A. ARP
B. DHCP
C. CDP
D. DNS
Correct Answer: B
A. ip access-list standard 99 Permit 10.100.100.0 0.0.0.255 Deny 192.168.0.0 0.0.255.255
B. ip access-list standard 99 Permit 10.100.100.0 0.0.0.255 Deny 192.168.0.0 0.255.255.255
C. ip access-list standard 100 Permit 10.100.100.0 0.0.0.255 Deny 192.168.0.0 0.255.255.255
D. ip access-list standard 100 Permit 10.100.100.0 0.0.0.255 Deny 192.168.0.0 0.0.255.255
Correct Answer: A
A. lt drops the frame immediately.
B. It forwards the frame back out of interface Fa0/1.
C. It floods the frame to all interfaces except Fa0/1.
D. It holds the frame until the MAC address timer expires and then drops the frame.
Correct Answer: C
A. The NMS software must be loaded with the MIB associated with the trap.
B. The NMS must be configured on the same router as the SNMP agent
C. The NMS must receive a trap and an inform message from the SNMP agent within a configured interval
D. The NMS must receive the same trap from two different SNMP agents to verify that it is reliable.
Correct Answer: A
A. Facilities communication between the controller and the applications
B. Facilities communication between the controller and the networking hardware
C. allows application developers to interact with the network
D. integrates a controller with other automation and orchestration tools.
Correct Answer: B
A. PortFast
B. BPDU guard
C. UplinkFast
D. BackboneFast
Correct Answer: C
A. latency
B. port security violation
C. shutdown command issued on the port
D. nothing plugged into the port
Correct Answer: B
A. Add the switch in the VTP domain with a lower revision number
B. Add the switch with DTP set to dynamic desirable
C. Add the switch in the VTP domain with a higher revision number
D. Add the switch with DTP set to desirable
Correct Answer: A
A. array
B. string
C. object
D. Boolean
Correct Answer: C
A. The wireless network becomes vulnerable to unauthorized access.
B. Wireless devices are unable to distinguish between different SSIDs
C. Users experience poor wireless network performance.
D. Network communications are open to eavesdropping.
Correct Answer: C
A. virtual routing and forwarding
B. network port ID visualization
C. virtual device contexts
D. server visualization
Correct Answer: D
A. CAR
B. CBWFQ
C. PQ
D. PBR
E. FRTS
Correct Answer: BC
A. switchport trunk allowed vlan 10
B. switchport trunk native vlan 10
C. switchport mode trunk
D. switchport trunk encapsulation dot1q
Correct Answer: B
A. It alternates automatically between 2.4 GHz and 5 GHz on adjacent access points
B. It allows the administrator to assign channels on a per-device or per-interface basis.
C. It segregates devices from different manufacturers onto different channels.
D. It analyzes client load and background noise and dynamically assigns a channel.
Correct Answer: A
A. VTP
B. DTP
C. egress traffic
D. ingress traffic
Correct Answer: D
A. policy plane
B. management plane
C. control plane
D. data plane
Correct Answer: C Section: choice Explanation
A. initiates a ping request to the URL
B. prompts the user to specify the desired IP address
C. continuously attempts to resolve the URL until the command is cancelled
D. sends a broadcast message in an attempt to resolve the URL
Correct Answer: D
A. Switch 1
B. Switch 2
C. Switch 3
D. Switch 4
Correct Answer: B
A. a list of statically assigned MAC addresses
B. a list of the available IP addresses in a pool
C. a list of public IP addresses and their corresponding names
D. usernames and passwords for the end users in a domain
Correct Answer: B
A. BPDU filter
B. Backbonefast
C. BPDU guard
D. PortFast
Correct Answer: D
A. DNS server pings the destination to verify that it is available
B. serves requests over destination port 53
C. DNS server forwards the client to an alternate IP address when the primary IP is down
D. responds to a request for IP address to domain name resolution to the DNS server
Correct Answer: D
A. Switch trunk allowed vlan 12
B. Switchport trunk allowed vlan none
C. Switchport trunk allowed vlan add 13
D. Switchport trunk allowed vlan remove 10-11
Correct Answer: C
A. connects each switch to every other switch in the network
B. enables multiple users to share a single broadband connection
C. provides high throughput access for 1000 or more users
D. includes at least three tiers of devices to provide load balancing and redundancy
Correct Answer: B
A. disk
B. applications
C. VM configuration file
D. operating system
Correct Answer: A
A. WPA2 + AES
B. WPA + AES
C. WEP
D. WPA + TKIP
Correct Answer: A
A. Use the Ixml library to parse the data returned by the NETCONF server for the interfacea??s configuration.
B. Create an XML filter as a string and pass it to get_config() method as an argument.
C. Create a JSON filter as a string and pass it to the get_config() method as an argument.
