Cisco: Exam Questions 200-301
Cisco: Exam Questions 200-301
Cisco
Exam Questions 200-301
Cisco Certified Network Associate
About Exambible
Found in 1998
Exambible is a company specialized on providing high quality IT exam practice study materials, especially Cisco CCNA, CCDA,
CCNP, CCIE, Checkpoint CCSE, CompTIA A+, Network+ certification practice exams and so on. We guarantee that the
candidates will not only pass any IT exam at the first attempt but also get profound understanding about the certificates they have
got. There are so many alike companies in this industry, however, Exambible has its unique advantages that other companies could
not achieve.
Our Advances
* 99.9% Uptime
All examinations will be up to date.
* 24/7 Quality Support
We will provide service round the clock.
* 100% Pass Rate
Our guarantee that you will pass the exam.
* Unique Gurantee
If you do not pass the exam at the first time, we will not only arrange FULL REFUND for you, but also provide you another
exam of your claim, ABSOLUTELY FREE!
NEW QUESTION 1
- (Topic 3)
OSPF must be configured between routers R1 and R2. Which OSPF configuration must be applied to router R1 to avoid a DR/BDR election?
A. router ospf 1network 192.168.1.1 0.0.0.0 area 0 interface e1/1ip address 192.168.1.1 255.255.255.252ip ospf network broadcast
B. router ospf 1network 192.168.1.1 0.0.0.0 area 0 interface e1/1ip address 192.168.1.1 255.255.255.252ip ospf network point-to-point
C. router ospf 1network 192.168.1.1 0.0.0.0 area 0 interface e1/1ip address 192.168.1.1 255.255.255.252ip ospf cost 0
D. router ospf 1network 192.168.1.1 0.0.0.0 area 0hello interval 15 interface e1/1Ip address 192.168.1.1 255.255.255.252
Answer: B
NEW QUESTION 2
- (Topic 3)
What is a requirement when configuring or removing LAG on a WLC?
A. The Incoming and outgoing ports for traffic flow must be specified If LAG Is enabled.
B. The controller must be rebooted after enabling or reconfiguring LAG.
C. The management interface must be reassigned if LAG disabled.
D. Multiple untagged interfaces on the same port must be supported.
Answer: C
NEW QUESTION 3
- (Topic 3)
Which wireless security protocol relies on Perfect Forward Secrecy?
A. WPA3
B. WPA
C. WEP
D. WPA2
Answer: A
NEW QUESTION 4
- (Topic 3)
Refer to the exhibit.
Traffic sourced from the loopback0 Interface is trying to connect via ssh to the host at 10.0.1.15. What Is the next hop to the destination address?
A. 192.168.0.7
B. 192.168.0.4
C. 192.168.0.40
D. 192.168.3.5
Answer: B
NEW QUESTION 5
DRAG DROP - (Topic 3)
Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
NEW QUESTION 6
- (Topic 3)
Which Layer 2 switch function encapsulates packets for different VLANs so that the packets traverse the same port and maintain traffic separation between the
VLANs?
A. VLAN numbering
B. VLAN DSCP
C. VLAN tagging
D. VLAN marking
Answer: C
NEW QUESTION 7
- (Topic 3)
R1 as an NTP server must have:
• NTP authentication enabled
• NTP packets sourced from Interface loopback 0
• NTP stratum 2
• NTP packets only permitted to client IP 209.165 200 225
How should R1 be configured?
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
NEW QUESTION 8
- (Topic 3)
Which type of network attack overwhelms the target server by sending multiple packets to a port until the half-open TCP resources of the target are exhausted?
A. SYIM flood
B. reflection
C. teardrop
D. amplification
Answer: A
NEW QUESTION 9
- (Topic 3)
Which value is the unique identifier that an access point uses to establish and maintain wireless connectivity to wireless network devices?
A. VLANID
B. SSID
C. RFID
D. WLANID
Answer: B
NEW QUESTION 10
- (Topic 3)
Refer to the exhibit.
Routers R1 and R3 have the default configuration The router R2 priority is set to 99 Which commands on R3 configure it as the DR in the 10.0 4.0/24 network?
Answer: B
NEW QUESTION 10
- (Topic 3)
Which protocol is used for secure remote CLI access?
A. HTTPS
B. HTTP
C. Telnet
D. SSH
Answer: D
NEW QUESTION 13
DRAG DROP - (Topic 3)
Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
NEW QUESTION 15
DRAG DROP - (Topic 3)
Drag and drop the descriptions of AAA services from the left onto the corresponding services on the right.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
NEW QUESTION 19
- (Topic 3)
A Cisco engineer is configuring a factory-default router with these three passwords:
• The user EXEC password for console access is p4ssw0rd1
• The user EXEC password for Telnet access is s3cr3t2
• The password for privileged EXEC mode is pnv4t3p4ss
Which command sequence must the engineer configured
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
NEW QUESTION 21
- (Topic 3)
Refer to the exhibit.
Which two commands must be configured on router R1 to enable the router to accept secure remote-access connections? (Choose two)
Answer: BE
NEW QUESTION 26
- (Topic 3)
Refer to the exhibit.
The router has been configured with a supernet to accommodate the requirement for 380 users on a subnet The requirement already considers 30% future growth.
Which configuration verifies the IP subnet on router R4?
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
NEW QUESTION 28
- (Topic 3)
Refer to the exhibit.
Which route must be configured on R1 so that OSPF routing is used when OSPF is up. but the server is still reachable when OSPF goes down?
Answer: D
NEW QUESTION 31
- (Topic 3)
Refer to the exhibit.
Traffic that is flowing over interface TenGigabitEthernet0/0 experiences slow transfer speeds. What is the reason for the issue?
Answer: C
NEW QUESTION 34
- (Topic 3)
Which QoS per-hop behavior changes the value of the ToS field in the IPv4 packet header?
A. shaping
B. classification
C. policing
D. marking
Answer: D
NEW QUESTION 37
FILL IN THE BLANK - (Topic 3)
Refer to the exhibit.
Drag and drop the prefix lengths from the left onto the corresponding prefixes on the right Not all prefixes are used
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Diagram Description automatically generated with low confidence
NEW QUESTION 40
- (Topic 3)
Refer to the exhibit.
An IP subnet must be configured on each router that provides enough addresses for the number of assigned hosts and anticipates no more than 10% growth for
now hosts. Which configuration script must be used?
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C
NEW QUESTION 41
- (Topic 3)
What is the difference between IPv6 unicast and anycast addressing?
