Examen Final
Examen Final
(Choose two)
A. reduced operational costs
C. faster changes with more reliable results
2. Which command enables a router to become a DHCP client?
A. ip address dhcp
3. Which design element is a best practice when deploying an 802.11b
wireless infrastructure?
C. allocating nonoverlapping channels to access points that are in
close physical proximity to one another
4. When configuring IPv6 on an interface, which two IPv6 multicast
groups are joined? (Choose two)
D. FF02::1
E. FF02::2
5. Which option about JSON is true?
B. used to describe structured data that includes arrays
6. Which IPv6 address type provides communication between subnets and
cannot route on the Internet?
B. unique local
7. Which command prevents passwords from being stored in the
configuration as plaintext on a router or switch?
B. service password-encryption
8. What are two southbound APIs? (Choose two )
A. OpenFlow
B. NETCONF
9. Which set of action satisfy the requirement for multifactor
authentication?
B. The user enters a user name and password, and then clicks a
notification in an authentication app on a mobile device.
10. Which two capacities of Cisco DNA Center make it more extensible?
(Choose two)
B. SDKs that support interaction with third-party network equipment
D. REST APIs that allow for external applications to interact
natively with Cisco DNA Center
11. An email user has been lured into clicking a link in an email sent by their
company’s security organization. The webpage that opens reports that it
was safe but the link could have contained malicious code.
Which type of security program is in place?
D. user awareness
12. Which type of wireless encryption is used for WPA2 in pre-shared key
mode?
D. AES-256
13. Which two must be met before SSH can operate normally on a Cisco IOS
switch? (Choose two)
A. The switch must be running a k9 (crypto) IOS image.
B. The ip domain-name command must be configured on the
switch.
14. Which type of address is the public IP address of a NAT device?
C. inside global
15. Refer to the exhibit. Which prefix does Router 1 use for traffic to Host
A?
D. 10.10.13.208/29
16. How does HSRP provide first hop redundancy?
D. It uses a shared virtual MAC and a virtual IP address to a group
of routers that serve as the default gateway for hosts on a LAN.
17. In Which way does a spine-and-leaf architecture allow for scalability in a
network when additional access ports are required?
D. A leaf switch can be added with connections to every spine
switch.
18. Which two actions are performed by the Weighted Random Early
Detection mechanism? (Choose two)
A. It drops lower-priority packets before it drops higher-priority
packets.
D. It can mitigate congestion by preventing the queue from filling
up.
19. A network engineer must back up 20 network router configurations
globally within a customer environment. Which protocol allows the engineer
to perform this function using the Cisco IOS MIB?
B. SNMP
20. Refer to the exhibit. What is the effect of this configuration?
22. How do TCP and UDP differ in the way that they establish a connection
between two endpoints?
D. TCP uses the three-way handshake and UDP does not
guarantee message delivery.
23. When OSPF learns multiple paths to a network, how does it select a
route?
C. It divides a reference bandwidth of 100 Mbps by the actual
bandwidth of the existing interface to calculate the router with the
lowest cost.
24. Refer to the exhibit. Which password must an engineer use to enter the
enable mode?
C. testing1234
C. Option C
34. Which unified access point mode continues to serve wireless clients after
losing connectivity to the Cisco Wireless LAN Controller?
C. flexconnect
35. Which two encoding methods are supported by REST APIs? (Choose
two)
B. JSON
E. XML
36. What are two reasons that cause late collisions to increment on an
Ethernet interface? (Choose two)
B. when the cable length limits are exceeded
C. when one side of the connection is configured for half-duplex
37. Router A learns the same route from two different neighbors, one of the
neighbor routers is an OSPF neighbor and the other is an EIGRP
neighbor. What is the administrative distance of the route that will be
installed in the routing table?
B. 90
38. What is the primary effect of the spanning-tree portfast command?
B. It minimizes spanning-tree convergence time
39. What is the default behavior of a Layer 2 switch when a frame with an
unknown destination MAC address is received?
B. The Layer 2 switch floods packets to all ports except the
receiving port in the given VLAN.
D. The switch discard all ingress ARP traffic with invalid MAC-to-IP
address bindings.
41. Refer to the exhibit. An engineer configured NAT translations and has
verified that the configuration is correct. Which IP address is the source IP?
D. 172.23.104.4
42. Refer to the exhibit. Which route does R1 select for traffic that is
destined to 192 168.16.2?
D. 192.168.16.0/27
43. Which IPv6 address block sends packets to a group address rather than
a single address?
D. FF00::/8
44. Which two values or settings must be entered when configuring a new
WLAN in the Cisco Wireless LAN Controller GUI? (Choose two)
D. SSID
E. Profile name
45. Which two actions influence the EIGRP route selection process? (Choose
two)
B. The router calculates the best backup path to the destination
route and assigns it as the feasible successor.
C. The router calculates the feasible distance of all paths to the
destination route.
46. Refer to Exhibit. Which action do the switches take on the trunk link?
B. The trunk forms but the mismatched native VLANs are merged
into a single broadcast domain.
