A.ipv6 address dhcp
B.ipv6 address 2001:DB8:5:112::/64 eui-64
C.ipv6 address autoconfig
D.ipv6 address 2001:DB8:5:112::2/64 link-local
Correct Answer: C
A.It uses the bandwidth and delay values of the path to calculate the route metric.
B.It uses a default metric of 10 for all routes that are learned by the router
C.It counts the number of hops between the receiving and destination routers and uses that value as the metric.
D.It uses a reference bandwidth and the actual bandwidth of the connected link to calculate the route metric.
Correct Answer: A
A.ASCII
B.base64
C.binary
D.decimal
E.hexadecimal
Correct Answer: AE
A.Fiber connects to physical interfaces using RJ-45 connections.
B.The data can pass through the cladding.
C.Light is transmitted through the core of the fiber.
D.The glass core component is encased in a cladding.
E.A BNC connector is used for fiber connections.
Correct Answer: CD
A.link-local
B.unique local
C.multicast
D.global unicast
Correct Answer: B
A.management
B.protected frame
C.action
D.control
Correct Answer: A
A.IPv6 address
B.OSPF process ID
C.OSPF MD5 authentication key
D.OSPF stub flag
E.OSPF area
Correct Answer: BE
A.When a powered device begins drawing power from a PoE switch port a syslog message is generated
B.As power usage on a PoE switch port is checked data flow to the connected device is temporarily paused
C.If a switch determines that a device is using less than the minimum configured power it assumes the device has failed and disconnects
D.If a monitored port exceeds the maximum administrative value for power, the port is shutdown and err-disabled
Correct Answer: D
A.The administrator can make configuration updates from the CLI
B.It uses northbound and southbound APIs to communicate between architectural layers
C.It moves the control plane to a central point
D.It decentralizes the control plane, which allows each device to make its own forwarding decisions
E.It uses Telnet to report system issues
Correct Answer: BC
A.adminadmin123
B.default
C.testing 1234
D.cisco123
Correct Answer: C
A.Bronze
B.Platinum
C.Silver
D.Gold
Correct Answer: B
A.cost
B.administrative distance
C.metric
D.as-path
Correct Answer: C
A.TCP does not guarantee delivery or error checking to ensure that there is no corruption of data; UDP provides message acknowledgement and retransmits data if lost.
B.TCP provides flow control to avoid overwhelming a receiver by sending too many packets at once; UDP sends packets to the receiver in a continuous stream without checking for sequencing.
C.TCP uses windowing to deliver packets reliably; UDP provides reliable message transfer between hosts by establishing a three-way handshake
D.TCP is a connectionless protocol that does not provide reliable delivery of data; UDP is a connection-oriented protocol that uses sequencing to provide reliable delivery.
Correct Answer: B
A.The hypervisor communicates on Layer 3 without the need for additional resources
B.Each hypervisor can support a single virtual machine and a single software switch
C.The hypervisor can virtual physical components including CPU,memory,and storage
D.Virtualized servers run most efficiently when they are physically connected to a switch that is separate from the hypervisor.
Correct Answer: C
A.2000::/3
B.2000::5
C.FC00::/7
D.FF02::1
E.FF02::2
Correct Answer: DE
A.uses predefined tags or angle brackets () to delimit markup text
B.used to describe structured data that includes arrays
C.used for storing information
D.similar to HTML, it is more verbose than XML
Correct Answer: B
A.Only traditional networks offer a centralized control plane
B.Only traditional networks natively support centralized management
C.Traditional and controller-based networks abstract policies from device configurations
D.Only controller-based networks decouple the control plane and the data plane
Correct Answer: D
A.It allows multiple operating systems and applications to run independently on one physical server.
B.It allows a physical router to directly connect NICs from each virtual machine into the network.
C.The environment must be configured with one hypervisor that serves solely as a network manager to monitor SNMP traffic.
D.It allows logical network devices to move traffic between virtual machines and the rest of the physical network.