A. IPv6 anycast nodes must be explicitly configured to recognize the anycast address, but IPv6 unicast nodes require no special configuration
B. IPv6 unicast nodes must be explicitly configured to recognize the unicast address, but IPv6 anycast nodes require no special configuration
C. An individual IPv6 unicast address is supported on a single interface on one node but an IPv6 anycast address is assigned to a group of interfaces on multiple
nodes.
D. Unlike an IPv6 anycast address, an IPv6 unicast address is assigned to a group of interfaces on multiple nodes
Answer: C
NEW QUESTION 46
- (Topic 3)
What is an expected outcome when network management automation is deployed?
Answer: B
NEW QUESTION 48
- (Topic 3)
What is one reason to implement LAG on a Cisco WLC?
Answer: B
NEW QUESTION 50
- (Topic 3)
Refer to the exhibit.
Web traffic is coming in from the WAN interface. Which route takes precedence when the router is processing traffic destined for the LAN network at 10 0.10.0/24?
Answer: A
NEW QUESTION 51
- (Topic 3)
What is a function of a Next-Generation IPS?
Answer: D
NEW QUESTION 55
DRAG DROP - (Topic 3)
Drag and drop the facts about wireless architectures from the left onto the types of access point on the right. Not all options are used.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
NEW QUESTION 58
DRAG DROP - (Topic 3)
An engineer is tasked to configure a switch with port security to ensure devices that forward unicasts multicasts and broadcasts are unable to flood the port The
port must be configured to permit only two random MAC addresses at a time Drag and drop the required configuration commands from the left onto the sequence
on the right Not all commands are used.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
NEW QUESTION 62
FILL IN THE BLANK - (Topic 3)
Drag and drop the functions of SNMP fault-management from the left onto the definitions on the right.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Table Description automatically generated
NEW QUESTION 65
- (Topic 3)
Refer to the exhibit.
Which two commands must be added to update the configuration of router R1 so that it accepts only encrypted connections? (Choose two )
Answer: DE
NEW QUESTION 68
- (Topic 3)
Which PoE mode enables powered-device detection and guarantees power when the device is detected?
A. dynamic
B. static
C. active
D. auto
Answer: B
NEW QUESTION 69
- (Topic 2)
Refer to the exhibit.
Which action is expected from SW1 when the untagged frame is received on the GigabitEthernet0/1 interface?
Answer: A
NEW QUESTION 74
- (Topic 2)
While examining excessive traffic on the network, it is noted that all incoming packets on an interface appear to be allowed even though an IPv4 ACL is applied to
the interface.
Which two misconfigurations cause this behavior? (Choose two)
Answer: BC
NEW QUESTION 77
- (Topic 2)
Refer to the exhibit.
If R1 receives a packet destined to 172.161.1, to which IP address does it send the packet?
A. 192.168.12.2
B. 192.168.13.3
C. 192.168.14.4
D. 192.168.15.5
Answer: C
NEW QUESTION 82
- (Topic 2)
Which protocol does an access point use to draw power from a connected switch?
Answer: C
NEW QUESTION 86
DRAG DROP - (Topic 2)
Drag the descriptions of IP protocol transmissions from the left onto the IP traffic types on the right.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
NEW QUESTION 91
- (Topic 2)
An engineer observes high usage on the 2.4GHz channels and lower usage on the 5GHz channels. What must be configured to allow clients to preferentially use
5GH2 access points?
Answer: D
NEW QUESTION 94
- (Topic 2)
Which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?
A. TKiP encryption
B. AES encryption
C. scrambled encryption key
D. SAE encryption
Answer: D
NEW QUESTION 98
- (Topic 2)
An engineer is configuring NAT to translate the source subnet of 10.10.0.0/24 to any of three addresses 192.168.30.1, 192.168.3.2, 192.168.3.3 Which
configuration should be used?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C
A. Telnet
B. SSH
C. HTTP
D. HTTPS
E. TFTP
Answer: AC
Answer: B
Router A learns the same route from two different neighbors, one of the neighbor routers is an OSPF neighbor and the other is an EIGRP neighbor. What is the
administrative distance of the route that will be installed in the routing table?
A. 20
B. 90
C. 110
D. 115
Answer: B
Explanation:
The Administrative distance (AD) of EIGRP is 90 while the AD of OSPF is 110 so EIGRP route will be chosen to install into the routing table.
A. sniffer
B. mesh
C. flexconnect
D. local
Answer: C
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-5/config-guide/b_cg85/flexconnect.html
A. management-plane
B. control-plane
C. data-plane
D. services-plane
Answer: B
Answer: A
Answer: B
A. backup
B. standby
C. listening
D. forwarding
Answer: B
B. between the SON controller and switches and routers on the network
C. between the SON controller and services and applications on the network
D. between network applications and switches and routers on the network
Answer: B
A. ip helper-address
B. ip address dhcp
C. ip dhcp pool
D. ip dhcp relay
Answer: A
A network administrator has been tasked with securing VTY access to a router. Which access-list entry accomplishes this task?
Answer: A
A. The new frame is delivered first, the previous frame is dropped, and a retransmission request is sent.
B. The previous frame is delivered, the new frame is dropped, and a retransmission request is sent.
C. The new frame is placed in a queue for transmission after the previous frame.
D. The two frames are processed and delivered at the same time.
Answer: B
Answer: AD
Explanation:
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4000/8-2glx/configuration/guide/ntp.html
To configure authentication, perform this task in privileged mode:Step 1: Configure an authentication key pair for NTP and specify whether the key will be trusted
or untrusted.Step 2: Set the IP address of the NTP server and the public key.Step 3: Enable NTP client mode.Step 4: Enable NTP authentication.Step 5: Verify the
NTP configuration.
Which IPv6 configuration is required for R17 to successfully ping the WAN interface on R18?
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
Explanation:
ipv6 unicast-routing statement included (IPv6 is enabled on the router).Compared to the exhibit, Fa0/0 and Fa0/1 have correct configurations.The route to subnet
2001:db8:4::/64 points to R18’s Fa1/0 (correct next-hop).
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer: C
A. to automatically route traffic on a secondary path when the primary path goes down
B. to route traffic differently based on the source IP of the packet
C. to enable fallback static routing when the dynamic routing protocol fails
D. to support load balancing via static routing
E. to control the return path of traffic that is sent from the router
Answer: AC
A. Unicode
B. base64
C. decimal
D. ASCII
Answer: D
A. DTP
B. FTP
C. SMTP
D. TFTP
Answer: B
A. The trunk does not form and the ports go into an err-disabled status.
B. The trunk forms but the mismatched native VLANs are merged into a single broadcast domain.
C. The trunk does not form, but VLAN 99 and VLAN 999 are allowed to traverse the link.
D. The trunk forms but VLAN 99 and VLAN 999 are in a shutdown state.
Answer: B
Explanation:
The trunk still forms with mismatched native VLANs and the traffic can actually flow between mismatched switches. But it is absolutely necessary that the native
VLANs on both ends of a trunk link match; otherwise a native VLAN mismatch occurs, causing the two VLANs to effectively merge.
