A. It load-balances traffic by assigning the same metric value to more than one route to the same destination in the IP routing table.
B. It load-balances Layer 2 traffic along the path by flooding traffic out all interfaces configured with the same VLAN.
C. It forwards multiple packets to the same destination over different routed links n the data path
D. It uses a shared virtual MAC and a virtual IP address to a group of routers that serve as the default gateway for hosts on a LAN
Correct Answer: D
A. 2000::/3
B. FC00::/7
C. FE80::/10
D. FF00::/12
Correct Answer: D
A. communicates between the controller and the physical network hardware
B. reports device errors to a controller
C. generates statistics for network hardware and traffic
D. facilitates communication between the controller and the applications
Correct Answer: D
A. The phone and a workstation that is connected to the phone do not have VLAN connectivity
B. The phone and a workstation that is connected to the phone send and receive data in VLAN 50.
C. The phone sends and receives data in VLAN 50, but a workstation connected to the phone has no VLAN connectivity
D. The phone sends and receives data in VLAN 50, but a workstation connected to the phone sends and receives data in VLAN 1
Correct Answer: D
A. 209.165.200.0/27
B. 10.10.10.0/28
C. 0.0.0.0/0
D. 10.10.13.0/24
Correct Answer: C
A. DHCP client
B. PC
C. router
D. access point
Correct Answer: D
A. R1(config)# interface fa0/0 R1(config-if)#ip address dhcp R1(config-if)# no shutsown
B. R1(config)# interface fa0/0 R1(config-if)#ip helper-address 192.0.2.2
C. R2(config)# interface gi0/0 R2(config-if)#ip address dhcp
D. R1(config)# interface fa0/0 R1(config-if)#ip helper-address 198.51.100.100
E. R2(config)# interface gi0/0 R2(config-if)#ip helper-address 198.51.100.100
Correct Answer: AE
A. It automatically provides a second authentication factor that is unknown to the original user.
B. It uses an internal firewall to protect the password repository from unauthorized access.
C. It protects against keystroke logging on a compromised device or web site.
D. It stores the password repository on the local workstation with built-in antivirus and anti-malware functionality
E. It encourages users to create stronger passwords.
Correct Answer: CE
A. 5GHz provides increased network capacity with up to 23 nonoveriapping channels.
B. For maximum throughput, the WLC is configured to dynamically set adjacent access points to the same channel.
C. 5GHz channel selection requires an autonomous access point.
D. Adjacent cells with overlapping channels use a repeater access point.
E. Cells that overlap one another are configured to use nonoveriapping channels.
Correct Answer: BE
A. 10.10.1.10
B. 10.10.10.20
C. 172.16.15.10
D. 192.168.0.1
Correct Answer: C
A. outside global
B. outside local
C. inside global
D. inside local
E. outside public
F. inside public
Correct Answer: C
A. It only supports auto-discovery of network elements in a green field deployment.
B. It modular design allows someone to implement different versions to meet the specific needs of an organization
C. It abstracts policy from the actual device configuration
D. It does not support high availability of management functions when operating in cluster mode
Correct Answer: C
A. OpenFlow
B. NETCONF
C. Thrift
D. CORBA
E. DSC
Correct Answer: AB
A. All ARP packets are dropped by the switch
B. Egress traffic is passed only if the destination is a DHCP server.
C. All ingress and egress traffic is dropped because the interface is untrusted
D. The switch discard all ingress ARP traffic with invalid MAC-to-IP address bindings.
Correct Answer: D
A. The DHCP client maintains a pool of IP addresses it can assign
B. The DHCP server assigns IP addresses without requiring the client to renew them.
C. The DHCP client can request up to four DNS server addresses.
D. The DHCP server offers the ability to exclude specific IP addresses from a pool of IP addresses
E. The DHCP server leases client IP addresses dynamically
Correct Answer: DE
A. TKIP with RC4
B. RC4
C. AES-128
D. AES-256
Correct Answer: D
A. The access point must not be connected to the wired network, as it would create a loop
B. The access point must directly connect to the WLC using a copper cable.
C. The access point must be connected to the same switch as the WL
C.
D. The access point has the ability to link to any switch in the network, assuming connectivity to the WL
C.