47. Which command is used to specify the delay time in seconds for LLDP to
initialize on any interface?
C. lldp reinit
48. An engineer configured an OSPF neighbor as a designated router.
Which state verifies the designated router is in the proper mode?
C. Full
49. Refer to the exhibit. The show ip ospf interface command has been
executed on R1. How is OSPF configured?
D. network
route
55. Refer to the exhibit. A network engineer must block access for all
computers on VLAN 20 to the web server via HTTP. All other computers
must be able to access the web server. Which configuration when applied to
switch A accomplishes this task?
B. Option B
D. active
60. A user configured OSPF and advertised the Gigabit Ethernet interface
in OSPF by default, which type of OSPF network does this interface belong
to?
C. broadcast
61. An organization has decided to start using cloud-provided
services. Which cloud service allows the organization to install its own
operating system on a virtual machine?
D. infrastructure-as-a-service
62. Which mode allows access points to be managed by Cisco Wireless LAN
Controllers?
B. lightweight
63. Which command automatically generates an IPv6 address from a
specified IPv6 prefix and MAC address of an interface?
C. ipv6 address autoconfig
C. 172.16.15.10
77. Refer to the exhibit. If OSPF is running on this network, how does
Router 2 handle traffic from Site B to 10.10.13.128/25 at Site A?
89. An engineer must configure a WLAN using the strongest encryption type
for WPA2-PSK. Which cipher fulfills the configuration requirement?
C. AES
90. Which statement about Link Aggregation when implemented on a Cisco
Wireless LAN Controller is true?
D. One functional physical port is needed to pass client traffic.
91. When configuring a WLAN with WPA2 PSK in the Cisco Wireless LAN
Controller GUI, which two formats are available to select? (Choose two)
A. ASCII
E. hexadecimal
92. Which API is used in controller-based architectures to interact with edge
devices?
D. southbound
93. Refer to the exhibit. A network administrator is configuring an
EtherChannel between
SW1 and SW2. The SW1
configuration is
shown. What is the correct
configuration for SW2?
C. interface
FastEthernet 0/1
channel-group 1 mode
desirable
switchport trunk
encapsulation dot1q
switchport mode trunk
interface FastEthernet
0/2 channel-group 1 mode desirable
switchport trunk encapsulation dot1q switchport mode trunk
106. Refer to the exhibit. Which switch in this configuration becomes the
root bridge?
C.
SW3
107. Refer to the exhibit. Which two statements are true about the loopback
address that is configured on RouterB? (Choose two.)
B. It provides
stability for the
OSPF process on
RouterB.
C. It specifies
that the router ID
for RouterB
should be
10.0.0.1.
108. Refer to the exhibit. Which two statements about the interface that
generated the output are true? (Choose two.)
C. The interface is
error-disabled.
D. The interface
dynamically learned
two secure MAC
addresses.
109. Refer to the exhibit. Which two statements about the interface that
generated the output are true? (Choose two.)
A. learned MAC
addresses are deleted
after five minutes of
inactivity
C. it has dynamically
learned two secure MAC
addresses
110. Refer to the exhibit. Which two events occur on the interface, if packets
from an
unknown Source
address arrive
after the
interface learns
the maximum
number of secure
MAC address?
(Choose two.)
A. The
security
violation counter dose not increment
E. The interface drops traffic from unknown MAC address
111. Refer to the exhibit. Which two statements about the network
environment of router R1 must be true? (Choose two.)
A. there are 20 different network masks within the 10.0.0.0/8
network
C. Ten routes are equally load-balanced between Te0/1/0.100 and
Te0/2/0.100
114. Refer to the exhibit Users in your office are complaining that they
cannot connect to the severs at a remote site. When troubleshooting, you
find that you can successfully reach the severs from router R2. What is the
most likely reason that the other users are experiencing connection failure?
135. Which of the following dynamic routing protocols are Distance Vector
routing protocols?
B. EIGRP
E. RIP
136. Refer to the exhibit. If R1 receives a packet destined to 172.16.1.1, to
which IP address does it send the packet?
A. 192.168.14.4
137. Which two VLAN IDs indicate a default VLAN? (Choose two.)
B. 1
C. 1005
D. 1006
E. 4096
138. Refer to the exhibit. If RTR01 is configured as shown, which three
addresses will be received by other routers that are running EIGRP on the
network? (Choose three)
A. 192.168.2.0
C. 10.0.0.0
D. 172.16.0.0
139. Which two options are the best reasons to use an IPV4 private IP
space?(choose two)
A. to enable intra-enterprise communication
D. to conserve global address space
140. Which technique can you use to route IPv6 traffic over an IPv4
infrastructure?
B. 6to4 tunneling
141. Which three describe the reasons large OSPF networks use a
hierarchical design? (Choose Three)
A. to speed up convergence
B. to reduce routing overhead
E. to confine network instability to single areas of the network.
142. Which statements describe the routing protocol OSPF? (Choose three.)
A. It supports VLSM.
C. It confines network instability to one area of the network.
E. It allows extensive control of routing updates.
F. It is simpler to configure than RIP v2.
143. Which command should you enter to view the error log in an EIGRP
for IPv6 environment?