For example with the above configuration, SW1 would send untagged frames for VLAN 999. SW2 receives them but would think they are for VLAN 99 so we can
say these two VLANs are merged.
A. IKEv2
B. IKEv1
C. IPsec
D. MD5
Answer: C
Explanation:
A site-to-site VPN allows offices in multiple fixed locations to establish secure connections with each other over a public network such as the Internet. A site-to-site
VPN means that two sites create a VPN tunnel by encrypting and sending data between two devices. One set of rules for creating a siteto-site VPN is defined by
IPsec.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer: B
An engineer is required to verify that the network parameters are valid for the users wireless LAN connectivity on a /24 subnet. Drag and drop the values from the
left onto the network parameters on the right. Not all values are used.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. When a powered device begins drawing power from a PoE switch port a syslog message is generated
B. As power usage on a PoE switch port is checked data flow to the connected device is temporarily paused
C. If a switch determines that a device is using less than the minimum configured power it assumes the device has failed and disconnects
D. Should a monitored port exceeds the maximum administrative value for power, the port is shutdown and err-disabled
Answer: D
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/power_over_ethernet.pdf
PoE monitoring and policing compares the power consumption on ports with the administrative maximum value (either a configured maximum value or the port’s
default value). If the power consumption on a monitored port exceeds the administrative maximum value, the following actions occur:– A syslog message is
issued.– The monitored port is shut down and error-disabled.– The allocated power is freed.
A. It selects the IS-IS route because it has the shortest prefix inclusive of the destination address.
B. It selects the EIGRP route because it has the lowest administrative distance.
C. It selects the OSPF route because it has the lowest cost.
D. It selects the RIP route because it has the longest prefix inclusive of the destination address.
Answer: D
Which route does R1 select for traffic that is destined to 192 168.16.2?
A. 192.168.16.0/21
B. 192.168.16.0/24
C. 192.168 26.0/26
D. 192.168.16.0/27
Answer: D
Explanation:
The destination IP addresses match all four entries in the routing table but the 192.168.16.0/27 has the longest prefix so it will be chosen. This is called the
“longest prefix match” rule.
Answer: B
Which two prefixes are included in this routing table entry? (Choose two.)
A. 192.168.1.17
B. 192.168.1.61
C. 192.168.1.64
D. 192.168.1.127
E. 192.168.1.254
Answer: BC
A. DTP
B. STP
C. VTP
D. 802.10
Answer: B
Answer: D
Answer: D
A. It is owned and maintained by one party, but it is shared among multiple organizations.
B. It enables an organization to fully customize how It deploys network resources.
C. It provides services that are accessed over the Internet.
D. It Is a data center on the public Internet that maintains cloud services for only one company.
E. It supports network resources from a centralized third-party provider and privately- owned virtual resources
Answer: CE
Explanation:
Private cloud is cloud infrastructure operated solely for a single organization, whether managed internally or by a third party, and hosted either internally or
externally. Most public-cloud providers offer direct-connection services that allow customers to securely link their legacy data centers to their cloud-resident
applications.
A. Ansible
B. Python
C. Puppet
D. Chef
Answer: A
Answer: D
A network engineer must block access for all computers on VLAN 20 to the web server via HTTP All other computers must be able to access the web server
Which configuration when applied to switch A accomplishes this task?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
The show ip ospf interface command has been executed on R1 How is OSPF configured?
Answer: C
Explanation:
https://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first- ospf/13689-17.html
A. The user swipes a key fob, then clicks through an email link
B. The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device
C. The user enters a PIN into an RSA token, and then enters the displayed RSA key on a login screen
D. The user enters a user name and password and then re-enters the credentials on a second screen
Answer: B
Explanation:
This is an example of how two-factor authentication (2FA) works:1. The user logs in to the website or service with their username and password.2. The password
is validated by an authentication server and, if correct, the user becomes eligible for the second factor.3. The authentication server sends a unique code to the
user’s second-factor method (such as a smartphone app).4. The user confirms their identity by providing the additional authentication for their second-factor
method.
An engineer configured the New York router with state routes that point to the Atlanta and Washington sites. When command must be configured on the Atlanta
and Washington routers so that both sites are able to reach the loopback2 interface on the New York router?
Answer: C
Answer: D
A. 2
B. 4
C. 6
Answer: D
Explanation:
https://en.wikipedia.org/wiki/Syslog
A. The NMS software must be loaded with the MIB associated with the trap.
B. The NMS must be configured on the same router as the SNMP agent
C. The NMS must receive a trap and an inform message from the SNMP agent within a configured interval
D. The NMS must receive the same trap from two different SNMP agents to verify that it is reliable.
Answer: A
Answer: A
Explanation:
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960x/software/15-0_2_EX/vlan/configuration_guide/b_vlan_152ex_2960-x_cg/b_vlan_152ex_2960-
x_cg_chapter_0110.pdf
Untagged traffic from the device attached to the Cisco IP Phone passes through the phone unchanged, regardless of the trust state of the access port on the
phone.
A. northbound API
B. REST API
C. SOAP API
D. southbound API
Answer: D
Explanation:
Cisco overview doc for SDN here: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Data_Center/VMDC/SDN/SDN. html
- (Topic 2)
An engineer must configure traffic for a VLAN that is untagged by the switch as it crosses a trunk link. Which command should be used?
Answer: B
A. Mastered
B. Not Mastered
Answer: A
Explanation:
1-1, 2-4, 3-3, 4-2
Answer: A
Answer: D
A. Enable Security Association Teardown Protection and set the SA Query timeout to 10
B. Enable MAC filtering and set the SA Query timeout to 10
C. Enable 802.1x Layer 2 security and set me Comeback timer to 10
D. Enable the Protected Management Frame service and set the Comeback timer to 10
Answer: C
A. The access point must directly connect to the WLC using a copper cable
B. The access point must not be connected to the wired network, as it would create a loop
C. The access point must be connected to the same switch as the WLC
D. The access point has the ability to link to any switch in the network, assuming connectivity to the WLC
Answer: D
Answer: C
How does SW2 interact with other switches in this VTP domain?
