200-301 Implementing and Administering Cisco Solutions (200-301 CCNA) v1.1 Questions and Answers
Drag and drop the IPv6 address details from the left onto the corresponding types on the right.
Refer to the exhibit.
All routers in the network are configured correctly, and the expected routes are being exchanged among the routeis. Which set or routes are learned from neighbors and Installed on router 2?
A)
B)
C)
D)
200-301 Report Card
An engineer must configure a core router with a floating static default route to the backup router at 10.200.0.2. Which command meets the requirements?
Refer to the exhibit.
The show ip ospf interface command has been executed on R1. How is OSPF configured?
What is a reason why an administrator would choose to implement an automated network management approach?
What is the purpose of configuring different levels of syslog for different devices on the network?
Drag and drop the characteristic from the left onto the IPv6 address type on the right.
Refer to the exhibit.
Which configuration establishes a Layer 2 LACP EtherChannel when applied to both switches?
Refer to the exhibit.
A new VLAN and switch are added to the network. A remote engineer configures OldSwitch and must ensure that the configuration meets these requirements:
• accommodates current configured VLANs
• expands the range to include VLAN 20
• allows for IEEE standard support for virtual LANs
Which configuration on the NewSwitch side of the link meets these requirements?
A)
B)
C)
D)
Refer to the exhibit.
R1 has taken the DROTHER role in the OSPF DR/BDR election process. Which configuration must an engineer implement so that R1 is elected as the DR?
Drag and drop the SNMP components from the left onto the description on the right.
Drag and chop the TCP/IP protocols from the left onto their primary transmission protocols on the right.
Refer to the exhibit Routers R1 R2 and R3 use a protocol to identify their neighbors ' IP addresses hardware platforms, and software versions. A network engineer must configure R2 to avoid sharing any neighbor information with R3, and maintain its relationship with R1. What action meets this requirement?
Refer to the exhibit.
How must OSPF be configured on the GigabitEthernet0/0 interface of the neighbor device to achieve.
A)
B)
C)
D)
Refer to the exhibit. User traffic originating within site 0 is failing to reach an application hosted on IP address 192.168 0 10. Which is located within site A What is determined by the routing table?
Refer to the exhibit.
What two conclusions should be made about this configuration? (Choose two )
Refer to the exhibit.
A router reserved these five routes from different routing information sources.
Which two routes does the router install in its routing table? (Choose two)
Refer to the exhibit.
All interfaces are in the same VLAN. All switches are configured with the default STP priorities. During the STP electronics, which switch becomes the root bridge?
Drag and drop the characteristic from the left onto the IPv6 address type on the right.
Which implementation provides the strongest encryption combination for the wireless environment?
Refer to the exhibit.
Router R4 is dynamically learning the path to the server. If R4 is connected to R1 via OSPF Area 20, to R2 v2ia R2 BGP, and to R3 via EIGRP 777, which path is installed in the routing table of R4?
When a switch receives a frame for a known destination MAC address, how is the frame handed?
Refer to the exhibit.
R5 is the current DR on the network, and R4 is the BDR. Their interfaces are flapping, so a network engineer wants the OSPF network to elect a different DR and BDR. Which set of configurations must the engineer implement?
A)
B)
C)
D)
When configuring a WLAN with WPA2 PSK in the Cisco Wireless LAN Controller GUI, which two formats are available to select? (Choose two)
How does a switch process a frame received on Fa0/1 with the destination MAC address of 0e38.7363.657b when the table is missing the address?
Aside from discarding, which two states does the switch port transition through while using RSTP (802.1w)? (Choose two)
Several new coverage cells are required to improve the Wi-Fi network of an organization. Which two standard designs are recommended? (choose two.)
Router R1 must send all traffic without a matching routing-table entry to 192.168.1.1. Which configuration accomplishes this task?
Refer to the exhibit.
An administrator must turn off the Cisco Discovery Protocol on the port configured with address last usable address in the 10.0.0.0/30 subnet. Which command set meets the requirement?
Drag and drop the DHCP snooping terms from the left onto the descriptions on the right.
An email user has been lured into clicking a link in an email sent by their company ' s security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?
Drag the IPv6 DNS record types from the left onto the description on the right.
An engineer must configure a/30 subnet between two routers. Which usable IP address and subnet mask combination meets this criteria?
Refer to the exhibit.
Which password must an engineer use to enter the enable mode?
When implementing a router as a DHCP server, which two features must be configured ' ? (Choose two)
Refer to the exhibit.
Which type of route does R1 use to reach host 10.10.13.10/32?
How do TCP and UDP differ in the way they provide reliability for delivery of packets?
Drag and drop the network protocols from the left onto the correct transport services on the right.
