A. Configure the version of SSH
B. Configure VTY access.
C. Create a user with a password.
D. Assign a DNS domain name
Correct Answer: D
A. 1.544 Mbps
B. 2.048 Mbps
C. 34.368 Mbps
D. 43.7 Mbps
Correct Answer: A
A. intrusion detection
B. user awareness
C. physical access control
D. network authorization
Correct Answer: C
A.different nonoverlapping channels
B.different overlapping channels
C.one overlapping channel
D.one nonoverlapping channel
Correct Answer: A
A.read
B.create
C.replace
D.update
Correct Answer: D
A.a workstation that requests a domain name associated with its IP address
B.a host that is configured to request an IP address automatically
C.a server that dynamically assigns IP addresses to hosts.
D.a router that statically assigns IP addresses to hosts.
Correct Answer: B
A.They support an inline optical attenuator to enhance signal strength
B.They provide minimal interruption to services by being hot-swappable
C.They offer reliable bandwidth up to 100 Mbps in half duplex mode
D.They accommodate single-mode and multi-mode in a single module
Correct Answer: B
A.configure IEEE 802.1p
B.configure IEEE 802.1q
C.configure ISL
D.configure DSCP
Correct Answer: B
A.HTTPS
B.RADIUS
C.TACACS+
D.HTTP
Correct Answer: A
A.management plane
B.control plane
C.policy plane
D.data plane
Correct Answer: D
A.FIFO
B.LLC
C.CBWFQ
D.RSVP
E.WFQ
Correct Answer: CE
A.Chef
B.Python
C.Puppet
D.Ansible
Correct Answer: D
A.in the MAC address table
B.in the CAM table
C.in the binding database
D.in the frame forwarding database
Correct Answer: C
A.spanning -tree vlan 200 priority 614440
B.spanning -tree vlan 200 priority 0
C.spanning -tree vlan 200 priority 38572422
D.spanning -tree vlan 200 root primary
Correct Answer: B
A.ip helper-address
B.ip address dhcp
C.ip dhcp pool
D.ip dhcp relay
Correct Answer: A
A.relay agent information
B.address pool
C.smart-relay
D.database agent
E.manual bindings
Correct Answer: BE
A.The CAM table is empty until ingress traffic arrives at each port
B.Switches dynamically learn MAC addresses of each connecting CAM table.
C.The ports are restricted and learn up to a maximum of 10 dynamically-learned addresses
D.It requires a minimum number of secure MAC addresses to be filled dynamically
Correct Answer: A
A.SNMP
B.DNS lookup
C.syslog
D.NTP
Correct Answer: B
A.802.1x
B.IP Source Guard
C.MAC Authentication Bypass
D.802.11n
Correct Answer: A
A.ip route 209.165.201.0 255.255.255.224 209.165.202.130
B.ip route 0.0.0.0 0.0.0.0 209.165.200.224
C.ip route 209.165.200.224 255.255.255.224 209.165.202.129 254
D.ip route 0.0.0.0 0.0.0.0 209.165.202.131
Correct Answer: C
A.to analyze traffic and drop unauthorized traffic from the Internet
B.to transmit wireless traffic between hosts
C.to pass traffic between different networks
D.forward traffic within the same broadcast domain
Correct Answer: C
A.switchport mode trunk
B.switchport mode dynamic desirable
C.switchport mode dynamic auto
D.switchport nonegotiate
Correct Answer: B
A.transfers a backup configuration file from a server to a switch using a username and password
B.transfers files between file systems on a router
C.transfers a configuration files from a server to a router on a congested link
D.transfers IOS images from a server to a router for firmware upgrades
Correct Answer: D
A.broadband cable access
B.frame-relay packet switching
C.dedicated point-to-point leased line
D.Integrated Services Digital Network switching.