D. Use the JSON library to parse the data returned by the NETCONF server for the interfacea??s configuration.
Correct Answer: D
A. on the public-facing interface of a firewall
B. to allow hosts inside to communicate in both directions with hosts outside the organization
C. on internal hosts that stream data solely to external resources
D. on hosts that communicates only with other internal hosts
Correct Answer: D
A. Layer 2 forwarding
B. coordinating VTNs
C. tracking hosts
D. managing the topology
E. protecting against DDoS attacks
Correct Answer: BD
A. The new frame is delivered first, the previous frame is dropped, and a retransmission request is sent.
B. The previous frame is delivered, the new frame is dropped, and a retransmission request is sent.
C. The new frame is placed in a queue for transmission after the previous frame.
D. The two frames are processed and delivered at the same time.
Correct Answer: C Section: choice Explanation
A. Router2(config)#ntp passive
B. Router2(config)#ntp server 172.17.0.1
C. Router2(config)#ntp master 4
D. Router2(config)#ntp server 192.168.0.2
Correct Answer: C
A. partial mesh
B. full mesh
C. point-to-point
D. hub-and-spoke
Correct Answer: C
A. The frame has zero destination MAC addresses.
B. The source MAC address of the frame is unknown
C. The source and destination MAC addresses of the frame are the same
D. The destination MAC address of the frame is unknown.
Correct Answer: D
A. 802.1q trunks
B. Cisco vPC
C. LLDP
D. LACP
Correct Answer: D
A. There is limited unique address space, and traffic on the new subnet will stay local within the organization.
B. The network has multiple endpoint listeners, and it is desired to limit the number of broadcasts.
C. Traffic on the subnet must traverse a site-to-site VPN to an outside organization.
D. The ISP requires the new subnet to be advertised to the internet for web services.
Correct Answer: A
A. listening
B. blocking
C. forwarding
D. learning
E. speaking
Correct Answer: CD
A. forwarding
B. listening
C. blocking
D. learning
Correct Answer: A
A. Add the access-list 10 permit any command to the configuration
B. Remove the access-class 10 in command from line vty 0.4.
C. Add the ip access-group 10 out command to interface g0/0.
D. Remove the password command from line vty 0 4.
Correct Answer: A
A. centralize the management of access points in an enterprise network
B. support standalone or controller-based architectures
C. serve as the first line of defense in an enterprise network
D. provide secure user logins to devices on the network.
Correct Answer: A
A. No router ID is set, and the OSPF protocol does not run.
B. The highest up/up physical interface IP address is selected as the router ID.
C. The lowest IP address is incremented by 1 and selected as the router ID.
D. The router ID 0.0.0.0 is selected and placed in the OSPF process.
Correct Answer: B
A. group access points together to increase throughput on a given channel
B. configure the first three access points are configured to use Channels 1, 6, and 11
C. include a least two access points on nonoverlapping channels to support load balancing
D. assign physically adjacent access points to the same Wi-Fi channel
Correct Answer: B
A. action
B. management
C. control
D. data
Correct Answer: B
A. wireless to an access point that is physically connected to the network
B. a cable connected to a physical switch on the network
C. a virtual switch that links to an access point that is physically connected to the network
D. a software switch on a hypervisor that is physically connected to the network
Correct Answer: D
A. read
B. update
C. create
D. delete
Correct Answer: A
A. Accept-Encoding: gzip. deflate
B. Accept-Patch: text/example; charset=utf-8
C. Content-Type: application/json; charset=utf-8
D. Accept: application/json
Correct Answer: D
A. wireless access point
B. firewall
C. wireless LAN controller
D. router
Correct Answer: B
A. It forwards it out G0/3 only
B. It is flooded out every port except G0/0.
C. It drops the frame
D. It forwards it out interface G0/2 only.
Correct Answer: B
A. access-list 101 permit tcp 10.1.10 0.0.0.255 172.16.10 0.0.0.255 eq ssh
B. access-list 101 permit tcp 10.11.0 0.0.0.255 172.16.10 0.0.0.255 eq scp
C. access-list 101 permit tcp 10.11.0 0.0.0.255 172.16.10 0.0.0.255 eq telnet
D. access-list 101 permit tcp 10.1.10 0.0.0.255 172.16.10 0.0.0.255 eq https
Correct Answer: A
A. a DHCP Relay Agent
B. DHCP Binding
C. a DHCP Pool
D. DHCP Snooping
Correct Answer: A
A. TACACS server
B. wireless access point
C. RADIUS server
D. wireless LAN controller
Correct Answer: D
A. The port transitions to STP blocking
B. The port transitions to the root port
C. The port immediately transitions to STP forwarding.
D. The port goes into error-disable state
Correct Answer: D