify priority

D.

modify network type

Buy Now
Questions 128

What benefit does controller-based networking provide versus traditional networking?

Options:

A.

moves from a two-tier to a three-tier network architecture to provide maximum redundancy

B.

provides an added layer of security to protect from DDoS attacks

C.

allows configuration and monitoring of the network from one centralized port

D.

combines control and data plane functionality on a single device to minimize latency

Buy Now
Questions 129

Drag the descriptions of device management from the left onto the types of device management on the right.

Options:

Buy Now
Questions 130

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

Options:

Buy Now
Questions 131

Refer to the exhibit.

A network engineer must configure NETCONF. After creating the configuration, the engineer gets output from the command show line but not from show running- config. Which command completes the configuration?

Options:

A.

Device(config)# netconf lock-time 500

B.

Device(config)# netconf max-message 1000

C.

Device(config)# no netconf ssh acl 1

D.

Device(config)# netconf max-sessions 100

Buy Now
Questions 132

Refer to the exhibit.

How many arrays are present in the JSON data?

Options:

A.

one

B.

three

C.

six

D.

nine

Buy Now
Questions 133

What is the purpose of configuring different levels of syslog for different devices on the network?

Options:

A.

to rate-limit messages for different seventy levels from each device

B.

to set the severity of syslog messages from each device

C.

to identify the source from which each syslog message originated

D.

to control the number of syslog messages from different devices that are stored locally

Buy Now
Questions 134

What is the collapsed layer in collapsed core architectures?

Options:

A.

core and WAN

B.

access and WAN

C.

distribution and access

D.

core and distribution

Buy Now
Questions 135

Refer to the exhibit.

A packet sourced from 172.18.33.2 is destined for 172.18.32.38. Where does the router forward the packet?

Options:

A.

GigabitEthernet0/0

B.

Loopback0

C.

10.1.1.1

D.

10.1.1.3

Buy Now
Questions 136

Refer to the exhibit. What is the cause of the issue?

Options:

A.

STP

B.

port security

C.

wrong cable type

D.

shutdown command

Buy Now
Questions 137

When is the PUT method used within HTTP?

Options:

A.

when a nonidempotent operation is needed

B.

to update a DNS server

C.

to display a web site

D.

when a read-only operation it required

Buy Now
Questions 138

An engineer is installing a new wireless printer with a static IP address on the Wi-Fi network. Which feature must be enabled and configured to prevent connection issues with the printer?

Options:

A.

client exclusion

B.

passive client

C.

DHCP address assignment

D.

static IP tunneling

Buy Now
Questions 139

Refer to the exhibit. An engineer must translate the PC1 IP address to 10.199.77.100 and permit PC1 to ping the loopback 0 on router R2. What command set must be used?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 140

Refer to the exhibit.

What is the next step to complete the implementation for the partial NAT configuration shown?

Options:

A.

Reconfigure the static NAT entries that overlap the NAT pool

B.

Configure the NAT outside interface

C.

Modify the access list for the internal network on e0/1

D.

Apply the ACL to the pool configuration

Buy Now
Questions 141

What is a specification for SSIDS?

Options:

A.

They are a Cisco proprietary security feature.

B.

They must include one number and one letter.

C.

They define the VLAN on a switch.

D.

They are case sensitive.

Buy Now
Questions 142

Which EtherChannel mode must be configured when using LAG on a WLC?

Options:

A.

on

B.

active

C.

auto

D.

passive

Buy Now
Questions 143

An engineer has configured the domain name, user name, and password on the local router. What is the next step to complete the configuration tor a Secure Shell access RSA key?

Options:

A.

crypto key Import rsa pem

B.

crypto key pubkey-chain rsa

C.

crypto key generate rsa

D.

crypto key zeroize rsa

Buy Now
Questions 144

Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.

Options:

Buy Now
Questions 145

Refer to the exhibit.

Which action by the router when a packet is sourced from 10.10.10.2 and destined 10.10.10.16?

Options:

A.

It queues the packets waiting for the route to be learned.

B.

It floods packets to all learned next hops.

C.

