A. enable configure terminal ip nat pool mypool 192.168.3.1 192.168.3.3 prefix-length 30 route-map permit 10.10.0.0 255.255.255.0 ip nat outside destination list 1 pool mypool interface g1/1 ip nat inside interface g1/2 ip nat outside
B. enable configure terminal ip nat pool mypool 192.168.3.1 192.168.3.3 prefix-length 30 access-list 1 permit 10.10.0.0 0.0.0.255 ip nat outside destination list 1 pool mypool interface g1/1 ip nat inside interface g1/2 ip nat outside
C. enable configure terminal ip nat pool mypool 192.168.3.1 192.168.3.3 prefix-length 30 access-list 1 permit 10.10.0.0 0.0.0.255 ip nat inside source list 1 pool mypool interface g1/1 ip nat inside interface g1/2 ip nat outside
D. enable configure terminal ip nat pool mypool 192.168.3.1 192.168.3.3 prefix-length 30 access-list 1 permit 10.10.0.0 0.0.0.255 interface g1/1 ip nat inside interface g1/2 ip nat outside
Correct Answer: C
A. ip address 192.168.0.0 255.255.0.0
B. ip address 192.168.0.0 255.255.254.0
C. ip address 192.168.0.0 255.255.255.128
D. ip address 192.168.0.0 255.255.255.224
Correct Answer: B
A. firewall
B. switch
C. access point
D. wireless controller
Correct Answer: A
A. local port ID
B. lowest path cost to the root bridge
C. lowest neighbora's bridge ID
D. lowest neighbora's port ID
Correct Answer: B
A. eBGP
B. static
C. OSPF
D. EIGRP
Correct Answer: B
A. enable dynamic MAC address learning
B. implement static MAC addressing.
C. enable sticky MAC addressing
D. implement auto MAC address learning
Correct Answer: C
A. Switch(config)#spanning-tree vlan 750 priority 38003685
B. Switch(config)#spanning-tree vlan 750 root primary
C. Switch(config)#spanning-tree vlan 750 priority 614440
D. Switch(config)#spanning-tree vlan 750 priority 0
Correct Answer: D
A. configure the hello and dead timers to match on both sides
B. configure the same process ID for the router OSPF process
C. configure the same router ID on both routing processes
D. Configure the interfaces as OSPF active on both sides.
E. configure both interfaces with the same area ID
Correct Answer: AE
A. SMTP
B. SNMP
C. TCP
D. FTP
Correct Answer: B
A. learning
B. forwarding
C. blocking
D. listening
Correct Answer: B
A. builds a flat structure of DNS names for more efficient IP operations
B. encrypts network Traffic as it travels across a WAN by default
C. improves security by protecting IP addresses under Fully Qualified Domain Names (FQDNs)
D. enables applications to identify resources by name instead of IP address
E. allows a single host name to be shared across more than one IP address
Correct Answer: DE
A. TCP uses checksum, acknowledgement, and retransmissions, and UDP uses checksums only.
B. TCP uses retransmissions, acknowledgement and parity checks and UDP uses cyclic redundancy checks only.
C. TCP uses checksum, parity checks, and retransmissions, and UDP uses acknowledgements only.
D. TCP uses two-dimensional parity checks, checksums, and cyclic redundancy checks and UDP uses retransmissions only.
Correct Answer: A
A. collision
B. CRC
C. runt
D. late collision
Correct Answer: D
A. WSA
B. Firepower
C. ASA
D. FireSIGHT
Correct Answer: A
A. 1,6.11
B. 1,5,10
C. 1,2,3
D. 5,6,7
Correct Answer: A
A. worm
B. malware
C. DDoS
D. man-in-the-middle
Correct Answer: D
A. controller-based increases network bandwidth usage, while traditional lightens the load on the network.
B. controller-based inflates software costs, while traditional decreases individual licensing costs
C. Controller-based reduces network configuration complexity, while traditional increases the potential for errors
D. Controller-based provides centralization of key IT functions. While traditional requires distributes management function
E. controller-based allows for fewer network failure, while traditional increases failure rates.