D. show ipv6 eigrp events
144. Which component of an Ethernet frame is used to notify a host that
traffic is coming?
C. preamble
145. Which command must you enter to guarantee that an HSRP router
with higher priority becomes the HSRP primary router after it is reloaded?
A. standby 10 preempt
146. Which configuration command can u apply to a HSRP router so that its
local interface becomes active if all other routers in the group fail?
A. no additional config is required
147. You are configuring your edge routers interface with a public IP
address for Internet connectivity.
The router needs to obtain the IP address from the service provider
dynamically. Which command is needed on interface FastEthernet 0/0 to
accomplish this?
D. ip address dhcp
148. Which type does a port become when it receives the best BPDU on a
bridge?
D. The root port
149. Which two command sequences must you configure on a switch to
establish a Layer 3 EtherChannel with an open-standard protocol? (Choose
two.)
B. interface GigabitEthernet0/0/1
channel-group 10 mode active
E. interface port-channel 10
no switchport
ip address 172.16.0.1.255.255.255.0
150. Which statement about VLAN configuration is true?
A. The switch must be in VTP server or transparent mode before
you can configure a VLAN
151. Refer to the exhibit. After you apply the given configuration to arouter,
the DHCP clients behind the device connot communicate with hosts outside
of their subnet. Which action is most likely to correct the problem?
B. 90
155. Refer to the exhibit. Which command would you use to configure a
static route on Router1 to network 192.168.202.0/24 with a nondefault
administrative distance?
B. router1(config)#ip route 192.168.202.0 255.255.255.0
192.168.201.2 5
156. Which feature or protocol is required for an IP SLA to measure UDP
jitter?
D. NTP
157. Which effete does the aaa new-model configuration command have?
A. It enables AAA services on the device
158. Refer to the exhibit. How will switch SW2 handle traffic from VLAN 10
on SW1?
D. EIGRP
167. Refer to the exhibit. Which VLAN ID is associated with the default
VLAN in the given environment?
A. VLAN 1
168. Which two circumstances can prevent two routers from establishing an
OSPF neighbor adjacency? (Choose two.)
D. mismatched hello timers and dead timers
E. use of the same router ID on both devices
171. Which keyword in a NAT configuration enables the use of one outside
IP address for multiple inside hosts?
D. overload
172. Which two pieces of information can you learn by viewing the routing
table? (Choose two)
C. whether the administrative distance was manually or
dynamically configured
E. the length of time that a route has been known
173. Which NAT term is defined as a group of addresses available for NAT
use?
A. NAT pool
174. Which command is used to enable LLDP globally on a Cisco IOS ISR?
A. lldp run
175. Refer to the exhibit. After you apply the give configurations to R1 and
R2 you notice that OSPFv3 fails to start. Which reason for the problem is
most likely true ?
191. A user configured OSPF in a single area between two routers A serial
interface connecting R1 and R2 is running encapsulation PPP. By default
which OSPF network type is seen on this interface when the user types show
ip ospf interface on R1 or R2?
C. point-to-point
192. Refer to the exhibit. Which address and mask combination represents a
summary of the routes learned by EIGRP?
C. 192.168.25.16 255.255.255.240
193. Refer to the exhibit. A network associate has configured OSPF with the
command:
City(config-router)# network 192.168.12.64 0.0.0.63
area 0.
After completing the configuration, the associate discovers that not all the
interfaces are participating in OSPF. Which three of the interfaces shown in
the exhibit will participate in OSPF according to this configuration
statement? (Choose three.)
B. FastEthernet0 /1
C. Serial0/0
D. Serial0/1.102
194. A network administrator is troubleshooting the OSPF configuration of
routers R1 and R2. The routers cannot establish an adjacency relationship
on their common Ethernet link. The graphic shows the output of the show ip
ospf interface e0 command for routers R1 and R2. Based on the information
in the graphic, what is the cause of this problem?
D. The hello and dead timers are not configured properly.
195. Refer to the graphic. R1 is unable to establish an OSPF neighbor
relationship with R3. What are possible reasons for this problem? (Choose
two.)
D. The hello and dead interval timers are not set to the same
values on R1 and R3.
F. R1 and R3 are configured in different areas.
196. Refer to the exhibit. Given the output for this command, if the router
ID has not been manually set, what router ID will OSPF use for this router?
C. 172.16.5.1
197. Refer to the exhibit. When running EIGRP, what is required for
RouterA to exchange routing updates with RouterC?
A. AS numbers must be changed to match on all the routers
198. Refer to the exhibit. Which rule does the DHCP server use when there
is an IP address conflict?
A. longest prefix
209. Router R1 must send all traffic without a matching routing-table entry
to 192.168.1.1. Which configuration accomplishes this task?