It discards the packets.

D.

It uses a route that is similar to the destination address.

Buy Now
Questions 146

Drag and drop the IPv6 address details from the left onto the corresponding types on the right.

Options:

Buy Now
Questions 147

What is a benefit of a point-to-point leased line?

Options:

A.

flexibility of design

B.

simplicity of configurator

C.

low cost

D.

full-mesh capability

Buy Now
Questions 148

In which circumstance would a network architect decide to implement a global unicast subnet instead of a unique local unicast subnet?

Options:

A.

when the subnet must be available only within an organization

B.

when the subnet does not need to be routable

C.

when the addresses on the subnet must be equivalent to private IPv4 addresses

D.

when the subnet must be routable over the internet

Buy Now
Questions 149

Drag and drop the SNMP components from the left onto the description on the right.

Options:

Buy Now
Questions 150

What is the temporary state that switch ports always enter immediately after the boot process when Rapid PVST+ is used?

Options:

A.

discarding

B.

listening

C.

forwarding

D.

learning

Buy Now
Questions 151

Refer to the exhibit.

Host A switch interface is configured in VLAN 2. Host D sends a unicast packet destined for the IP address of host A.

What does the switch do when it receives the frame from host D?

Options:

A.

It creates a broadcast storm.

B.

It drops the frame from the MAC table of the switch.

C.

It shuts down the source port and places It In err-disable mode.

D.

It floods the frame out of every port except the source port.

Buy Now
Questions 152

Refer to the exhibit.

What is represented by the word "switch’’ in line 2 of the JSON schema?

Options:

A.

array

B.

key

C.

value

D.

object

Buy Now
Questions 153

SW1 supports connectivity for a lobby conference room and must be secured. The engineer must limit the connectivity from PCI lo ma SW1 and SW2 network. The MAC addresses allowed must be Limited to two. Which configuration secures the conference room connectivity?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 154

What does the implementation of a first-hop redundancy protocol protect against on a network?

Options:

A.

root-bridge loss

B.

spanning-tree loops

C.

default gateway failure

D.

BGP neighbor flapping

Buy Now
Questions 155

Which IP header field is changed by a Cisco device when QoS marking is enabled?

Options:

A.

Header Checksum

B.

Type of service

C.

DSCP

D.

ECN

Buy Now
Questions 156

What is a reason why an administrator would choose to implement an automated network management approach?

Options:

A.

Reduce inconsistencies in the network configuration.

B.

Enable "box by box" configuration and deployment.

C.

Decipher simple password policies.

D.

Increase recurrent management costs.

Buy Now
Questions 157

PC1 tries to send traffic to newly installed PC2. The PC2 MAC address is not listed in the MAC address table of the switch, so the switch sends the packet to all ports in the same VLAN Which switching concept does this describe?

Options:

A.

MAC address aging

B.

MAC address table

C.

frame flooding

D.

spanning-tree protocol

Buy Now
Questions 158

What does traffic shaping do?

Options:

A.

It modifies the QoS attributes of a packet

B.

It queues excess traffic

C.

It organizes traffic into classes.

D.

It sets QoS attributes within a packet.

Buy Now
Questions 159

A client experiences slow throughput from a server that is directly connected to the core switch in a data center. A network engineer finds minimal latency on connections to the server, but data transfers are unreliable, and the output of the show Interfaces counters errors command shows a high FCS-Err count on the interface that is connected to the server. What is the cause of the throughput issue?

Options:

A.

high bandwidth usage

B.

a physical cable fault

C.

a speed mismatch

D.

a cable that is too long

Buy Now
Questions 160

Refer to the exhibit.

Which per-hop QoS behavior is R1 applying to incoming packets?

Options:

A.

queuing

B.

marking

C.

shaping

D.

policing

Buy Now
Questions 161

Which two protocols are used by an administrator for authentication and configuration on access points?

Options:

A.

Kerberos

B.

802.1Q

C.

802.1x

D.

TACACS+

E.

RADIUS

Buy Now
Questions 162

What are two advantages of implementing a controller-based architecture instead of a traditional network architecture? (Choose two.)

