200-301 (3)
200-301 (3)
Cisco
Exam Questions 200-301
Cisco Certified Network Associate
About Exambible
Found in 1998
Exambible is a company specialized on providing high quality IT exam practice study materials, especially Cisco CCNA, CCDA,
CCNP, CCIE, Checkpoint CCSE, CompTIA A+, Network+ certification practice exams and so on. We guarantee that the
candidates will not only pass any IT exam at the first attempt but also get profound understanding about the certificates they have
got. There are so many alike companies in this industry, however, Exambible has its unique advantages that other companies could
not achieve.
Our Advances
* 99.9% Uptime
All examinations will be up to date.
* 24/7 Quality Support
We will provide service round the clock.
* 100% Pass Rate
Our guarantee that you will pass the exam.
* Unique Gurantee
If you do not pass the exam at the first time, we will not only arrange FULL REFUND for you, but also provide you another
exam of your claim, ABSOLUTELY FREE!
NEW QUESTION 1
- (Topic 3)
What is a requirement when configuring or removing LAG on a WLC?
A. The Incoming and outgoing ports for traffic flow must be specified If LAG Is enabled.
B. The controller must be rebooted after enabling or reconfiguring LAG.
C. The management interface must be reassigned if LAG disabled.
D. Multiple untagged interfaces on the same port must be supported.
Answer: C
NEW QUESTION 2
- (Topic 3)
Refer to the exhibit.
Traffic sourced from the loopback0 Interface is trying to connect via ssh to the host at 10.0.1.15. What Is the next hop to the destination address?
A. 192.168.0.7
B. 192.168.0.4
C. 192.168.0.40
D. 192.168.3.5
Answer: B
NEW QUESTION 3
- (Topic 3)
What causes a port to be placed in the err-disabled state?
Answer: B
NEW QUESTION 4
- (Topic 3)
Which type of network attack overwhelms the target server by sending multiple packets to a port until the half-open TCP resources of the target are exhausted?
A. SYIM flood
B. reflection
C. teardrop
D. amplification
Answer: A
NEW QUESTION 5
- (Topic 3)
Which protocol uses the SSL?
A. HTTP
B. SSH
C. HTTPS
D. Telnet
Answer: C
NEW QUESTION 6
- (Topic 3)
Refer to the exhibit.
Site A was recently connected to site B over a new single-mode fiber path. Users at site A report Intermittent connectivity Issues with applications hosted at site B.
What is the reason for the problem?
Answer: B
NEW QUESTION 7
- (Topic 3)
A network engineer is installing an IPv6-only capable device. The client has requested that the device IP address be reachable only from the internal network.
Which type of IPv6 address must the engineer assign?
Answer: B
NEW QUESTION 8
- (Topic 3)
Refer to the exhibit.
Which two commands must be configured on router R1 to enable the router to accept secure remote-access connections? (Choose two)
Answer: BE
NEW QUESTION 9
- (Topic 3)
The router has been configured with a supernet to accommodate the requirement for 380 users on a subnet The requirement already considers 30% future growth.
Which configuration verifies the IP subnet on router R4?
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
NEW QUESTION 10
- (Topic 3)
Refer to the exhibit.
Which route must be configured on R1 so that OSPF routing is used when OSPF is up. but the server is still reachable when OSPF goes down?
Answer: D
NEW QUESTION 10
- (Topic 3)
Refer to the exhibit.
Which two commands when used together create port channel 10? (Choose two.)
Answer: AC
NEW QUESTION 15
- (Topic 3)
Which two components comprise part of a PKI? (Choose two.)
Answer: BC
NEW QUESTION 20
FILL IN THE BLANK - (Topic 3)
Refer to the exhibit.
Drag and drop the prefix lengths from the left onto the corresponding prefixes on the right Not all prefixes are used
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Diagram Description automatically generated with low confidence
NEW QUESTION 25
- (Topic 3)
What is the difference between IPv6 unicast and anycast addressing?
A. IPv6 anycast nodes must be explicitly configured to recognize the anycast address, but IPv6 unicast nodes require no special configuration
B. IPv6 unicast nodes must be explicitly configured to recognize the unicast address, but IPv6 anycast nodes require no special configuration
C. An individual IPv6 unicast address is supported on a single interface on one node but an IPv6 anycast address is assigned to a group of interfaces on multiple
nodes.
D. Unlike an IPv6 anycast address, an IPv6 unicast address is assigned to a group of interfaces on multiple nodes
Answer: C
NEW QUESTION 28
- (Topic 3)
Which two network actions occur within the data plane? (Choose two.)
Answer: BD
NEW QUESTION 32
- (Topic 3)
A network engineer must implement an IPv6 configuration on the vlan 2000 interface to create a routable locally-unique unicast address that is blocked from being
advertised to the internet. Which configuration must the engineer apply?
Answer: B
NEW QUESTION 36
- (Topic 3)
Refer to the exhibit.
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C
NEW QUESTION 38
DRAG DROP - (Topic 3)
Drag and drop the facts about wireless architectures from the left onto the types of access point on the right. Not all options are used.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
NEW QUESTION 39
- (Topic 3)
Which type of IPv6 address is similar to a unicast address but is assigned to multiple devices on the same network at the same time?
Answer: B
NEW QUESTION 44
- (Topic 3)
What is a function of an endpoint on a network?
Answer: C
Explanation:
An endpoint is a host that acts as the source or destination of data traffic flowing through a network.
When you are at your PC, editing your CV and uploading it to a file server, you are sitting at an endpoint.
NEW QUESTION 48
- (Topic 3)
Refer to the exhibit.
Which two commands must be added to update the configuration of router R1 so that it accepts only encrypted connections? (Choose two )
Answer: DE
NEW QUESTION 49
- (Topic 2)
The service password-encryption command is entered on a router. What is the effect of this configuration?
A. restricts unauthorized users from viewing clear-text passwords in the running configuration
B. encrypts the password exchange when a VPN tunnel is established
C. prevents network administrators from configuring clear-text passwords
D. protects the VLAN database from unauthorized PC connections on the switch
Answer: A
NEW QUESTION 51
- (Topic 2)
Refer to the exhibit.