A. It processes VTP updates from any VTP clients on the network on its access ports.
B. It receives updates from all VTP servers and forwards all locally configured VLANs out all trunk ports
C. It forwards only the VTP advertisements that it receives on its trunk ports.
D. It transmits and processes VTP updates from any VTP Clients on the network on its trunk ports
Answer: C
Explanation:
Reference: https://www.cisco.com/c/en/us/support/docs/lan-switching/vtp/10558-21.html
The VTP mode of SW2 is transparent so it only forwards the VTP updates it receives to its trunk links without processing them.
Answer: D
A. policy plane
B. management plane
C. control plane
D. data plane
Answer: C
To which device does Router1 send packets that are destined to host 10.10.13.165?
A. Router2
B. Router3
C. Router4
D. Router5
Answer: B
Answer: CD
Answer: D
A. IP SLA
B. syslog
C. NetFlow
D. SNMPv3
Answer: C
A device detects two stations transmitting frames at the same time. This condition occurs after the first 64 bytes of the frame is received interface counter
increments?
A. collision
B. CRC
C. runt
D. late collision
Answer: D
Explanation:
https://www.cisco.com/c/en/us/support/docs/interfaces-modules/port-adapters/12768-eth-collisions.html
Which route type does the routing protocol Code D represent in the output?
Answer: D
A. cost
B. adminstrative distance
C. metric
D. as-path
Answer: C
Explanation:
If a router learns two different paths for the same network from the same routing protocol, it has to decide which route is better and will be placed in the routing
table. Metric is the measure used to decide which route is better (lower number is better). Each routing protocol uses its own metric.For example, RIP uses hop
counts as a metric, while OSPF uses cost.
A packet is being sent across router R1 to host 172.163.3.14. To which destination does the router send the packet?
Answer: B
A. array
B. string
C. object
D. Boolean
Answer: C
Answer: BC
A. It alternates automatically between 2.4 GHz and 5 GHz on adjacent access points
B. It allows the administrator to assign channels on a per-device or per-interface basis.
C. It segregates devices from different manufacturers onto different channels.
D. It analyzes client load and background noise and dynamically assigns a channel.
Answer: A
Answer: A
Answer: D
Explanation:
“In IEEE 802.11 wireless local area networking standards (including Wi-Fi), a service set is a group of wireless network devices which share a service set
identifier (SSID)… A service set forms a logical network of nodes operating with shared link-layer networking parameters; they form one logical network segment.“
A. Cisco DNA Center device management can deploy a network more quickly thantraditional campus device management
B. Traditional campus device management allows a network to scale more quickly than with Cisco DNA Center device management
C. Cisco DNA Center device management can be implemented at a lower cost than most traditional campus device management options
D. Traditional campus device management schemes can typically deploy patches and updates more quickly than Cisco DNA Center device management
Answer: A
Answer: B
Answer: BE
A. global unicast
B. unique local
C. link-local
D. multicast
Answer: B
An engineer deploys a topology in which R1 obtains its IP configuration from DHCP. If the switch and DHCP server configurations are complete and correct. Which
two sets of
commands must be configured on R1 and R2 to complete the task? (Choose two)
Answer: BC
Answer: C
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. logging trap 5
B. logging trap 2
C. logging trap 4
D. logging trap 3
Answer: C
Answer: A
A. management
B. protected frame
C. control
D. action
Answer: A
Explanation:
Reference: https://en.wikipedia.org/wiki/802.11_Frame_Types
Answer: D
Router R4 is dynamically learning the path to the server. If R4 is connected to R1 via OSPF Area 20, to R2 v2ia R2 BGP, and to R3 via EIGRP 777, which path is
installed in the routing table of R4?
A. the path through R1, because the OSPF administrative distance is 110
B. the path through R2. because the IBGP administrative distance is 200
C. the path through R2 because the EBGP administrative distance is 20
D. the path through R3. because the EIGRP administrative distance is lower than OSPF and BGP
Answer: C
If OSPF Is running on this network, how does Router2 handle traffic from Site B to 10.10.13.128/25 at Site A?
Answer: B
Answer: C
Explanation:
The “ipv6 address autoconfig” command causes the device to perform IPv6 stateless address autoconfiguration to discover prefixes on the link and then to add
the EUI-64 based addresses to theinterface.Addresses are configured depending on the prefixes received in Router Advertisement (RA)messages.The device will
listen for RA messages which are transmitted periodically from the router (DHCPServer).This RA message allows a host to create a global IPv6 address from:+ Its
interface identifier (EUI- 64 address)+ Link Prefix (obtained via RA)Note: Global address is the combination of Link Prefix and EUI-64 address
Answer: B
Answer: B
Explanation:
Reference:
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_55_se/configuration/guide/3560_scg/swstpopt.html
A. OSPF area
B. OSPF MD5 authentication key
C. iPv6 address
D. OSPf process ID
E. OSPf stub flag
Answer: AD
A. Mastered
B. Not Mastered
Answer: A
Explanation:
The focus of Ansible is to be streamlined and fast, and to require no node agent installation.
Thus, Ansible performs all functions over SSH. Ansible is built on Python, in contrast to the Ruby foundation of Puppet and Chef.
TCP port 10002 is the command port. It may be configured in the Chef Push Jobs configuration file .
This port allows Chef Push Jobs clients to communicate with the Chef Push Jobs server. Puppet is an open-source configuration management solution, which is
built with Ruby and offers custom Domain Specific Language (DSL) and Embedded Ruby (ERB) templates to create custom Puppet language files, offering a
declarative-paradigm programming approach.
A Puppet piece of code is called a manifest, and is a file with .pp extension.
Which switch becomes the root of the spanning tree for VLAN 110?
A. Switch 1
B. Switch 2
C. Switch 3
D. Switch 4
Answer: B
If OSPF is running on this network, how does Router 2 handle traffic from Site B to 10.10.13/25 at Site A?
Answer: C
Explanation:
Router2 does not have an entry for the subnet 10.10.13.128/25. It only has an entry for 10.10.13.0/25, which ranges from 10.10.13.0 to 10.10.13.127.
https://study-ccna.com/administrative-distance-metric/
A. 0050.0c05.ad81
B. 0007.c061.bc01
C. 0000.5E00.0101
D. 0500.3976.6401
Answer: C
Explanation:
The virtual router MAC address associated with a virtual router is an IEEE 802 MAC Address in the following format:
00-00-5E-00-01-{VRID} (in hex in internet standard bit-order)
Answer: AE
A. A spine switch and a leaf switch can be added with redundant connections between them
B. A spine switch can be added with at least 40 GB uplinks
C. A leaf switch can be added with a single connection to a core spine switch.
D. A leaf switch can be added with connections to every spine switch
Answer: D
Explanation:
Spine-leaf architecture is typically deployed as two layers: spines (such as an aggregation layer), and leaves (such as an access layer). Spine-leaf topologies
provide high-bandwidth, low-latency, nonblocking server-to-server connectivity.