Options:

A.

It allows for seamless connectivity to virtual machines.

B.

It supports complex and high-scale IP addressing schemes.

C.

It enables configuration task automation.

D.

It provides increased scalability and management options.

E.

It increases security against denial-of-service attacks.

Buy Now
Questions 163

Drag and drop the device behaviors from the left onto the matching HSRP slate on the right.

Options:

Buy Now
Questions 164

Drag and drop the characteristics of transport layer protocols from the left onto the corresponding protocols on the right.

Options:

Buy Now
Questions 165

Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.

Options:

Buy Now
Questions 166

Refer to the exhibit.

How many JSON objects are represented?

Options:

A.

1

B.

2

C.

3

D.

4

Buy Now
Questions 167

Which interface IP address serves as the tunnel source for CAPWAP packets from the WLC to an AP?

Options:

A.

service

B.

trunk

C.

AP-manager

D.

virtual AP connection

Buy Now
Questions 168

Refer to the exhibit.

All interfaces are in the same VLAN. All switches are configured with the default STP priorities. During the STP electronics, which switch becomes the root bridge?

Options:

A.

MDF-DC-4:08:E0:19: 08:B3:19

B.

MDF-DC-3:08:0E:18::1A:3C:9D

C.

MDF-DC-08:0E:18:22:05:97

D.

MDF-DC-1:DB:E:44:02:54:79

Buy Now
Questions 169

Refer to the exhibit.

Which set of commands must be applied to the two switches to configure an LACP Layer 2 EtherChannel?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 170

Drag and drop the IPv6 address description from the left onto the IPv6 address types on the right. Not all options are used.

Options:

Buy Now
Questions 171

Refer to the exhibit.

What is the subnet mask for route 172.16.4.0?

Options:

A.

255.255.248.0

B.

255.255.254.0

C.

255.255.255.192

D.

255.255.240.0

Buy Now
Questions 172

A WLC sends alarms about a rogue AP, and the network administrator verifies that the alarms are caused by a legitimate autonomous AP.

Options:

A.

Place the AP into manual containment.

B.

Remove the AP from WLC management.

C.

Manually remove the AP from Pending state.

D.

Set the AP Class Type to Friendly.

Buy Now
Questions 173

Which two HTTP methods are suitable for actions performed by REST-based APIs? (Choose two.)

Options:

A.

REMOVE

B.

REDIRECT

C.

OPOST

D.

GET

E.

UPOP

Buy Now
Questions 174

Drag and drop the functions from the left onto the correct network components on the right

Options:

Buy Now
Questions 175

An email user has been lured into clicking a link in an email sent by their company's security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?

Options:

A.

Physical access control

B.

Social engineering attack

C.

brute force attack

D.

user awareness

Buy Now
Questions 176

Refer to the exhibit.

What is the issue with the interface GigabitEthernet0/0/1?

Options:

A.

Port security

B.

High throughput

C.

Cable disconnect

D.

duplex mismatch

Buy Now
Questions 177

Which function is performed by the collapsed core layer in a two-tier architecture?

Options:

A.

enforcing routing policies

B.

marking interesting traffic for data polices

C.

attaching users to the edge of the network

D.

applying security policies

Buy Now
Questions 178

By default, how Does EIGRP determine the metric of a route for the routing table?

Options:

A.

it uses the bandwidth and delay values of the path to calculate the route metric

B.

it uses a default metric of 10 for all routes that are learned by the router

C.

it uses a reference Bandwidth and the actual bandwidth of the connected link to calculate the route metric

D.

it counts the number of hops between the receiving and destination routers and uses that value as the metric

Buy Now
Questions 179

Refer to the exhibit.

An administrator must turn off the Cisco Discovery Protocol on the port configured with address last usable address in the 10.0.0.0/30 subnet. Which command set meets the requirement?

Options:

A.

interface gi0/1

no cdp enable

B.

interface gi0/1

clear cdp table

C.

interface gi0/0

no cdp advertise-v2

D.

interface gi0/0

no cdp run

Buy Now
Questions 180

Refer to the Exhibit.