What is the difference in data transmission delivery and reliability between TCP and UDP?
Which command prevents passwords from being stored in the configuration as plain text on a router or switch?
What is the purpose of a southbound API in a control based networking architecture?
What uses HTTP messages to transfer data to applications residing on different hosts?
Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right.
What mechanism carries multicast traffic between remote sites and supports encryption?
Several new coverage cells are required to improve the Wi-Fi network of an organization. Which two standard designs are recommended? (choose two.)
What is an advantage of Cisco DNA Center versus traditional campus device management?
Refer to the exhibit.
What is the correct next hop for router R1 to reach IP addresses 192.168.2.86 and 10.20.1.50?
What event has occurred if a router sends a notice level message to a syslog server?
When a floating static route is configured, which action ensures that the backup route is used when the primary route fails?
How do TCP and UDP differ in the way that they establish a connection between two endpoints?
Drag and drop the DNS lookup components from the left onto the functions on the right.
Which switch technology establishes a network connection immediately when it is plugged in?
What is the purpose of using First Hop Redundancy Protocol in a specific subnet?
Refer to the exhibit.
Which configuration on RTR-1 denies SSH access from PC-1 to any RTR-1 interface and allows all other traffic?
When a site-to-site VPN is configured, which IPsec mode provides encapsulation and encryption of the entire original P packet?
What does a router do when configured with the default DNS lookup settings, and a URL is entered on the CLI?
Which technology allows for multiple operating systems to be run on a single host computer?
Refer to the exhibit.
Which route type does the routing protocol Code D represent in the output?
Refer to the exhibit.
An administrator must configure interfaces Gi1/1 and Gi1/3 on switch SW11 PC-1 and PC-2 must be placed in the Data VLAN and Phone-1 must be placed in the Voice VLAN Which configuration meets these requirements?
Drag the descriptions of IP protocol transmissions from the left onto the IP traffic types on the right.
Which two WAN architecture options help a business improve scalability and reliability for the network? (Choose two.)
Which two functions are performed by the core layer in a three-tier architecture? (Choose two)
Which function is performed by the collapsed core layer in a two-tier architecture?
An engineer must configure the IPv6 address 2001:0db8:0000:0000:0700:0003:400F:572B on the serial0/0 interface of the HQ router and wants to compress it for easier configuration. Which command must be issued on the router interface?
After installing a new Cisco ISE server, which task must the engineer perform on the Cisco WLC to connect wireless clients on a specific VLAN based on their credentials?
Drag and drop the attack-mitigation techniques from the left onto the Types of attack that they mitigate on the right.
Refer to the exhibit.
A network administrator must permit SSH access to remotely manage routers in a network. The operations team resides on the 10.20.1.0/25 network. Which command will accomplish this task?
An engineer must configure a/30 subnet between two routers. Which usable IP address and subnet mask combination meets this criteria?
What is recommended for the wireless infrastructure design of an organization?
Which network allows devices to communicate without the need to access the Internet?
Refer to the Exhibit.
After the switch configuration the ping test fails between PC A and PC B Based on the output for switch 1. which error must be corrected?
Which protocol requires authentication to transfer a backup configuration file from a router to a remote server?
Which configuration management mechanism uses TCP port 22 by default when communicating with managed nodes?
in Which way does a spine and-leaf architecture allow for scalability in a network when additional access ports are required?
What is the total number of users permitted to simultaneously browse the controller management pages when using the AireOS GUI?
In QoS, which prioritization method is appropriate for interactive voice and video?
A user configured OSPF in a single area between two routers A serial interface connecting R1 and R2 is running encapsulation PPP By default which OSPF network type is seen on this interface when the user types show ip ospf interface on R1 or R2?
Refer to the exhibit.
An engineer must document all Wi-Fi services on a new wireless LAN controller. The Wi-Fi SSID " Office_WLan " has Layer 2 Security. What is determined by this configuration?
Refer to the exhibit. The route for 10.220.100.96/27 has been very unstable. The same route has four backups to routers A, B, C, and D via the respective methods. The routing protocol defaults for router Y have not been changed. When the current route for 10.220.100.96/27 becomes unavailable, which router will router Y use to route traffic to 10.220.100.96/27?
Router A learns the same route from two different neighbors, one of the neighbor routers is an OSPF neighbor and the other is an EIGRP neighbor. What is the administrative distance of the route that will be installed in the routing table?
Refer to the exhibit. A packet sourced from 10.10.10.1 is destined for 172.16.3.254. What is the subnet mask of the destination route?
When implementing a router as a DHCP server, which two features must be configured ' ? (Choose two)
Drag and drop the TCP and UDP characteristics from the left onto the supporting protocols on the right. Not all options are used.