E.It requires that some servers, virtual machines, and network gear reside on the Internet.
Correct Answer: AD
A.The root port is FastEthernet 2/1
B.The spanning-tree mode is Rapid PVST+
C.The designated port is FastEthernet 2/1
D.The spanning-tree mode is PVST+
E.This is a root bridge
Correct Answer: AB
A.ip address dhcp
B.ip helper-address
C.ip dhcp pool
D.ip dhcp client
Correct Answer: A
A.The Layer 2 switch forwards the packet and adds the destination MAC address to its MAC address table
B.The Layer 2 switch sends a copy of a packet to CPU for destination MAC address learning
C.The Layer 2 switch floods packets to all ports except the receiving port in the given VLAN
D.The Layer 2 switch dorps the received frame
Correct Answer: C
A.Enable NTP authentication
B.Verify the time zone
C.Disable NTP broadcasts
D.Specify the IP address of the NTP server
E.Set the NTP server private key
Correct Answer: AD
A.switchport access vlan 67
B.switchport trunk allowed vlan 67
C.switchport private-vlan association host 67
D.switchport trunk native vlan 67
Correct Answer: D
A.It drops lower-priority packets before it drops higher-priority packets
B.It can identify different flows with a high level of granularity
C.It guarantees the delivery of high-priority packets
D.It can mitigate congestion by preventing the queue from filling up
E.IT supports protocol discovery
Correct Answer: AD
A.The user swipes a key fob, then clicks through an email link
B.The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device
C.The user enters a PIN into an RSA token, and then enters the displayed RSA key on a login scre
D.The user enters a user name and password and then re-enters the credentials on a second screen
Correct Answer: B
A.Authorization provides access control,and authentication tracks user services
B.Accounting tracks user services,and authentication provides access control.
C.Authorization identifies users,and authentication provides access control
D.Authentication identifies users,and accounting tracks user services
Correct Answer: D
A.FlexConnect AP mode fails to function if the AP loses connectivity with the WLC.
B.FlexConnect AP mode bridges the traffic from the AP to the WLC when local switching is configured.
C.Local AP mode creates two CAPWAP tunnels per AF to the WLC.
D.Local AP mode causes the AP to behave as if it were an autonomous AP.
Correct Answer: C
A.allow multiple companies to each use the same address without conflicts
B.provides a direct connection for hosts from outside of the enterprise network
C.ensues that NAT is not required to reach the internet with private range addressing
D.enable secure communications to the internet for all external hosts
Correct Answer: A
A.input erros
B.frame
C.giants
D.CRC
E.runts
Correct Answer: AD
A.An interface line has changed status
B.An ICMP connection has been built
C.A certificate has expired
D.A TCP connection has been torn down
Correct Answer: A
A.The switch must be running a k9 (crypto) IOS image
B.The ip domain-name command must be configured on the switch
C.IP routing must be enabled on the switch
D.A console password must be configured on the switch
E.Telnet must be disabled on the switch
Correct Answer: AB
A.10.4.4.4
B.10.4.4.5
C.172.23.103.10
D.172.23.104.4
Correct Answer: D
A.lldp timer
B.lldp holdtime
C.lldp reinit
D.lldp tlv-select
Correct Answer: C
A.passive
B.mode on
C.auto
D.active
Correct Answer: D
A.TKIP encryption
B.SAE encryption
C.AES encryption
D.scrambled encryption key
Correct Answer: B
A.It selects the EIGRP route because it has the lowest administrative distance
B.It selects the RIP route because it has the longest prefix inclusive of the destination address
C.It selects the OSFP route because it has the lowest cost
D.It selects the IS-IS route because it has the shortest prefix inclusive of the destination address
Correct Answer: B
A.The router calculates the reported distance by multiplying the delay on the exiting Interface by 256.
B.The router calculates the best backup path to the destination route and assigns it as the feasible successor.
