A. ip route 209.165.201.0 255.255.255.224 209.165.202.130
B. ip route 0.0.0.0 0.0.0.0 209.165.200.224
C. ip route 209.165.200.224 255.255.255.224 209.165.202.129 254
D. ip route 0.0.0.0 0.0.0.0 209.165.202.131
Correct Answer: C
A. to analyze traffic and drop unauthorized traffic from the Internet
B. to transmit wireless traffic between hosts
C. to pass traffic between different networks
D. forward traffic within the same broadcast domain
Correct Answer: C
A. switchport mode trunk
B. switchport mode dynamic desirable
C. switchport mode dynamic auto
D. switchport nonegotiate
Correct Answer: B
A. transfers a backup configuration file from a server to a switch using a username and password
B. transfers files between file systems on a router
C. transfers a configuration files from a server to a router on a congested link
D. transfers IOS images from a server to a router for firmware upgrades
Correct Answer: D
A. different nonoverlapping channels
B. different overlapping channels
C. one overlapping channel
D. one nonoverlapping channel
Correct Answer: D
A. ipv6 route ::/0 Serial 0/0/1
B. ipv6 route 0/0 Serial 0/0/0
C. ipv6 route ::/0 Serial 0/0/0
D. ip route 0.0.0.0.0.0.0.0 Serial 0/0/0
E. ipv6 route ::/0 2000::2
Correct Answer: C
A. read
B. create
C. replace
D. update
Correct Answer: D
A. a workstation that requests a domain name associated with its IP address
B. a host that is configured to request an IP address automatically
C. a server that dynamically assigns IP addresses to hosts.
D. a router that statically assigns IP addresses to hosts.
Correct Answer: B
A. They support an inline optical attenuator to enhance signal strength
B. They provide minimal interruption to services by being hot-swappable
C. They offer reliable bandwidth up to 100 Mbps in half duplex mode
D. They accommodate single-mode and multi-mode in a single module
Correct Answer: B
A. configure IEEE 802.1p
B. configure IEEE 802.1q
C. configure ISL
D. configure DSCP
Correct Answer: B
A. HTTPS
B. RADIUS
C. TACACS+
D. HTTP
Correct Answer: A
A. management plane
B. control plane
C. policy plane
D. data plane
Correct Answer: D
A. FIFO
B. LLC
C. CBWFQ
D. RSVP
E. WFQ
Correct Answer: CE
A. Chef
B. Python
C. Puppet
D. Ansible
Correct Answer: D
A. in the MAC address table
B. in the CAM table
C. in the binding database
D. in the frame forwarding database
Correct Answer: C
A. intrusion detection
B. user awareness
C. physical access control
D. network authorization
Correct Answer: C
A. 802.1q trunks
B. Cisco vPC
C. LLDP
D. LACP
Correct Answer: D
A. There is limited unique address space, and traffic on the new subnet will stay local within the organization.
B. The network has multiple endpoint listeners, and it is desired to limit the number of broadcasts.
C. Traffic on the subnet must traverse a site-to-site VPN to an outside organization.
D. The ISP requires the new subnet to be advertised to the internet for web services.
Correct Answer: A
A. listening
B. blocking
C. forwarding
D. learning
E. speaking
Correct Answer: CD
A. forwarding
B. listening
C. blocking
D. learning
Correct Answer: A
A. Add the access-list 10 permit any command to the configuration
B. Remove the access-class 10 in command from line vty 0.4.
C. Add the ip access-group 10 out command to interface g0/0.
D. Remove the password command from line vty 0 4.
Correct Answer: B
A. centralize the management of access points in an enterprise network
B. support standalone or controller-based architectures
C. serve as the first line of defense in an enterprise network
D. provide secure user logins to devices on the network.
Correct Answer: A
A. No router ID is set, and the OSPF protocol does not run.
B. The highest up/up physical interface IP address is selected as the router I
D.
C. The lowest IP address is incremented by 1 and selected as the router I
D.