Leaf (aggregation) switches are what provide devices access to the fabric (the network of spine and leaf switches) and are typically deployed at the top of the rack.
Generally, devices connect to the leaf switches.
Devices can include servers, Layer 4-7 services (firewalls and load balancers), and WAN or Internet routers. Leaf switches do not connect to other leaf switches. In
spine-and-leaf architecture, every leaf should connect to every spine in a full mesh.
Spine (aggregation) switches are used to connect to all leaf switches and are typically deployed at the end or middle of the row. Spine switches do not connect to
other spine switches.
A. read
B. update
C. create
D. delete
Answer: A
Explanation:
GET: This method retrieves the information identified by the request URI. In the context of the RESTful web services, this method is used to retrieve resources.
This is the method used for read operations (the R in CRUD).
https://hub.packtpub.com/crud-operations-rest/
Answer: D
Answer: C
A. It supports numerous extensibility options including cross-domain adapters and third- party SDKs.
B. It supports high availability for management functions when operating in cluster mode.
C. It enables easy autodiscovery of network elements m a brownfield deployment.
D. It is designed primarily to provide network assurance.
Answer: A
A. Frames are sent to every port on the switch in the same VLAN except from the originating port
B. Frames are sent to every port on the switch that has a matching entry in the MAC address table.
C. Frames are sent to all ports, including those that are assigned to other VLANs.
D. Frames are sent to every port on the switch in the same VLAN.
Answer: A
A. worm
B. malware
C. DDoS
D. man-in-the-middle
Answer: D
- (Topic 1)
What must be considered when using 802:11 ta?
Answer: A
What commands are needed to add a subinterface to Ethernet0/0 on R1 to allow for VLAN 20, with IP address 10.20.20.1/24?
Answer: B
A. Mastered
B. Not Mastered
Answer: A
Explanation:
https://ns1.com/resources/dns-types-records-servers-and-
queries#:~:text=Address%20Mapping%20record%20(A%20Record,a%20hostname%20to%20another%20hostname.
Answer: B
Answer: BD
Explanation:
Cisco DNA Center offers 360-degree extensibility through four distinct types of platform capabilities:+ Intent-based APIs leverage the controller and enable
business and IT applications to deliver intent to the network and to reap network analytics and insights for IT and business innovation.+ Process adapters, built on
integration APIs, allow integration with other IT and network systems to streamline IT operations and processes.+ Domain adapters, built on integration APIs, allow
integration with other infrastructure domains such as data center, WAN, and security to deliver a consistent intent-based infrastructure across the entire IT
environment.+ SDKs allow management to be extended to third-party vendor’s network devices to offer support for diverse environments.
Answer: B
Answer: D
Answer: D
Answer: A
What is the next hop address for traffic that is destined to host 10.0.1.5?
A. 10.0.1.3
B. 10.0.1.50
C. 10.0.1.4
D. Loopback D
Answer: B
Answer: BC
A. firewall
B. switch
C. access point
D. wireless controller
Answer: A
Answer: C
Explanation:
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/25ew/configuration/guide/conf/port_sec.html
A. 0000.5E00.010a
B. 0005.3711.0975
C. 0000.0C07.AC99
D. 0007.C070/AB01
Answer: A
Explanation:
With VRRP, the virtual router’s MAC address is 0000.5E00.01xx , in which xx is the VRRP group.
A. SW1
B. SW2
C. SW3
D. SW4
Answer: C
Answer: DE
Answer: A
Answer: BE
A. alert
B. critical
C. notice
D. debug
Answer: C
Answer: D
A. 1729.0.0/16
B. 172.28.0.0/16
C. 192.0.0.0/8
D. 209.165.201.0/24
Answer: B
Explanation:
The private ranges of each class of IPv4 are listed below:
Class A private IP address ranges from 10.0.0.0 to 10.255.255.255 Class B private IP address ranges from 172.16.0.0 to 172.31.255.255 Class C private IP
address ranges from 192.168.0.0 to 192.168.255.255 Only the network 172.28.0.0/16 belongs to the private IP address (of class B).
A. 1.544 Mbps
B. 2.048 Mbps
C. 34.368 Mbps
D. 43.7 Mbps
Answer: A
Explanation:
https://www.bsimplify.com/what-is-point-to-point-t1/#:~:text=A%20Point%20to%20Point%20T1,data%20speeds%20(1.54Mbps).
Point to Point T1
A Point to Point T1 service is a private data connection securely connecting two or more locations with T1 data speeds (1.54Mbps).
Answer: C
A network engineer must configured communication between PC A and the File Server. To prevent interruption for any other communications, which command
must be configured?
Answer: C
Refer to the exhibit. All routers in the network are configured R2 must be the DR. After the engineer connected the devices, R1 was elected as the DR. Which
command sequence must be configure on R2 to Be elected as the DR in the network?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. asynchronous routing
B. single-homed branches
C. dual-homed branches
D. static routing
E. dynamic routing
Answer: AC
A. It automatically provides a second authentication factor that is unknown to the original user.
B. It uses an internal firewall to protect the password repository from unauthorized access.
C. It protects against keystroke logging on a compromised device or web site.
D. It stores the password repository on the local workstation with built-in antivirus and anti- malware functionality
E. It encourages users to create stronger passwords.
Answer: CE
Answer: B
An access list is required to permit traffic from any host on interface G0/0 and deny traffic from interface G/0/1. Which access list must be applied?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
A. overlay
B. northbound
C. underlay
D. southbound
Answer: D
Answer: A
Answer: D
A. data plane
B. control plane
C. policy plane
D. management plane
Answer: B
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. local port ID
B. lowest path cost to the root bridge
C. lowest neighbor's bridge ID
D. lowest neighbor's port ID
Answer: B
Answer: B
Explanation:
Traffic shaping retains excess packets in a queue and then schedules the excess for later transmission over increments of time.