C. R1# config t
R1(config)# ip routing
R1(config)# ip route 0.0.0.0 0.0.0.0 192.168.1.1
210. Which WPA3 enhancement protects against hackers viewing traffic on
the Wi-Fi network?
D. SAE encryption
A. Option A
C. Option C
214. What is a difference between RADIUS and TACACS+?
C. TACACS+ separates authentication and authorization, and
RADIUS merges them
215. Refer to the exhibit. How does the router manage traffic to
192.168.12.16?
C. SW3
224. What are two fundamentals of virtualization? (choose two)
B. It allows logical network devices to move traffic between virtual
machines and the rest of the physical network
C. It allows multiple operating systems and applications to run
independently on one physical server.
225. Refer to the exhibit. What two conclusions should be made about this
configuration? (Choose two )
227. Refer to the exhibit. The network administrator wants VLAN 67 traffic
to be untagged between Switch 1 and Switch 2 while all other VLANs are to
remain tagged. Which command accomplishes this task?
D. switchport trunk native vlan 67
228. What are two differences between optical-fiber cabling and copper
cabling? (Choose two)
A. Light is transmitted through the core of the fiber
C. The glass core component is encased in a cladding
229. Which two minimum parameters must be configured on an active
interface to enable OSPFv2 to operate? (Choose two)
A. OSPF area
D. OSPf process ID
230. Refer to the exhibit. Refer to the exhibit. After the configuration is
applied, the two routers fail to establish an OSPF neighbor relationship.
what is the reason for the problem?
B. Router2 is using the default hello timer.
231. How do TCP and UDP differ in the way they provide reliability for
delivery of packets?
C. TCP provides flow control to avoid overwhelming a receiver by
sending too many packets at once, UDP sends packets to the receiver
in a continuous stream without checking for sequencing
232. A packet is destined for 10.10.1.22. Which static route does the router
choose to forward the packet?
C. ip route 10.10.1.20 255.255.255.252 10.10.255.1
233. Refer to the exhibit. Router R1 Fa0/0 cannot ping router R3 Fa0/1.
Which action must be taken in router R1 to help resolve the configuration
issue?
D. configure a static route with 10.10.10.2 as the next hop to reach
the 20.20.20.0/24 network
234. Refer to the exhibit. Refer to the exhibit. An engineer must add a
subnet for a new office that will add 20 users to the network. Which IPv4
network and subnet mask combination does the engineer assign to minimize
wasting addresses?
D. 10.10.225.32 255.255.255.224
235. A corporate office uses four floors in a building
* Floor 1 has 24 users
* Floor 2 has 29 users
* Floor 3 has 28 users
* Floor 4 has 22 users
Which subnet summarizes and gives the most efficient distribution of IP
addresses for the router configuration?
D. 192.168.0.0/25 as summary and 192.168.0.0/27 for each floor
236. By default, how Does EIGRP determine the metric of a route for the
routing table?
A. it uses the bandwidth and delay values of the path to calculate
the route metric
237. Refer to the exhibit. Which configuration issue is preventing the OSPF
neighbor relationship from being established between the two routers?
D. R1 interface Gi1/0 has a larger MTU size
238. What are two roles of the Dynamic Host Configuration Protocol
(DHCP)? (Choose two)
A. The DHCP server offers the ability to exclude specific IP
addresses from a pool of IP addresses
D. The DHCP server leases client IP addresses dynamically.
239. How does CAPWAP communicate between an access point in local
mode and a WLC?
D. The access point has the ability to link to any switch in the
network, assuming connectivity to the WLC
240. Refer to the exhibit. Which action is expected from SW1 when the
untagged frame is received on the GigabitEthernet0/1 interface?
A. The frame is processed in VLAN 5.
241. What are two reasons for an engineer to configure a floating state
route? (Choose two)
A. to automatically route traffic on a secondary path when the
primary path goes down
C. to enable fallback static routing when the dynamic routing
protocol fails
242. Refer to the exhibit. Which route type is configured to reach the
internet?
C. default route
243. How does Cisco DNA Center gather data from the network?
A. Network devices use different services like SNMP, syslog, and
streaming telemetry to send data to the controller
244. What is the difference regarding reliability and communication type
between TCP and UDP?
A. TCP is reliable and is a connection-oriented protocol; UDP is not
reliable and is a connectionless protocol
245. Several new coverage cells are required to improve the Wi-Fi network
of an organization. Which two standard designs are recommended? (Choose
two.)
C. Cells that overlap one another are configured to use
nonoverlapping channels.
E. For maximum throughput, the WLC is configured to dynamically
set adjacent access points to the channel.
246. The service password-encryption command is entered on a router.
What is the effect of this configuration?
A. restricts unauthorized users from viewing clear-text passwords in
the running configuration
247. Which type of ipv6 address is publicly routable in the same way as ipv4
public addresses?
D. global unicast
248. Which two statements are true about the command ip route 172.16.3.0
255.255.255.0 192.168.2.4? (Choose two.)
A. It establishes a static route to the 172.16.3.0 network.
E. It uses the default administrative distance.
249. Which three statements are typical characteristics of VLAN
arrangements? (Choose three.)
