New 1
New 1
A. 1.544 Mbps
B. 2.048 Mbps
C. 34.368 Mbps
D. 43.7 Mbps
Answer: A
Explanation
Question 11
Answer: A
Explanation
At present, there are four kinds of c: OM1, OM2, OM3 and OM4. The letters “OM” stand for optical
multi-mode. OM3 and OM4 fibers will support upcoming 40 and 100 Gb/s speeds. OM2, OM3, OM4
and OM5 have 50 micron core diameter.
Question 18
Refer to the exhibit.
Shortly after SiteA was connected to SiteB over a new single-mode fiber path, users at SiteA
report intermittent connectivity issues with applications hosted at SiteB. What is the cause of the
intermittent connectivity issue?
Answer: A
Explanation
The txload and rxload on both sites are 1/255 so the interfaces are not busy in transmitting and
receiving traffic. But the reliability on SiteA is only 166/255 which indicates input and output errors
increase. Reliability is calculated by this formula: reliability = number of packets / number of total
frames.
Question 38
What is the difference in data transmission delivery and reliability between TCP and UDP?
A. UDP sets up a connection between both devices before transmitting data. TCP uses the three-
way handshake to transmit data with a reliable connection.
B. TCP transmits data at a higher rate and ensures packet delivery. UDP retransmits lost data to
ensure applications receive the data on the remote end.
C. UDP is used for multicast and broadcast communication. TCP is used for unicast communication
and transmits data at a higher rate with error checking.
D. TCP requires the connection to be established before transmitting data. UDP transmits data at a
higher rate without ensuring packet delivery.
Answer: D
Question 39
Answer: A
Explanation
A network endpoint is any device that is physically an end point on a network. Laptops, desktops,
mobile phones, tablets, servers, and virtual environments can all be considered endpoints.
Network endpoints may be a threat to our networks if they are compromised.
Question 51
What are two similarities between UTP Cat 5e and Cat 6a cabling? (Choose two)
Answer: A D
Question 2
Answer: A
Explanation
1000BASE-T standard only supports up to 100 meters while 1000BASE-LX is a standard which
uses a 1,270–1,355 nm laser for longer wavelength. It has a distance capability of up to 5
kilometers over a Single-mode fiber -> Answer D is not correct.
1000BASE-LX is an optical fiber Gigabit Ethernet standard so it does not support RJ-45 connectors
directly -> Answer C is not correct.
Question 22
Drag and drop the lightweight access point operation modes from the left onto the descriptions on
the right.
Answer:
Explanation
You can have the WLCs across the WAN from the APs. LWAPP/CAPWAP works over a WAN when
the LAPs are configured in Remote Edge AP (REAP) or Hybrid Remote Edge AP(H-REAP)
mode. Either of these modes allows the control of an AP by a remote controller that is connected
via a WAN link. Traffic is bridged onto the LAN link locally, which avoids the need to unnecessarily
send local traffic over the WAN link.
Reference: https://www.cisco.com/c/en/us/support/docs/wireless/wireless-lan-controller-
software/118833-wlc-design-ftrs-faq.html
When you configure the Bridge mode, the AP by default reboots as a Mesh AP (MAP) and tries to
register to the WLC via the radio backhaul or the wired backhaul.
Local mode (default mode): measures noise floor and interference, and scans for intrusion
detection (IDS) events every 180 seconds on unused channels
Sniffer mode: run as a sniffer and captures and forwards all the packets on a particular channel
to a remote machine where you can use protocol analysis tool (Wireshark, Airopeek, etc) to review
the packets and diagnose issues.
Monitor mode: does not transmit or serve clients at all. It acts like a dedicated sensor for
location-based services (LBS), rogue AP detection, and Checks Intrusion Detection System (IDS).
In this mode, AP will not broadcast an SSID so clients are unable to connect to it.
Rogue detector mode: monitor for rogue APs. It does not handle data at all.
Question 23
Answer: C
Explanation
The 2.4 GHz band is subdivided into multiple channels each allotted 22 MHz bandwidth and
separated from the next channel by 5 MHz.
-> A best practice for 802.11b/g/n WLANs requiring multiple APs is to use non-overlapping
channels such as 1, 6, and 11.
Reference: https://www.cisco.com/c/en/us/support/docs/wireless/aironet-340-series/8117-
connectivity.html
If other Wi-Fi sources such as neighboring wireless access points are using the same wireless
channel, this may cause intermittent connectivity issues.
Reference: https://arris.secure.force.com/consumers/articles/General_FAQs/SBG8300-
Troubleshooting-Intermittent-Wi-Fi-Connections/?l=en_US&fs=RelatedArticle
In this question, both Zone 3 & Zone 4 use Channel 11 so interference can occur.
Question 24
A. access point
B. switch
C. wireless controller
D. firewall
Answer: D
Question 25
Drag the descriptions of device management from the left onto the types of device management
on the right.
Answer:
Question 26
Answer: A
Question 27
Answer: A
Question 28
Answer: D
Question 29
Which 802.11 frame type is indicated by a probe response after a client sends a probe request?
A. action
B. management
C. control
D. data
Answer: B
Explanation
There are three main types of 802.11 frames: the Data Frame, the Management Frame and the
Control Frame. Association Response belongs to Management Frame. Association response is sent
in response to an association request.
Question 30
Explanation
The 2.4 GHz band is subdivided into multiple channels each allotted 22 MHz bandwidth and
separated from the next channel by 5 MHz.
-> A best practice for 802.11b/g/n WLANs requiring multiple APs is to use non-overlapping
channels such as 1, 6, and 11.
Reference: https://www.cisco.com/c/en/us/support/docs/wireless/aironet-340-series/8117-
connectivity.html
Question 31
For security reasons, automatic neighbor discovery must be disabled on the R5 Gi0/1 interface.
Option A Option B
Option C Option D
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C
Explanation
Although CDP is a Layer 2 protocol but we can check the neighbor IP address with the “show cdp
neighbor detail” command.
One of the task in this question is “display the IP address of R6’s interface Gi0/2” so we must use
“show cdp neighbor detail” command -> Only Option A and Option C are correct.
If we want to disable LLDP on an interface we can use two commands under interface mode:
no lldp transmit: Disallows sending LLDP packets on the interface.
no lldp receive: Disallows receiving LLDP packets on the interface.
But these two commands are not used in this question so we have to disable LLDP globally (with
command “no lldp run”) so that only CDP is enabled on R5 interface Gi0/2 -> Only Option C is
correct.
Question 32
Which type of API allows SDN controllers to dynamically make changes to the network?
A. northbound API
B. southbound API
C. SOAP API
D. REST API
Answer: B
Question 33
Answer: A
Explanation
The most frequently used port for DNS is UDP 53 but as time progresses, DNS will reply on TCP
Port 53 more heavily.
Question 34
Without allowing Telnet access from PC-1, which action must be taken to permit the traffic?
Answer: A
Question 35
Drag and drop the TCP/IP protocols from the left onto their primary transmission protocols on the
right.
