A. interface e0/0 description to HQ-A370:98968 ip address 10.2.1.3 255.255.255.252
B. interface e0/0 description to HQ-A370:98968 ip address 192.168.1.1 255.255.255.248
C. interface e0/0 description to HQ-A370:98968 ip address 172.16.1.4 255.255.255.248
D. interface e0/0 description to HQ-A370:98968 ip address 209.165.201.2 255.255.255.252
Correct Answer: D
A. sniffer
B. mesh
C. flexconnect
D. local
Correct Answer: C
A. passive
B. mode on
C. auto
D. active
Correct Answer: D
A. TKIP encryption
B. SAE encryption
C. AES encryption
D. scrambled encryption key
Correct Answer: B
A. Traffic to 10.10.13.0.25 is load balanced out of multiple interfaces
B. Route 10.10.13.0/25 is updated in the routing table as being learned from interface Gi0/1.
C. Traffic to 10.10.13.0/25 is a symmetrical
D. Route 10.10.13.0/25 learned via the Gi0/0 interface remains in the routing table
Correct Answer: D
A. It selects the EIGRP route because it has the lowest administrative distance
B. It selects the RIP route because it has the longest prefix inclusive of the destination address
C. It selects the OSFP route because it has the lowest cost
D. It selects the IS-IS route because it has the shortest prefix inclusive of the destination address
Correct Answer: B
A. The router calculates the reported distance by multiplying the delay on the exiting Interface by 256.
B. The router calculates the best backup path to the destination route and assigns it as the feasible successor.
C. The router calculates the feasible distance of all paths to the destination route
D. The advertised distance is calculated by a downstream neighbor to inform the local router of the bandwidth on the link
E. The router must use the advertised distance as the metric for any given route
Correct Answer: BC
A. TACACS+ encrypts only password information and RADIUS encrypts the entire payload
B. RADIUS logs all commands that are entered by the administrator, but TACACS+ logs only start, stop, and interim commands