C.The router calculates the feasible distance of all paths to the destination route
D.The advertised distance is calculated by a downstream neighbor to inform the local router of the bandwidth on the link
E.The router must use the advertised distance as the metric for any given route
Correct Answer: BC
A.int range g0/0-1 Channel-group 10 mode active
B.Bint range g0/0-1 Channel-group 10 mode desirable
C.int range g0/0-1 Channel-group 10 mode passive
D.int range g0/0-1 Channel-group 10 mode auto
E.int range g0/0-1 Channel-group 10 mode on
Correct Answer: AC
A.TACACS+ encrypts only password information and RADIUS encrypts the entire payload
B.RADIUS logs all commands that are entered by the administrator, but TACACS+ logs only start, stop, and interim commands
C.RADIUS is most appropriate for dial authentication, but TACACS+ can be used for multiple types of authentication
D.TACACS+ separates authentication and authorization, and RADIUS merges them
Correct Answer: D
A.It selects RIP route because it has the longest prefix inclusive of the destination address
B.It chooses the EIGRP route because it has the lowest administrative distance
C.It load-balances traffic between all three routes
D.It chooses the OSPF route because it has the longest prefix inclusive of the destination address
Correct Answer: A
A.It supports numerous extensibility options including cross-domain adapters and third-party SDKs.
B.It supports high availability for management functions when operating in cluster mode.
C.It enables easy autodiscovery of network elements m a brownfield deployment.
D.It is designed primarily to provide network assurance
Correct Answer: A
A.disabling TPC so that access points can negotiate signal levels with their attached wireless devices.
B.setting the maximum data rate to 54 Mbps on the Cisco Wireless LAN Controller
C.allocating non overlapping channels to access points that are in close physical proximity to one another
D.configuring access points to provide clients with a maximum of 5 Mbps
Correct Answer: C
A.Cisco DNA Center device management can be implemented at a lower cost than most traditional campus device management options
B.Traditional campus device management schemes can typically deploy patches and updates more quickly than Cisco DNA Center device management.
C.Cisco DNA Center device management can deploy a network more quickly than traditional campus device management
D.Traditional campus device management allows a network to scale more quickly than with Cisco DNA Center device management.
Correct Answer: C
A.It multiple the active K value by 256 to calculate the route with the lowest metric.
B.For each existing interface, it adds the metric from the source router to the destination to calculate the route with the lowest bandwidth.
C.It divides a reference bandwidth of 100 Mbps by the actual bandwidth of the existing interface to calculate the router with the lowest cost.
D.It count the umber of hops between the source router and the destination to determine the router with the lowest metric
Correct Answer: C
A.It provides variable latency.
B.Each link between leaf switches allows for higher bandwidth.
C.Each device is separated by the same number of hops.
D.It provides greater predictability on STP blocked ports.
Correct Answer: C
A.The two routers share a virtual IP address that is used as the default gateway for devices on the LAN.
B.The two routers negotiate one router as the active router and the other as the standby router
C.Each router has a different IP address both routers act as the default gateway on the LAN, and traffic is load balanced between them.
D.The two routers synchronize configurations to provide consistent packet forwarding
E.The two routed share the same IP address, and default gateway traffic is load-balanced between them
Correct Answer: AB
A.explicitly assign a link-local address
B.disable the EUI-64 bit process
C.enable SLAAC on an interface
D.configure a stateful DHCPv6 server on the network
Correct Answer: C
A.The switch port interface trust state becomes untrusted
B.The switch port remains administratively down until the interface is connected to another switch
C.Dynamic ARP inspection is disabled because the ARP ACL is missing
D.The switch port remains down until it is configured to trust or untrust incoming packets
Correct Answer: A
A.A spine switch and a leaf switch can be added with redundant connections between them
B.A spine switch can be added with at least 40 GB uplinks
C.A leaf switch can be added with connections to every spine switch
D.A leaf switch can be added with a single connection to a core spine switch
Correct Answer: C
A.Configure the version of SSH
B.Configure VTY access.
C.Create a user with a password
D.Assign a DNS domain name
Correct Answer: D