Answer:
TCP:
+ SMTP
+ HTTP
+ Telnet
UDP:
+ DNS
+ SNMP
+ RTP
Question 36
A. Configure the ip dhcp snooping trust command on the interface that is connected to the
DHCP server
B. Configure the ip dhcp relay information option command on the interface that is connected
to the DHCP server
C. Configure the ip dhcp relay information option command on the interface that is connected
to the DHCP client
D. Configure the ip dhcp snooping trust command on the interface that is connected to the
DHCP client
Answer: A
Explanation
We see from the output of the “show ip dhcp snooping statistics detail” command the packets
“received on untrusted ports = 32” so maybe the interface connected to DHCP Server is configured
untrusted port. Therefore we have to configure the “ip dhcp snooping trust” command on this
interface.
Question 37
A. RSA token
B. clear-text password that authenticates connections
C. one of more CRLs
D. preshared key that authenticates connections
E. CA that grants certificates
Answer: C E
Explanation
PKI (or Public Key Infrastructure) is the framework of encryption and cybersecurity that protects
communications between the server (your website) and the client (the users). Think about all the
information, people, and services that your team communicates and works with. PKI is essential in
building a trusted and secure business environment by being able to verify and exchange data
between various servers and users.
The components of a PKI include:
+ public key
+ private key
+ Certificate Authority (CA)
+ Certificate Store
+ Certificate Revocation List (CRL)
+ Hardware Security Module
Reference: https://www.securew2.com/blog/public-key-infrastructure-explained
Question 38
A network administrator is setting up a new IPv6 network using the 64-bit address
2001:0EB8:00C1:2200:0001:0000:0000:0331/64. To simplify the configuration, the administrator
has decided to compress the address. Which IP address must the administrator configure?
Answer: D
Question 39
Which command must be issued to enable a floating static default route on router A?
Answer: C
Question 40
Router R1 currently is configured to use R3 as the primary route to the Internet, and the route
uses the default administrative distance settings. A network engineer must configure R1 so that it
uses R2 as a backup, but only if R3 goes down. Which command must the engineer configure on
R1 so that it correctly uses R2 as a backup route, without changing the administrative distance
configuration on the link to R3?
Answer: A
Explanation
R1 uses R3 as the primary route to the Internet so it may use either of these commands:
The administrative distance (AD) of the first command is 1 while that of the second command is 0.
Therefore we have to choose a higher AD for our backup route. And the exit interface of the
backup route is g0/1 or the next-hop is 209.165.200.230.
Question 41
Answer: B
Explanation
By only configuring static route to the host New Server, we also don’t allow PC1 & PC2 ping to R2
Gi0/0 (default gateway of New Server).
Question 42
Which plan must be implemented to ensure optimal QoS marking practices on this network?
A. As traffic enters from the access layer on SW1 and SW2, trust all traffic markings
B. Trust the IP phone markings on SW1 and mark traffic entering SW2 at SW2
C. As traffic traverses MLS1 remark the traffic, but trust all markings at the access layer
D. Remark traffic as it traverses R1 and trust all markings at the access layer
Answer: B
Explanation
“Classify, mark, and police as close to the traffic-sources as possible.” -> Answer C is not correct.
Reference: https://www.cisco.com/en/US/technologies/tk543/tk759/technologies_white_paper090
0aecd80295aa1.pdf
As a rule, it is not recommended to trust markings set by end users leveraging PCs or other
endpoint devices. End users can intentionally or unintentionally abuse QoS policies that trust
markings of end devices. If users and unclassified applications take advantage of the configured
QoS policy as a result of trusting end devices, this can result in easily starving priority queues with
nonpriority traffic, ruining quality of service for real-time applications.
Reference: https://www.ciscopress.com/articles/article.asp?p=2756478&seqNum=2
Question 43
Drag and drop the Rapid PVST+ forwarding state actions from the left to the right. Not all actions
are used.
Answer:
Explanation
Forwarding State
A LAN port in the forwarding state forwards frames. The LAN port enters the forwarding state from
the learning state. A LAN port in the forwarding state performs as follows:
Forwards frames received from the attached segment.
Forwards frames switched from another port for forwarding.
Incorporates the end station location information into its address database.
Receives BPDUs and directs them to the system module.
Processes BPDUs received from the system module.
Receives and responds to network management messages.
Reference: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus5000/sw/layer2/50
3_n1_1/Cisco_n5k_layer2_config_gd_rel_503_N1_1_chapter9.html
The statement “BPDUs received from the system module are processed and transmitted” is not
correct as Rapid PVST+ does not “transmit”, only PVST does.
Question 44
interface FastEthernet0/10
description WAN_INTERFACE
ip address 10.0.1.2 255.255.255.252
ip access-group 100 in
!
interface FastEthernet0/1
description LAN INTERFACE
ip address 10.148.2.1 255.255.255.0
duplex auto
speed auto
!
ip forward-protocol nd
!
access-list 100 permit eigrp any any
access-list 100 permit icmp any any
access-list 100 permit tcp 10.149.3.0 0.0.0.255 host 10.0.1.2
eq 22
access-list 100 permit tcp any any eq 80
access-list 100 permit tcp any any eq 443
access-list 100 deny ip any any log
Which configuration enables DHCP addressing for hosts connected to interface FastEthernet0/1 on
router R4?
A. interface FastEthernet0/1
ip helper-address 10.0.1.1
!
access-list 100 permit tcp host 10.0.1.1 eq 67 host 10.148.2.1
B. interface FastEthernet0/0
ip helper-address 10.0.1.1
!
access-list 100 permit host 10.0.1.1 host 10.148.2.1 eq bootps
C. interface FastEthernet0/0
ip helper-address 10.0.1.1
!
access-list 100 permit udp host 10.0.1.1 eq bootps host 10.148.2.1
D. interface FastEthernet0/1
ip helper-address 10.0.1.1
!
access-list 100 permit udp host 10.0.1.1 eq bootps host 10.148.2.1
Answer: D
Question 45
Which configuration allows routers R14 and R16 to form an OSPFv2 adjacency while acting as a
central point for exchanging OSPF information between routers?