Which action is expected from SW1 when the untagged frame is received on the GigabitEthernet0/1 interface?
Answer: A
NEW QUESTION 53
- (Topic 2)
Using direct sequence spread spectrum, which three 2.4-GHz channels are used to limit collisions?
A. 1,6,11
B. 1,5,10
C. 1,2,3
D. 5,6,7
Answer: A
NEW QUESTION 54
DRAG DROP - (Topic 2)
Drag the descriptions of IP protocol transmissions from the left onto the IP traffic types on the right.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
NEW QUESTION 57
- (Topic 2)
An engineer observes high usage on the 2.4GHz channels and lower usage on the 5GHz channels. What must be configured to allow clients to preferentially use
5GH2 access points?
Answer: D
NEW QUESTION 60
- (Topic 2)
Which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?
A. TKiP encryption
B. AES encryption
C. scrambled encryption key
D. SAE encryption
Answer: D
NEW QUESTION 64
- (Topic 2)
An engineer is configuring NAT to translate the source subnet of 10.10.0.0/24 to any of three addresses 192.168.30.1, 192.168.3.2, 192.168.3.3 Which
configuration should be used?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C
NEW QUESTION 65
DRAG DROP - (Topic 2)
Drag and drop the Cisco Wireless LAN Controller security settings from the left onto the correct security mechanism categories on the right.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
NEW QUESTION 70
- (Topic 2)
Refer to the exhibit.
An engineer must configure GigabitEthernet1/1 to accommodate voice and data traffic Which configuration accomplishes this task?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
NEW QUESTION 72
- (Topic 2)
Which unified access point mode continues to serve wireless clients after losing connectivity to the Cisco Wireless LAN Controller?
A. sniffer
B. mesh
C. flexconnect
D. local
Answer: C
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-5/config-guide/b_cg85/flexconnect.html
NEW QUESTION 73
DRAG DROP - (Topic 2)
Refer to the exhibit.
An engineer is tasked with verifying network configuration parameters on a client workstation to report back to the team lead. Drag and drop the node identifiers
from the left onto the network parameters on the right.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
NEW QUESTION 74
- (Topic 2)
What is a characteristic of spine-and-leaf architecture?
Answer: A
NEW QUESTION 77
- (Topic 2)
Refer to the exhibit.
Based on the LACP neighbor status, in which mode is the SW1 port channel configured?
A. passive
B. mode on
C. auto
D. active
Answer: D
Explanation:
From the neighbor status, we notice the “Flags” are SP. “P” here means the neighbor is in Passive mode.In order to create an Etherchannel interface, the (local)
SW1 ports should be in Active mode.Moreover, the “Port State” in the exhibit is “0x3c” (which equals to “00111100 in binary format).Bit 3 is “1” which means the
ports are synchronizing -
> the ports are working so the local ports should be in Active mode.
NEW QUESTION 82
- (Topic 2)
Why does a switch flood a frame to all ports?
Answer: B
NEW QUESTION 86
- (Topic 2)
Which communication interaction takes place when a southbound API Is used?
Answer: B
NEW QUESTION 88
- (Topic 2)
Refer to the exhibit.
Which command configures a floating static route to provide a backup to the primary link?
Answer: D
NEW QUESTION 91
- (Topic 2)
Which command must be entered to configure a DHCP relay?
A. ip helper-address
B. ip address dhcp
C. ip dhcp pool
D. ip dhcp relay
Answer: A
NEW QUESTION 94
- (Topic 2)
A corporate office uses four floors in a building
• Floor 1 has 24 users
• Floor 2 has 29 users
• Floor 3 has 28 users
•Floor 4 has 22 users
Which subnet summarizes and gives the most efficient distribution of IP addresses for the router configuration?
Answer: D
NEW QUESTION 97
- (Topic 2)
Which function is performed by DHCP snooping?
Answer: A
Which command must be executed for Gi1.1 on SW1 to become a trunk port if Gi1/1 on SW2 is configured in desirable or trunk mode?
Answer: C
An engineer is configuring the NEW York router to reach the Lo1 interface of the Atlanta router using interface Se0/0/0 as the primary path. Which two commands
must be configured on the New York router so that it can reach the Lo1 interface of the Atlanta router via Washington when the link between New York and Atlanta
goes down? (Choose two)
Answer: AE
Explanation:
Floating static routes are static routes that have an administrative distance greater than the administrative distance (AD) of another static route or dynamic routes.
By default a static route has an AD of 1 then floating static route must have the AD greater than 1. Floating static route has a manually configured administrative
distance greater than that of the primary route and therefore would not be in the routing table until the primary route fails.
Which IPv6 configuration is required for R17 to successfully ping the WAN interface on R18?
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
Explanation:
ipv6 unicast-routing statement included (IPv6 is enabled on the router).Compared to the exhibit, Fa0/0 and Fa0/1 have correct configurations.The route to subnet
2001:db8:4::/64 points to R18’s Fa1/0 (correct next-hop).
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. it sends information about MIB variables in response to requests from the NMS
B. it requests information from remote network nodes about catastrophic system events.
C. it manages routing between Layer 3 devices in a network
D. it coordinates user authentication between a network device and a TACACS+ or RADIUS server
Answer: A
A. port-to-multipoint
B. broadcast
C. point-to-point
D. nonbroadcast
Answer: C
Explanation:
The default OSPF network type for HDLC and PPP on Serial link is point-to- point (while the default OSPF network type for Ethernet link is Broadcast).
A. DTP
B. FTP
C. SMTP
D. TFTP
Answer: B
A. The trunk does not form and the ports go into an err-disabled status.
B. The trunk forms but the mismatched native VLANs are merged into a single broadcast domain.
C. The trunk does not form, but VLAN 99 and VLAN 999 are allowed to traverse the link.
D. The trunk forms but VLAN 99 and VLAN 999 are in a shutdown state.
Answer: B
Explanation:
The trunk still forms with mismatched native VLANs and the traffic can actually flow between mismatched switches. But it is absolutely necessary that the native
VLANs on both ends of a trunk link match; otherwise a native VLAN mismatch occurs, causing the two VLANs to effectively merge.
For example with the above configuration, SW1 would send untagged frames for VLAN 999. SW2 receives them but would think they are for VLAN 99 so we can
say these two VLANs are merged.