Correct Answer: CD
A. data plane
B. control plane
C. policy plane
D. management plane
Correct Answer: B
A. broadband cable access
B. frame-relay packet switching
C. dedicated point-to-point leased line
D. Integrated Services Digital Network switching.
Correct Answer: A
A. There is a duplex mismatch
B. There is a speed mismatch
C. There is a protocol mismatch
D. The interface is shut down
E. The interface is error-disabled
Correct Answer: DE
A. global unicast
B. link-local
C. unique local
D. multicast
Correct Answer: A
A. access-list 100 deny tcp host 172.16.1.33 any eq 22 access-list 100 permit ip any any interface GigabitEthernet0/0 ip access-group 100 in
B. access-list 100 deny top host 172.16.1.33 any eq 22 access-list 100 permit ip any any line vty 0 15 access-class 100 in
C. access-list 100 deny tcp host 172.16.1.33 any eq 23 access-list 100 permit ip any any interface GigabitEthernet0/0 ip access-group 100 in
D. access-list 100 deny tcp host 172.16.1.33 any eq 23 access-list 100 permit ip any any line vty 0 15 access-class 100 in
Correct Answer: B
A. restricts unauthorized users from viewing clear-text passwords in the running configuration
B. encrypts the password exchange when a VPN tunnel is established
C. prevents network administrators from configuring clear-text passwords
D. protects the VLAN database from unauthorized PC connections on the switch
Correct Answer: A
A. Frames are sent to every port on the switch in the same VLAN except from the originating port
B. Frames are sent to every port on the switch that has a matching entry in the MAC address table.
C. Frames are sent to all ports, including those that are assigned to other VLANs.
D. Frames are sent to every port on the switch in the same VLAN.
Correct Answer: A
A. It allows directly connected neighbors to share configuration information.
B. It allows a router to use bridge priorities to create multiple loop-free paths to a single destination.
C. It reduces routing failures by allowing Layer 3 load balancing between OSPF neighbors that have the same link metric.
D. It reduces routing failures by allowing more than one router to represent itself, as the default gateway of a network.
Correct Answer: D
A. R(config)#interface ethernet0/0 R(config)#encapsulation dot1q 20 R(config)#ip address 10.20.20.1 255.255.255.0
B. R(config)#interface ethernet0/0.20 R(config)#encapsulation dot1q 20 R(config)#ip address 10.20.20.1 255.255.255.0
C. R(config)#interface ethernet0/0 R(config)#ip address 10.20.20.1 255.255.255.0
D. R(config)#interface ethernet0/0.20 R(config)#ip address 10.20.20.1 255.255.255.0
Correct Answer: B
A. Router2
B. Router3
C. Router4
D. Router5
Correct Answer: B
A. ipv6 route 2000::1/128 2012::2
B. ipv6 route 2000::3/128 2023::3
C. ipv6 route 2000::3/128 s0/0/0
D. ipv6 route 2000::1/128 s0/0/1
E. ipv6 route 2000::1/128 2012::1
Correct Answer: BE
A. 207.165.200.246 via Serial0/1/0
B. 207.165.200.254 via Serial0/0/0
C. 207.165 200.254 via Serial0/0/1
D. 207.165.200.250 via Serial0/0/0
Correct Answer: C
A. allows servers and workstations to communicate across public network boundaries
B. provides a reduction in size of the forwarding table on network routers
C. allows communication across the Internet to other private networks
D. provides an added level of protection against Internet exposure
Correct Answer: D
A. Add PDA to VLAN 10 and the File Server to VLAN 11 for VLAN segmentation
B. Add VLAN 13 to the trunk links on Switch A and Switch B for VLAN propagation
C. Add a router on a stick between Switch A and Switch B allowing for Inter VLAN routing
D. Add PC A to the same subnet as the File Server allowing for intra-VLAN communication
Correct Answer: B
A. 6
B. 8
C. 12
D. 18
Correct Answer: B