Option A Option B
R14# R14#
interface FastEthernet0/0 interface FastEthernet0/0
ip address 10.73.65.65 ip address 10.73.65.65
255.255.255.252 256.255.255.252
ip ospf network broadcast ip ospf network broadcast
ip ospf priority 0 ip ospf priority 255
ip mtu 1400 ip mtu 1500
R86# R86#
interface Loopback0 interface FastEthernet0/0
ip address 10.10.1.86 ip address 10.73.65.66
266.255.255.255 256.255.255.252
ip ospf network broadcast
interface FastEthernet0/0 ip mtu 1500
ip address 10.73.65.66
255.255.255.252 router ospf 10
ip ospf network broadcast router-id 10.10.1.86
ip mtu 1500 network 10.10.1.86 0.0.0.0 area 0
network 10.73.65.64 0.0.0.3 area 0
router ospf 10
router-id 10.10.1.86
network 10.10.1.86 0.0.0.0 area 0
network 10.73.65.64 0.0.0.3 area 0
Option C Option D
R14# R14#
interface Loopback0 interface FastEthernet0/0
ip ospf 10 area 0 ip address 10.73.65.65
255.255.255.252
interface FastEthernet0/0 ip ospf network broadcast
ip address 10.73.65.65 ip ospf priority 255
255.255.255.252 ip mtu 1500
ip ospf network broadcast
ip ospf 10 area 0 router ospf 10
ip mtu 1500 router-id 10.10.1.14
network 10.10.1.14 0.0.0.0 area 0
router ospf 10 network 10.73.65.64 0.0.0.3 area 0
ip ospf priority 255
router-id 10.10.1.14 R86#
interface FastEthernet0/0
R86# ip address 10.73.65.66
interface Loopback0 255.255.255.252
ip ospf 10 area 0 ip ospf network broadcast
ip mtu 1400
interface FastEthernet0/0
ip address 10.73.65.66 router ospf 10
255.255.255.252 router-id 10.10.1.86
ip ospf network broadcast network 10.10.1.86 0.0.0.0 area 0
ip ospf 10 area 0 network 10.73.65.64 0.0.0.3 area 0
ip mtu 1500
router ospf 10
router-id 10.10.1.86
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
Explanation
In Option A and Option D, the MTUs of two Fa0/0 interfaces are mismatched so they cannot form
OSPF adjacency -> Option A and Option D are not correct.
DR and BDR serve as the central point for exchanging OSPF routing information so we must
configure Fa0/0 interfaces in broadcast mode. In Option B, R14 Fa0/0 interface is configured with
OSPF priority 255 so surely it would become DR -> This is the best answer.
Note: An OSPF priority of 0 does not prevent the router from establishing OSPF adjacencies.
Question 46
A. WPA
B. WPA3
C. WPA2
D. WEP
Answer: B
Explanation
WPA3 (Wi-Fi Protected Access 3) is the newest wireless security protocol designed to encrypt data
using a frequent and automatic encryption type called Perfect Forward Secrecy. It’s more secure
than its predecessor, WPA2, but it hasn’t been widely adopted yet. Not all hardware supports
WPA3 automatically, and using this protocol often requires costly upgrades.
Reference: https://www.avast.com/c-wep-vs-wpa-or-wpa2
Question 47
A network engineer must provide configured IP addressing details to investigate a firewall rule
issue. Which subnet and mask identify what is configured on the en0 interface?
A. 10.8.0.0/16
B. 10.8.64.0/18
C. 10.8.128.0/19
D. 10.8.138.0/24
Answer: C
Explanation
netmask 0xffffe000 means 255.255.224.0 or /19 (convert from hex to decimal) -> Answer C is
correct. We also notice the broadcast address is 10.8.159.255.
Question 48
A network engineer must configure two new subnets using the address block 10.70.128.0/19 to
meet these requirements:
* The first subnet must support 24 hosts.
* The second subnet must support 472 hosts
* Both subnets must use the longest subnet mask possible from the address block
Which two configurations must be used to configure the new subnets and meet a requirement to
use the first available address in each subnet for the router interfaces? (Choose two)
Answer: C E
Explanation
In order to support 24 (<25) hosts we need 5 bits 0 in the subnet mask so the last octet of the
subnet mask must be 1110 0000 -> 255.255.255.224. In the answer above there are two IP
address with subnet mask 255.255.255.224. They are:
+ 10.70.147.17 255.255.255.224: This IP address belongs to subnet 10.70.147.0/27 but
10.70.147.17 is not the first available address in this subnet (the first available address in this
subnet is 10.70.147.1)
+ 10.70.155.65 255.255.255.224: This IP address belongs to subnet 10.70.155.64/27 and
10.70.155.65 is the first available address in this subnet -> Answer E is correct.
In order to support 472 (<512 = 29) hosts we need 9 bits 0 in the subnet mask -> 255.255.254.0.
In the answer above there are two IP address with subnet mask 255.255.254.0. They are:
+ 10.70.148.1 255.255.254.0: This IP address belongs to subnet 10.70.148.0/23 and it is the first
available IP address in this subnet
+ 10.70.159.1 255.255.254.0: This IP address belongs to subnet 10.70.158.0/23. It is not the
first available IP address in this subnet (the first available IP address is 10.70.158.1).
Question 49
An administrator must connect SW_1 and the printer to the network. SW_2 requires DTP to be
used for the connection to SW_1. The printer is configured as an access port with VLAN 5. Which
set of commands completes the connectivity?
Question 50
Traffic sourced from the loopback0 interface is trying to connect via ssh to the host at 10.0.1.15.
What is the next hop to the destination address?
A. 192.168.0.7
B. 192.168.0.4
C. 192.168.0.40
D. 192.168.3.5
Answer: A
Explanation
10.0.1.0/28 is always preferred over 10.0.1.0/24 because of longest prefix match. 10.0.0.15
belongs to 10.0.1.0/28 subnet so the next hop is 192.168.0.7 (learned via EIGRP).
Question 51
Refer to the exhibit.
Shortly after SiteA was connected to SiteB over a new single-mode fiber path, users at SiteA
report intermittent connectivity issues with applications hosted at SiteB. What is the cause of the
intermittent connectivity issue?
A. An incorrect type of transceiver has been inserted into a device on the link.
B. The wrong cable type was used to make the connection.
C. Heavy usage is causing high latency.
D. Physical network errors are being transmitted between the two sites.
Answer: A
Explanation
SR stands for Short Reach, and LR stands for Long Reach. SR supports 400metres while LR
supports 10 kilometers. In this question, SiteA is using SFP-SR so it is not suitable for 7KM
distance.
Question 52
A. Configure the OSPF priority on router A with the lowest value between the three routers
B. Configure the router A interfaces with the highest OSPF priority value within the area.
C. Configure router A with a fixed OSPF router ID.
D. Configure router B and router C as OSPF neighbors of router A.
Answer: B
Explanation
The router with the highest OSPF priority on a segment will become the DR for that segment
Question 53
What does the switch do when ft receives the frame from host A?
A. It shuts down the port Fa0/1 and places it in err-disable mode.
B. It experiences a broadcast storm,
C. It floods the frame out of all ports except port Fa0/1.
D. It drops the frame from the switch CAM table.
Answer: C
Explanation
When the switch receives a frame for a MAC destination address not listed in its address table, it
floods the frame to all LAN ports of the same VLAN except the port that received the frame.
In this question, switch has not learned about host D yet so it floods the frame to all LAN ports of
the same VLAN except Fa0/1 which it received frame from host A.
Question 54
An engineer has started to configure replacement switch SW1. To verify part of the configuration,
the engineer issued the commands as shown and noticed that the entry for PC2 is missing. Which
change must be applied to SW1 so that PC1 and PC2 communicate normally?