Refer to the exhibit.
Which command must be executed for Gi1.1 on SW1 to become a trunk port if Gi1/1 on SW2 is configured in desirable or trunk mode?
Which two primary drivers support the need for network automation? (Choose two.)
Refer to the exhibit.
Only four switches are participating in the VLAN spanning-tree process.
Branch-1 priority 614440
Branch-2: priority 39082416
Branch-3: priority 0
Branch-4: root primary
Which switch becomes the permanent root bridge for VLAN 5?
Aswitch receives a frame with the destination MAC address 3C:5D: 7E:9F: 1A:2B.
Switch# show ethernet-frame-and-mac-address-table
How does the switch handle the frame?
Drag and drop the characteristic from the left onto the cable type on the right.
Which action prevents debug messages from being sent via syslog while allowing other messages when an abnormally high number of syslog messages are generated by a device with the debug process turned on?
Using direct sequence spread spectrum, which three 2.4-GHz channels are used to limit collisions?
An organization secures its network with multi-factor authentication using an authenticator app on employee smartphone. How is the application secured in the case of a user’s smartphone being lost or stolen?
An engineer must configure an OSPF neighbor relationship between router R1 and R3 The authentication configuration has been configured and the connecting interfaces are in the same 192.168 1.0/30 sublet. What are the next two steps to complete the configuration? (Choose two.)
A wireless administrator has configured a WLAN; however, the clients need access to a less congested 5-GHz network for their voice quality. What action must be taken to meet the requirement?
Refer to the exhibit.
Router R1 is running three different routing protocols. Which route characteristic is used by the router to forward the packet that it receives for destination IP 172.16.32.1?
Refer to the exhibit.
Which command configures a floating static route to provide a backup to the primary link?
Refer to the exhibit.
The show ip ospf interface command has been executed on R1 How is OSPF configured?
Refer to the exhibit. Which configuration enables SW2 to establish an LACP EtherChannel?
Refer to the exhibit. An administrator is configuring a new WLAN for a wireless network that has these requirements:
Dual-band clients that connect to the WLAN must be directed to the 5-GHz spectrum.
Wireless clients on this WLAN must be able to apply VLAN settings from RADIUS attributes.
Which two actions meet these requirements? (Choose two.)
An organization developed new security policies and decided to print the policies and distribute them to all personnel so that employees review and apply the policies. Which element of a security program is the organization implementing?
What are two recommendations for protecting network ports from being exploited when located in an office space outside of an IT closer? (Choose two.)
Refer to the exhibit. A secondary route is required on router R1 to pass traffic to the LAN network on R2 if the primary link fails. Which command must be entered to configure the router?
An engineer must establish a trunk link between two switches. The neighboring switch is set to trunk or desirable mode. What action should be taken?
An engineer configured an OSPF neighbor as a designated router. Which state verifies the designated router is in the proper mode?
What makes Cisco DNA Center different from traditional network management applications and their management of networks?
Refer to the exhibit. An engineer is using the Cisco WLC GUI to configure a WLAN for WPA2 encryption with AES and preshared key Cisc0123456. After the engineer selects the WPA + WPA2 option from the Layer 2 Security drop-down, which two tasks must they perform to complete the process? (Choose two)
Drag and drop the steps in a standard DNS lookup operation from the let into the order on the right.
A new DHCP server has been deployed in a corporate environment with lease time set to eight hours. Which CMD command on a Windows-based device allows the engineer to verify the DHCP lease expiration?
An engineer must configure traffic for a VLAN that is untagged by the switch as it crosses a trunk link. Which command should be used?
What are two reasons that cause late collisions to increment on an Ethernet interface? (Choose two)
An administrator must secure the WLC from receiving spoofed association requests. Which steps must be taken to configure the WLC to restrict the requests and force the user to wait 10 ms to retry an association request?
Refer to the exhibit. After the configuration is applied, the two routers fail to establish an OSPF neighbor relationship. what is the reason for the problem?
Refer to the exhibit.
A network engineer must block access for all computers on VLAN 20 to the web server via HTTP All other computers must be able to access the web server Which configuration when applied to switch A accomplishes this task?
An engineer must configure a WLAN using the strongest encryption type for WPA2- PSK. Which cipher fulfills the configuration requirement?
Refer to the exhibit.
The entire contents of the MAC address table are shown. Sales-4 sends a data frame to Sales-1.
What does the switch do as it receives the frame from Sales-4?
Refer to the exhibit.
Which configuration issue is preventing the OSPF neighbor relationship from being established between the two routers?
Refer to the exhibit.
Between which zones do wireless users expect to experience intermittent connectivity?
When a client and server are not on the same physical network, which device is used to forward requests and replies between client and server for DHCP?