D. The router ID 0.0.0.0 is selected and placed in the OSPF process.
Correct Answer: B
A. group access points together to increase throughput on a given channel
B. configure the first three access points are configured to use Channels 1, 6, and 11
C. include a least two access points on nonoverlapping channels to support load balancing
D. assign physically adjacent access points to the same Wi-Fi channel
Correct Answer: A
A. action
B. management
C. control
D. data
Correct Answer: B
A. wireless to an access point that is physically connected to the network
B. a cable connected to a physical switch on the network
C. a virtual switch that links to an access point that is physically connected to the network
D. a software switch on a hypervisor that is physically connected to the network
Correct Answer: D
A. read
B. update
C. create
D. delete
Correct Answer: A
A. Accept-Encoding: gzip. deflate
B. Accept-Patch: text/example; charset=utf-8
C. Content-Type: application/json; charset=utf-8
D. Accept: application/json
Correct Answer: D
A. wireless access point
B. firewall
C. wireless LAN controller
D. router
Correct Answer: C
A. internal BGP route
B. /24 route of a locally configured IP
C. statically assigned route
D. route learned through EIGRP
Correct Answer: D
A. asychronous routing
B. single-homed branches
C. dual-homed branches
D. static routing
E. dynamic routing
Correct Answer: AC
A. enable AAA override
B. enable RX-SOP
C. enable DTIM
D. enable Band Select
Correct Answer: D
A. ISATAP
B. GRE over iPsec
C. iPsec over ISATAP
D. GRE
Correct Answer: B
A. clock timezone
B. clock summer-time date
C. clock set
D. clock summer-time recurring
Correct Answer: C
A. Switch 1
B. Switch 2
C. Switch 3
D. Switch 4
Correct Answer: C
A. applying security policies
B. attaching users to the edge of the network
C. enforcing routing policies
D. making interesting traffic for data policies
Correct Answer: C
A. runs applications that send and retrieve data for workstations that make requests
B. handles requests from multiple workstations at the same time
C. housed solely in a data center that is dedicated to a single client
D. achieves redundancy by exclusively using virtual server clustering
E. runs the same operating system in order to communicate with other servers
Correct Answer: AB
A. used exclusively when a user is connected to a company's internal network
B. allows the users to access company internal network resources through a secure tunnel
C. uses cryptographic tunneling to protect the privacy of data for multiple users simultaneously
D. establishes a secure tunnel between two branch sites
Correct Answer: B
A. shut down unused ports
B. configure static ARP entries
C. enable the PortFast feature on ports
D. implement port-based authentication
E. configure ports to a fixed speed
Correct Answer: AD
A. access-list 2699 permit udp 10.20.1.0 0.0.0.255
B. no access-list 2699 deny tcp any 10.20.1.0 0.0.0.127 eq 22
C. access-list 2699 permit tcp any 10.20.1.0 0.0.0.255 eq 22
D. no access-list 2699 deny ip any 10.20.1.0 0.0.0.255
Correct Answer: D
A. Ensure timely data transfer between layers.
B. Provide uninterrupted forwarding service
C. Inspect packets for malicious activity.
D. Police traffic that is sent to the edge of the network.
E. Provide direct connectivity for end user devices
Correct Answer: BC
A. to provide fair queuing for buffered flows
B. to mitigate delays over slow links
C. to limit the bandwidth that a flow can use
D. to be a marking mechanism that identifies different flows
Correct Answer: A
A. spanning -tree vlan 200 priority 614440
B. spanning -tree vlan 200 priority 0
C. spanning -tree vlan 200 priority 38572422
D. spanning -tree vlan 200 root primary
Correct Answer: B
A. ip helper-address
B. ip address dhcp
C. ip dhcp pool
D. ip dhcp relay
Correct Answer: A
A. relay agent information
B. address pool
C. smart-relay
D. database agent
E. manual bindings
Correct Answer: BE
A. The CAM table is empty until ingress traffic arrives at each port
B. Switches dynamically learn MAC addresses of each connecting CAM table.
C. The ports are restricted and learn up to a maximum of 10 dynamically-learned addresses
D. It requires a minimum number of secure MAC addresses to be filled dynamically
Correct Answer: A
A. SNMP
B. DNS lookup
C. syslog
D. NTP
Correct Answer: B
A. 802.1x
B. IP Source Guard
C. MAC Authentication Bypass
D. 802.11n
Correct Answer: A
A. switchport port-security violation access
B. switchport port-security violation protect
C. switchport port-security violation restrict
D. switchport port-security violation shutdown
Correct Answer: D
A. SW1
B. SW2
C. SW3
D. SW4
Correct Answer: C