A. SW1(config)#interface fa0/2
SW1(config-if)#no switchport access vlan 2
SW1(config-if}#no switchport trunk allowed vlan 3
SW1 (config-if)#switchport trunk allowed vlan 2
B. SW1(config)#interface fa0/1
SW1(config-if}#no switchport access vlan 2
SW1(config-if)#switchport trunk native vlan 2
SW1(config-if)#switchport trunk allowed vlan 3
C. SW1(config-if)#interface fa0/2
SW1(config-if)#no switchport mode trunk
SW1(config-if)#no switchport trunk allowed vlan 3
SW1(config-if)#switchport mode access
D. SW1(config)#interface fa0/1
SW1(config-if)#no switchport access vlan 2
SW1(config-if)#switchport access vlan 3
SW1(config-if)#switchport trunk allowed vlan 2
Answer: C
Question 55
Answer: D E
Explanation
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_ssh/configuration/15-
e/sec-usr-ssh-15-e-book/sec-secure-shell-v2.html
Question 56
Which two spanning-tree states are bypassed on an interface running PortFast? (Choose two)
A. forwarding
B. blocking
C. disabled
D. learning
E. listening
Answer: D E
Explanation
Enabling the PortFast feature causes a switch or a trunk port to enter the STP forwarding-state
immediately or upon a linkup event, thus bypassing the listening and learning states.
Question 57
Answer: B
Explanation
When you enable LAG or make any changes to the LAG configuration, you must immediately
reboot the controller.
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-
4/configuration/guides/consolidated/b_cg74_CONSOLIDATED/b_cg74_CONSOLIDATED_chapter_0
10100001.html
Question 58
Answer: C
Explanation
Each channel on the 2.4 GHz spectrum is 20 MHz wide. The channel centers are separated by 5
MHz, and the entire spectrum is only 100 MHz wide. This means the 11 channels have to squeeze
into the 100 MHz available, and in the end, overlap. Channels 1, 6, and 11, however, are far
enough from each other on the 2.4GHz band that they have sufficient space between their channel
centers and do not overlap.
Question 59
An engineer must configure R1 for a new user account. The account must meet these
requirements:
* It must be configured in the local database.
* The username is engineer2
* It must use the strongest password configurable.
Explanation
Secret type 4 was determined to have a flaw and was removed in later versions of iOS. Type 4
Passwords should never be used!
Secret type 5 uses MD5 which is not secured.
Secret type 9 – Scrypt and PBKDF2 (which can be used with “algorithm-type sha256”, but it is just
a small part of a much larger crypto algorithm) are much slower to compute and take longer to
brute force. Currently it is the strongest password configurable in Cisco devices.
Question 60
Which configuration enables an EtherChannel to form dynamically between SW1 and SW2 by using
an industry-standard protocol, and to support full IP connectivity between all PCs?
Option A Option B
SW1# SW1#
interface Gi0/1 interface Gi0/1
switchport switchport
switchport mode trunk switchport mode trunk
channel-group 1 mode on channel-group 1 mode auto
! !
interface Gi0/2 interface Gi0/2
switchport switchport
switchport mode trunk switchport mode access
channel-group 1 mode auto channel-group 1 mode
active
SW2#
interface Gi0/1 SW2#
switchport interface gi0/1
switchport mode trunk switchport
channel-group 1 mode auto switchport mode access
! channel-group 1 mode
interface Gi0/2 desirable
switchport !
switchport mode trunk interface Gi0/2
channel-group 1 mode on switchport
interface port-channel 1 switchport mode access
switchport channel-group 1 mode
switchport mode trunk desirable
Option C Option D
SW2#
interface Gi0/1
switchport
switchport mode trunk
channel-group 1 mode
passive
!
interface Gi0/2
switchport
switchport mode trunk
channel-group 1 mode
passive
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C
Explanation
LACP is the IEEE Standard (IEEE 802.3ad) and is the most common dynamic ether-channel
protocol, whereas PAgP is a Cisco proprietary protocol.
Question 61
Drag and drop the descriptions or AAA services from the left onto the corresponding services on
the right.
Answer:
Accounting
+ records user commands
+ logs session statistics
Authentication
+ secures access to routers
+ validates user credentials
Authorization
+ limits the user’s access permissions
+ allows the user to change to enable mode
Question 62
Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.
Answer:
TCP
+ used to reliably share files between devices
+ requires the client and the server to establish a connection before sending the packet
UDP
+ transmitted based on data contained in the packet without the need for a data channel
+ appropriate for streaming operations with minimal latency
Question 63
A. forwarding packets
B. making routing decisions
C. multicast replication at the hardware level
D. fragmenting and reassembling packets
Answer: B
Question 64
An IP subnet must be configured on each router that provides enough addresses for the number of
assigned hosts and anticipates no more than 10% growth for new hosts. Which configuration script
must be used?
Option A Option B
R7# R7#
configure terminal configure terminal
interface Fa1/0 interface Fa1/0
ip address 10.1.56.1 255.255.240.0 ip address 10.1.56.1 255.255.248.0
no shutdown no shutdown
R8# R8#
configure terminal configure terminal
interface Fa0/0 interface Fa0/0
ip address 10.9.32.1 255.255.224.0 ip address 10.9.32.1 255.255.254.0
no shutdown no shutdown
R9#
configure terminal R9#
interface Fa1/1 configure terminal
ip address 10.23.96.1 255.255.192.0 interface Fa1/1
no shutdown ip address 10.23.96.1 255.255.248.0
no shutdown
Option C Option D
R7# R7#
configure terminal configure terminal
interface Fa1/0 interface Fa1/0
ip address 10.1.56.1 255.255.252.0 ip address 10.1.56.1 255.255.192.0
no shutdown no shutdown
R8#
R8# configure terminal
configure terminal interface Fa0/0
interface Fa0/0 ip address 10.9.32.1 255.255.224.0
ip address 10.9.32.1 255.255.255.0 no shutdown
no shutdown R9#
R9# configure terminal
configure terminal interface Fa1/1
interface Fa1/1 ip address 10.23.96.1 255.255.128.0
ip address 10.23.96.1 255.255.240.0 no shutdown
no shutdown
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C
Explanation
R7 Fa1/0: 923 hosts + 10% * 923 = 1015 < 1024 = 210 hosts. The best subnet mask is /22 =
255.255.252.0
R8 Fa0/0: 225 hosts + 10% * 225 = 247 < 256 = 28 hosts. The best subnet mask is /24 =
255.255.255.0
R9 Fa1/1: 3641 hosts + 10% * 3641 = 4005 < 4096 = 212 hosts. The best subnet mask is /20 =
255.255.240.0
In fact we don’t have to calculate subnet for R9 Fa1/1 because only Option C is suitable for R7 &
R8 interfaces.
Question 65
A. 172.16.0.0/16
B. 207.165.200.0/24
C. 192.168.2.0/24
D. 192.168.1.0/24
Answer: C
Explanation
Question 66
Answer: B
Question 67
A network engineer must update the configuration on Switch2 so that it sends LLDP packets every
minute and the information sent via LLDP is refreshed every 3 minutes. Which configuration must
the engineer apply?
A. Switch2(config)#lldp timer 60
Switch2(config)# lldp tlv-select 180
B. Switch2(config)#lldp timer 60
Switch2(config)#lldp holdtime 180
C. Switch2(config)#lldp timer 1
Switch2(config)#lldp tlv-select 3
D. Switch2(config)#lldp timer 1
Switch2(config)#lldp holdtime 3
Answer: B
Explanation
+ lldp holdtime seconds: Specify the amount of time a receiving device should hold the
information from your device before discarding it
+ lldp timer rate: Set the sending frequency of LLDP updates in seconds
+ lldp tlv-select command. This will specify the LLDP TLVs to send or receive.