A. The switch rewrites the source and destination MAC addresses with its own
B. The source and destination MAC addresses remain the same
C. The source MAC address is changed
D. The destination MAC address is replaced with ffff.ffff.ffff
Correct Answer: B
A. switch#lldp port-description
B. switch(config)#lldp port-description
C. switch(config-line}#lldp port-description
D. switch(config-if)#lldp port-description
Correct Answer: B
A. S1
B. S2
C. S3
D. S4
Correct Answer: B
A. forwarding
B. backup
C. standby
D. listening
Correct Answer: C
A. The application requires the user to enter a PIN before it provides the second factor
B. the application challenges a user by requiring an administrator password to reactivate when the smartphone is rebooted
C. The application requires an aadministrator password to reactivate after a configured interval
D. The application verifies that the user is in a specific location before it provides the second factor
Correct Answer: A
A. modify priority
B. modify process ID
C. modify hello interval
D. modity network type
Correct Answer: C
A. R1(config)#username admin R1(config-if)#line vty 0 4 R1(config-line)#password p@ss1234
B. R1(config)#username admin R1(config-if)#line vty 0 4 R1(config-line)#password p@ss1234 R1(config-line)#transport input telnet
C. R1(config)#username admin secret p@ss1234 R1(config-if)#line vty 0 4 R1(config-line)#login local R1(config)#enable secret p@ss1234
D. R1(config)#username admin privilege 15 secret p@ss1234 R1(config-if)#line vty 0 4 R1(config-line)#login local
Correct Answer: D
A. Spanning tree may fail to detect a switching loop in the network that causes broadcast storms
B. VTP is allowed to propagate VLAN configuration information from switch to switch automatically
C. Root port choice and spanning tree recalculation are accelerated when a switch link goes down
D. After spanning tree converges PortFast shuts down any port that receives BPDUs.
Correct Answer: A
A. It sends packets out of interface Fa0/2 only.
B. It sends packets out of interface Fa0/1 only.
C. It cannot send packets to 10.10.13 128/25
D. It load-balances traffic out of Fa0/1 and Fa0/2
Correct Answer: C
A. default route
B. network route
C. host route
D. floating static route
Correct Answer: B
A. network route
B. floating static route
C. host route
D. default route
Correct Answer: D
A. 0000.5E00.010a
B. 0005.3711.0975
C. 0000.0C07.AC99
D. 0007.C070/AB01
Correct Answer: A
A. Devices establish an IPsec tunnel to exchange data with the controller
B. Devices use the call-home protocol to periodically send data to the controller.
C. Network devices use different services like SNMP, syslog, and streaming telemetry to send data to the controller.
D. The Cisco CLI Analyzer tool gathers data from each licensed network device .and streams it to the controller.
Correct Answer: C
A. point-to-multipoint
B. point-to-point
C. broadcast
D. nonbroadcast
Correct Answer: C
A. TCP is reliable and is a connectionless protocol; UDP is not reliable and is a connection-oriented protocol.
B. TCP is not reliable and is a connectionless protocol; UDP is reliable and is a connection-oriented protocol.
C. TCP is reliable and is a connection-oriented protocol; UDP is not reliable and is a connectionless protocol.
D. TCP is not reliable and is a connection-oriented protocol; UDP is reliable and is a connectionless protocol.
Correct Answer: C
A. Configure the ports in an EtherChannel.
B. Administratively shut down the ports
C. Configure the port type as access and place in VLAN 99
D. Configure the ports as trunk ports
E. Enable the Cisco Discovery Protocol
Correct Answer: BC
A. A network device has restarted
B. An ARP inspection has failed
C. A routing instance has flapped
D. A debug operation is running
Correct Answer: C