A. IKEv2
B. IKEv1
C. IPsec
D. MD5
Answer: C
Explanation:
A site-to-site VPN allows offices in multiple fixed locations to establish secure connections with each other over a public network such as the Internet. A site-to-site
VPN means that two sites create a VPN tunnel by encrypting and sending data between two devices. One set of rules for creating a siteto-site VPN is defined by
IPsec.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
The nip server 192.168.0.3 command has been configured on router 1 to make it an NTP client of router 2. Which command must be configured on router 2 so that
it operates in server-only mode and relies only on its internal clock?
A. Router2(config)#ntp passive
B. Router2(config)#ntp server 172.17.0.1
C. Router2(config)#ntp master 4
D. Router2(config)#ntp server 192.168.0.2
Answer: B
Explanation:
• To use internal clock of this router, use any configured IP address in any interface of this router.
A. After the cable is connected, the interface uses the fastest speed setting available for that cable type
B. After the cable is connected, the interface is available faster to send and receive user data
C. The frames entering the interface are marked with higher priority and then processed faster by a switch.
D. Real-time voice and video frames entering the interface are processed faster
Answer: B
Which route does R1 select for traffic that is destined to 192 168.16.2?
A. 192.168.16.0/21
B. 192.168.16.0/24
C. 192.168 26.0/26
D. 192.168.16.0/27
Answer: D
Explanation:
The destination IP addresses match all four entries in the routing table but the 192.168.16.0/27 has the longest prefix so it will be chosen. This is called the
“longest prefix match” rule.
Which two prefixes are included in this routing table entry? (Choose two.)
A. 192.168.1.17
B. 192.168.1.61
C. 192.168.1.64
D. 192.168.1.127
E. 192.168.1.254
Answer: BC
A. IS-IS
B. RIP
C. Internal EIGRP
D. OSPF
Answer: C
Explanation:
With the same route (prefix), the router will choose the routing protocol with lowest Administrative Distance (AD) to install into the routing table. The AD of Internal
EIGRP (90) is lowest so it would be chosen. The table below lists the ADs of popular routing protocols.
A. DTP
B. STP
C. VTP
D. 802.10
Answer: B
A network engineer is in the process of establishing IP connectivity between two sites. Routers R1 and R2 are partially configured with IP addressing. Both routers
have the ability to access devices on their respective LANs. Which command set configures the IP connectivity between devices located on both LANs in each
site?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: D
Answer: DE
Answer: D
Answer: D
A. HTTPS
B. RADIUS
C. TACACS+
D. HTTP
Answer: A
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-0/configuration-guide/b_cg80/b_cg80_chapter_011.html
Answer: B
A. 110
B. 38443
C. 3184439
Answer: C
Explanation:
Both the line “O 172.16.0.128/25” and “S 172.16.0.0/24” cover the host 172.16.0.202 but with the “longest (prefix) match” rule the router will choose the first
route.
A. broadcast packets from a switch that is attempting to locate a MAC address at one of several remote sites
B. multicast traffic from a server at one site to hosts at another location
C. spanning-tree updates between switches that are at two different sites
D. unicast messages from a host at a remote site to a server at headquarters
Answer: D
Explanation:
“The original poster makes a correct observation that EIGRP does not work in a pure IPSEC environment. IPSEC was designed to process unicast traffic.
A. The NMS software must be loaded with the MIB associated with the trap.
B. The NMS must be configured on the same router as the SNMP agent
C. The NMS must receive a trap and an inform message from the SNMP agent within a configured interval
D. The NMS must receive the same trap from two different SNMP agents to verify that it is reliable.
Answer: A
A. The seventh bit of the original MAC address of the interface is inverted
B. The interface ID is configured as a random 64-bit value
C. The characters FE80 are inserted at the beginning of the MAC address of the interface
D. The MAC address of the interface is used as the interface ID without modification
Answer: A
Answer: C
A. northbound API
B. REST API
C. SOAP API
D. southbound API
Answer: D
Explanation:
Cisco overview doc for SDN here: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Data_Center/VMDC/SDN/SDN. html
Refer to the exhibit. After the configuration is applied, the two routers fail to establish an OSPF neighbor relationship. what is the reason for the problem?
Answer: B
Answer: B
A. Mastered
B. Not Mastered
Answer: A
Explanation:
1-1, 2-4, 3-3, 4-2
A. 6
B. 8
C. 12
D. 18
Answer: B
Refer to the exhibit. An engineer must add a subnet for a new office that will add 20 users to the network. Which IPv4 network and subnet mask combination does
the engineer assign to minimize wasting addresses?
A. 10.10.225.48 255.255.255.240
B. 10.10.225.32 255.255.255.240
C. 10.10.225.48 255.255.255.224
D. 10.10.225.32 255.255.255.224
Answer: D
Answer: A
Answer: D
Which action is necessary to complete the configuration if the ISP uses third-party network devices?
Answer: D
C. allows configuration and monitoring of the network from one centralized port
D. combines control and data plane functionality on a single device to minimize latency
Answer: C
A. policy plane
B. management plane
C. control plane
D. data plane
Answer: C
To which device does Router1 send packets that are destined to host 10.10.13.165?
A. Router2
B. Router3
C. Router4
D. Router5
Answer: B
A. IP SLA
B. syslog
C. NetFlow
D. SNMPv3
Answer: C
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A packet is being sent across router R1 to host 172.163.3.14. To which destination does the router send the packet?
Answer: B
A. It alternates automatically between 2.4 GHz and 5 GHz on adjacent access points
B. It allows the administrator to assign channels on a per-device or per-interface basis.
Answer: A
Answer: AB
Explanation:
Reference: https://www.cisco.com/c/en/us/support/docs/security-vpn/secure-shell- ssh/4145-ssh.html
Answer: D
Explanation:
“In IEEE 802.11 wireless local area networking standards (including Wi-Fi), a service set is a group of wireless network devices which share a service set
identifier (SSID)… A service set forms a logical network of nodes operating with shared link-layer networking parameters; they form one logical network segment.“
A. Cisco DNA Center device management can deploy a network more quickly thantraditional campus device management
B. Traditional campus device management allows a network to scale more quickly than with Cisco DNA Center device management
C. Cisco DNA Center device management can be implemented at a lower cost than most traditional campus device management options
D. Traditional campus device management schemes can typically deploy patches and updates more quickly than Cisco DNA Center device management
Answer: A
A. FIFO
B. WFQ
C. PQ
D. WRED
Answer: C
A. switch(config-line)#IIdp port-description
B. switch(config)#IIdp port-description
C. switch(config-if)#IIdp port-description
D. switch#IIdp port-description
Answer: B
The entire contents of the MAC address table are shown. Sales-4 sends a data frame to Sales-1.