An engineer configures interface Gi1/0 on the company PE router to connect to an ISP Neighbor discovery is disabled
Which action is necessary to complete the configuration if the ISP uses third-party network devices?
Refer to the exhibit. The static routes were implemented on the border router. What is the next hop IP address for a ping sent to 172.16.153.154 from the border router?
Refer to the exhibit.
Which two commands must be configured on router R1 to enable the router to accept secure remote-access connections? (Choose two)
What does an SDN controller use as a communication protocol to relay forwarding changes to a southbound API?
What are two differences between optical-fiber cabling and copper cabling? (Choose two)
What role does a hypervisor provide for each virtual machine in server virtualization?
Refer to the exhibit.
Which change to the configuration on Switch?
allows the two switches to establish an GtherChannel?
Which QoS per-hop behavior changes the value of the ToS field in the IPv4 packet header?
which IPv6 address block forwards packets to a multicast address rather than a unicast address?
A network administrator enabled port security on a switch interface connected to a printer. What is the next configuration action in order to allow the port to learn the MAC address of the printer and insert it into the table automatically?
Refer to the exhibit.
A packet is being sent across router R1 to host 172.163.3.14. To which destination does the router send the packet?
Refer to the exhibit.
A network engineer is in the process of establishing IP connectivity between two sites. Routers R1 and R2 are partially configured with IP addressing. Both routers have the ability to access devices on their respective LANs. Which command set configures the IP connectivity between devices located on both LANs in each site?
Which two tasks must be performed to configure NTP to a trusted server in client mode on a single network device? (Choose two)
Which result occurs when PortFast is enabled on an interface that is connected to another switch?
An implementer is preparing hardware for virtualization to create virtual machines on a host. What is needed to provide communication between hardware and virtual machines?
Which port type supports the spanning-tree portfast command without additional configuration?
Which action must be taken to assign a global unicast IPv6 address on an interface that is derived from the MAC address of that interface?
Which action does the router take as rt forwards a packet through the network?
Which type of IPv6 address is publicly routable in the same way as IPv4 public address?
Refer to the exhibit.
An engineer booted a new switch and applied this configuration via the console port. Which additional configuration must be applied to allow administrators to authenticate directly to enable privilege mode via Telnet using a local username and password?
What are two reasons for an engineer to configure a floating state route? (Choose two)
A network administrator must to configure SSH for remote access to router R1 The requirement is to use a public and private key pair to encrypt management traffic to and from the connecting client.
Which configuration, when applied, meets the requirements?
A network administrator needs to aggregate 4 ports into a single logical link which must negotiate layer 2 connectivity to ports on another switch. What must be configured when using active mode on both sides of the connection?
Refer to the exhibit. HQC needs to use a configuration that:
Handles up to 150,000 concurrent connections
Minimizes consumption of public IP addresses
Which configuration meets the requirements?
Refer to the exhibit. Routers R1 and R2 have been configured with their respective LAN interfaces. The two circuits are operational and reachable across the WAN. Which command set establishes failover redundancy if the primary circuit goes down?
Refer to the exhibit.
Which IPv6 configuration is required for R17 to successfully ping the WAN interface on R18?
A)
B)
C)
D)
Refer to the exhibit. What is the administrative distance for the advertised prefix that includes the host IP address 192.168.20.1?
Refer to the exhibit.
A static route must be configured on R14 to forward traffic for the 172 21 34 0/25 network that resides on R86 Which command must be used to fulfill the request?
Refer to the exhibit.
An engineer is tasked with verifying network configuration parameters on a client workstation to report back to the team lead. Drag and drop the node identifiers from the left onto the network parameters on the right.
Refer to the exhibit.
An engineer is configuring an EtherChannel using LACP between Switches 1 and 2 Which configuration must be applied so that only Switch 1 sends LACP initiation packets?
Refer to the exhibit.
R1 learns all routes via OSPF Which command configures a backup static route on R1 to reach the 192 168.20.0/24 network via R3?
An engineer is configuring remote access to a router from IP subnet 10.139.58.0/28. The domain name, crypto keys, and SSH have been configured. Which configuration enables the traffic on the destination router?
A)
B)
C)
D)
An engineer must configure R1 for a new user account. The account must meet these requirements:
* It must be configured in the local database.
* The username is engineer.
* It must use the strongest password configurable. Which command must the engineer configure on the router?
Refer to the exhibit.
An engineer built a new L2 LACP EtherChannel between SW1 and SW2 and executed these show commands to verify the work. Which additional task allows the two switches to establish an LACP port channel?
A network engineer is configuring a switch so that it is remotely reachable via SSH. The engineer has already configured the host name on the router. Which additional command must the engineer configure before entering the command to generate the RSA key?