After the switch configuration the ping test fails between PC A and PC B Based on the output for switch 1. which error must be corrected?

Options:

A.

There is a native VLAN mismatch

B.

Access mode is configured on the switch ports.

C.

The PCs are m the incorrect VLAN

D.

All VLANs are not enabled on the trunk

Buy Now
Questions 181

What are two fundamentals of virtualization? (choose two)

Options:

A.

The environment must be configured with one hypervisor that serves solely as a network manager to monitor SNMP traffic

B.

It allows logical network devices to move traffic between virtual machines and the rest of the physical network

C.

It allows multiple operating systems and applications to run independently on one physical server.

D.

It allows a physical router to directly connect NICs from each virtual machine into the network

E.

It requires that some servers, virtual machines and network gear reside on the Internet

Buy Now
Questions 182

Several new coverage cells are required to improve the Wi-Fi network of an organization. Which two standard designs are recommended? (choose two.)

Options:

A.

5GHz provides increased network capacity with up to 23 nonoveriapping channels.

B.

For maximum throughput, the WLC is configured to dynamically set adjacent access points to the same channel.

C.

5GHz channel selection requires an autonomous access point.

D.

Adjacent cells with overlapping channels use a repeater access point.

E.

Cells that overlap one another are configured to use nonoveriapping channels.

Buy Now
Questions 183

Refer to the exhibit.

An engineer configured NAT translations and has verified that the configuration is correct.

Which IP address is the source IP?

Options:

A.

10.4.4.4

B.

10.4.4.5

C.

172.23.103.10

D.

172.23.104.4

Buy Now
Questions 184

Which technology allows for multiple operating systems to be run on a single host computer?

Options:

A.

virtual routing and forwarding

B.

network port ID visualization

C.

virtual device contexts

D.

server visualization

Buy Now
Questions 185

Which type of information resides on a DHCP server?

Options:

A.

a list of the available IP addresses in a pool

B.

a list of public IP addresses and their corresponding names

C.

usernames and passwords for the end users in a domain

D.

a list of statically assigned MAC addresses

Buy Now
Questions 186

Which network allows devices to communicate without the need to access the Internet?

Options:

A.

1729.0.0/16

B.

172.28.0.0/16

C.

192.0.0.0/8

D.

209.165.201.0/24

Buy Now
Questions 187

Which output displays a JSON data representation?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 188

Where is the interface between the control plane and data plane within the software-defined architecture?

Options:

A.

control layer and the infrastructure layer

B.

application layer and the infrastructure layer

C.

control layer and the application layer

D.

application layer and the management layer

Buy Now
Questions 189

Refer to exhibit.

Which statement explains the configuration error message that is received?

Options:

A.

It is a broadcast IP address

B.

The router does not support /28 mask.

C.

It belongs to a private IP address range.

D.

IT is a network IP address.

Buy Now
Questions 190

Refer to the exhibit.

How does the router manage traffic to 192.168.12.16?

Options:

A.

It selects the RIP route because it has the longest prefix inclusive of the destination address.

B.

It chooses the OSPF route because it has the longest prefix inclusive of the destination address.

C.

it load-balances traffic between all three routes

D.

It chooses the EIGRP route because it has the lowest administrative distance

Buy Now
Questions 191

Drag and drop the attack-mitigation techniques from the left onto the Types of attack that they mitigate on the right.

Options:

Buy Now
Questions 192

Why was the RFC 1918 address space defined?

Options:

A.

conserve public IPv4 addressing

B.

preserve public IPv6 address space

C.

reduce instances of overlapping IP addresses

D.

support the NAT protocol

Buy Now
Questions 193

How does HSRP provide first hop redundancy?

Options:

A.

It load-balances traffic by assigning the same metric value to more than one route to the same destination m the IP routing table.

B.

It load-balances Layer 2 traffic along the path by flooding traffic out all interfaces configured with the same VLAN.

C.

It forwards multiple packets to the same destination over different routed links n the data path

D.