Question 68
R1#show run
!
router ospf 1
auto-cost reference-bandwidth
100000
!
interface GigabitEthernet0/0
bandwidth 10000000
!
interface GigabitEthernet0/1
bandwidth 100000000
!
interface GigabitEthernet0/2
ip ospf cost 100
!
interface GigabitEthernet0/3
ip ospf cost 1000
Router R1 resides in OSPF Area 0. After updating the R1 configuration to influence the paths that it
will use to direct traffic, an engineer verified that each of the four Gigabit interfaces has the same
route to 10.10.0.0/16. Which interface will R1 choose to send traffic to reach the route?
A. GigabitEthernet0/0
B. GigabitEthernet0/1
C. GigabitEthernet0/2
D. GigabitEthernet0/3
Answer: B
Explanation
The reference bandwidth in terms of Mbits per second so “auto-cost reference-bandwidth 100000”
means 100Gbps or 1011bps. The “bandwidth” under interface mode is configured in in kilobits.
Therefore:
-> R1 will choose the lowest cost path which is interface G0/1
Question 69
An engineer is configuring remote access to a router from IP subnet 10.139.58.0/28. The domain
name, crypto keys, and SSH have been configured. Which configuration enables the traffic on the
destination router?
A. interface FastEthernet0/0
ip address 10.122.49.1 255.255.255.252
ip access-group 10 in
!
ip access-list standard 10
permit udp 10.139.58.0 0.0.0.7 host 10.122.49.1 eq 22
B. line vty 0 15
access-class 120 in
!
ip access-list extended 120
permit tcp 10.139.58.0 0.0.0.15 any eq 22
C. line vty 0 15
access-group 120 in
!
ip access-list extended 120
permit tcp 10.139.58.0 0.0.0.15 any eq 22
D. interface FastEthernet0/0
ip address 10.122.49.1 255.255.255.252
ip access-group 110 in
!
ip access-list standard 110
permit tcp 10.139.58.0 0.0.0.15 eq 22 host 10.122.49.1
Answer: B
Explanation
When applying access-list to line vty we must use “access-class”, not “access-group”. Subnet
10.139.58.0/28 converts to wildcard mask is 10.139.58.0 0.0.0.15. And we have to use port 22 as
the destination port.
Question 70
A. HTTP
B. Telnet
C. SSH
D. HTTPS
Answer: C
Question 71
Answer: C
Question 72
Answer: D
Question 73
A network engineer must implement an IPv6 configuration on the vlan 2000 interface to create a
routable locally-unique unicast address that is blocked from being advertised to the internet.
Which configuration must the engineer apply?
Answer: C
Explanation
A unique local address (ULA) is an Internet Protocol version 6 (IPv6) address in the address
range fc00::/7. Its purpose in IPv6 is analogous to IPv4 private network addressing. Unique local
addresses may be used freely, without centralized registration, inside a single site or organization
or spanning a limited number of sites or organizations. They are routable only within the scope of
such private networks, but not in the global IPv6 Internet.
Question 74
Answer: C
Question 75
OSPF must be configured between routers R1 and R2. Which OSPF configuration must be applied
to router R1 to avoid a DR/BDR election?
A. router ospf 1
network 192.168.1.1 0.0.0.0 area 0
interface e1/1
ip address 192.160.1.1 255.255.255.252
ip ospf network broadcast
B. router ospf 1
network 192.168.1.1 0.0.0.0 area 0
interface e1/1
ip address 192.168.1.1 255.255.255.252
ip ospf cost 0
C. router ospf 1
network 192.168.1.1 0.0.0.0 area 0
hello interval 15
interface e1/1
ip address 192.168.1.1 255.255.255.252
D. router ospf 1
network 192.168.1.1 0.0.0.0 area 0
interface e1/1
ip address 192.168.1.1 255.55.255.252
ip ospf network point-to-point
Answer: D
Question 76
All VLANs are present in the VLAN database. Which command sequence must be applied to
complete the configuration?
A. interface FastEthernet0/1
switchport trunk native vlan 10
switchport trunk allowed vlan 10,15
B. interface FastEthernet0/1
switchport mode trunk
switchport trunk allowed vlan 10,15
C. interface FastEthernet0/1
switchport trunk allowed vlan add 10
vlan 10
private-vlan isolated
D. interface FastEthernet0/1
switchport mode access
switchport voice vlan 10
Answer: D
Explanation
The voice VLAN feature enables access ports to carry IP voice traffic from an IP phone. You can
configure a voice VLAN with the “switchport voice vlan …” command under interface mode. The full
configuration is shown below:
Switch(config)#interface fastethernet0/1
Switch(config-if)#switchport mode access
Switch(config-if)#switchport access vlan 15
Switch(config-if)#switchport voice vlan 10
Question 77
Option A Option B
Option C Option D
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
Explanation
If we enter the “enable secret privilege 15 priv4t3p4ss” command then the text “privilege 15
priv4t3p4ss” will be used as password. In both console and vty line we should use the “login”
command to enable password checking.
Question 78
Refer to the exhibit.
Packets received by the router from BGP enter via a serial interface at 209.165.201.10. Each route
is present within the routing table. Which interface is used to forward traffic with a destination IP
of 10.10.10.24?
A. F0/10
B. F0/11
C. F0/12
D. F0/13
Answer: B
Question 79
Answer: D
Explanation
Use the ip address dhcp command to obtain IP address information for the configured interface.
Question 80
Answer: B
Question 81
Drag and drop the statements about networking from the left onto the corresponding networking
types on the right.
Answer:
Traditional Networking
+ New devices are configured using the physical infrastructure
+ This type requires a distributed control plane
Controller-Based Networking
+ This type provisions resources from a centralized location
+ This type allows better control over how networks work and how networks are configured
+ This type enables networks to integrate with applications through APIs.
Question 82
A network engineer is installing an IPv6-only capable device. The client has requested that the
device IP address be reachable only from the internal network. Which type of IPv6 address must
the engineer assign?
Answer: A
Question 83
Which two commands when used together create port channel 10? (Choose two)
A. int range g0/0-1
channel-group 10 mode active
B. int range g0/0-1
channel-group 10 mode desirable
C. int range g0/0-1
channel-group 10 mode passive
D. int range g0/0-1
channel-group 10 mode auto
E. int range g0/0-1
channel-group 10 mode on
Answer: A C
Question 84
Which type of IPv6 address is similar to a unicast address but is assigned to multiple devices on
the same network at the same time?
Answer: B
Explanation
The anycast address is very similar to the multicast address, but packets will be delivered to only
one random host, instead of the entire group. Anycast address don’t have a specific range, as they
are exactly the same as regular unicast addresses. This means that a hosts has no way to
distinguish a unicast from an anycast address when it sends a packet.