A. Perform a lookup in the MAC address table and discard the frame due to a missing entry.
B. Insert the source MAC address and port into the forwarding table and forward the frame to Sales-1.
C. Map the Layer 2 MAC address to the Layer 3 IP address and forward the frame.
D. Flood the frame out of all ports except on the port where Sales-1 is connected.
Answer: B
Explanation:
https://www.ciscopress.com/articles/article.asp?p=3089352&seqNum=6
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Ansible:– uses SSH for remote device communication– uses YAML for fundamental configuration elements
Chef:– uses TCP port 10002 for configuration push jobs– uses Ruby for fundamental configuration elements
Puppet:– fundamental configuration elements are stored in a manifest– uses TCP 8140 for communication
The focus of Ansible is to be streamlined and fast, and to require no node agent installation.Thus, Ansible performs all functions over SSH. Ansible is built on
Python, in contrast to the Ruby foundation of Puppet and Chef.TCP port 10002 is the command port. It may be configured in the Chef Push Jobs configuration file
.This port allows Chef Push Jobs clients to communicate with the Chef Push Jobs server.Puppet is an open-source configuration management solution, which is
built with Ruby and offers custom Domain Specific Language (DSL) and Embedded Ruby (ERB) templates to create custom Puppet language files, offering a
declarative-paradigm programming approach.A Puppet piece of code is called a manifest, and is a file with .pp extension.
Answer: C
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer: A
A. show ip route
B. show ip interface
C. show interface
D. show cdp neighbor
Answer: D
A. TCP is reliable and is a connection-oriented protocol UDP is not reliable and is a connectionless protocol
B. TCP is not reliable and is a connection-oriented protocol; UDP is reliable and is aconnectionless protocol
C. TCP is not reliable and is a connectionless protocol; UDP is reliable and is a connection- oriented protocol
D. TCP is reliable and is a connectionless protocol; UDP is not reliable and is a connection- oriented protocol
Answer: A
A. logging trap 5
B. logging trap 2
C. logging trap 4
D. logging trap 3
Answer: C
Answer: A
Answer: A
- (Topic 1)
Which switch technology establishes a network connection immediately when it is plugged in?
A. PortFast
B. BPDU guard
C. UplinkFast
D. BackboneFast
Answer: A
Explanation:
PortFast is useful to connect hosts and switches to a switch. Access layer switches are more frequently “plugged in” and “plugged out” than distribution or core
layer switches. Also, this feature’s target is just to minimize STP convergence time.
Answer: A
A. The switch rewrites the source and destination MAC addresses with its own.
B. The source MAC address is changed.
C. The source and destination MAC addresses remain the same.
D. The destination MAC address is replaced with ffff.ffff.ffff.
Answer: C
Answer: CD
- (Topic 1)
Which state does the switch port move to when PortFast is enabled?
A. forwarding
B. listening
C. blocking
D. learning
Answer: A
An engineer is configuring the router to provide static NAT for the webserver Drag and drop the configuration commands from the left onto the letters that
correspond to its position in the configuration on the right.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer: C
Explanation:
The “ipv6 address autoconfig” command causes the device to perform IPv6 stateless address autoconfiguration to discover prefixes on the link and then to add
the EUI-64 based addresses to theinterface.Addresses are configured depending on the prefixes received in Router Advertisement (RA)messages.The device will
listen for RA messages which are transmitted periodically from the router (DHCPServer).This RA message allows a host to create a global IPv6 address from:+ Its
interface identifier (EUI- 64 address)+ Link Prefix (obtained via RA)Note: Global address is the combination of Link Prefix and EUI-64 address
Answer: D
Answer: B
A. expedited forwarding
B. traffic policing
C. round-robin scheduling
D. low-latency queuing
Answer: D
A. OSPF area
B. OSPF MD5 authentication key
C. iPv6 address
D. OSPf process ID
E. OSPf stub flag
Answer: AD
A. adminadmin123
B. default
C. testing 1234
D. cisco123
Answer: C
Explanation:
If neither the enable password command nor the enable secret command is configured, and if there is a line password configured for the console, the console line
password serves as the enable password for all VTY sessions -> The “enable secret” will be used first if available, then “enable password” and line password.
A. ASCII
B. base64
C. binary
D. decimal
E. hexadecimal
Answer: AE
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-4/configuration/guides/consolidated/b_cg74_CONSOLIDATED/b_cg74_CONSOLIDATED_
chapter_01010001.html
A. OpenFlow
B. OpenStack
C. OpFlex
D. REST
Answer: D
Answer: C
Answer: B
A. disk
B. applications
C. VM configuration file
D. operating system
Answer: C
Answer: C
Answer: A
Answer: D
Explanation:
We can see in this picture we have to type 64 hexadecimal characters (256 bit) for the WPA2 passphrase so we can deduce the encryption is AES-256, not
AES-128.
https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/67134- wpa2-config.html
Answer: B
Explanation:
If the destination MAC address is not in the CAM table (unknown destination MAC address), the switch sends the frame out all other ports that are in the same
VLAN as the received frame. This is called flooding. It does not flood the frame out the same port on which the frame was received.
What commands are needed to add a subinterface to Ethernet0/0 on R1 to allow for VLAN 20, with IP address 10.20.20.1/24?
Answer: B
A. local port ID
B. lowest path cost to the root bridge
C. lowest neighbor's bridge ID
D. lowest neighbor's port ID
Answer: B
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. Mastered
B. Not Mastered
Answer: A
Explanation:
https://ns1.com/resources/dns-types-records-servers-and-
queries#:~:text=Address%20Mapping%20record%20(A%20Record,a%20hostname%20to%20another%20hostname.