It uses a shared virtual MAC and a virtual IP address to a group of routers that serve as the default gateway for hosts on a LAN

Buy Now
Questions 194

Drag and drop the DHCP snooping terms from the left onto the descriptions on the right.

Options:

Buy Now
Questions 195

When using Rapid PVST+, which command guarantees the switch is always the root bridge for VLAN 200?

Options:

A.

spanning -tree vlan 200 priority 614440

B.

spanning -tree vlan 200 priority 38572422

C.

spanning -tree vlan 200 priority 0

D.

spanning -tree vlan 200 root primary

Buy Now
Questions 196

An engineering team asks an implementer to configure syslog for warning conditions and error conditions. Which command does the implementer configure to achieve the desired result?

Options:

A.

logging trap 5

B.

logging trap 2

C.

logging trap 4

D.

logging trap 3

Buy Now
Questions 197

How does QoS optimize voice traffic?

Options:

A.

reducing bandwidth usage

B.

by reducing packet loss

C.

by differentiating voice and video traffic

D.

by increasing jitter

Buy Now
Questions 198

Refer to the exhibit.

After running the code in the exhibit, which step reduces the amount of data that the NETCONF server returns to the NETCONF client, to only the interface's configuration?

Options:

A.

Use the Ixml library to parse the data returned by the NETCONF server for the interface's configuration.

B.

Create an XML filter as a string and pass it to get_config() method as an argument.

C.

Create a JSON filter as a string and pass it to the get_config() method as an argument.

D.

Use the JSON library to parse the data returned by the NETCONF server for the interface's configuration.

Buy Now
Questions 199

Which state does the switch port move to when PortFast is enabled?

Options:

A.

learning

B.

forwarding

C.

blocking

D.

listening

Buy Now
Questions 200

Refer to the exhibit.

Which switch in this configuration will be elected as the root bridge?

Options:

A.

SW1

B.

SW2

C.

SW3

D.

SW4

Buy Now
Questions 201

Which device tracks the state of active connections in order to make a decision to forward a packet through?

Options:

A.

wireless access point

B.

firewall

C.

wireless LAN controller

D.

router

Buy Now
Questions 202

What is a function of Wireless LAN Controller?

Options:

A.

register with a single access point that controls traffic between wired and wireless endpoints.

B.

use SSIDs to distinguish between wireless clients.

C.

send LWAPP packets to access points.

D.

monitor activity on wireless and wired LANs

Buy Now
Questions 203

What is the function of a hub-and-spoke WAN topology?

Options:

A.

allows access restrictions to be implemented between subscriber sites.

B.

provides direct connections between subscribers

C.

supports Layer 2 VPNs

D.

supports application optimization

Buy Now
Questions 204

What is a characteristic of cloud-based network topology?

Options:

A.

wireless connections provide the sole access method to services

B.

onsite network services are provided with physical Layer 2 and Layer 3 components

C.

services are provided by a public, private, or hybrid deployment

D.

physical workstations are configured to share resources

Buy Now
Questions 205

Which option about JSON is true?

Options:

A.

uses predefined tags or angle brackets () to delimit markup text

B.

used to describe structured data that includes arrays

C.

used for storing information

D.

similar to HTML, it is more verbose than XML

Buy Now
Questions 206

A network analyst is tasked with configured the date and time on a router using EXEC mode. The date must be set to 12:00am. Which command should be used?

Options:

A.

Clock timezone

B.

Clock summer-time-recurring

C.

Clock summer-time date

D.

Clock set

Buy Now
Questions 207

Where does the configuration reside when a helper address Is configured lo support DHCP?

Options:

A.

on the router closest to the server

B.

on the router closest to the client

C.

on every router along the path

D.

on the switch trunk interface

Buy Now
Questions 208

Refer to the exhibit.

Which password must an engineer use to enter the enable mode?

Options:

A.

adminadmin123

B.

default

C.

testing 1234

D.

cisco123

Buy Now
Questions 209

Which level of severity must be set to get informational syslogs?

Options:

A.

alert

B.

critical

C.

notice

D.

debug

Buy Now
Questions 210

Which WAN topology provides a combination of simplicity quality, and availability?