Question 85
A. authorized services
B. authenticator
C. username
D. password
Answer: D
Explanation
RADIUS encrypts only the password in the access-request packet, from the client to the server.
The remainder of the packet is unencrypted. Other information, such as username, authorized
services, and accounting, can be captured by a third party.
Reference: https://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-
user-service-radius/13838-10.html
Question 86
A. R1(config)#interface fastethernet0/0
R1(config-if)#ip ospf priority 200
B. R1(config)#router ospf 1
R1(config-router)#router-id 192.168.100.1
C. R3(config)#interface fastethernet0/0
R3(config-if)#ip ospf priority 0
D. R1(config)#interface fastethernet0/0
R1(config-if)#ip ospf priority 0
E. R3(config)#interface fastethernet0/0
R3(config-if)#ip ospf priority 200
Answer: A C
Question 87
The router has been configured with a supernet to accommodate the requirement for 380 users on
a subnet. The requirement already considers 30% future growth. Which configuration verifies the
IP subnet on router R4?
A. Subnet: 10.7.54.0
Subnet mask: 255.255.254.0
Broadcast address: 10.7.54.255
Usable IP address range: 10.7.54.1 – 10.7.55.254
B. Subnet: 10.7.54.0
Subnet mask: 255.255.254.0
Broadcast address: 10.7.55.255
Usable IP address range: 10.7.54.1 – 10.7.55.254
C. Subnet: 10.7.54.0
Subnet mask: 255.255.128.0
Broadcast address: 10.7.55.255
Usable IP address range: 10.7.54.1 – 10.7.55.254
D. Subnet: 10.7.54.0
Subnet mask: 255.255.255.0
Broadcast address: 10.7.54.255
Usable IP address range: 10.7.54.1 – 10.7.55.254
Answer: B
Explanation
380 users in a subnet < 512 = 29. Therefore we need 9 bits 0 in the subnet mask ->
255.255.254.0. The increment is 2 (in the third octet) so the broadcast address is 10.7.55.255.
Question 88
Answer: D
Question 89
A. An individual IPv6 unicast address is supported on a single interface on one node but an IPv6
anycast address is assigned to a group of interfaces on multiple nodes.
B. IPv6 unicast nodes must be explicitly configured to recognize the unicast address, but IPv6
anycast nodes require no special configuration
C. IPv6 anycast nodes must be explicitly configured to recognize the anycast address, but IPv6
unicast nodes require no special configuration
D. Unlike an IPv6 anycast address, an IPv6 unicast address is assigned to a group of interfaces on
multiple nodes
Answer: A
Question 90
Which two commands must be added to update the configuration of router R1 so that it accepts
only encrypted connections? (Choose two)
A. username CNAC secret R!41!4319115@
B. crypto key generate rsa 1024
C. ip ssh version 2
D. line vty 0 4
E. transport input ssh
Answer: B E
Question 91
Answer: D
Question 92
Option A Option B
Option C Option D
A. Option A
B. Option B
C. Option C
D. Option D
Answer: D
Explanation
To configure a Cisco device as an Authoritative NTP Server, use the ntp master [stratum]
command -> Only Option A and Option D are correct.
ACL 10 is a standard ACL so we cannot configure protocol (UDP in this case) for the ACL. We can
only configure source IP address -> Option D is correct.
Question 93
Which route must be configured on R1 so that OSPF routing is used when OSPF is up. But the
server is still reachable when OSPF goes down?
Answer: D
Question 94
Answer: C
Question 95
A. SSH
B. HTTPS
C. Telnet
D. console
Answer: C
Explanation
As you know, telnet is insecure. By default, telnet is disabled on Cisco WLCs. So, if you want to
use telnet, you must enable it.
Question 96
Which command configures OSPF on the point-to-point link between routers R1 and R2?
Answer: A
Question 97
A. user-activity logging
B. service limitations
C. consumption-based billing
D. identity verification
Answer: A
Question 98
Traffic that is flowing over interface TenGigabitEthernet0/0 experiences slow transfer speeds. What
is the reason for the issue?
Answer: C
Question 99
Refer to the exhibit.
Traffic that is flowing over interface TenGigabitEthernet0/0 experiences slow transfer speeds. What
is the reason for the issue?
Answer: D
Explanation
We see the collisions are very high compared to the packets output. The is usually the result of
duplex mismatch (one is half-duplex, one end is full-duplex for example)
Question 100
Which type of network attack overwhelms the target server by sending multiple packets to a port
until the half-open TCP resources of the target are exhausted?
A. SYN flood
B. reflection
C. teardrop
D. amplification
Answer: A
Explanation
A SYN flood (half-open attack) is a type of denial-of-service (DDoS) attack which aims to make a
server unavailable to legitimate traffic by consuming all available server resources. By repeatedly
sending initial connection request (SYN) packets, the attacker is able to overwhelm all available
ports on a targeted server machine, causing the targeted device to respond to legitimate traffic
sluggishly or not at all.
Question 101
Which interface mode must be configured to connect the lightweight APs in a centralized
architecture?
A. WLAN dynamic
B. management
C. trunk
D. access
Answer: D
Question 102
Which two network actions occur within the data plane? (Choose two)
Answer: A E
Explanation
For perspective, the following list details some of the more common actions that a networking
device does that fit into the data plane:
+ De-encapsulating and re-encapsulating a packet in a data-link frame (routers, Layer 3 switches)
+ Adding or removing an 802.1Q trunking header (routers and switches)
+ Matching an Ethernet frame’s destination Media Access Control (MAC) address to the
MAC address table (Layer 2 switches)
+ Matching an IP packet’s destination IP address to the IP routing table (routers, Layer 3 switches)
+ Encrypting the data and adding a new IP header (for virtual private network [VPN] processing)
+ Changing the source or destination IP address (for Network Address Translation [NAT]
processing)
+ Discarding a message due to a filter (access control lists [ACLs], port security)
Reference: https://www.ciscopress.com/articles/article.asp?p=2995354&seqNum=2
Question 103
An engineer assumes a configuration task from a peer. Router A must establish an OSPF neighbor
relationship with neighbor 172.1.1.1. The output displays the status of the adjacency after 2
hours. What is the next step in the configuration process for the routers to establish an adjacency?
A. Set the router B OSPF ID to the same value as its IP address
B. Set the router B OSPF ID to a nonhost address
C. Configure a point-to-point link between router A and router B
D. Configure router A to use the same MTU size as router B
Answer: D
Explanation
The problem occurs most frequently when attempting to run OSPF between a Cisco router and
another vendor’s router. The problem occurs when the maximum transmission unit (MTU) settings
for neighboring router interfaces don’t match.
Reference: https://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/13684-
12.html
Question 104
CPE#show ip route
192.168.1.0/24 is variably subnetted, 3 subnets, 3 masks
B 192.168.1.0/24 [20/1] via 192.168.12.2, 00:00:06
R 192.168.1.128/25 [120/5] via 192.168.13.3, 00:02:22, Ethernet0/1
O 192.168.1.192/26 [110/11] via 192.168.14.4, 00:02:22, Ethernet0/2
D 192.168.1.224/27 [90/1024640] via 192.168.15.5, 00:01:33, Ethernet0/3
All traffic enters the CPE router from interface Serial0/3 with an IP address of 192.168.50.1. Web
traffic from the WAN is destined for a LAN network where servers are load-balanced. An IP packet
with a destination address of the HTTP virtual IP of 192.168.1.250 must be forwarded. Which
routing table entry does the router use?