- (Topic 1)
Which command prevents passwords from being stored in the configuration as plain text on a router or switch?
A. enable secret
B. service password-encryption
C. username Cisco password encrypt
D. enable password
Answer: B
An administrator must turn off the Cisco Discovery Protocol on the port configured with address last usable address in the 10.0.0.0/30 subnet. Which command set
meets the requirement?
Answer: D
A. S1
B. S2
C. S3
D. S4
Answer: B
Which two encoding methods are supported by REST APIs? (Choose two)
A. YAML
B. JSON
C. EBCDIC
D. SGML
E. XML
Answer: BE
Explanation:
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/2-x/rest_cfg/2_1_x/b_Cisco_APIC_REST_API_Configuration_Guide/b_Cisco_APIC_REST
_ API_Configuration_Guide_chapter_01.html
Reference:
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus1000/sw/5_x/rest_api_co
nfig/b_Cisco_N1KV_VMware_REST_API_Config_5x/b_Cisco_N1KV_VMware_REST_API
_Config_5x_chapter_010.pdf
The Application Policy Infrastructure Controller (APIC) REST API is a programmatic interface that uses REST architecture. The API accepts and returns HTTP (not
enabled by default) or HTTPS messages that contain JavaScript Object Notation (JSON) or Extensible Markup Language (XML) documents.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. partial mesh
B. full mesh
C. point-to-point
D. hub-and-spoke
Answer: C
A. CDP
B. SNMP
C. SMTP
D. ARP
Answer: B
Explanation:
SNMP is an application-layer protocol that provides a message format for communication between SNMP managers and agents. SNMP provides a standardized
framework and a common language used for the monitoring and management of devices in a network.The SNMP framework has three parts:+ An SNMP
manager+ An SNMP agent+ A Management Information Base (MIB)The Management Information Base (MIB) is a virtual information storage area for network
management information, which consists of collections of managed objects.With SNMP, the network administrator can send commands to multiple routers to do
the backup
Answer: A
Answer: D
A. The floating static route must have a higher administrative distance than the primary route so it is used as a backup
B. The administrative distance must be higher on the primary route so that the backup route becomes secondary.
C. The floating static route must have a lower administrative distance than the primary route so it is used as a backup
D. The default-information originate command must be configured for the route to be installed into the routing table
Answer: A
Answer: A
Answer: BC
- (Topic 1)
What is a difference between local AP mode and FiexConnet AP mode?
Answer: A
Answer: C
Explanation:
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/25ew/configuration/guide/conf/port_sec.html
Answer: A
Explanation:
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-5/configuration-guide/b_cg75/b_cg75_chapter_0100010.html
A. TACACS server
B. wireless access point
C. RADIUS server
D. wireless LAN controller
Answer: B
Answer: DE
Answer: A
A. alert
B. critical
C. notice
D. debug
Answer: C
Answer: D
The network administrator wants VLAN 67 traffic to be untagged between Switch 1 and Switch 2 while all other VLANs are to remain tagged.
Which command accomplishes this task?
Answer: D
Answer: C
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. ip address dhcp
B. ip helper-address
C. ip dhcp pool
D. ip dhcp client
Answer: A
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_dhcp/configuration/12-4/dhcp-12-4-book/config-dhcp-client.html
If we want to get an IP address from the DHCP server on a Cisco device, we can use the command “ip address dhcp”.
Note: The command “ip helper-address” enables a router to become a DHCP Relay Agent.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. cookbook
B. task
C. playbook
D. model
E. recipe
Answer: CD
A. asynchronous routing
B. single-homed branches
C. dual-homed branches
D. static routing
E. dynamic routing
Answer: AC
Answer: D
An access list is required to permit traffic from any host on interface G0/0 and deny traffic from interface G/0/1. Which access list must be applied?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
Answer: D
Explanation:
This is a training program which simulates an attack, not a real attack (as it says “The webpage that opens reports that it was safe”) so we believed it should be
called a “user awareness” program.Therefore the best answer here should be “user awareness”. This is the definition of“User awareness” from CCNA 200- 301
Offical Cert Guide Book:“User awareness: All users should be made aware of the need for data confidentiality to protect corporate information, as well as their own
credentials and personal information. They should also be made aware of potential threats, schemes to mislead, and proper procedures to report security
incidents. ” Note: Physical access control means infrastructure locations, such as network closets and data centers, should remain securely locked.
A. dual algorithm
B. metric
C. administrative distance
D. hop count
Answer: C
Explanation:
Administrative distance is the feature used by routers to select the best path when there are two or more different routes to the same destination from different
routing protocols. Administrative distance defines the reliability of a routing protocol.
A. data plane
B. control plane
C. policy plane
D. management plane
Answer: B
A. local port ID
B. lowest path cost to the root bridge
C. lowest neighbor's bridge ID
D. lowest neighbor's port ID
Answer: B
Answer: B
Explanation:
Traffic shaping retains excess packets in a queue and then schedules the excess for later transmission over increments of time.
A. 2000::/3
B. 2002::5
C. FC00::/7
D. FF02::1
E. FF02::2
Answer: DE
Explanation:
Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6/configuration/xe-3s/ipv6-xe-36s-book/ip6-multicast.html
When an interface is configured with IPv6 address, it automatically joins the all nodes (FF02::1) and solicited-node (FF02::1:FFxx:xxxx) multicast groups. The all-
node group is used to communicate with all interfaces on the local link, and the solicited-nodes multicast group is required for link-layer address resolution. Routers
also join a third multicast group, the all-routers group (FF02::2).