B. Connectivity between VLANs requires a Layer 3 device.
D. Each VLAN uses a separate address space.
E. A switch maintains a separate bridging table for each VLAN.
250. Refer to the exhibit. To which device does Router1 send packets that
are destined to host 10.10.13.165?
B. Router3
251. Refer to the exhibit. Which two commands were used to create port
channel 10? (Choose two.)
B.
R2(config)# interface gi0/0
R2(config-if)# ip helper-address 198.51.100.100
C.
R1(config)# interface fa0/0
R1(config-if)# ip address dhcp
R1(config-if)# no shutdown
263. Refer to the exhibit. What commands are needed to add a subinterface
to Ethernet0/0 on R1 to allow for VLAN 20, with IP address 10.20.20.1/24?
B.
R1(config)#interface ethernet0/0.20
R1(config)#encapsulation dot1q 20
R1(config)#ip address 10.20.20.1 255.255.255.0
264. On a corporate network, hosts on the same VLAN can communicate
with each other, but they are unable to communicate with hosts on different
VLANs. What is needed to allow communication between the VLANs?
A. a router with subinterfaces configured on the physical interface
that is connected to the switch
265. Which command can you enter to determine the addresses that have
been assigned on a DHCP Server?
C. Show ip DHCP binding.
266. Refer to the exhibit. If the network environment is operating normally,
which type of device must be connected to interface FastEthernet 0/1?
C. router
267. Refer to the exhibit. Which configuration on RTR-1 denies SSH access
from PC-1 to any RTR-1 interface and allows all other traffic?
B.
access-list 100 deny tcp host 172.16.1.33 any eq 22
access-list 100 permit ip any any
line vty 0 15
access-class 100 in
268. Which function dose the range of private IPv4 addresses perform?
A. allow multiple companies to each use the same address without
conflicts
269. Which type of API would be used to allow authorized salespeople of an
organization access to internal sales data from their mobile devices?
D. private
270. What is a characteristic of the REST API?
D. most widely used API for web services
271. What is the name of the layer in the Cisco borderless switched network
design that is considered to be the backbone used for high-speed
connectivity and fault isolation?
C. core
272. Refer to the exhibit. An administrator configures the following ACL in
order to prevent devices on the 192.168.1.0 subnet from accessing the server
at 10.1.1.5:
access-list 100 deny ip 192.168.1.0 0.0.0.255 host
10.1.1.5
277. Refer to the exhibit. Which two configurations would be used to create
and apply a standard access list on R1, so that only the 10.0.70.0/25 network
devices are allowed to access the internal database server? (Choose two.)
A.
R1(config)# interface GigabitEthernet0/0
R1(config-if)# ip access-group 5 out
D.
R1(config)# access-list 5 permit 10.0.70.0 0.0.0.127
278. Which type of VPN uses a hub-and-spoke configuration to establish a
full mesh topology?
B. dynamic multipoint VPN
279. What are two purposes of launching a reconnaissance attack on a
network? (Choose two.)
C. to gather information about the network and devices
D. to scan for accessibility
280. Refer to the exhibit. If the switch reboots and all routers have to re-
establish OSPF adjacencies, which routers will become the new DR and
BDR?
C. 0.0.0.0/0
285. Refer to Exhibit. The loopback1 interface of the Atlanta router must
reach the loopback3 interface of the Washington router. Which two static
host routes must be configured on the NEW York router? (Choose two)
290. Refer to the exhibit Which outcome is expected when PC_A sends data
to PC_B?
B. The source and destination MAC addresses remain the same
291. An engineer needs to configure LLDP to send the port description time
length value (TLV). What command sequence must be implemented?
B. switch(config)#lldp port-description
292. Refer to the exhibit. Which switch becomes the root bridge?
B. S2
293. Refer to the exhibit. What is the next hop address for traffic that is
destined to host 10.0.1.5?
C. 10.0.1.50
294. When the active router in an HSRP group fails, what router assumes
the role and forwards packets?
C. standby
296. Refer to the exhibit. What action establishes the OSPF neighbor
relationship without forming an adjacency?
D.
R1(config)#username admin privilege 15 secret p@ss1234
R1(config-if)#line vty 0 4
R1(config-line)#login local
298. Refer to the exhibit. Which switch in this configuration will be elected
as the root bridge?
SW1: 0C:E0:38:00:36:75
SW2: 0C:0E:15:22:05:97
SW3: 0C:0E:15:1A:3C:9D
SW4: 0C:E0:18:A1:B3:19
C. SW3
299. An engineer is configuring NAT to translate the source subnet of
10.10.0.0/24 to any of three addresses 192.168.3.1, 192.168.3.2, 192.168.3.3 .
Which configuration should be used?
C.
enable
configure terminal
ip nat pool mypool 192.168.3.1 192.168.3.3 prefix-length 30
access-list 1 permit 10.10.0.0 0.0.0.255
ip nat inside source list 1 pool mypool
interface g1/1
ip nat inside
interface g1/2
ip nat outside
300. An office has 8 floors with approximately 30-40 users per floor .What
command must be configured on the router Switched Virtual Interface to
use address space efficiently?