Options:

A.

partial mesh

B.

full mesh

C.

point-to-point

D.

hub-and-spoke

Buy Now
Questions 211

Which WLC port connects to a switch to pass normal access-point traffic?

Options:

A.

redundancy

B.

console

C.

distribution system

D.

service

Buy Now
Questions 212

What is the primary purpose of a First Hop Redundancy Protocol?

Options:

A.

It allows directly connected neighbors to share configuration information.

B.

It allows a router to use bridge priorities to create multiple loop-free paths to a single destination.

C.

It reduces routing failures by allowing Layer 3 load balancing between OSPF neighbors that have the same link metric.

D.

It reduces routing failures by allowing more than one router to represent itself, as the default gateway of a network.

Buy Now
Questions 213

Refer to the exhibit.

What two conclusions should be made about this configuration? (Choose two )

Options:

A.

The designated port is FastEthernet 2/1

B.

This is a root bridge

C.

The spanning-tree mode is Rapid PVST+

D.

The spanning-tree mode is PVST+

E.

The root port is FastEthernet 2/1

Buy Now
Questions 214

Which global command encrypt all passwords in the running configuration?

Options:

A.

password-encrypt

B.

enable password-encryption

C.

enable secret

D.

service password-encryption

Buy Now
Questions 215

Which type of address is the public IP address of a NAT device?

Options:

A.

outside global

B.

outsdwde local

C.

inside global

D.

insride local

E.

outside public

F.

inside public

Buy Now
Questions 216

An engineer is asked to protect unused ports that are configured in the default VLAN on a switch.

Which two steps will fulfill the request? (Choose two)

Options:

A.

Configure the ports in an EtherChannel.

B.

Administratively shut down the ports

C.

Configure the port type as access and place in VLAN 99

D.

Configure the ports as trunk ports

E.

Enable the Cisco Discovery Protocol

Buy Now
Questions 217

Refer to the exhibit.

Which route type does the routing protocol Code D represent in the output?

Options:

A.

internal BGP route

B.

/24 route of a locally configured IP

C.

statically assigned route

D.

route learned through EIGRP

Buy Now
Questions 218

Refer to the exhibit.

What is the effect of this configuration?

Options:

A.

All ARP packets are dropped by the switch

B.

Egress traffic is passed only if the destination is a DHCP server.

C.

All ingress and egress traffic is dropped because the interface is untrusted

D.

The switch discard all ingress ARP traffic with invalid MAC-to-IP address bindings.

Buy Now
Questions 219

When deploying syslog, which severity level logs informational message?

Options:

A.

0

B.

2

C.

4

D.

6

Buy Now
Questions 220

The service password-encryption command is entered on a router. What is the effect of this configuration?

Options:

A.

restricts unauthorized users from viewing clear-text passwords in the running configuration

B.

encrypts the password exchange when a VPN tunnel is established

C.

prevents network administrators from configuring clear-text passwords

D.

protects the VLAN database from unauthorized PC connections on the switch

Buy Now
Questions 221

Drag and drop the application protocols from the left onto the transport protocols that it uses on the right

Options:

Buy Now
Questions 222

With REST API, which standard HTTP header tells a server which media type is expected by the client?

Options:

A.

Accept-Encoding: gzip. deflate

B.

Accept-Patch: text/example; charset=utf-8

C.

Content-Type: application/json; charset=utf-8

D.

Accept: application/json

Buy Now
Questions 223

When a site-to-site VPN is used, which protocol is responsible for the transport of user data?

Options:

A.

IKEv2

B.

IKEv1

C.

IPsec

D.

MD5

Buy Now
Questions 224

What are two characteristics of a controller-based network? (Choose two)

Options:

A.

The administrator can make configuration updates from the CLI

B.

It uses northbound and southbound APIs to communicate between architectural layers

C.

It moves the control plane to a central point.

D.

It decentralizes the control plane, which allows each device to make its own forwarding decisions

E.

It uses Telnet to report system issues.

Buy Now
Questions 225

A network administrator enabled port security on a switch interface connected to a printer. What is the next configuration action in order to allow the port to learn the MAC address of the printer and insert it into the table automatically?