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. Ansible
B. JSON
C. Chef
D. Puppet
Answer: D
A. Control
B. Management
C. Data
D. application
Answer: C
Explanation:
Data plane—Handles all the data traffic. The basic functionality of a Cisco NX-OS device is to forward packets from one interface to another. The packets that are
not meant for the switch itself are called the transit packets. These packets are handled by the data plane
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. default-router
B. default-gateway
C. ip helper-address
D. dns-server
Answer: A
Answer: A
A. redundancy
B. console
C. distribution system
D. service
Answer: C
A. autonomous
B. lightweight
C. bridge
D. mobility express
Answer: B
Explanation:
https://www.cisco.com/c/en/us/support/docs/wireless/aironet-1200- series/70278-lap-faq.html
A Lightweight Access Point (LAP) is an AP that is designed to be connected to a wireless LAN (WLAN) controller (WLC). APs are “lightweight,” which means that
they cannot act independently of a wireless LAN controller (WLC). The WLC manages the AP configurations and firmware. The APs are “zero touch” deployed,
and individual configuration of APs is not necessary.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer: D
- (Topic 1)
Aside from discarding, which two states does the switch port transition through while using RSTP (802.1w)? (Choose two)
A. listening
B. blocking
C. forwarding
D. learning
E. speaking
Answer: CD
A. Data collection and analysis tools establish a baseline for the network
B. Artificial intelligence identifies and prevents potential design failures.
C. Machine learning minimizes the overall error rate when automating troubleshooting processes
D. New devices are onboarded with minimal effort
E. Proprietary Cisco APIs leverage multiple network management tools.
Answer: BE
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
Answer: BD
Answer: B
A. Layer 2 forwarding
B. coordinating VTNs
C. tracking hosts
D. managing the topology
E. protecting against DDoS attacks
Answer: BD
A. infrastructure-as-a-service
B. platform-as-a-service
C. business process as service to support different types of service
D. software-as-a-service
Answer: D
An engineer configured NAT translations and has verified that the configuration is correct. Which IP address is the source IP?
A. 10.4.4.4
B. 10.4.4.5
C. 172.23.103.10
D. 172.23.104.4
Answer: D
Explanation:
NAT is used to send a packet to the outside network, using a public IP address to make it routable. The NAT logic is "inside-to-outside" FIRST and "outside-to-
inside" THEN. This way, configuring NAT means "choosing a public IP address" for any outbound packet" IN THE FIRST PLACE, where "public IP address"
translates to "inside global address". Among the given answers, the only inside global address is 172.123.104.4.
A. used cryptographic tunneling to protect the privacy of data for multiple users simultaneously
B. used exclusively when a user is connected to a company's internal network
C. establishes a secure tunnel between two branch sites
D. allows the users to access company internal network resources through a secure tunnel
Answer: D
A. outside global
B. outsdwde local
C. inside global
D. insride local
E. outside public
F. inside public
Answer: C
Explanation:
NAT use four types of addresses:* Inside local address – The IP address assigned to a host on the inside network. The address is usually not an IP address
assigned by the Internet Network Information Center (InterNIC) or service provider.This address is likely to be an RFC 1918 private address.* Inside global
address – A legitimate IP address assigned by the InterNIC or service provider that represents one or more inside local IP addresses to the outside world.* Outside
local address – The IP address of an outside host as it is known to the hosts on the inside network.* Outside global address – The IP address assigned to a host
on the outside network. The owner of the host assigns
this address.
Answer: D
Explanation:
FHRP is layer 3 protocol whose purpose is to protect the default gateway by offering redundancy of the gateway in a subnet. This is achieved by allowing two or
more routers to provide a backup for the first-hop IP router address. If a failure of an active router occurs, the backup router will take over the address. The routers
negotiate their roles (Active/Standby) with each other by multicast hello messages to share the VIP (virtual IP address) between the FHRP routers. The terms
Active/Standby vary between the different types of FHRP. The active router will act as the default gateway and the standby router acts as a backup the active
router.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer: B
Explanation:
Stateful inspection, also known as dynamic packet filtering, is a firewall technology that monitors the state of active connections and uses this information to
determine which network packets to allow through the firewall.
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C
A. BPDUfilter
B. PortFast
C. Backbonefast
D. BPDUguard
Answer: B
Explanation:
PortFast
Spanning Tree Portfast causes layer 2 switch interfaces to enter forwarding state immediately, bypassing the listening and learning states. It should be used on
ports connected directly to end hosts like servers or workstations. Note: If portfast isn’t enabled, DHCP timeouts can occur while STP converges, causing more
problems.
https://skminhaj.wordpress.com/2015/03/04/spanning-tree-stp-rstp-mst-enhancements/
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. intrusion detection
B. user awareness
C. physical access control
D. network authorization
Answer: C
The loopback1 interface of the Atlanta router must reach the loopback3 interface of the Washington router. Which two static host routes must be configured on the
NEW York router? (Choose two)
Answer: AB
Answer: C
Explanation:
Usually no action is required when a route flaps so it generates the notification syslog level message (level 5).
A. SMTP
B. SNMP
C. TCP
D. FTP
Answer: B
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. The environment must be configured with one hypervisor that serves solely as a network manager to monitor SNMP traffic
B. It allows logical network devices to move traffic between virtual machines and the rest of the physical network
C. It allows multiple operating systems and applications to run independently on one physical server.
D. It allows a physical router to directly connect NICs from each virtual machine into the network
E. It requires that some servers, virtual machines and network gear reside on the Internet
Answer: BC
Answer: D
Explanation:
Forward time : Determines how long each of the listening and learning states last before the port begins forwarding.
Switch(config)# [ no ] spanning-tree vlan vlan_ID forward-time forward_timeConfigures the forward time of a VLAN. The forward_time value can be from 4 to 30
seconds. https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/15-02SG/configuration/guide/config/spantree.html#56177
A. OpenFlow
B. REST API
C. NETCONF
D. Southbound API
Answer: B
A. platform-as-a-service
B. software-as-a-service
C. network-as-a-service
D. infrastructure-as-a-service
Answer: B
Explanation:
Below are the 3 cloud supporting services cloud providers provide to customer:
+ SaaS (Software as a Service): SaaS uses the web to deliver applications that are managed by a thirdparty vendor and whose interface is accessed on the
clients’ side. Most SaaS applications can be run directly from a web browser without any downloads or installations required, although some require plugins.
+ PaaS (Platform as a Service): are used for applications, and other development, while providing cloud components to software. What developers gain with PaaS
is a framework they can build upon to develop or customize applications. PaaS makes the development, testing, and deployment of applications quick, simple, and
cost-effective. With this technology, enterprise operations, or a thirdparty provider, can manage OSes, virtualization, servers, storage, networking, and the PaaS
software itself. Developers, however, manage the applications.
