A.forwarding
B.backup
C.standby
D.listening
Correct Answer: C
A.modify priority
B.modify process ID
C.modify hello interval
D.modity network type
Correct Answer: C
A.firewall
B.switch
C.access point
D.wireless controller
Correct Answer: A
A.2000::/3
B.FC00::/7
C.FE80::/10
D.FF00::/12
Correct Answer: D
A.communicates between the controller and the physical network hardware
B.reports device errors to a controller
C.generates statistics for network hardware and traffic
D.facilitates communication between the controller and the applications
Correct Answer: D
A.209.165.200.0/27
B.10.10.10.0/28
C.0.0.0.0/0
D.10.10.13.0/24
Correct Answer: C
A.DHCP client
B.PC
C.router
D.access point
Correct Answer: D
A.It automatically provides a second authentication factor that is unknown to the original user.
B.It uses an internal firewall to protect the password repository from unauthorized access.
C.It protects against keystroke logging on a compromised device or web site.
D.It stores the password repository on the local workstation with built-in antivirus and anti-malware functionality
E.It encourages users to create stronger passwords.
Correct Answer: CE
A.5GHz provides increased network capacity with up to 23 nonoveriapping channels.
B.For maximum throughput, the WLC is configured to dynamically set adjacent access points to the same channel.
C.5GHz channel selection requires an autonomous access point.
D.Adjacent cells with overlapping channels use a repeater access point.
E.Cells that overlap one another are configured to use nonoveriapping channels.
Correct Answer: BE
A.There is a duplex mismatch
B.There is a speed mismatch
C.There is a protocol mismatch
D.The interface is shut down
E.The interface is error-disabled
Correct Answer: DE
A.global unicast
B.link-local
C.unique local
D.multicast
Correct Answer: A
A.restricts unauthorized users from viewing clear-text passwords in the running configuration
B.encrypts the password exchange when a VPN tunnel is established
C.prevents network administrators from configuring clear-text passwords
D.protects the VLAN database from unauthorized PC connections on the switch
Correct Answer: A
A.Frames are sent to every port on the switch in the same VLAN except from the originating port
B.Frames are sent to every port on the switch that has a matching entry in the MAC address table.
C.Frames are sent to all ports, including those that are assigned to other VLANs.
D.Frames are sent to every port on the switch in the same VLAN.
Correct Answer: A
A.Spanning tree may fail to detect a switching loop in the network that causes broadcast storms
B.VTP is allowed to propagate VLAN configuration information from switch to switch automatically
C.Root port choice and spanning tree recalculation are accelerated when a switch link goes down
D.After spanning tree converges PortFast shuts down any port that receives BPDUs.
Correct Answer: A
A.It sends packets out of interface Fa0/2 only.
B.It sends packets out of interface Fa0/1 only.
C.It cannot send packets to 10.10.13 128/25
D.It load-balances traffic out of Fa0/1 and Fa0/2
Correct Answer: C
A.default route
B.network route
C.host route
D.floating static route
Correct Answer: B
A.network route
B.floating static route
C.host route
D.default route
Correct Answer: D
A.0000.5E00.010a
B.0005.3711.0975
C.0000.0C07.AC99
D.0007.C070/AB01
Correct Answer: A
A.Devices establish an IPsec tunnel to exchange data with the controller
B.Devices use the call-home protocol to periodically send data to the controller.
C.Network devices use different services like SNMP, syslog, and streaming telemetry to send data to the controller.
D.The Cisco CLI Analyzer tool gathers data from each licensed network device .and streams it to the controller.
Correct Answer: C
A.TCP is reliable and is a connectionless protocol; UDP is not reliable and is a connection-oriented protocol.
B.TCP is not reliable and is a connectionless protocol; UDP is reliable and is a connection-oriented protocol.
C.TCP is reliable and is a connection-oriented protocol; UDP is not reliable and is a connectionless protocol.
D.TCP is not reliable and is a connection-oriented protocol; UDP is reliable and is a connectionless protocol.
Correct Answer: C
A.A network device has restarted
B.An ARP inspection has failed
C.A routing instance has flapped
D.A debug operation is running
Correct Answer: C
A.It load-balances traffic by assigning the same metric value to more than one route to the same destination in the IP routing table.
B.It load-balances Layer 2 traffic along the path by flooding traffic out all interfaces configured with the same VLAN.
C.It forwards multiple packets to the same destination over different routed links n the data path
D.It uses a shared virtual MAC and a virtual IP address to a group of routers that serve as the default gateway for hosts on a LAN
Correct Answer: D
A.it enables BPDU messages
B.It minimizes spanning-tree convergence time
C.It immediately puts the port into the forwarding state when the switch is reloaded
D.It immediately enables the port in the listening state
Correct Answer: B
A.The frame is dropped
B.The frame is processed in VLAN 5
C.The frame is processed in VLAN 11
D.The frame is processed in VLAN 1
Correct Answer: B
A.To pass client traffic two or more ports must be configured.