Answer: D
Question 105
Answer: A
Question 106
Answer: C
Question 107
An engineer is configuring the HO router. Which IPv6 address configuration must be applied to the
router fa0/1 interface for the router to assign a unique 64-bit IPv6 address to itself?
Question 108
An engineer is configuring a new router on the network and applied this configuration. Which
additional configuration allows the PC to obtain its IP address from a DHCP server?
Answer: C
Question 109
A static route must be configured on R14 to forward traffic for the 172.21.34.0/25 network that
resides on R86. Which command must be used to fulfill the request?
Answer: D
Question 110
A. offer compression
B. increase security by using a WEP connection
C. provide authentication
D. protect traffic on open networks
Answer: D
Explanation
Opportunistic Wireless Encryption (OWE) is an extension to IEEE 802.11 that provides encryption
of the wireless medium. The purpose of OWE based authentication is avoid open unsecured
wireless connectivity between the AP’s and clients. The OWE uses the Diffie-Hellman algorithms
based Cryptography to setup the wireless encryption.
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/16-12/config-
guide/b_wl_16_12_cg/wpa3.html
Question 111
A company is configuring a failover plan and must implement the default routes in such a way that
a floating static route will assume traffic forwarding when the primary link goes down. Which
primary route configuration must be used?
Answer: D
Question 112
Which action implements physical access control as part of the security program of an
organization?
Answer: D
Question 113
Answer: C
Question 114
Answer: C
Question 115
A. R3(config)#interface Gig0/1
R3(config-if)#ip ospf priority 100
B. R3(config)#interface Gig0/0
R3(config-if)#ip ospf priority 100
C. R3(config)#interface Gig0/0
R3(config-if)#ip ospf priority 1
D. R3(config)#interface Gig0/1
R3(config-if)#ip ospf priority 0
Answer: A
Question 116
Which QoS per-hop behavior changes the value of the ToS field in the IPv4 packet header?
A. shaping
B. marking
C. policing
D. classification
Answer: B
Question 117
Which next-hop IP address does Router1 use for packets destined to host 10.10.13.158?
A. 10.10.10.5
B. 10.10.11.2
C. 10.10.12.2
D. 10.10.10.9
Answer: D
Explanation
Question 118
Answer: B
Question 119
Web traffic is coming in from the WAN interface. Which route takes precedence when the router is
processing traffic destined for the LAN network at 10.0.10.0/24?
Answer: A
Question 120
Which PoE mode enables powered-device detection and guarantees power when the device is
detected?
A. dynamic
B. static
C. active
D. auto
Answer: D
Explanation
Reference: https://www.thinlabs.com/faq/configure-cisco-switch-for-powering-poe-client
Question 121
A Cisco engineer must configure a single switch interface to meet these requirements
* accept untagged frames and place them in VLAN 20
* accept tagged frames in VLAN 30 when CDP detects a Cisco IP phone
Answer: C
Question 122
Which minimum configuration items are needed to enable Secure Shell version 2 access to R15?
A. Router(config)#hostname R15
R15(config)#crypto key generate rsa general-keys modulus 1024
R15(config-line)#line vty 0 15
R15(config-line)# transport input ssh
R15(config)#ip ssh source-interface Fa0/0
R15(config)#ip ssh stricthostkeycheck
Answer: C
Explanation
Reference: https://ipwithease.com/how-to-configure-ssh-version-2-on-cisco-router/
Question 123
Users need to connect to the wireless network with IEEE 802.11r-compatible devices. The
connection must be maintained as users travel between floors or to other areas in the building.
What must be the configuration of the connection?
A. Select the WPA Policy option with the CCKM option
B. Disable AES encryption
C. Enable Fast Transition and select the FT 802.1x option
D. Enable Fast Transition and select the FT PSK option
Answer: C
Explanation
802.11r, which is the IEEE standard for fast roaming, introduces a new concept of roaming where
the initial handshake with the new AP is done even before the client roams to the target AP, which
is called Fast Transition (FT). The initial handshake allows the client and APs to do the Pairwise
Transient Key (PTK) calculation in advance. These PTK keys are applied to the client and AP after
the client does the reassociation request or response exchange with new target AP.
FT works with both preshared key (PSK) and 802.1X authentication methods. If you check the FT
PSK check box, from the PSK Format drop-down list, choose ASCII or Hex and enter the key value
-> This question does not mention about “enter the key value” so maybe answer C is the best
choice.
Reference: https://www.cisco.com/c/dam/en/us/td/docs/wireless/controller/technotes/80211r-
ft/b-80211r-dg.html
Question 124
A. Switch1(config-if)#channel-group 1 mode on
Switch2(config-if)#channel-group 1 mode passive
B. Switch1(config-if)#channel-group 1 mode passive
Switch2(config-if)#channel-group 1 mode active
C. Switch1(config-if)#channel-group 1 mode active
Switch2(config-if)#channel-group 1 mode passive
D. Switch1(config-if)#channel-group 1 mode on
Switch2(config-if)#channel-group 1 mode active
Answer: C
Question 125
Which switch becomes the root of a spanning tree for VLAN 20 if all links are of equal speed?
A. SW1
B. SW2
C. SW3
D. SW4
Answer: A
Question 126
Router1(config)#interface GigabitEthernet0/0
Router1(config-if)#ip address 209.165.200.225 255.255.255.224
Router1(config-if)#ip nat outside
Router1(config)#interface GigabitEthernet0/1
Router1(config-if)#ip nat inside
Router1(config)#interface GigabitEthernet
Router1(config-if)#encapsulation dot1Q 100
Router1(config-if)#ip address 10.10.10.1 255.255.255.0
Router1(config)#interface GigabitEthernet0/1.200
Router1(config-if)#encapsulation dot1Q 200
Router1(config-if)#ip address 10.10.20.1 255.255.255.0
Router1(config)#ip access-list standard NAT_INSIDE_RANGES
Router1(config-std-nacl)#permit 10.10.10.0 0.0.0.255
Router1(config)#ip nat inside source list NAT_INSIDE_RANGES interface GigabitEthernet0/0
overload
Users on existing VLAN 100 can reach sites on the Internet. Which action must the administrator
take to establish connectivity to the Internet for users in VLAN 200?
Answer: B
Explanation
Question 127
A. HTTP
B. HTTPS
C. SSH
D. Telnet
Answer: B
Question 128
Drag and drop the facts about wireless architectures from the left onto the types of access point
on the right. Not all options are used.
Answer:
Explanation
An autonomous AP is a self-contained device with both wired and wireless hardware so that it
can bridge to the wired VLAN infrastructure wireless clients that belong to SSIDs. Each
autonomous AP must be configured with a management IP address so that it can be
remotely accessed using Telnet, SSH, or a web interface. Each AP must be individually managed
and maintained unless you use a management platform such as Cisco DNA Center.