B. ip address 192.168.0.0 255.255.254.0
301. Which device performs stateful inspection of traffic?
A. firewall
302. What criteria is used first during the root port selection process?
B. lowest path cost to the root bridge
325. What role does a hypervisor provide for each virtual machine in server
virtualization?
C. control and distribution of physical resources
326. Which technology must be implemented to configure network device
monitoring with the highest security?
D. SNMPv3
327. What is the function of a server?
B. It provides shared applications to end users.
328. Refer to the exhibit. Which type of configuration is represented in the
output?
D. Puppet
329. A port security violation has occurred on a switch port due to the
maximum MAC address count being exceeded Which command must be
configured to increment the security-violation count and forward an SNMP
trap?
C. switchport port-security violation restrict
330. Which spanning-tree enhancement avoids the learning and listening
states and immediately places ports in the forwarding state?
B. PortFast
331. What are two functions of a Layer 2 switch? (Choose two)
C. moves packets within a VLAN
E. makes forwarding decisions based on the MAC address of a
packet
Correct Answer: C, E
332. A manager asks a network engineer to advise which cloud service
models are used so employees do not have to waste their time installing,
managing, and updating software which is only used occasionally Which
cloud service model does the engineer recommend?
D. software-as-a-service
Correct Answer: D
333. Which two functions are performed by the core layer in a three-tier
architecture? (Choose two)
A. Provide uninterrupted forwarding service.
D. Ensure timely data transfer between layers.
334. When using Rapid PVST+, which command guarantees the switch is
always the root bridge for VLAN 200?
B. spanning -tree vlan 200 priority 0
335. What are two functions of a server on a network? (Choose two)
B. runs applications that send and retrieve data for workstations
that make requests
C. handles requests from multiple workstations at the same time
336. What is the primary function of a Layer 3 device?
C. to pass traffic between different networks
337. Refer to the exhibit. After the election process what is the root bridge in
the HQ LAN?
C. Switch 3
338. An engineer requires a scratch interface to actively attempt to establish
a trunk link with a neighbor switch. What command must be configured?
B. switchport mode dynamic desirable
339. What is a function of TFTP in network operations?
D. transfers IOS images from a server to a router for firmware
upgrades
340. What are two recommendations for protecting network ports from
being exploited when located in an office space outside of an IT closet?
(Choose two)
C. implement port-based authentication
E. shut down unused ports
341. What is a recommended approach to avoid co-channel congestion while
installing access points that use the 2.4 GHz frequency?
A. different nonoverlapping channels
342. Refer to the exhibit. An engineer configured the New York router with
state routes that point to the Atlanta and Washington sites. When command
must be configured on the Atlanta and Washington routers so that both sites
are able to reach the loopback2 interface on the New York router?
380. Refer to the exhibit. A network administrator has been tasked with
securing VTY access to a router. Which access-list entry accomplishes this
task?
386. An engineer must configure traffic for a VLAN that is untagged by the
switch as it crosses a trunk link. Which command should be used?
B. switchport trunk native vlan 10
387. How does a Cisco Unified Wireless network respond to Wi-Fi channel
overlap?
A. It alternates automatically between 2.4 GHz and 5 GHz on
adjacent access points
388. What does a switch use to build its MAC address table?
D. ingress traffic
Answer: D
389. Which network plane is centralized and manages routing decisions?
C. control plane
390. What does a router do when configured with the default DNS lookup
settings, and a URL is entered on the CLI?
D. sends a broadcast message in an attempt to resolve the URL
391. What is a DNS lookup operation?
D. responds to a request for IP address to domain name resolution to
the DNS server
392. Refer to the exhibit. A network engineer must configured
communication between PC A and the File Server. To prevent interruption
for any other communications, which command must be configured?
D. Use the JSON library to parse the data returned by the NETCONF
server for the interface’s configuration.
397. What is an appropriate use for private IPv4 addressing?
D. on hosts that communicates only with other internal hosts
398. What are two functions of an SDN controller? (Choose two)
B. coordinating VTNs
D. managing the topology
399. If a switch port receives a new frame while it is actively transmitting a
previous frame, how does it process the frames?
C. The new frame is placed in a queue for transmission after the
previous frame.
400. Refer to the exhibit. The ntp server 192.168.0.3 command has been
configured on router 1 to make it an NTP client of router 2. Which
command must be configured on router 2 so that it operates in server-only
mode and relies only on its internal clock?
C. Router2(config)#ntp master 4
401. Which WAN topology provides a combination of simplicity quality, and
availability?
C. point-to-point
402. Why does a switch flood a frame to all ports?
D. The destination MAC address of the frame is unknown.
403. When DHCP is configured on a router, which command must be
entered so the default gateway is automatically distributed?
A. default-router
404. What is a network appliance that checks the state of a packet to
determine whether the packet is legitimate?