A. CPU ACL
B. TACACS
C. Flex ACL
D. RADIUS
Answer: A
Explanation:
Reference: https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wlan-security/71978-acl-wlc.html
A. allows multiple companies to each use the same addresses without conflicts
B. provides a direct connection for hosts from outside of the enterprise network
C. ensures that NAT is not required to reach the internet with private range addressing
D. enables secure communications to the internet for all external hosts
Answer: A
PC1 is trying to ping PC3 for the first time and sends out an ARP to S1 Which action is taken by S1?
Answer: B
Answer: D
Explanation:
Although the spanning-tree vlan 10 root primary command will ensure a switch will have a bridge priority value lower than other bridges introduced to the network,
the spanning-tree vlan 10 priority 0 command ensures the bridge priority takes precedence over all other priorities.
Answer: A
A. WSA
B. Firepower
C. ASA
D. FireSIGHT
Answer: A
Answer: A
A. Mastered
B. Not Mastered
Answer: A
Explanation:
How must router A be configured so that it only sends Cisco Discovery Protocol Information to router C?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: D
A. autonomous
B. lightweight
C. bridge
D. mobility express
Answer: B
Explanation:
https://www.cisco.com/c/en/us/support/docs/wireless/aironet-1200- series/70278-lap-faq.html
A Lightweight Access Point (LAP) is an AP that is designed to be connected to a wireless LAN (WLAN) controller (WLC). APs are “lightweight,” which means that
they cannot act independently of a wireless LAN controller (WLC). The WLC manages the AP configurations and firmware. The APs are “zero touch” deployed,
and individual configuration of APs is not necessary.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. management plane
B. control plane
C. policy plane
D. data plane
Answer: D
Answer: D
A. listening
B. blocking
C. forwarding
D. learning
E. speaking
Answer: CD
A. Data collection and analysis tools establish a baseline for the network
B. Artificial intelligence identifies and prevents potential design failures.
C. Machine learning minimizes the overall error rate when automating troubleshooting processes
D. New devices are onboarded with minimal effort
E. Proprietary Cisco APIs leverage multiple network management tools.
Answer: BE
Answer: AD
Explanation:
Weighted Random Early Detection (WRED) is just a congestion avoidance mechanism. WRED drops packets selectively based on IP precedence. Edge routers
assign IP precedences to packets as they enter the network. When a packet arrives, the following events occur:
* 1. The average queue size is calculated.2. If the average is less than the minimum queue threshold, the arriving packet is queued.3. If the average is between
the minimum queue threshold for that type of traffic and the maximum threshold for the interface, the packet is either dropped or queued, depending on the packet
drop probability for that type of traffic.4. If the average queue size is greater than the maximum threshold, the packet is dropped. WRED reduces the chances of
tail drop (when the queue is full, the packet is dropped) by selectively dropping packets when the output interface begins to show signs of congestion (thus it can
mitigate congestion by preventing the queue from filling up). By dropping some packets early rather than waiting until the queue is full, WRED avoids dropping
large numbers of packets at once and minimizes the chances of global synchronization. Thus, WRED allows the transmission line to be usedfully at all times.
WRED generally drops packets selectively based on IP precedence. Packets with a higher IP precedence are less likely to be dropped than packets with a lower
precedence. Thus, the higher the priority of a packet, the higher the probability that the packet will be delivered
Answer: B
A. Layer 2 forwarding
B. coordinating VTNs
C. tracking hosts
D. managing the topology
E. protecting against DDoS attacks
Answer: BD
An engineer configured NAT translations and has verified that the configuration is correct. Which IP address is the source IP?
A. 10.4.4.4
B. 10.4.4.5
C. 172.23.103.10
D. 172.23.104.4
Answer: D
Explanation:
NAT is used to send a packet to the outside network, using a public IP address to make it routable. The NAT logic is "inside-to-outside" FIRST and "outside-to-
inside" THEN. This way, configuring NAT means "choosing a public IP address" for any outbound packet" IN THE FIRST PLACE, where "public IP address"
translates to "inside global address". Among the given answers, the only inside global address is 172.123.104.4.
A. used cryptographic tunneling to protect the privacy of data for multiple users simultaneously
B. used exclusively when a user is connected to a company's internal network
C. establishes a secure tunnel between two branch sites
D. allows the users to access company internal network resources through a secure tunnel
Answer: D
Refer to the exhibit Routers R1 and R2 have been configured with their respective LAN interfaces The two circuits are operational and reachable across WAN
Which command set
establishes failover redundancy if the primary circuit goes down?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
A. outside global
B. outsdwde local
C. inside global
D. insride local
E. outside public
F. inside public
Answer: C
Explanation:
NAT use four types of addresses:* Inside local address – The IP address assigned to a host on the inside network. The address is usually not an IP address
assigned by the Internet Network Information Center (InterNIC) or service provider.This address is likely to be an RFC 1918 private address.* Inside global
address – A legitimate IP address assigned by the InterNIC or service provider that represents one or more inside local IP addresses to the outside world.* Outside
local address – The IP address of an outside host as it is known to the hosts on the inside network.* Outside global address – The IP address assigned to a host
on the outside network. The owner of the host assigns
this address.
Answer: D
Explanation:
FHRP is layer 3 protocol whose purpose is to protect the default gateway by offering redundancy of the gateway in a subnet. This is achieved by allowing two or
more routers to provide a backup for the first-hop IP router address. If a failure of an active router occurs, the backup router will take over the address. The routers
negotiate their roles (Active/Standby) with each other by multicast hello messages to share the VIP (virtual IP address) between the FHRP routers. The terms
Active/Standby vary between the different types of FHRP. The active router will act as the default gateway and the standby router acts as a backup the active
router.
A. asychronous routing
B. single-homed branches
C. dual-homed branches
D. static routing
E. dynamic routing
Answer: AC
Answer: A
Answer: B
Explanation:
Stateful inspection, also known as dynamic packet filtering, is a firewall technology that monitors the state of active connections and uses this information to
determine which network packets to allow through the firewall.
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C
A. SNMP
B. DNS lookup
C. syslog
D. NTP
Answer: B
A. BPDUfilter
B. PortFast
C. Backbonefast
D. BPDUguard
Answer: B
Explanation:
PortFast
Spanning Tree Portfast causes layer 2 switch interfaces to enter forwarding state immediately, bypassing the listening and learning states. It should be used on
ports connected directly to end hosts like servers or workstations. Note: If portfast isn’t enabled, DHCP timeouts can occur while STP converges, causing more
problems.
https://skminhaj.wordpress.com/2015/03/04/spanning-tree-stp-rstp-mst-enhancements/
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. intrusion detection
B. user awareness
C. physical access control
D. network authorization
Answer: C
A. latency
B. port security violation
C. shutdown command issued on the port
D. nothing plugged into the port
Answer: B
Explanation:
This mode is the default violation mode; when in this mode, the switch will automatically force the switchport into an error disabled (err-disable) state when a
violation occurs. While in this state, the switchport forwards no traffic. The switchport can be brought out of this error disabled state by issuing the errdisable
recovery cause CLI command or by disabling and reenabling the switchport.