Reference: https://www.ciscopress.com/articles/article.asp?p=2999384&seqNum=5
From the above paragraph, we can see autonomous AP is not managed by a WLC.
Question 129
Which value is the unique identifier that an access point uses to establish and maintain wireless
connectivity to wireless network devices?
A. VLANID
B. SSID
C. RFID
D. WLANID
Answer: B
Explanation
The SSID is a unique identifier that wireless networking devices use to establish and maintain
wireless connectivity. Multiple access points on a network or subnetwork can use the same SSIDs.
SSIDs are case sensitive and can contain up to 32 alphanumeric characters.
Question 130
A network engineer is configuring a switch so that it is remotely reachable via SSH. The engineer
has already configured the host name on the router. Which additional command must the engineer
configure before entering the command to generate the RSA key?
A. password password
B. crypto key generate rsa modulus 1024
C. ip domain-name domain
D. ip ssh authentication-retries 2
Answer: B
Question 131
Switch A is newly configured. All VLANs are present in the VLAN database. The IP phone and PC A
on Gi0/1 must be configured for the appropriate VLANs to establish connectivity between the PCs.
Which command set fulfills the requirement?
A. SwitchA(config-if)#switchport mode access
SwitchA(config-if)#switchport access vlan 50
SwitchA(config-if)#switchport voice vlan 51
Answer: A
Question 132
Which QoS traffic handling technique retains excess packets in a queue and reschedules these
packets for later transmission when the configured maximum bandwidth has been surpassed?
A. traffic shaping
B. traffic policing
C. weighted random early detection
D. traffic prioritization
Answer: A
Explanation
+ Shaping: retains excess packets in a queue and then schedules the excess for later
transmission over increments of time. When traffic reaches the maximum configured rate,
additional packets are queued instead of being dropped to proceed later. Traffic shaping is
applicable only on outbound interfaces as buffering and queuing happens only on outbound
interfaces. Shaping is configured in bits per second.
Question 133
R1 learns all routes via OSPF. Which command configures a backup static route on R1 to reach the
192.168.20.0/24 network via R3?
Answer: A
Question 134
Which Layer 2 switch function encapsulates packets for different VLANs so that the packets
traverse the same port and maintain traffic separation between the VLANs?
A. VLAN numbering
B. VLAN DSCP
C. VLAN tagging
D. VLAN marking
Answer: C
Explanation
VLAN tagging is a method through which more than one VLAN is handled on a port. VLAN tagging
is used to tell which packet belongs to which VLAN on the other side. To make recognition easier, a
packet is tagged with a VLAN tag in the Ethernet frame.
Question 135
Answer: B
Question 54
The primary route across Gi0/0 is configured on both routers. A secondary route must be
configured to establish connectivity between the workstation networks. Which command set must
be configured to complete this task?
A. R1
ip route 172.16.2.0 255.255.255.240 172.16.0.2 113
R2
ip route 172.16.1.0 255.255.255.0 172.16.0.1 114
B. R1
ip route 172.16.2.0 255.255.255.240 172.16.0.5 89
R2
ip route 172.16.1.0 255.255.255.0 172.16.0.6 89
C. R1
ip route 172.16.2.0 255.255.255.248 172.16.0.5 110
R2
ip route 172.16.1.0 255.255.255.0 172.16.0.6 110
D. R1
ip route 172.16.2.0 255.255.255.224 172.16.0.6 111
R2
ip route 172.16.1.0 255.255.255.0 172.16.0.5 112
Answer: D
Question 55
Which action must be taken so that neighboring devices rapidly discover switch Cat9300?
Answer: D
Explanation
The “cdp timer seconds” command sets the transmission frequency of CDP updates in seconds so
we should reduce it so that CDP updates are sent more often.
Question 56
Answer: A
Question 57
A. STP cables are cheaper to produre and easier to install and UTP cables are more expensive and
harder to install.
B. UTP cables are less prone to crosstalk and interference and STP cables are more prone to
crosstalk and interference.
C. UTP cables provide faster and more reliable data transfer rates and STP cables are slower and
less reliable.
D. STP cables are shielded and protect against electromagnetic interference and UTP lacks the
same protection against electromagnetic interference.
Answer: D
Explanation
UTP (Unshielded twisted pair) and STP (Shielded twisted pair) are the types of twisted pair cables
which act as a transmission medium and imparts reliable connectivity of electronic equipment.
Although the design and manufacture are different but both serve the same purpose.
The basic difference between UTP and STP is UTP (Unshielded twisted pair) is a cable with wires
that are twisted together to reduce noise and crosstalk. On the contrary, STP (Shielded twisted
pair) is a twisted pair cable confined in foil or mesh shield that guards the cable against
electromagnetic interference.
Question 58
Drag and drop the statements about device management from the left onto the corresponding
device-management types on the right.
Answer:
Question 59
Which port type does a lightweight AP use to connect to the wired network when configured in
FlexConnect mode with local switching and VLAN tagging?
A. EtherChannel
B. access
C. LAG
D. trunk
Answer: D
Explanation
Local Switched: Locally-switched WLAN’s (the SSID you are connected to) will map their wireless
user traffic to a VLAN via 802.1Q trunking to a local switch adjacent to the access point.
Reference: https://wlanlessonslearned.wordpress.com/tag/flexconnect/
Question 60
An engineer is installing a new wireless printer with a static IP address on the Wi-Fi network.
Which feature must be enabled and configured to prevent connection issues with the printer?
A. passive client
B. static IP tunneling
C. DHCP address assignment
D. client exclusion
Answer: B
Explanation
At times you may want to configure static IP addresses for wireless clients. When these wireless
clients move about in a network, they could try associating with other controllers. If the clients try
to associate with a controller that does not support the same subnet as static IP, the clients fail to
connect to the network. With WLC 7.0.116.0 you can enable dynamic tunneling of clients with
static IP addresses.
Reference: https://mrncciew.com/2013/03/25/static-ip-clients-mobility/
Question 61
Answer: A
Question 62
Refer to the exhibit. What must be configured to enable 802.11w on the WLAN?
A. Set PMF to Required
B. Enable MAC Filtering
C. Enable WPA Policy
D. Set Fast Transition to Enabled
Answer: A
Explanation
Reference: https://content.cisco.com/chapter.sjs?uri=/searchable/chapter/content/en/us/td/docs/
wireless/controller/7-5/configuration-guide/b_cg75/b_cg75_chapter_01001100.html.xml
Note: When you create a MAC address filter on WLCs, users are granted or denied access to the
WLAN network based on the MAC address of the client they use
Question 63
Drag and drop the IPv6 address details from the left onto the corresponding types on the right.
Answer:
Anycast:
+ used exclusively by a non-host device
+ assigned to more than one interface
Multicast:
+ derived from the FF00::/8 address range
+ provides one-to-many communications
Unicast:
+ includes link-local and loopback addresses
+ identifies an interface on an IPv6 device
Explanation
An anycast address must be assigned to a router not a host and cannot be used as a source
address.