A.overlay
B.northbound
C.underlay
D.southbound
Correct Answer: D
A.Central AP management requires more complex configurations
B.Unique SSIDs cannot use the same authentication method
C.It supports autonomous and lightweight APs
D.It eliminates the need to configure each access point individually
Correct Answer: D
A.sniffer
B.mesh
C.flexconnect
D.local
Correct Answer: C
A.The floating static route must have a higher administrative distance than the primary route so it is used as a backup
B.The administrative distance must be higher on the primary route so that the backup route becomes secondary.
C.The floating static route must have a lower administrative distance than the primary route so it is used as a backup
D.The default-information originate command must be configured for the route to be installed into the routing table
Correct Answer: A
A.The distribution layer runs Layer 2 and Layer 3 technologies.
B.The network core is designed to maintain continuous connectivity when devices fail.
C.The core layer maintains wired connections for each host.
D.The core and distribution layers perform the same functions
E.The access layer manages routing between devices in different domains.
Correct Answer: AB
A.The seventh bit of original MAC address of the interface is inverted
B.The interface ID is configured as a random 64-bit value
C.The characters FE80 are inserted at the beginning of the MAC address of the interface
D.The MAC address of the interface is used as the interface ID without modification
Correct Answer: A
A.It manages routing between Layer 3 devices in a network
B.It coordinates user authentication between a network device and a TACACS+ or RADIUS server.
C.It sends information about MIB variables in response to requests from the NMS.
D.It requests information from remote network nodes about catastrophic system events.
Correct Answer: C
A.reduced operational costs
B.reduced hardware footprint
C.faster changes with more reliable results
D.fewer network failures
E.increased network security
Correct Answer: AC
A.interface GigabitEthernet0/0/1 Channel-group 10 mode active
B.interface GigabitEthernet0/0/1 Channel-group 10 mode auto
C.interface GigabitEthernet0/0/1 Channel-group 10 mode on
D.interface port-channel 10 no switchport ip address 172.16.0.1 255.255.255.0
E.interface port-channel 10 switchport Switchport mode trunk
Correct Answer: AD
A.enable secret
B.service password-encryption
C.username Cisco password encrypt
D.enable password
Correct Answer: B
A.route with the lowest cost
B.route with the shortest prefix length
C.route with the next hop that has the highest IP
D.route with the lowest administrative distance
Correct Answer: D
A.ntp master
B.ntp sever
C.ntp authenticate
D.ntp peer
Correct Answer: A
1. At the end of task, all EtherChannels between switches sw101, sw102, sw110 must be up and operational including all their physical member links.
2. Do not create new Port-Channel interfaces, reuse those that already exist on the switches.
3. When resolving existing issues, do not change the preconfigured negotiation protocol (if any). 4. On EtherChannels that use a negotiation protocol, tune its mode of operation for the shortest link bundling time possible.
Configure Spanning Tree Protocol on switches sw101, sw102, sw110 according to these requirements:
1. The STP root for VLAN 2000 must be sw101
2. The STP root for VLAN 2001 must be sw102
3. The roots must be elected based on bridge priority
4. On the three switches, have STP perform cost calculations in 32-bit arithmetic
5. On the three switches, use the Rapid STP version and ensure that it can achieve rapid
convergence on all interconnections between the switches.
6. On sw110, prevent all current and future access mode interface from being affected by the Proposal/Agreement process.
Solution
SW101:
sw101(config)#interface range gigabitEthernet 1/2-3
sw101(config-if-range)#Channel-group 1 mode on
sw101(config)# interface range gigabitEthernet 2/0-3
sw101(config-if-range)#channel-group 1 mode passive
sw101(config)#spanning-tree mode rapid-pvst
sw101(config)#spanning-tree vlan 2000 priority 0
sw101(config)#spanning-tree pathcost method long
SW102:
sw102(config)#interface range gigabitEthernet 1/2-3
sw102(config-if-range)#channel-group 2 mode active
sw102(config)#Spanning-tree mode rapid-pvst
sw102(config)#spanning-tree vlan 2001 priority 0
sw102(config)#spanning-tree pathcost method long
SW110:
sw110(config)#spanning-tree mode rapid-pvst
sw110(config)#spanning-tree portfast edge default
sw110(config)#spanning-tree pathcost method long
Verification
SW101:
A. when the sending device waits 15 seconds before sending the frame again
B. when the cable length limits are exceeded
C. when one side of the connection is configured for half-duplex
D. when Carner Sense Multiple Access/Collision Detection is used
E. when a collision occurs after the 32nd byte of a frame has been transmitted
Correct Answer: BC
A. It allows the traffic to pass through unchanged
B. It drops the traffic
C. It tags the traffic with the default VLAN
D. It tags the traffic with the native VLAN
Correct Answer: A
A. provides an added layer of security to protect from DDoS attacks
B. combines control and data plane functionality on a single device to minimize latency
C. moves from a two-tier to a three-tier network architecture to provide maximum redundancy
D. allows configuration and monitoring of the network from one centralized point
Correct Answer: D
A. TCP use the three-way handshake,and UDP dose no guarantee message delivery
B. TCP use synchronization packets,and UDP uses acknowledgement packets
C. UDP provides reliable message transfer,and TCP is a connectionless protocol.
D. UDP use SYN,SYN ACK,and FIN bits in the frame header while TCP uses SYN,SYN ACK,and ACK bis.
Correct Answer: A
A. Device(config)#lldp run
B. Device(config)#cdp run
C. Device(config)# cdp enable
D. Device(config)# flow-sampler-map topology
Correct Answer: A
A. CPU ACL
B. TACACS
C. Flex ACL
D. RADIUS
Correct Answer: A
A. IKEv2
B. IKEv1
C. IPsec
D. MD5
Correct Answer: C