Options:

A.

enable dynamic MAC address learning

B.

implement static MAC addressing.

C.

enable sticky MAC addressing

D.

implement auto MAC address learning

Buy Now
Questions 226

What are two characteristics of a public cloud Implementation? (Choose two.)

Options:

A.

It is owned and maintained by one party, but it is shared among multiple organizations.

B.

It enables an organization to fully customize how It deploys network resources.

C.

It provides services that are accessed over the Internet.

D.

It Is a data center on the public Internet that maintains cloud services for only one company.

E.

It supports network resources from a centralized third-party provider and privately-owned virtual resources

Buy Now
Questions 227

How do traditional campus device management and Cisco DNA Center device management differ in regards to deployment?

Options:

A.

Cisco DNA Center device management can deploy a network more quickly than traditional campus device management

B.

Traditional campus device management allows a network to scale more quickly than with Cisco DNA Center device management

C.

Cisco DNA Center device management can be implemented at a lower cost than most traditional campus device management options

D.

Traditional campus device management schemes can typically deploy patches and updates more quickly than Cisco DNA Center device management

Buy Now
Questions 228

Refer to the exhibit.

Which route does R1 select for traffic that is destined to 192 168.16.2?

Options:

A.

192.168.16.0/21

B.

192.168.16.0/24

C.

192.168 26.0/26

D.

192.168.16.0/27

Buy Now
Questions 229

What is the benefit of configuring PortFast on an interface?

Options:

A.

After the cable is connected, the interface uses the fastest speed setting available for that cable type

B.

After the cable is connected, the interface is available faster to send and receive user data

C.

The frames entering the interface are marked with higher priority and then processed faster by a switch.

D.

Real-time voice and video frames entering the interface are processed faster

Buy Now
Questions 230

What is a characteristic of private IPv4 addressing?

Options:

A.

traverse the Internet when an outbound ACL is applied

B.

issued by IANA in conjunction with an autonomous system number

C.

composed of up to 65.536 available addresses

D.

used without tracking or registration

Buy Now
Questions 231

Which two capacities of Cisco DNA Center make it more extensible as compared to traditional campus device management? (Choose two)

Options:

A.

adapters that support all families of Cisco IOS software

B.

SDKs that support interaction with third-party network equipment

C.

customized versions for small, medium, and large enterprises

D.

REST APIs that allow for external applications to interact natively with Cisco DNA Center

E.

modular design that is upgradable as needed

Buy Now
Questions 232

Which 802.11 frame type is indicated by a probe response after a client sends a probe request?

Options:

A.

action

B.

management

C.

control

D.

data

Buy Now
Questions 233

Which plane is centralized by an SDN controller?

Options:

A.

management-plane

B.

control-plane

C.

data-plane

D.

services-plane

Buy Now
Questions 234

Refer to the exhibit.

Which two commands were used to create port channel 10? (Choose two )

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Buy Now
Questions 235

Which type of IPv6 address is publicly routable in the same way as IPv4 public address?

Options:

A.

global unicast

B.

link-local

C.

unique local

D.

multicast

Buy Now
Questions 236

What is the function of a server?

Options:

A.

It transmits packets between hosts in the same broadcast domain.

B.

It provides shared applications to end users.

C.

It routes traffic between Layer 3 devices.

D.

It Creates security zones between trusted and untrusted networks

Buy Now
Questions 237

Refer to the exhibit.

A network engineer is in the process of establishing IP connectivity between two sites. Routers R1 and R2 are partially configured with IP addressing. Both routers have the ability to access devices on their respective LANs. Which command set configures the IP connectivity between devices located on both LANs in each site?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 238

Drag and drop the TCP/IP protocols from the left onto the transmission protocols on the right

Options:

Buy Now
Questions 239

Drag and drop the Cisco Wireless LAN Controller security settings from the left onto the correct security mechanism categories on the right.

Options:

Buy Now
Questions 240

Which result occurs when PortFast is enabled on an interface that is connected to another switch?

Options:

A.