C. firewall
405. How is the native VLAN secured in a network?
A. separate from other VLANs within the administrative domain
406. Which command on a port enters the forwarding state immediately
when a PC is connected to it?
C. switch(config-if)#spanning-tree portfast trunk
407. Refer to Exhibit. Which configuration must be applied to the router
that configures PAT to translate all addresses in VLAN 200 while allowing
devices on VLAN 100 to use their own IP addresses?
D. Option D
B. Switch 2
410. What is a benefit of VRRP?
B. It provides the default gateway redundancy on a LAN using two or
more routers.
411. Which protocol does an IPv4 host use to obtain a dynamically assigned
IP address?
B. DHCP
412. Refer to the exhibit. An access list is required to permit traffic from any
host on interface G0/0 and deny traffic from interface G/0/1. Which access
list must be applied?
A. Option A
413. How does a switch process a frame received on Fa0/1 with the
destination MAC address of 0e38.7363.657b when the table is missing the
address?
C. It floods the frame to all interfaces except Fa0/1.
414. Which condition must be met before an NMS handles an SNMP trap
from an agent?
A. The NMS software must be loaded with the MIB associated with
the trap.
423. Refer to the exhibit. An administrator must turn off the Cisco
Discovery Protocol on the port configured with address last usable address
in the 10.0.0.0/30 subnet. Which command set meets the requirement?
A. interface gi0/1
no cdp enable
424. What is a role of access points in an enterprise network?
A. connect wireless devices to a wired network
425. What is a similarity between OM3 and OM4 fiber optic cable?
A. Both have a 50 micron core diameter
426. Refer to the exhibit.
The entire contents of the MAC address table are shown. Sales-4 sends a
data frame to Sales-1.
430. Refer to the exhibit. Shortly after SiteA was connected to SiteB over a
new single-mode fiber path users at SiteA report intermittent connectivity
issues with applications hosted at SiteB What is the cause of the intermittent
connectivity issue?
A. Option A
432. Which technology is appropriate for communication between an SDN
controller and applications running over the network?
B. REST API
433. Which security program element involves installing badge readers on
data-center doors to allow workers to enter and exit based on their job
roles?
D. physical access control
434. Which network action occurs within the data plane?
A. compare the destination IP address to the IP routing table.
435. Which networking function occurs on the data plane?
A. forwarding remote client/server traffic
436. A network administrator must to configure SSH for remote access to
router R1 The requirement is to use a public and private key pair to encrypt
management traffic to and from the connecting client. Which configuration,
when applied, meets the requirements?
B. Option B
437. Which protocol does an access point use to draw power from a
connected switch?
C. Cisco Discovery Protocol
438. What is the benefit of using FHRP?
C. higher degree of availability
439. An administrator must secure the WLC from receiving spoofed
association requests. Which steps must be taken to configure the WLC to
restrict the requests and force the user to wait 10 ms to retry an association
request?
D. Enable the Protected Management Frame service and set the
Comeback timer to 10
440. A network engineer must configure the router R1 GigabitEthernet1/1
interface to connect to the router R2 GigabitEthernet1/1 interface. For the
configuration to be applied the engineer must compress the address
2001:0db8:0000:0000:0500:000a:400F:583B. Which command must be
issued on the interface?
B. ipv6 address 2001:db8::500:a:400F:583B
C. ipv6 address 2001 db8:0::500:a:4F:583B
441. What does an SDN controller use as a communication protocol to relay
forwarding changes to a southbound API?
A. OpenFlow
442. What uses HTTP messages to transfer data to applications residing on
different hosts?
D. REST
443. When a WLAN with WPA2 PSK is configured in the Wireless LAN
Controller GUI which format is supported?
D. ASCII
444. Which 802.11 management frame type is sent when a client roams
between access points on the same SSID?
A. Reassociation Request
445. An engineer observes high usage on the 2.4GHz channels and lower
usage on the 5GHz channels. What must be configured to allow clients to
preferentially use 5GHz access points?
D. Client Band Select
446. What is a characteristic of private IPv4 addressing?
D. used without tracking or registration
447. Refer to the exhibit. Which command must be executed for Gi1.1 on
SW1 to become a trunk port if Gi1/1 on SW2 is configured in desirable or
trunk mode?
A. Option A
454. Which global command encrypt all passwords in the running
configuration?
D. service password-encryption
455. What is the function of a hub-and-spoke WAN topology?
B. provides direct connections between subscribers
456. An implementer is preparing hardware for virtualization to create
virtual machines on a host. What is needed to provide communication
between hardware and virtual machines?
A. hypervisor
457. Which two components are needed to create an Ansible script that
configures a VLAN on a switch? (Choose two.)
A. cookbook
B. task
C. playbook
458. Refer to the exhibit. Which two prefixes are included in this routing
table entry? (Choose two.)
A. 192.168.1.17
B. 192.168.1.61
459. Which two primary drivers support the need for network automation?
(Choose two.)