Refer to the exhibit.
The following must be considered:
• SW1 is fully configured for all traffic
• The SW4 and SW9 links to SW1 have been configured
• The SW4 interface Gi0/1 and Gi0/0 on SW9 have been configured
• The remaining switches have had all VLANs adde d to their VLAN database
Which configuration establishes a successful ping from PC2 to PC7 without interruption to traffic flow between other PCs?
A)
B)
C)
D)
Which feature of Digest Authentication prevents credentials from being sent in plaintext?
Which two spanning-tree states are bypassed on an interface running PortFast? (Choose two.)
Drag and drop the Rapid PVST+ forwarding slate actions from the loft to the right. Not all actions are used.
Drag and drop the statements about networking from the left onto the corresponding networking types on the right.
Refer to the exhibit.
An IP subnet must be configured on each router that provides enough addresses for the number of assigned hosts and anticipates no more than 10% growth for now hosts. Which configuration script must be used?
A)
B)
C)
D)
Drag and drop the facts about wireless architectures from the left onto the types of access point on the right. Not all options are used.
Refer to the exhibit.
A network engineer must update the configuration on Switch2 so that it sends LLDP packets every minute and the information sent via LLDP is refreshed every 3 minutes Which configuration must the engineer apply?
A)
B)
C)
D)
R1 as an NTP server must have:
• NTP authentication enabled
• NTP packets sourced from Interface loopback 0
• NTP stratum 2
• NTP packets only permitted to client IP 209.165 200 225
How should R1 be configured?
A)
B)
C)
D)
Refer to the exhibit.
All VLANs are present in the VLAN database. Which command sequence must be applied to complete the configuration?
A Cisco engineer is configuring a factory-default router with these three passwords:
• The user EXEC password for console access is p4ssw0rd1
• The user EXEC password for Telnet access is s3cr3t2
• The password for privileged EXEC mode is pnv4t3p4ss Which command sequence must the engineer configured
A)
B)
C)
D)
Which Layer 2 switch function encapsulates packets for different VLANs so that the packets traverse the same port and maintain traffic separation between the VLANs?
Refer to the exhibit.
Which minimum configuration items are needed to enable Secure Shell version 2 access to R15?
A)
B)
C)
D)
Refer to the exhibit.
Packets received by the router from BGP enter via a serial interface at 209.165.201.10. Each route is present within the routing table. Which interface is used to forward traffic with a destination IP of 10.10.10.24?
Refer to the exhibit.
Which configuration allows routers R14 and R86 to form an OSPFv2 adjacency while acting as a central point for exchanging OSPF information between routers?
A)
B)
C)
D)
Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.
Refer to the exhibit.
Which two commands must be added to update the configuration of router R1 so that it accepts only encrypted connections? (Choose two )
Three switches must be configured for Layer 2 connectivity. The company requires only the designated VLANs to be configured on their respective switches and permitted accross any links between switches for security purposes. Do not modify or delete VTP configurations.
The network needs two user-defined VLANs configured:
VLAN 110: MARKETING
VLAN 210: FINANCE
1. Configure the VLANs on the designated switches and assign them as access ports to the interfaces connected to the PCs.
2. Configure the e0/2 interfaces on Sw1 and Sw2 as 802.1q trunks with only the required VLANs permitted.
3. Configure the e0/3 interfaces on Sw2 and Sw3 as 802.1q trunks with only the required VLANs permitted.
Refer to the exhibit. A secondary route is required on router R1 to pass traffic to the LAN network on R2 if the primary link fails. Which command must be entered to configure the router?
Which interface is used to send traffic to the destination network?
O 10.18.75.113/27 [110/6906] via GO/6
O 10.18.75.113/27 [110/23018] via GO/3
R 10.18.75.113/27 [120/16] via GO/16
R 10.18.75.113/27 [120/14] via GO/23
Which WLC management connection type is vulnerable to man-in-the-middle attacks?
Refer to the exhibit.
Users need to connect to the wireless network with IEEE 802. 11r-compatible devices. The connection must be maintained as users travel between floors or to other areas in the building What must be the configuration of the connection?
Refer to the exhibit.
All traffic enters the CPE router from interface Serial0/3 with an IP address of 192 168 50 1 Web traffic from the WAN is destined for a LAN network where servers are load-balanced An IP packet with a destination address of the HTTP virtual IP of 192 1681 250 must be forwarded Which routing table entry does the router use?
Refer to the exhibit.
Routers R1 and R3 have the default configuration The router R2 priority is set to 99 Which commands on R3 configure it as the DR in the 10.0 4.0/24 network?
Refer to the exhibit.