C. RADIUS is most appropriate for dial authentication, but TACACS+ can be used for multiple types of authentication
D. TACACS+ separates authentication and authorization, and RADIUS merges them
Correct Answer: D
A. It selects RIP route because it has the longest prefix inclusive of the destination address
B. It chooses the EIGRP route because it has the lowest administrative distance
C. It load-balances traffic between all three routes
D. It chooses the OSPF route because it has the longest prefix inclusive of the destination address
Correct Answer: A
A. Device(config)#lldp run
B. Device(config)#cdp run
C. Device(config)# cdp enable
D. Device(config)# flow-sampler-map topology
Correct Answer: A
A. CPU ACL
B. TACACS
C. Flex ACL
D. RADIUS
Correct Answer: A
A. IKEv2
B. IKEv1
C. IPsec
D. MD5
Correct Answer: C
A. TCP use the three-way handshake,and UDP dose no guarantee message delivery
B. TCP use synchronization packets,and UDP uses acknowledgement packets
C. UDP provides reliable message transfer,and TCP is a connectionless protocol.
D. UDP use SYN,SYN ACK,and FIN bits in the frame header while TCP uses SYN,SYN ACK,and ACK bis.
Correct Answer: A
A. when the sending device waits 15 seconds before sending the frame again
B. when the cable length limits are exceeded
C. when one side of the connection is configured for half-duplex
D. when Carner Sense Multiple Access/Collision Detection is used
E. when a collision occurs after the 32nd byte of a frame has been transmitted
Correct Answer: BD
A. It allows the traffic to pass through unchanged
B. It drops the traffic
C. It tags the traffic with the default VLAN
D. It tags the traffic with the native VLAN
Correct Answer: A
A. The interface is not participating in OSPF
B. A point-to-point network type is configured
C. The default Hello and Dead timers are in use
D. There are six OSPF neighbors on this interface
Correct Answer: C
A. provides an added layer of security to protect from DDoS attacks
B. combines control and data plane functionality on a single device to minimize latency
C. moves from a two-tier to a three-tier network architecture to provide maximum redundancy
D. allows configuration and monitoring of the network from one centralized point
Correct Answer: D
A. The floating static route must have a higher administrative distance than the primary route so it is used as a backup
B. The administrative distance must be higher on the primary route so that the backup route becomes secondary.
C. The floating static route must have a lower administrative distance than the primary route so it is used as a backup
D. The default-information originate command must be configured for the route to be installed into the routing table
Correct Answer: A
A. on
B. auto
C. active
D. desirable
Correct Answer: A
A. The distribution layer runs Layer 2 and Layer 3 technologies.
B. The network core is designed to maintain continuous connectivity when devices fail.
C. The core layer maintains wired connections for each host.
D. The core and distribution layers perform the same functions
E. The access layer manages routing between devices in different domains.
Correct Answer: AB
A. it belongs to a private IP address range
B. the router dose not support /28 mask
C. it is a network IP address
D. it is a broadcast IP address
Correct Answer: D
A. The seventh bit of original MAC address of the interface is inverted
B. The interface ID is configured as a random 64-bit value
C. The characters FE80 are inserted at the beginning of the MAC address of the interface
D. The MAC address of the interface is used as the interface ID without modification
Correct Answer: A
A. It manages routing between Layer 3 devices in a network,
B. It coordinates user authentication between a network device and a TACACS+ or RADIUS server.
C. It sends information about MIB variables in response to requests from the NMS.
D. It requests information from remote network nodes about catastrophic system events.
Correct Answer: C
A. Add the default-information originate command on R2
B. Add the always keyword to the default-information originate command on R1
C. Configure the ip route 0.0.0.0 0.0.0.0 10.10.10.18 command on R1
D. Configure the ip route 0.0.0.0 0.0.0.0 10.10.10.2 command on R2
Correct Answer: C
A. reduced operational costs
B. reduced hardware footprint
C. faster changes with more reliable results
D. fewer network failures
E. increased network security
Correct Answer: AC
A. interface GigabitEthernet0/0/1 Channel-group 10 mode active
B. interface GigabitEthernet0/0/1 Channel-group 10 mode auto
C. interface GigabitEthernet0/0/1 Channel-group 10 mode on
D. interface port-channel 10 no switchport ip address 172.16.0.1 255.255.255.0
E. interface port-channel 10 switchport Switchport mode trunk
Correct Answer: AD
A. enable secret
B. service password-encryption
C. username Cisco password encrypt
D. enable password
Correct Answer: B
A. route with the lowest cost
B. route with the shortest prefix length
C. route with the next hop that has the highest IP
D. route with the lowest administrative distance
Correct Answer: D
A. 172.9.0.0/16
B. 172.28.0.0/16
C. 192.0.0.0/18
D. 209.165.201.0/24
Correct Answer: B
A. dual algorithm
B. metric
C. administrative distance
D. hop count
Correct Answer: C
A. ntp master
B. ntp sever
C. ntp authenticate
D. ntp peer
Correct Answer: A
A. ipv6 address 2001:db8::700:3:400F:572B
B. ipv6 address 2001:db8:0::700:3:4F:572B
C. ipv6 address 2001:0db8::7:3:4F:572B
D. ipv6 address 2001::db8:0000::700:3:400F:572B
Correct Answer: A Section: (none)Explanation
A. redundancy
B. console
C. distribution system
D. service
Correct Answer: C Section: (none)Explanation
A. logging trap 5
B. logging trap 2
C. logging trap 4
D. logging trap 3
Correct Answer: C Section: (none)Explanation
A. RADIUS
B. TACACS+
C. SCP
D. Telnet
E. SSH
Correct Answer: DE Section: (none)Explanation
A. #config tRouter A(config)#cdp run Router A(config)#interface gi0/0/0Router A(config-if)#no cdp enable
B. #config tRouter A(config)#cdp run Router A(config)#interface gi0/0/0Router A(config-if)#cdp enable
C. #config tRouter A(config)#cdp run Router A(config)#interface gi0/0/1Router A(config-if)#cdp enable
D. #config tRouter A(config)#no cdp run Router A(config)#interface gi0/0/1Router A(config-if)#cdp enable
Correct Answer: A Section: (none)Explanation
A. It improve network availability by providing redundant gateways
B. It passes configuration information to host in a TCP/IP network
C. It provides a mechanism for diskless clients to autoconfigure their IP parameters during boot
D. It helps hosts on the network to reach remote subnets without a default gateway
E. It groups two or more routers to operate as one virtual router
Correct Answer: AE Section: (none)Explanation
A. They are case sensitive
B. They define the VLAN on a switch
C. They must include one number and one letter
D. They are a Cisco proprietary security feature
Correct Answer: A Section: (none)Explanation
A. console
B. service
C. management
D. redundant
E. redundant
Correct Answer: AB Section: (none)Explanation
A. It is used to request contextual help about the API usage
B. It permits the server to disregard the protocol specified,with allows the server to use any protocols
C. It prevent the sever from sending any errors in the answer
D. It precedes the query parameters when performing a GET request
Correct Answer: D Section: (none)Explanation
A. password-encrypt
B. enable password-encryption
C. enable secret
D. service password-encryption
Correct Answer: D Section: (none)Explanation
A. allows access restrictions to be implemented between subscriber sites.
B. provides direct connections between subscribers
C. supports Layer 2 VPNs
D. supports application optimization
Correct Answer: B Section: (none)Explanation
A. Filter traffic based on destination IP addressing
B. Sends the default route to the hosts on a network
C. ensures a loop-free physical topology
D. forwards multicast hello messages between routers
Correct Answer: D Section: (none)Explanation
A. DHCP
B. STP
C. SNMP
D. DNS
Correct Answer: A Section: (none)Explanation
A. FIFO
B. WFQ
C. PQ
D. WRED
Correct Answer: C Section: (none)Explanation
A. DHCP relay agent
B. DHCP server
C. DHCPDISCOVER
D. DHCPOFFER
Correct Answer: A Section: (none)Explanation
A. Telnet
B. SSH
C. HTTP
D. HTTPS
E. TFTP
Correct Answer: AC Section: (none)Explanation
A. enable dynamic ARP inspection
B. manually implement trunk ports and disable DTP
C. activate all ports and place in the default VLAN
D. configure extended VLANs
Correct Answer: B Section: (none)Explanation
A. After the cable is connected, the interface uses the fastest speed setting available for that cable type
B. After the cable is connected, the interface is available faster to send and receive user data
C. The frames entering the interface are marked with higher priority and then processed faster by a switch.
D. Real-time voice and video frames entering the interface are processed faster
Correct Answer: B Section: (none)Explanation
A. Forwards packets based on stateless packet inspection
B. Processes unauthorized packets and allows passage to less secure segments of the network
C. determines which packets are allowed to cross from unsecured to secured networks
D. explicitly denies all packets from entering an administrative domain
Correct Answer: C Section: (none)Explanation