A. SMTP
B. SNMP
C. TCP
D. FTP
Answer: B
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer: D
Explanation:
Forward time : Determines how long each of the listening and learning states last before the port begins forwarding.
Switch(config)# [ no ] spanning-tree vlan vlan_ID forward-time forward_timeConfigures the forward time of a VLAN. The forward_time value can be from 4 to 30
seconds. https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/15-02SG/configuration/guide/config/spantree.html#56177
Answer: B
A. OpenFlow
B. REST API
C. NETCONF
D. Southbound API
Answer: B
A. DHCP
B. STP
C. SNMP
D. DNS
Answer: A
Answer: B
A. Bronze
B. Platinum
C. Silver
D. Gold
Answer: B
Explanation:
Reference: https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/81831-qos-wlc-lap.html
Cisco Unified Wireless Network solution WLANs support four levels of QoS: Platinum/Voice, Gold/Video, Silver/Best Effort (default), and Bronze/Background.
A. It selects the RIP route because it has the longest prefix inclusive of the destination address.
B. It chooses the OSPF route because it has the longest prefix inclusive of the destination address.
C. it load-balances traffic between all three routes
D. It chooses the EIGRP route because it has the lowest administrative distance
Answer: A
A network administrator must permit SSH access to remotely manage routers in a network. The operations team resides on the 10.20.1.0/25 network. Which
command will accomplish this task?
Answer: D
Explanation:
Note : Already a statement is there in last to allow SSH Traffic for network 10.20.1.0 0.0.0.127, but Second statement says deny ip any 10.20.1.0 0.0.0.255, so
how it will work once it is denied. So the right answer is remove the --- no access-list 2699 deny ip any 10.20.1.0 0.0.0.255.
Answer: A
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Connectivity between three routers has been established, and IP services must be configured jn the order presented to complete the implementation Tasks
assigned include configuration of NAT, NTP, DHCP, and SSH services.
* 1. All traffic sent from R3 to the R1 Loopback address must be configured for NAT on R2. All source addresses must be translated from R3 to the IP address of
Ethernet0/0 on R2, while using only a standard access list named NAT To verify, a ping must be successful to the R1 Loopback address sourced from R3. Do not
use NVI NAT configuration.
* 2. Configure R1 as an NTP server and R2 as a client, not as a peer, using the IP address of the R1 Ethernet0/2 interface. Set the clock on the NTP server for
midnight on January 1, 2019.
* 3. Configure R1 as a DHCP server for the network 10.1.3.0/24 in a pool named TEST. Using a single command, exclude addresses 1-10 from the range.
Interface Ethernet0/2 on R3 must be issued the IP address of 10.1.3.11 via DHCP.
* 4. Configure SSH connectivity from R1 to R3, while excluding access via other remote connection protocols. Access for user root and password Cisco must be
set on router R3 using RSA and 1024 bits. Verify connectivity using an SSH session from router R1 using a destination address of 10.1.3.11. Do NOT modify
console access or line numbers to accomplish this task.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer as below configuration:
conf t
R1(config)#ntp master 1
R2(config)#ntp server 10.1.2.1
Exit
Router#clock set 00:00:00 jan 1 2019 ip dhcp pool TEST
network 10.1.3.0 255.255.255.0
ip dhcp exluded-address 10.1.3.1 10.1.3.10 R3(config)#int e0/3
R3(config)#int e0/2 ip address dhcp no shut
crypto key generate RSA 1024
Copy run start
IP connectivity and OSPF are preconfigured on all devices where necessary. Do not make any changes to the IP addressing or OSPF. The company policy uses
connected interfaces and next hops when configuring static routes except for load balancing or redundancy without floating static. Connectivity must be
established between subnet 172.20.20.128/25 on the Internet and the LAN at 192.168.0.0/24 connected to SW1:
* 1. Configure reachability to the switch SW1 LAN subnet in router R2.
* 2. Configure default reachability to the Internet subnet in router R1.
* 3. Configure a single static route in router R2 to reach to the Internet subnet considering both redundant links between routers R1 and R2. A default route is NOT
allowed in router R2.
* 4. Configure a static route in router R1 toward the switch SW1 LAN subnet where the primary link must be through Ethernet0/1. and the backup link must be
through Ethernet0/2 using a floating route. Use the minimal administrative distance value when required.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer as below configuration:
On R2:
Enable Conf t
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer as below configuration:
* 1.- on R3
config terminal
ip route 192.168.1.1 255.255.255.255 209.165.200.229
end
copy running start
* 2.- on R2
config terminal
ip route 0.0.0.0 0.0.0.0 209.165.202.130
end
copy running start
* 3.- on R2
config terminal
ipv6 route ::/0 2001:db8:abcd::2 end
copy running start
Three switches must be configured for Layer 2 connectivity. The company requires only the designated VLANs to be configured on their respective switches and
permitted accross any links between switches for security purposes. Do not modify or delete VTP configurations.
The network needs two user-defined VLANs configured:
VLAN 110: MARKETING
VLAN 210: FINANCE
* 1. Configure the VLANs on the designated switches and assign them as access ports to the interfaces connected to the PCs.
* 2. Configure the e0/2 interfaces on Sw1 and Sw2 as 802.1q trunks with only the required VLANs permitted.