Users on existing VLAN 100 can reach sites on the Internet. Which action must the administrator take to establish connectivity to the Internet for users in VLAN 200?
Refer to the exhibit.
What is the metric for the route to the 192.168.10.33 host?
Refer to the exhibit.
An engineer is updating the R1 configuration to connect a new server to the management network. The PCs on the management network must be blocked from pinging the default gateway of the new server. Which command must be configured on R1 to complete the task?
A network engineer must configure two new subnets using the address block 10 70 128 0/19 to meet these requirements:
• The first subnet must support 24 hosts
• The second subnet must support 472 hosts
• Both subnets must use the longest subnet mask possible from the address block
Which two configurations must be used to configure the new subnets and meet a requirement to use the first available address in each subnet for the router interfaces? (Choose two )
Refer to the exhibit.
Which route must be configured on R1 so that OSPF routing is used when OSPF is up. but the server is still reachable when OSPF goes down?
Refer to the exhibit.
Of the routes learned with dynamic routing protocols, which has the least preferred metric?
Refer to the exhibit. A secondary route is required on router R1 to pass traffic to the LAN network on R2 if the primary link fails. Which command must be entered to configure the router?
Refer to the exhibit.
Which two configurations must the engineer apply on this network so that R1 becomes the DR? (Choose two.)
A)
B)
C)
D)
E)
Which value is the unique identifier that an access point uses to establish and maintain wireless connectivity to wireless network devices?
Refer to the exhibit.
The DHCP server and clients are connected to the same switch. What is the next step to complete the DHCP configuration to allow clients on VLAN 1 to receive addresses from the DHCP server?
Refer to the exhibit.
Which plan must be Implemented to ensure optimal QoS marking practices on this network?
Refer to the exhibit.
What is a reason for poor performance on the network interface?
Which QoS traffic handling technique retains excess packets in a queue and reschedules these packets for later transmission when the configured maximum bandwidth has been surpassed?
Refer to the exhibit.
Which command configures OSPF on the point-to-point link between routers R1 and R2?
When deploying a new network that includes both Cisco and third-party network devices, which redundancy protocol avoids the interruption of network traffic if the default gateway router fails?
Refer to the exhibit. An engineer is using the Cisco WLC GUI to configure a WLAN for WPA2 encryption with AES and preshared key Cisc0123456. After the engineer selects the WPA + WPA2 option from the Layer 2 Security drop-down, which two tasks must they perform to complete the process? (Choose two)
Refer to the exhibit. How will router R1 handle packets destined to 192.168.64.22?
Which two principles must be considered when using per-hop behavior in QoS? (Choose two.)
Refer to the exhibit. Which routes are configured with their default administrative distances?
Which type of wired port is required when an AP offers one unique SSID, passes client data and management traffic, and is in autonomous mode?
Which two features are provided by Ansible in network automation? (Choose two.)
Drag and drop the characteristics of networking from the left onto the networking types on the right.
Refer to the exhibit.
Router R1 currently is configured to use R3 as the primary route to the Internet, and the route uses the default administrative distance settings. A network engineer must configure R1 so that it uses R2 as a backup, but only if R3 goes down. Which command must the engineer configure on R1 so that it correctly uses R2 as a backup route, without changing the administrative distance configuration on the link to R3?
Refer to the exhibit. Inter-VLAN routing is configured on SW1. Client A is running Linux as an OS in VLAN 10 with a default gateway IP 10.0.0.1 but cannot ping client B in VLAN 20 running Windows. What action must be taken to verify that client A has the correct IP settings?
Refer to the exhibit. The Wi-Fi SSID " Office_WLAN " has Layer 2 Security configured with MAC filtering enabled. What additional security is provided by this specific feature?
Refer to the exhibit.
Router R1 resides in OSPF Area 0. After updating the R1 configuration to influence the paths that it will use to direct traffic, an engineer verified that each of the four Gigabit interfaces has the same route to 10.10.0.0/16. Which interface will R1 choose to send traffic to reach the route?
Refer to the exhibit.
An engineer has started to configure replacement switch SW1. To verify part of the configuration, the engineer issued the commands as shown and noticed that the entry for PC2 is missing. Which change must be applied to SW1 so that PC1 and PC2 communicate normally?
A)
B)
C)
D)
Refer to the exhibit.
Which action must be taken to ensure that router A is elected as the DR for OSPF area 0?
Refer to the exhibit.
The router has been configured with a supernet to accommodate the requirement for 380 users on a subnet The requirement already considers 30% future growth. Which configuration verifies the IP subnet on router R4?
A)
B)
C)
D)
A network engineer is installing an IPv6-only capable device. The client has requested that the device IP address be reachable only from the internal network. Which type of IPv6 address must the engineer assign?