+ IaaS (Infrastructure as a Service): self-service models for accessing, monitoring, and managing remote datacenter infrastructures, such as compute (virtualized
or bare metal), storage, networking, and networking services (e.g. firewalls). Instead of having to purchase hardware outright, users can purchase IaaS based on
consumption, similar to electricity or other utility billing.
In general, IaaS provides hardware so that an organization can install their own operating system.
A. 2000::/3
B. FC00::/7
C. FE80::/10
D. FF00::/8
Answer: D
Explanation:
FF00::/8 is used for IPv6 multicast and this is the IPv6 type of address the question wants to ask.FE80::/10 range is used for link-local addresses. Link-local
addresses only used for communications within the local subnetwork (automatic address configuration, neighbor discovery, router discovery, and by many routing
protocols). It is only valid on the current subnet.It is usually created dynamically using a link-local prefix of FE80::/10 and a 64-bit interface identifier (based on
Answer: C
A. Mastered
B. Not Mastered
Answer: A
Explanation:
To configure an LACP EtherChannel and number it as 44, configure it between switches SW1 and SW2 using interfaces Ethernet0/0 and Ethernet0/1 on both
sides, configure the EtherChannel as a trunk link, configure the trunk link with 802.1q tags, and configure VLAN ‘MONITORING’ as the untagged VLAN of the
EtherChannel, you need to follow these steps:
? On both SW1 and SW2, enter the global configuration mode by using the
configure terminal command.
? On both SW1 and SW2, select the two interfaces that will form the EtherChannel by using the interface range ethernet 0/0 - 1 command. This will enter the
interface range configuration mode.
? On both SW1 and SW2, set the protocol to LACP by using the channel-protocol
lacp command.
? On both SW1 and SW2, assign the interfaces to an EtherChannel group number 44 by using the channel-group 44 mode active command. This will create a
logical interface named Port-channel44 and set the LACP mode to active on both ends. The LACP mode must match on both ends for the EtherChannel to form.
? On both SW1 and SW2, exit the interface range configuration mode by using the exit command.
? On both SW1 and SW2, enter the Port-channel interface configuration mode by using the interface port-channel 44 command.
? On both SW1 and SW2, configure the Port-channel interface as a trunk link by using the switchport mode trunk command.
? On both SW1 and SW2, configure the Port-channel interface to use 802.1q tags for VLAN identification by using the switchport trunk encapsulation dot1q
command.
? On both SW1 and SW2, configure VLAN ‘MONITORING’ as the untagged VLAN of the Port-channel interface by using the switchport trunk native vlan
MONITORING command.
? On both SW1 and SW2, exit the Port-channel interface configuration mode by using the exit command.
? On both SW1 and SW2, save the configuration to NVRAM by using the copy running-config startup-config command.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer as below configuration:
* 1.- on R3
config terminal
ip route 192.168.1.1 255.255.255.255 209.165.200.229
end
copy running start
* 2.- on R2
config terminal
ip route 0.0.0.0 0.0.0.0 209.165.202.130
end
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer as below configuration:
On SW1:
conf terminal vlan 15
exit
interface range eth0/0 - 1 channel-group 1 mode active exit
interface port-channel 1
switchport trunk encapsulation dot1q switchport mode trunk
switchport trunk native vlan 15 end
copy run start
on SW2:
conf terminal
vlan 15 exit
interface range eth0/0 - 1 channel-group 1 mode active exit
interface port-channel 1
switchport trunk encapsulation dot1q switchport mode trunk
switchport trunk native vlan 15 end
copy run start
* 5. A ping must work between the routers on the IPv4 and IPv6 address ranges.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer as below configuration:
on R1
config terminal
ipv6 unicast-routing inter eth0/1
ip addre 192.168.1.1 255.255.255.240
ipv6 addre 2001:db8:aaaa::1/64 not shut
end
copy running start
on R2
config terminal
ipv6 unicast-routing inter eth0/1
ip address 192.168.1.14 255.255.255.240
ipv6 address 2001:db8:aaaa::2/64 not shut
end
copy running start
---------------------
for test from R1
ping ipv6 2001:db8:aaaa::1
for test from R2
ping ipv6 2001:db8:aaaa::2
A. tunnel
B. transport
C. aggressive
D. main
Answer: B
Explanation:
IPsec encryption mode is the way IPsec secures the data packets that are sent over an IP network. There are two main modes of IPsec encryption: tunnel mode
and transport mode1. Tunnel mode encrypts the entire IP packet, including the original header, and adds a new IP header with the source and destination
addresses of the security gateways (routers, firewalls, or VPN servers) that perform the encryption and decryption2. Transport mode encrypts only the payload
(data) of the IP packet, leaving the original header intact, and uses the original source and destination addresses of the endpoints that generate and consume the
data3. Therefore, transport mode is appropriate when the destination of a packet differs from the security termination point, as it does not change the original IP
header information. Tunnel mode is more suitable when the security termination point is also the destination of the packet, as it provides more protection for the
original IP header information.
Drag and drop the learned prefixes from the left onto the subnet masks on the right
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer: D
A. TCP establishes a connection prior to sending data, and UDP sends immediately.
B. TCP uses error detection for packets, and UDP uses error recovery.
C. TCP avoids using sequencing, and UDP avoids using acknowledgments.
D. TCP encourages out-of-order packet delivery, and UDP prevents re-ordering.
Answer: A
The image server and client A are running an application that transfers an extremely high volume of data between the two. An engineer is configuring a dedicated
circuit between R1 and R2. Which set of commands must the engineer apply to the routers so that only traffic between the image server and client A is forces to
use the new circuit?