B.The EtherChannel must be configured in "mode active"
C.When enabled the WLC bandwidth drops to 500 Mbps
D.One functional physical port is needed to pass client traffic
Correct Answer: D
A.IS-IS
B.RIP
C.Internal EIGRP
D.OSPF
Correct Answer: C
A.management interface settings
B.QoS settings
C.Ip address of one or more access points
D.SSID
E.Profile name
Correct Answer: DE
A.to route traffic differently based on the source IP of the packet
B.to enable fallback static routing when the dynamic routing protocol fails
C.to automatically route traffic on a secondary path when the primary path goes down
D.to control the return path of traffic that is sent from the router
E.to support load balancing via static routing
Correct Answer: BC
A.YAML
B.JSON
C.EBCDIC
D.SGML
E.XML
Correct Answer: BE
A.Exchange
B.2-way
C.Full
D.Init
Correct Answer: C
A.adapters that support all families of Cisco IOS software
B.SDKs that support interaction with third-party network equipment
C.customized versions for small, medium, and large enterprises
D.REST APIs that allow for external applications to interact natively with Cisco DNA Center
E.modular design that is upgradable as needed
Correct Answer: BD
A.It processes VTP updates from any VTP clients on the network on its access ports.
B.It receives updates from all VTP servers and forwards all locally configured VLANs out all trunk ports
C.It forwards only the VTP advertisements that it receives on its trunk ports.
D.It transmits and processes VTP updates from any VTP Clients on the network on its trunk ports
Correct Answer: C
A.autonomous
B.lightweight
C.bridge
D.mobility express
Correct Answer: B
A.Authentication verifies a username and password, and authorization handles the communication between the authentication agent and the user database
B.Authentication identifies a user who is attempting to access a system, and authorization validates the users password
C.Authentication identifies and verifies a user who is attempting to access a system, and authorization controls the tasks the user can perform.
D.Authentication controls the system processes a user can access and authorization logs the activities the user initiates
Correct Answer: C
A.R2 is using the passive-interface default command
B.R1 has an incorrect network command for interface Gi1/0
C.R2 should have its network command in area 1
D.R1 interface Gi1/0 has a larger MTU size
Correct Answer: D
A.10.10.1.10
B.10.10.10.20
C.172.16.15.10
D.192.168.0.1
Correct Answer: C
A.outside global
B.outside local
C.inside global
D.inside local
E.outside public
F.inside public
Correct Answer: C
A.It only supports auto-discovery of network elements in a green field deployment.
B.It modular design allows someone to implement different versions to meet the specific needs of an organization
C.It abstracts policy from the actual device configuration
D.It does not support high availability of management functions when operating in cluster mode
Correct Answer: C
A.OpenFlow
B.NETCONF
C.Thrift
D.CORBA
E.DSC
Correct Answer: AB
A.All ARP packets are dropped by the switch
B.Egress traffic is passed only if the destination is a DHCP server.
C.All ingress and egress traffic is dropped because the interface is untrusted
D.The switch discard all ingress ARP traffic with invalid MAC-to-IP address bindings.
Correct Answer: D
A.The DHCP client maintains a pool of IP addresses it can assign
B.The DHCP server assigns IP addresses without requiring the client to renew them.
C.The DHCP client can request up to four DNS server addresses.
D.The DHCP server offers the ability to exclude specific IP addresses from a pool of IP addresses
E.The DHCP server leases client IP addresses dynamically
Correct Answer: DE
A.TKIP with RC4
B.RC4
C.AES-128
D.AES-256
Correct Answer: D
A.The access point must not be connected to the wired network, as it would create a loop
B.The access point must directly connect to the WLC using a copper cable.
C.The access point must be connected to the same switch as the WLC.
D.The access point has the ability to link to any switch in the network, assuming connectivity to the WLC.
Correct Answer: D
A.0
B.110
C.38443
D.3184439
Correct Answer: C
A.ip route 10.10.1.0 255.255.255.240 10.10.255.1
B.ip route 10.10.1.20 255.255.255.252 10.10.255.1
C.ip route 10.10.1.20 255.255.255.254 10.10.255.1
D.ip route 10.10.1.16 255.255.255.252 10.10.255.1
Correct Answer: B
A.The trunk does not form and the ports go into an err-disabled status.
B.The trunk forms but the mismatched native VLANs are merged into a single broadcast domain.
C.The trunk does not form, but VLAN 99 and VLAN 999 are allowed to traverse the link.
D.The trunk forms but VLAN 99 and VLAN 999 are in a shutdown state.
Correct Answer: B
A.2000::/3
B.FC00::/7
C.FE80::/10
D.FF00::/8
Correct Answer: D
A.The link is in a downstate.
B.The link is in an error disables state
C.The link is becomes an access port.
D.The link becomes a trunk port.
Correct Answer: D
A.show ip route
B.show ip interface
C.show interface
D.show cdp neighbor
Correct Answer: D
A.WEP
B.RC4
C.AES
D.TKIP
Correct Answer: C