Correct Answer: A
A.internal BGP route
B./24 route of a locally configured IP
C.statically assigned route
D.route learned through EIGRP
Correct Answer: D
A.asychronous routing
B.single-homed branches
C.dual-homed branches
D.static routing
E.static routing
Correct Answer: AC
A.enable AAA override
B.enable RX-SOP
C.enable DTIM
D.enable Band Select
Correct Answer: D
A.ISATAP
B.GRE over iPsec
C.iPsec over ISATAP
D.GRE
Correct Answer: B
A.applying security policies
B.attaching users to the edge of the network
C.enforcing routing policies
D.making interesting traffic for data policies
Correct Answer: C
A.runs applications that send and retrieve data for workstations that make requests
B.handles requests from multiple workstations at the same time
C.housed solely in a data center that is dedicated to a single client
D.achieves redundancy by exclusively using virtual server clustering
E.runs the same operating system in order to communicate with other servers
Correct Answer: AB
A.shut down unused ports
B.configure static ARP entries
C.enable the PortFast feature on ports
D.implement port-based authentication
E.configure ports to a fixed speed
Correct Answer: AD
A.Ensure timely data transfer between layers.
B.Provide uninterrupted forwarding service
C.Inspect packets for malicious activity.
D.Police traffic that is sent to the edge of the network.
E.Provide direct connectivity for end user devices
Correct Answer: BC
A.to provide fair queuing for buffered flows
B.to mitigate delays over slow links
C.to limit the bandwidth that a flow can use
D.to be a marking mechanism that identifies different flows
Correct Answer: A
A.local port ID
B.lowest path cost to the root bridge
C.lowest neighbor??s bridge ID
D.lowest neighbor??s port ID
Correct Answer: B
A.Switch(config)#spanning-tree vlan 750 priority 38003685
B.Switch(config)#spanning-tree vlan 750 root primary
C.Switch(config)#spanning-tree vlan 750 priority 614440
D.Switch(config)#spanning-tree vlan 750 priority 0
Correct Answer: D
A.SMTP
B.SNMP
C.TCP
D.FTP
Correct Answer: B
A.learning
B.forwarding
C.blocking
D.listening
Correct Answer: B
A.builds a flat structure of DNS names for more efficient IP operations
B.encrypts network Traffic as it travels across a WAN by default
C.improves security by protecting IP addresses under Fully Qualified Domain Names (FQDNs)
D.enables applications to identify resources by name instead of IP address
E.allows a single host name to be shared across more than one IP address
Correct Answer: DE
A.TCP uses checksum, acknowledgement, and retransmissions, and UDP uses checksums only.
B.TCP uses retransmissions, acknowledgement and parity checks and UDP uses cyclic redundancy checks only.
C.TCP uses checksum, parity checks, and retransmissions, and UDP uses acknowledgements only.
D.TCP uses two-dimensional parity checks, checksums, and cyclic redundancy checks and UDP uses retransmissions only.
Correct Answer: A
A.WSA
B.Firepower
C.ASA
D.FireSIGHT
Correct Answer: A
A.1,6.11
B.1,5,10
C.1,2,3
D.5,6,7
Correct Answer: A
A.worm
B.malware
C.DDoS
D.man-in-the-middle
Correct Answer: D
A.controller-based increases network bandwidth usage, while traditional lightens the load on the network.
B.controller-based inflates software costs, while traditional decreases individual licensing costs
C.Controller-based reduces network configuration complexity, while traditional increases the potential for errors
D.Controller-based provides centralization of key IT functions. While traditional requires distributes management function
E.controller-based allows for fewer network failure, while traditional increases failure rates.
Correct Answer: CD
A.It allows directly connected neighbors to share configuration information.
B.It allows a router to use bridge priorities to create multiple loop-free paths to a single destination.
C.It reduces routing failures by allowing Layer 3 load balancing between OSPF neighbors that have the same link metric.
D.It reduces routing failures by allowing more than one router to represent itself, as the default gateway of a network.
Correct Answer: D
A.allows servers and workstations to communicate across public network boundaries
B.provides a reduction in size of the forwarding table on network routers
C.allows communication across the Internet to other private networks
D.provides an added level of protection against Internet exposure
Correct Answer: D
A.6
B.8
C.12
D.18
Correct Answer: B
A.The switch rewrites the source and destination MAC addresses with its own
B.The source and destination MAC addresses remain the same
C.The source MAC address is changed
D.The destination MAC address is replaced with ffff.ffff.ffff
Correct Answer: B
A.switch#lldp port-description
B.switch(config)#lldp port-description
C.switch(config-line}#lldp port-description
D.switch(config-if)#lldp port-description
Correct Answer: B
A.S1
B.S2
C.S3
D.S4
Correct Answer: B
A.Loopback 0
B.10.0.1.4
C.10.0.1.50
D.10.0.1.3
Correct Answer: C