Answer: D
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
A. CHANGE
B. UPDATE
C. POST
D. PUT
Answer: D
Explanation:
PUT is most-often utilized for **update** capabilities, PUT-ing to a known
resource URI with the request body containing the newly-updated representation of the original resource.However, PUT can also be used to create a resource in
the case where the resource ID is chosen by the client instead of by the server. In other words, if the PUT is to a URI that contains the value of a non-existent
resource ID. Again, the request body contains a resource representation. Many feel this is convoluted and confusing. Consequently, this method of creation should
be used sparingly, if at all.Alternatively, use POST to create new resources and provide the client-defined ID in the body representation—presumably to a URI that
doesn’t include the ID of the resource (see POST below).On successful update, return 200 (or 204 if not returning any content in the body) from a PUT. If using
PUT for create, return HTTP status 201 on successful creation. A body in the response is optional—providing one consumes more bandwidth. It is not necessary to
return a link via a Location header in the creation case since the client already set the resource ID.PUT is not a safe operation, in that it modifies (or creates) state
on the server, but it is idempotent. In other words, if you create or update a resource using PUT and then make that same call again, the resource is still there and
still has the same state as it did with the first call.If, for instance, calling PUT on a resource increments a counter within the resource, the call is no longer
idempotent. Sometimes that happens and it may be enough to document that the call is not idempotent. However, it’s recommended to keep PUT requests
idempotent. It is strongly recommended to use POST for non-idempotent requests.Examples:
https://www.restapitutorial.com/lessons/httpmethods.html
Which action by the router when a packet is sourced from 10.10.10.2 and destined 10.10.10.16?
Answer: D
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. Cisco DNA Center correlates information from different management protocols to obtain insights, and traditional campus management requires manual analysis.
B. Cisco DNA Center handles management tasks at the controller to reduce the load on infrastructure devices, and traditional campus management uses the data
backbone.
C. Cisco DNA Center leverages YANG and NETCONF to assess the status of fabric and nonfabric devices, and traditional campus management uses CLI
exclusively.
D. Cisco DNA Center automatically compares security postures among network devices, and traditional campus management needs manual comparisons.
Answer: C
A network administrator must permit traffic from the 10.10.0.0/24 subnet to the WAN on interlace Seria10. What is the effect of the configuration as the
administrator applies the command?
Answer: C
A. Get
B. GetNext
C. Set
D. GetBulk
E. Inform
Answer: AD
A. The switch references the MAC address aging table for historical addresses on the port that received the frame.
B. The switch floods the frame to all ports in all VLANs except the port that received the frame
C. The switch drops the frame and learns the destination MAC address again from the port that received the frame
D. The switch floods the frame to all ports in the VLAN except the port that received the frame.
Answer: D
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
A. user training
B. user awareness
C. vulnerability verification
D. physical access control
Answer: D
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. management
B. control
C. action
D. protected frame
Answer: A
Answer: B
A. 200 seconds
B. 300 seconds
C. 600 seconds
D. 900 seconds
Answer: B
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Refer to the exhibit. The IPv6 address for the LAN segment on router R1 must be configured using the EUI-64 format. When configured which ipv6 address is
produced by the router?
A. 2001:db8:1a44:41a4:C801:BEFF:FE4A:1
B. 2001:db8:1a44:41a4:C081:BFFF:FE4A:1
C. 2001:db8:1a44:41a4:4562:098F:FE36:1
D. 2001:db8:1a44:41a4:C800:BAFE:FF00:1
Answer: B
Answer: A
Answer: C
A. OS
B. hypervisor
C. CPU
D. physical enclosure
Answer: B
Drag and drop the statements about networking from the left onto the corresponding
networking types on the right. Not all statements are used.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Controller-based Networking :– This type deploys a consistent configuration across multiple devices.– Southbound APIs are used to apply
configurations.Traditional Networking :– A distributed control plane is needed.– This type requires a distributed management plane.
On a SND network the control plane is centralized on the the SND controller not distributed on the networking devices.
Northbound APIs do not interact with end devices. They allow the SND controller to interact with applications on the application plane
A. DHCPREQUEST
B. DHCPDISCOVER
C. DHCPACK
D. DHCPOFFER
Answer: D
Explanation:
DHCPOFFER is used to identify spurious DHCP servers. A spurious DHCP server is any device that is configured to act as a DHCP server without the network
administrator’s knowledge or permission. A spurious DHCP server can cause network problems by assigning incorrect or duplicate IP addresses to clients, or by
redirecting traffic to malicious gateways. To prevent such attacks, the DHCP snooping feature can be enabled on switches to filter out invalid or unauthorized
DHCP messages from untrusted sources1.
DHCP snooping works by intercepting and validating DHCP messages on a per-VLAN basis. The switch maintains a DHCP snooping binding database that
contains information about the trusted hosts with leased IP addresses, such as MAC address, IP address, lease time, binding type, VLAN number, and interface
information2. The switch also classifies its ports as trusted or untrusted. Trusted ports are those that connect to authorized DHCP servers or other trusted
switches. Untrusted ports are those that connect to untrusted hosts or devices. The switch only allows DHCP messages from trusted ports, and drops any DHCP
messages from untrusted ports that do not match the information in the binding database3.
The switch uses DHCPOFFER messages to identify spurious DHCP servers. A DHCPOFFER message is a response from a DHCP server to a client’s request for
an IP address. The message contains the offered IP address, subnet mask, default gateway, and other configuration parameters for the client4. When the switch
receives a DHCPOFFER message from an untrusted port, it compares the source MAC address and the offered IP address with the binding database. If there is
no match, the switch considers the message as coming from a spurious DHCP server and drops it. The switch also logs an error message and increments a
counter for the number of dropped messages5.
References:
? 1: Configuring DHCP Snooping - Cisco
? 2: Catalyst 6500 Release 12.2SX Software Configuration Guide - DHCP Snooping Binding Database
? 3: What is DHCP Snooping? - IONOS
? 4: Dynamic Host Configuration Protocol (DHCP) and Bootstrap Protocol (BOOTP) Parameters
? 5: Configuring DHCP Snooping - Cisco
A network engineer configures the CCNA WLAN so that clients must authenticate hourly and to limit the number of simultaneous connections to the WLAN to
Which two actions complete this configuration? (Choose two.)
A. Enable the Enable Session Timeout option and set the value to 3600.
B. Set the Maximum Allowed Clients value to 10.
C. Enable the Client Exclusion option and set the value to 3600.
D. Enable the Wi-Fi Direct Clients Policy option.
E. Set the Maximum Allowed Clients Per AP Radio value to 10.
Answer: AB
Relate Links
https://www.exambible.com/200-301-exam/
Contact us
We are proud of our high-quality customer service, which serves you around the clock 24/7.
Viste - https://www.exambible.com/