Refer to the exhibit.
An engineer is configuring a new router on the network and applied this configuration. Which additional configuration allows the PC to obtain its IP address from a DHCP server?
A network administrator is setting up a new IPv6 network using the 64-bit address 2001 0EB8 00C1 2200:0001 0000 0000 0331/64 To simplify the configuration the administrator has decided to compress the address Which IP address must the administrator configure?
Which PoE mode enables powered-device detection and guarantees power when the device is detected?
A network engineer must implement an IPv6 configuration on the vlan 2000 interface to create a routable locally-unique unicast address that is blocked from being advertised to the internet. Which configuration must the engineer apply?
Refer to the exhibit.
How should the configuration be updated to allow PC1 and PC2 access to the Internet?
Refer to the exhibit.
An engineer is asked to insert the new VLAN into the existing trunk without modifying anything previously configured Which command accomplishes this task?
Refer to the exhibit.
Which command must be issued to enable a floating static default route on router A?
Which type of IPv6 address is similar to a unicast address but is assigned to multiple devices on the same network at the same time?
Refer to the exhibit.
Switch A is newly configured. All VLANs are present in the VLAN database. The IP phone and PC A on Gi0/1 must be configured for the appropriate VLANs to establish connectivity between the PCs. Which command set fulfills the requirement?
A)
B)
C)
D)
Refer to the exhibit.
An engineer is configuring the HO router. Which IPv6 address configuration must be applied to the router fa0 ' 1 interface for the router to assign a unique 64-brt IPv6 address to Itself?
Which interface mode must be configured to connect the lightweight APs in a centralized architecture?
Which type of wired port is required when an AP offers one unique SSID, passes client data and management traffic, and is in autonomous mode?
Refer to the exhibit. OSPF neighbors routers A, B, C, and D are sending a route for 10.227.150.160/27. When the current route for 10.227.150.160/27 becomes unavailable, which cost will router Y use to route traffic to 10.227.150.160/27?
Refer to the exhibit. During initial configuration testing, the Windows workstation PC1 cannot connect with the 172.16.2.0/24 network. Which set of actions corrects the configuration?
Which protocol should be used to transfer large files on a company intranet that allows UDP 69 through the firewall?
IP connectivity between the three routers is configured. OSPF adjacencies must be established.
1. Configure R1 and R2 Router IDs using the interface IP addresses from the link that is shared between them.
2. Configure the R2 links with a max value facing R1 and R3. R2 must become the DR. R1 and R3 links facing R2 must remain with the default OSPF configuration for DR election. Verify the configuration after clearing the OSPF process.
3. Using a host wildcard mask, configure all three routers to advertise their respective Loopback1 networks.
4. Configure the link between R1 and R3 to disable their ability to add other OSPF routers.
Refer to the exhibit.
Which configuration is needed to configure a WLAN with WPA2 only and with a password that is 63 characters long?
Refer to the exhibit. A VTY password has been set to Labtest32! for remote access. Which commands are required to allow only SSH access and to hide passwords in the running configuration?
Refer to the exhibit. Which interface does a packet take to reach the destination address of 10.10.10.147?
Which technology is appropriate for communication between an SDN controller and applications running over the network?
An engineer must update the configuration on two PCs in two different subnets to communicate locally with each other. One PC is configured with IP address 192.168.25.128/25 and the other with 192.168.25.100/25. Which network mask must the engineer configure on both PCs to enable the communication?
Refer to the exhibit.
How does router R1 forward packets destined to 10.0.4.10?
Which syslog message logging level displays interface line protocol up/down events?
Which cloud-provided service allows an organization to install its own operating system on a virtual machine?
Refer to the exhibit. The routers R1-LAB and R2-LAB are configured with link-local addresses. What command must be applied to interface Gi0/0 on R1-LAB for an automated address self-assignment on the IPv6 network?
Refer to the exhibit. The route for 10.220.100.96/27 has been very unstable. The same route has four backups to routers A, B, C, and D via the respective methods. The routing protocol defaults for router Y have not been changed. When the current route for 10.220.100.96/27 becomes unavailable, which router will router Y use to route traffic to 10.220.100.96/27?
Refer to the exhibit. A network engineer is configuring a WLAN to use a WPA2 PSK and allow only specific clients to join. Which two actions must be taken to complete the process? (Choose two)
Refer to the exhibit. A network administrator is configuring a router for user access via SSH. The service-password encryption command has been issued. The configuration must meet these requirements:
• Create the username as CCUser.
• Create the password as NA!2Scc.
• Encrypt the user password.
What must be configured to meet the requirements?
Which type of IPv4 address must be assigned to a server to protect it from external access and allow only internal users access while restricting internet access?