* 3. Configure the e0/3 interfaces on Sw2 and Sw3 as 802.1q trunks with only the required VLANs permitted.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer as below configuration:
Sw1 enbale config t Vlan 210
Name FINANCE
Inter e0/1
Switchport access vlan 210 do wr
Sw2 Enable config t Vlan 110
Name MARKITING
Int e0/1
Switchport acees vlan 110 do wr
Sw3 Enable config t
Vlan 110
Name MARKITING
Vlan 210
Name FINANCE
Int e0/0
Switchport access vlan 110 Int e0/1
Switchport access vlan 210
Sw1
Int e0/1
Switchport allowed vlan 210
Sw2
Int e0/2
Switchport trunk allowed vlan 210
Sw3
Int e0/3
Switchport trunk allowed vlan 210 Switchport trunk allowed vlan 210,110
A. Mastered
B. Not Mastered
Answer: A
Explanation:
? To configure static routing on R1 to ensure that it prefers the path through R2 to reach only PC1 on R4’s LAN, you need to create a static route for the host
10.0.0.100/8 with a next-hop address of 20.0.0.2, which is the IP address of R2’s interface connected to R1. You also need to assign a lower administrative
distance (AD) to this route than the default AD of 1 for static routes, so that it has a higher preference over other possible routes. For example, you can use an AD
of 10 for this route. To create this static route, you need to enter the following commands on R1’s console:
R1#configure terminal R1(config)#ip route 10.0.0.100 255.0.0.0 20.0.0.2 10 R1(config)#end
? To configure static routing on R1 that ensures that traffic sourced from R1 will take an alternate path through R3 to PC1 in the event of an outage along the
primary path, you need to create another static route for the host 10.0.0.100/8 with a next- hop address of 40.0.0.2, which is the IP address of R3’s interface
connected to R1. You also need to assign a higher AD to this route than the AD of the primary route, so that it has a lower preference and acts as a backup route.
For example, you can use an AD of 20 for this route. This type of static route is also known as a floating static route. To create this static route, you need to enter
the following commands on R1’s console:
R1#configure terminal R1(config)#ip route 10.0.0.100 255.0.0.0 40.0.0.2 20 R1(config)#end
? To configure default routes on R1 and R3 to the Internet using the least number of hops, you need to create a static route for the network 0.0.0.0/0 with a next-
hop address of the ISP’s interface connected to each router respectively. A default route is a special type of static route that matches any destination address and
is used when no other specific route is available. The ISP’s interface connected to R1 has an IP address of 10.0.0.4, and the ISP’s interface connected to R3 has
an IP address of 50.0.0.4. To create these default routes, you need to enter the following commands on each router’s console:
On R1: R1#configure terminal R1(config)#ip route 0.0.0.0 0.0.0.0 10.0.0.4 R1(config)#end On R3: R3#configure terminal R3(config)#ip route 0.0.0.0 0.0.0.0
50.0.0.4 R3(config)#end
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer as below configuration:
On SW1:
conf terminal vlan 15
exit
interface range eth0/0 - 1 channel-group 1 mode active exit
interface port-channel 1
switchport trunk encapsulation dot1q switchport mode trunk
switchport trunk native vlan 15 end
copy run start
on SW2:
conf terminal
vlan 15 exit
interface range eth0/0 - 1 channel-group 1 mode active exit
interface port-channel 1
switchport trunk encapsulation dot1q switchport mode trunk
switchport trunk native vlan 15 end
copy run start
Guidelines
This is a lab item in which tasks will be performed on virtual devices.
• Refer to the Tasks tab to view the tasks for this lab item.
• Refer to the Topology tab to access the device console(s) and perform the tasks.
• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.
• All necessary preconfigurations have been applied.
• Do not change the enable password or hostname for any device.
• Save your configurations to NVRAM before moving to the next item.
• Click Next at the bottom of the screen to submit this lab and move to the next question.
• When Next is clicked, the lab closes and cannot be reopened.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
? To subnet 172.25.0.0/16 to meet the subnet requirements and maximize the number of hosts, you need to determine how many bits you need to borrow from the
host portion of the address to create enough subnets for 32 sites. Since 32 is 2^5, you need to borrow 5 bits, which means your new subnet mask will be /21 or
255.255.248.0. To find the second subnet, you need to add the value of the fifth bit
(32) to the third octet of the network address (0), which gives you 172.25.32.0/21 as the second subnet. The first usable IP address in this subnet is 172.25.32.1,
and the last usable IP address is 172.25.39.254.
? To assign the first usable IP address to e0/0 on Sw101, you need to enter the
following commands on the device console:
Sw101#configure terminal Sw101(config)#interface e0/0 Sw101(config-if)#ip address 172.25.32.1 255.255.248.0 Sw101(config-if)#no shutdown Sw101(config-
if)#end
? To assign the last usable IP address to e0/0 on Sw102, you need to enter the
following commands on the device console:
Sw102#configure terminal Sw102(config)#interface e0/0 Sw102(config-if)#ip address 172.25.39.254 255.255.248.0 Sw102(config-if)#no shutdown Sw102(config-
if)#end
? To subnet an IPv6 GUA to meet the subnet requirements and maximize the
number of hosts, you need to determine how many bits you need to borrow from the interface identifier portion of the address to create enough subnets for 32
sites. Since 32 is 2^5, you need to borrow 5 bits, which means your new prefix length will be /69 or ffff:ffff:ffff:fff8::/69 (assuming that your IPv6 GUA has a /64
prefix by default). To find the second subnet, you need to add the value of the fifth bit (32) to the fourth hextet of the network address (0000), which gives you
xxxx:xxxx:xxxx:0020::/69 as the second subnet (where xxxx:xxxx:xxxx is your IPv6 GUA prefix). The first and last IPv6 addresses in this subnet are
xxxx:xxxx:xxxx:0020::1 and xxxx:xxxx:xxxx:0027:ffff:ffff:ffff:fffe respectively.
? To assign an IPv6 GUA using a unique 64-bit interface identifier on e0/0 on
Sw101, you need to enter the following commands on the device console (assuming that your IPv6 GUA prefix is 2001:db8::/64):
Sw101#configure terminal Sw101(config)#interface e0/0 Sw101(config-if)#ipv6 address 2001:db8::20::1/69 Sw101(config-if)#no shutdown Sw101(config-if)#end
? To assign an IPv6 GUA using a unique 64-bit interface identifier on e0/0 on
Sw102, you need to enter the following commands on the device console (assuming that your IPv6 GUA prefix is 2001:db8::/64):
Sw102#configure terminal Sw102(config)#interface e0/0 Sw102(config-if)#ipv6 address 2001:db8::27::fffe/69 Sw102(config-if)#no shutdown Sw102(config-if)#end
A. PSK
B. TKIP
C. SAE
D. AES
Answer: D
Answer: A
Explanation:
Link Aggregation Group (LAG) is a feature that allows you to bundle multiple physical Ethernet links into a single logical link, and is used to increase the available
throughput on the link. LAG is supported on the Cisco Wireless LAN Controller (WLC) and the connected switch ports [1], and can be used to provide greater
bandwidth and increased redundancy. It also enables the connected switch ports to use different Layer 2 configurations, such as Spanning Tree Protocol (STP)
and Hot Standby Router Protocol (HSRP).
Relate Links
https://www.exambible.com/200-301-exam/
Contact us
We are proud of our high-quality customer service, which serves you around the clock 24/7.
Viste - https://www.exambible.com/