Correct Answer: D
A. The frame is dropped
B. The frame is processed in VLAN 5
C. The frame is processed in VLAN 11
D. The frame is processed in VLAN 1
Correct Answer: B
A. To pass client traffic two or more ports must be configured.
B. The EtherChannel must be configured in "mode active"
C. When enabled the WLC bandwidth drops to 500 Mbps
D. One functional physical port is needed to pass client traffic
Correct Answer: D
A. IS-IS
B. RIP
C. Internal EIGRP
D. OSPF
Correct Answer: C
A. management interface settings
B. QoS settings
C. Ip address of one or more access points
D. SSID
E. Profile name
Correct Answer: DE
A. to route traffic differently based on the source IP of the packet
B. to enable fallback static routing when the dynamic routing protocol fails
C. to automatically route traffic on a secondary path when the primary path goes down
D. to control the return path of traffic that is sent from the router
E. to support load balancing via static routing
Correct Answer: BC
A. ARP
B. SNMP
C. SMTP
D. CDP
Correct Answer: B
A. YAML
B. JSON
C. EBCDIC
D. SGML
E. XML
Correct Answer: BE
A. Exchange
B. 2-way
C. Full
D. Init
Correct Answer: C
A. Configure the ipv6 route 2012::/126 2023::1 command on the Washington router
B. Configure the ipv6 route 2023::/126 2012::1 command on the Atlanta router.
C. Configure the Ipv6 route 2012::/126 s0/0/0 command on the Atlanta router
D. Configure the ipv6 route 2023::/126 2012::2 command on the Atlanta router
E. Configure the ipv6 route 2012::/126 2023::2 command on the Washington router
Correct Answer: DE
A. adapters that support all families of Cisco IOS software
B. SDKs that support interaction with third-party network equipment
C. customized versions for small, medium, and large enterprises
D. REST APIs that allow for external applications to interact natively with Cisco DNA Center
E. modular design that is upgradable as needed
Correct Answer: BD
A. It processes VTP updates from any VTP clients on the network on its access ports.
B. It receives updates from all VTP servers and forwards all locally configured VLANs out all trunk ports
C. It forwards only the VTP advertisements that it receives on its trunk ports.
D. It transmits and processes VTP updates from any VTP Clients on the network on its trunk ports
Correct Answer: C
A. autonomous
B. lightweight
C. bridge
D. mobility express
Correct Answer: B
A. cost
B. administrative distance
C. metric
D. as-path
Correct Answer: C
A. The OSPF router IDs are mismatched.
B. Router2 is using the default hello timer.
C. The network statement on Router1 is misconfigured.
D. The OSPF process IDs are mismatched
Correct Answer: B
A. TCP does not guarantee delivery or error checking to ensure that there is no corruption of data; UDP provides message acknowledgement and retransmits data if lost.
B. TCP provides flow control to avoid overwhelming a receiver by sending too many packets at once; UDP sends packets to the receiver in a continuous stream without checking for sequencing.
C. TCP uses windowing to deliver packets reliably; UDP provides reliable message transfer between hosts by establishing a three-way handshake
D. TCP is a connectionless protocol that does not provide reliable delivery of data; UDP is a connection-oriented protocol that uses sequencing to provide reliable delivery.
Correct Answer: B
A. 0
B. 110
C. 38443
D. 3184439
Correct Answer: C
A. ip route 10.10.1.0 255.255.255.240 10.10.255.1
B. ip route 10.10.1.20 255.255.255.252 10.10.255.1
C. ip route 10.10.1.20 255.255.255.254 10.10.255.1
D. ip route 10.10.1.16 255.255.255.252 10.10.255.1
Correct Answer: B
A. Physical access control
B. Social engineering attack
C. brute force attack
D. user awareness
Correct Answer: D
A. set the default network as 20.20.20.0/24
B. configure a static route with Fa0/1 as the egress interface to reach the 20.20.20.0/24 network
C. set the default gateway as 20.20.20.2
D. configure a static route with 10.10.10.2 as the next hop to reach the 20.20.20.0/24 network
Correct Answer: D
A. The trunk does not form and the ports go into an err-disabled status.
B. The trunk forms but the mismatched native VLANs are merged into a single broadcast domain.
C. The trunk does not form, but VLAN 99 and VLAN 999 are allowed to traverse the link.
D. The trunk forms but VLAN 99 and VLAN 999 are in a shutdown state.
Correct Answer: B
A. 2000::/3
B. FC00::/7
C. FE80::/10
D. FF00::/8
Correct Answer: D
A. The link is in a downstate.
B. The link is in an error disables state
C. The link is becomes an access port.
D. The link becomes a trunk port.
Correct Answer: D
A. show ip route
B. show ip interface
C. show interface
D. show cdp neighbor
Correct Answer: D
A. It ignores the new static route until the existing OSPF default route is removed
B. It immediately replaces the existing OSPF route in the routing table with the newly configured static route
C. It starts load-balancing traffic between the two default routes
D. It starts sending traffic without a specific matching entry in the routing table to Gigabit Ethernet0/1
Correct Answer: A
A. 10.10.225.48 255.255.255.240
B. 10.10.225.32 255.255.255.240
C. 10.10.225.48 255.255.255.224
D. 10.10.225.32 255.255.255.224
Correct Answer: D
A. WEP
B. RC4
C. AES
D. TKIP
Correct Answer: C
A. ipv6 address dhcp
B. ipv6 address 2001:DB8:5:112::/64 eui-64
C. ipv6 address autoconfig
D. ipv6 address 2001:DB8:5:112::2/64 link-local
Correct Answer: C
A. 192.168.0.0/25 as summary and 192.168.0.0/27 for each floor
B. 192.168.0.0/26 as summary and 192.168.0.0/29 for each floor
C. 192.168.0.0/24 as summary and 192.168.0.0/28 for each floor
D. 192.168.0.0/23 as summary and 192.168.0.0/25 for each floor
Correct Answer: A
A. It uses the bandwidth and delay values of the path to calculate the route metric.
B. It uses a default metric of 10 for all routes that are learned by the router
C. It counts the number of hops between the receiving and destination routers and uses that value as the metric.
D. It uses a reference bandwidth and the actual bandwidth of the connected link to calculate the route metric.
Correct Answer: A
A. ASCII
B. base64
C. binary
D. decimal
E. hexadecimal
Correct Answer: AE
A. Authentication verifies a username and password, and authorization handles the communication between the authentication agentand the user database
B. Authentication identifies a user who is attempting to access a system, and authorization validates the users password
C. Authentication identifies and verifies a user who is attempting to access a system, and authorization controls the tasks the user canperform.
D. Authentication controls the system processes a user can access and authorization logs the activities the user initiates
Correct Answer: C
A. R2 is using the passive-interface default command
B. R1 has an incorrect network command for interface Gi1/0
C. R2 should have its network command in area 1
D. R1 interface Gi1/0 has a larger MTU size
Correct Answer: D
A. uses predefined tags or angle brackets () to delimit markup text
B. used to describe structured data that includes arrays
C. used for storing information
D. similar to HTML, it is more verbose than XML
Correct Answer: B