The address block 192 168 32 0/24 must be subnetted into smaller networks The engineer must meet these requirements
• Create 8 new subnets
• Each subnet must accommodate 30 hosts
• Interface VLAN 10 must use the last usable IP in the first new subnet
• A Layer 3 interface is used
Which configuration must be applied to the interface?
A)
B)
C)
D)
Refer to the exhibit.
PC A and the file server. Which commend must be configured on switch A to prevent interruption of other communications?
Which cable type must be used to interconnect one switch using 1000 BASE-SX GBiC modules and another switch using 1000 BASE-SX SFP modules?
A network engineer is replacing the switches that belong to a managed-services client with new Cisco Catalyst switches. The new switches will be configured for updated security standards, including replacing Telnet services with encrypted connections and doubling the modulus size from 1024. Which two commands must the engineer configure on the new switches? (Choose two.)
Drag and drop the statements about networking from the left onto the corresponding networking types on the right. Not all statements are used.
Refer to the exhibit.
Which configuration parameter is preventing host C from reaching the internet?
A network engineer must configure the router R1 GigabitEthernet1/1 interface to connect to the router R2 GigabitEthernet1/1 interface. For the configuration to be applied, the engineer must compress the address 2001:0db8:0000:0000:0500:000a:400F:583B. Which command must be issued on the interface?
Which interface or port on the WLC is the default for in-band device administration and communications between the controller and access points?
An engineer is configuring router R1 with an IPv6 static route for prefix 2019:C15C:0CAF:E001::/64. The next hop must be 2019:C15C:0CAF:E002::1 The route must be reachable via the R1 Gigabit 0/0 interface. Which command configures the designated route?
Refer to the exhibit. The user has connectivity to devices on network 192.168.3 0/24 but cannot reach users on the network 10.10.1.0724.
What is the first step to verify connectivity?
Which WLC management connection type is vulnerable to man-in-the-middIe attacks?
Refer to the exhibit. Clients on the WLAN are required to use 802.11r. What action must be taken to meet the requirement?
A network engineer is configuring a switch so that it is remotely reachable via SSH. The engineer has already configured the host name. Which additional command must the engineer configure before entering the command to generate the RSA key?
Drag and drop the characteristic from the left onto the IPv6 address type on the right.
Which two VPN technologies are recommended by Cisco for multiple branch offices and large-scale deployments? (Choose two.)
A router received three destination prefixes:10.0.0/18, and 10.0.0/24. When the show ip route command is executed, which output does it return?
A)
B)
C)
D)
Which type of DNS record is used to specify the mail server responsible for accepting email messages on behalf of a recipient ' s domain?
Refer to Exhibit.
Rotor to the exhibit. The IP address configurations must be completed on the DC-1 and HQ-1 routers based on these requirements:
DC-1 Gi1/0 must be the last usable address on a /30
DC-1 Gi1/1 must be the first usable address on a /29
DC-1 Gi1/2 must be the last usable address on a /28
HQ-1 Gil/3 must be the last usable address on a /29
Drag and drop the commands from the left onto the destination interfaces on the right. Not all commands are used
What does a switch do when it receives a frame whose destination MAC address is missing from the MAC address table?
Refer to the exhibit.
Router R1 must be configured to reach the 10.0.3.0/24 network from the 10.0.1.0/24 segment.
Which command must be used to configure the route?
What is the operating mode and role of a backup port on a shared LAN segment in Rapid PVST+?
Drag and drop the IPv6 address description from the left onto the IPv6 address types on the right. Not all options are used.
Which action implements physical access control as part of the security program of an organization1?
Refer to the exhibit.
How many objects are present in the given JSON-encoded data?
An engineer observes high usage on the 2.4GHz channels and lower usage on the 5GHz channels. What must be configured to allow clients to preferentially use 5GHz access points?
Which solution is appropriate when mitigating password attacks where the attacker was able to sniff the clear-text password of the system administrator?
An engineer must configure a core router with a floating static default route to the backup router at 10.200.0.2.
How does IPsec provide secure networking for applications within an organization?
NO: 346
What must a network administrator consider when deciding whether to configure a new wireless network with APs in autonomous mode or APs running in cloud-based mode?
Autonomous mode APs are less dependent on an underlay but more complex to maintain than APs in cloud-based mode.
Cloud-based mode APs relay on underlays and are more complex to maintain than APs in autonomous mode.









In this attack, the attacking computer generates frames with two 802.1Q tags. The first tag matches the native VLAN of the trunk port (VLAN 10 in this case), and the second matches the VLAN of a host it wants to attack (VLAN 20).


















