New Question 8june2021
New Question 8june2021
Answer: B
Question 2
Answer: A
Explanation
1000BASE-T standard only supports up to 100 meters while 1000BASE-LX is a standard which uses a
1,270–1,355 nm laser for longer wavelength. It has a distance capability of up to 5 kilometers over a
Single-mode fiber -> Answer D is not correct.
1000BASE-LX is an optical fiber Gigabit Ethernet standard so it does not support RJ-45 connectors
directly -> Answer C is not correct.
Question 3
Answer: A
Explanation
WPA3 incorporates Simultaneous Authentication of Equals (SAE), a secure key establishment protocol
between devices. By using a stronger ‘handshaking’ protocol, users should be protected from
password guessing attempts. For home networks, that equates to password-based authentication
that’s more resilient, even if users choose unsophisticated passwords.
Question 4
Which mode must be set for APs to communicate to a Wireless LAN Controller using the Control and
Provisioning of Wireless Access Points (CAPWAP) protocol?
A. bridge
B. route
C. autonomous
D. lightweight
Answer: D
Explanation
Cisco Access Points (APs) can operate in one of two modes: autonomous or lightweight
+ Autonomous: self-sufficient and standalone. Used for small wireless networks.
+ Lightweight: A Cisco lightweight AP (LAP) has to join a Wireless LAN Controller (WLC) to function.
LAP and WLC communicate with each other via a logical pair of CAPWAP tunnels.
Question 5
Which change to the configuration on Switch allows the two switches to establish an EtherChannel?
Answer: B
Question 6
Answer: D
Question 7
What is the path for traffic sent from one user workstation to another workstation on a separate
switch in a three-layer architecture model?
Answer: D
Question 8
Answer: D E
Question 9
Answer: C
Explanation
Stands for “Service Set Identifier.” An SSID is a unique ID that consists of 32 characters and is used
for naming wireless networks. When multiple wireless networks overlap in a certain location, SSIDs
make sure that data gets sent to the correct destination.
Question 10
Answer: A D
Explanation
The SSID is a unique identifier that wireless networking devices use to establish and maintain wireless
connectivity. The SSID can consist of up to 32 alphanumeric, case-sensitive, characters.
We can hide a SSID by choosing “Disabled” in the Basic Wireless Settings/Wireless/SSID Broadcast
section.
Question 11
In QoS, which prioritization method is appropriate for interactive voice and video?
A. expedited forwarding
B. traffic policing
C. round-robin scheduling
D. low-latency queuing
Answer: A
Explanation
The Expedited Forwarding (EF) model is used to provide resources to latency (delay) sensitive real-
time, interactive traffic.
Question 12
An engineer is configuring data and voice services to pass through the same port. The designated
switch interface fastethernet0/1 must transmit packets using the same priority for data when they are
received from the access port of the IP phone. Which configuration must be used?
A. interface fastethernet0/1
switchport priority extend cos 7
B. interface fastethernet0/1
switchport voice vlan untagged
C. interface fastethernet0/1
switchport voice vlan dot1p
D. interface fastethernet0/1
switchport priority extend trust
Answer: D
Explanation
The command “switchport priority extend cos 7” sets the IP phone port to override the priority
received from the PC or the attached device (7 is the highest priority).
The command “switchport priority extend trust” tells the Cisco IP Phone to trust the CoS value of the
connected PC without remark all packets sent form PC to CoS 0, by default.
Question 13
Which port type supports the spanning-tree portfast command without additional configuration?
A. access ports
B. Layer 3 main interfaces
C. Layer 3 subinterfaces
D. trunk ports
Answer: A
Question 14
Answer: C
Explanation
Facility levels and syslog levels are different. The purpose of using the facilities is to organize the
syslog messages received on the Syslog server from different sources. The default syslog facility
setting is local7.
Reference: https://www.oreilly.com/library/view/cisco-ios-cookbook/0596527225/ch18s08.html
Question 15
What are two characteristics of a public cloud implementation? (Choose two)
A. It is owned and maintained by one party, but it is shared among multiple organizations
B. It enables an organization to fully customize how it deploys network resources
C. It provides services that are accessed over the Internet
D. It is a data center on the public Internet that maintains cloud services for only one company
E. It supports network resources from a centralized third-party provider and privately-owned virtual
resources
Answer: A C
Explanation
Public clouds are managed by a third-party cloud provider. Public cloud computing resources are
shared among multiple customers, unlike private clouds.
Question 16
A. broadcast packets from a switch that is attempting to locate a MAC address at one of several
remote sites
B. multicast traffic from a server at one site to hosts at another location
C. spanning-tree updates between switches that are at two different sites
D. unicast messages from a host at a remote site to a server at headquarters
Answer: D
Explanation
Pure IPSec configuration (no GRE tunnel) does not support multicast or broadcast traffic. Spanning-
tree updates use multicast too. -> Answer A, answer B and answer C are not correct.
Question 17
A. DTP
B. STP
C. VTP
D. 802.10
Answer: B
Explanation
STP can prevent DHCP clients from getting an IP address because the port doesn’t start forwarding
traffic until STP goes into the forwarding state.