Spanning tree may fail to detect a switching loop in the network that causes broadcast storms

B.

VTP is allowed to propagate VLAN configuration information from switch to switch automatically.

C.

Root port choice and spanning tree recalculation are accelerated when a switch link goes down

D.

After spanning tree converges PortFast shuts down any port that receives BPDUs.

Buy Now
Questions 241

While examining excessive traffic on the network, it is noted that all incoming packets on an interface appear to be allowed even though an IPv4 ACL is applied to the interface.

Which two misconfigurations cause this behavior? (Choose two)

Options:

A.

The packets fail to match any permit statement

B.

A matching permit statement is too high in the access test

C.

A matching permit statement is too broadly defined

D.

The ACL is empty

E.

A matching deny statement is too high in the access list

Buy Now
Questions 242

How does WPA3 improve security?

Options:

A.

It uses SAE for authentication.

B.

It uses a 4-way handshake for authentication.

C.

It uses RC4 for encryption.

D.

It uses TKIP for encryption.

Buy Now
Questions 243

Refer to the exhibit.

An administrator is tasked with configuring a voice VLAN. What is the expected outcome when a Cisco phone is connected to the GigabitEfriemet3/1/4 port on a switch?

Options:

A.

The phone and a workstation that is connected to the phone do not have VLAN connectivity

B.

The phone and a workstation that is connected to the phone send and receive data in VLAN 50.

C.

The phone sends and receives data in VLAN 50, but a workstation connected to the phone has no VLAN connectivity

D.

The phone sends and receives data in VLAN 50, but a workstation connected to the phone sends and receives data in VLAN 1

Buy Now
Questions 244

Which protocol does an access point use to draw power from a connected switch?

Options:

A.

Internet Group Management Protocol

B.

Adaptive Wireless Path Protocol

C.

Cisco Discovery Protocol

D.

Neighbor Discovery Protocol

Buy Now
Questions 245

IP connectivity and OSPF are preconfigured on all devices where necessary. Do not make any changes to the IP addressing or OSPF. The company policy uses connected interfaces and next hops when configuring static routes except for load balancing or redundancy without floating static. Connectivity must be established between subnet 172.20.20.128/25 on the Internet and the LAN at 192.168.0.0/24 connected to SW1:

1. Configure reachability to the switch SW1 LAN subnet in router R2.

2. Configure default reachability to the Internet subnet in router R1.

3. Configure a single static route in router R2 to reach to the Internet subnet considering both redundant links between routers R1 and R2. A default route is NOT allowed in router R2.

4. Configure a static route in router R1 toward the switch SW1 LAN subnet where the primary link must be through Ethernet0/1. and the backup link must be through Ethernet0/2 using a floating route. Use the minimal administrative distance value when required.

Options:

Buy Now
Questions 246

Physical connectivity is implemented between the two Layer 2 switches,

and the network connectivity between them must be configured.

I . Configure an LACP EtherChanneI and number it as 44; configure it

between switches SWI and SW2 using interfaces EthernetO/O and

Ethernet0/1 on both sides. The LACP mode must match on both ends.

2. Configure the EtherChanneI as a trunk link.

3. Configure the trunk link with 802. Iq tags.

4. Configure VLAN 'MONITORING' as the untagged VLAN of the

EtherChannel.

==================

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using

the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Options:

Buy Now
Questions 247

All physical cabling is in place. Router R4 and PCI are fully configured and

inaccessible. R4's WAN interfaces use .4 in the last octet for each subnet.

Configurations should ensure that connectivity is established end-to-end.

1 . Configure static routing to ensure RI prefers the path through R2 to

reach only PCI on R4's LAN

2. Configure static routing that ensures traffic sourced from RI will take

an alternate path through R3 to PCI in the event of an outage along

the primary path

3. Configure default routes on RI and R3 to the Internet using the least number of hops

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using

the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Options:

Buy Now
Exam Code: 200-301
Exam Name: Cisco Certified Network Associate
Last Update: Nov 15, 2024
Questions: 970

PDF + Testing Engine

$140

Testing Engine

$105

PDF (Q&A)

$90