C. Policy-derived provisioning of resources
D. Providing a ship entry point for resource provisioning
460. What is a characteristic of cloud-based network topology?
C. services are provided by a public, private, or hybrid deployment
461. A network analyst is tasked with configured the date and time on a
router using EXEC mode. The date must be set to 12:00am. Which
command should be used?
D. Clock set
462. Which HTTP status code is returned after a successful REST API
request?
A. 200
463. Refer to the exhibit. When PC-A sends traffic to PC-B, which network
component is in charge of receiving the packet from PC-A verifying the IP
addresses, and forwarding the packet to PC-B?
B. Router
464. What is the function of a controller in controller-based networking?
A. It serves as the centralized management point of an SDN
architecture.
465. Refer to me exhibit. Which action is taken by the router when a packet
is sourced from 10.10.10.2 and destined for 10.10.10.16?
B. It discards the packets.
466. When a switch receives a frame for a known destination MAC address,
how is the frame handed?
A. sent to the port identified for the known MAC address
467. Why was the RFC 1918 address space defined?
A. conserve public IPv4 addressing
468. Refer to the exhibit. R5 is the current DR on the network, and R4 is the
BDR. Their interfaces are flapping, so a network engineer wants the OSPF
network to elect a different DR and BDR. Which set of configurations must
the engineer implement?
D. Option
469. After installing a new Cisco ISE server, which task must the engineer
perform on the Cisco WLC to connect wireless clients on a specific VLAN
based on their credentials?
A. Enable the allow AAA Override
470. Which level of severity must be set to get informational syslogs?
D. debug
471. Refer to the exhibit. Router R4 is dynamically learning the path to the
server. If R4 is connected to R1 via OSPF Area 20, to R2 via R2 BGP, and to
R3 via EIGRP 777, which path is installed in the routing table of R4?
477. Refer to the exhibit. Which two commands, when configured on router
R1, fulfill these requirements? (Choose two.)
Packets towards the entire network 2001:db8:2::/64 must be forwarded
through router R2.
Packets toward host 2001:db8:23::14 preferably must be forwarded through
R3.
E. 193
500. What are two characteristics of the distribution layer in a three-tier
network architecture? (Choose two.)
A. serves as the network aggregation point
B. provides a boundary between Layer 2 and Layer 3
communications
501. What prevents a workstation from receiving a DHCP address?
B. STP
502. What Is a syslog facility?
D. set of values that represent the processes that can generate a log
message
503. Which communication interaction takes place when a southbound API
Is used?
B. between the SON controller and switches and routers on the
network
504. Which port type supports the spanning-tree portfast command without
additional configuration?
A. access ports
505. An engineer is configuring data and voice services to pass through the
same port. The designated switch interface fastethernet0/1 must transmit
packets using the same priority for data when they are received from the
access port of the IP phone. Which configuration must be used?
A)
interface fastethernet0/1
switchport priority extend cos 7
506. Which mode must be set for APs to communicate to a Wireless LAN
Controller using the Control and Provisioning of Wireless Access Points
(CAPWAP) protocol?
D. lightweight
507. What are two benefits of FHRPs? (Choose two.)
D. They enable automatic failover of the default gateway.
E. They allow multiple devices lo serve as a single virtual gateway for
clients in the network
508. What are two characteristics of an SSID? (Choose Two)
A. It can be hidden or broadcast in a WLAN
D. It is at most 32 characters long.
509. In QoS, which prioritization method is appropriate for interactive voice
and video?
D. low-latency queuing
510. Refer to the exhibit. Which change to the configuration on Switch
allows the two switches to establish an GtherChannel?
C. Option C
522. Which type of organization should use a collapsed-core architecture?
C. small and needs to reduce networking costs currently
523. In software-defined architecture, which place handles switching for
traffic through a Cisco router?
C. Data
524. Refer to the exhibit. Which IPv6 configuration is required for R17 to
successfully ping the WAN interface on R18?
B. Option B
525. Refer to the exhibit. Between which zones do wireless users expect to
experience intermittent connectivity?
526. Which device permits or denies network traffic based on a set of rules?
B. firewall
527. Refer to the exhibit. The entire MAC address table for SW1 is shown
here:
SW1#show mac-address-table
SW1#
528. Refer to Exhibit. An engineer is configuring the NEW York router to reach
the Lot interface of the Atlanta router using interface Se0/0/0 as the primary
path. Which two commands must be configured on the New York router so that
it can reach the Lo1 interface of the Atlanta router via Washington when the link
between New York and Atlanta goes down? (Choose two)
E. ipv6 router 2000::1/128 2023::3 5
A. ipv6 router 2000::1/128 2012::1
529. Refer to the exhibit. An extended ACL has been configured and applied
to router R2 The configuration started to work as intended.Which two
changes stop outbound traffic on TCP ports 25 and 80 to 10.0.20.0/26 from
the 10.0.10.0/26 subnet while still allowing all other traffic? (Choose two)
B. Add a “permit ip any any” statement at the end of ACL 101 for allowed traffic.
C. The source and destination IPs must be swapped in ACL 101.