CCNP 1

1 Refer to the exhibit. Router R6 has sent a join message to router R4 requesting multicast traffic for users in the multicast group 224.1.1.1. How will the multicast traffic that is sent from the multicast server SRC through the R1-R3-R5 path be handled at router R6?The exhibit shows a network with 6 routers, 1 switch, 1 server, and 3 workstations. The routers are named R1 through R6 respectively. The switch is named SW1. From top to the bottom, the server SRC is assigned an IPv4 address 10.1.1.1 and is connected to R1. R1 is also labeled as RP. R1 is connected to R2 and R3 separately. R2 is connected to R4 and R3 is connected to R5. An interface on R4 is assigned an IPv4 address 172.16.1.1 and is connected to R6 at its Fa0/0 interface. An interface on R5 is assigned an IPv4 address 172.16.2.1 and is connected to R6 at its Fa0/1 interface. The Fa0/2 interface on R6 is connected to the switch SW1. Three workstations are attached to the switch SW1. There is an IPv4 address 224.1.1.1 next to the workstations. There is a dotted arrow line from R6 to point to R4. The dotted arrow line is labeled with the word Join. There is a text box pointing to R6 with the following information: Unicast Route Table Network Int Next-Hop 10.1.0.0/24 Fa0/0 172.16.1.1 10.1.0.0/24 Fa0/1 172.16.2.1

1 The exhibit shows a network with 6 routers, 1 switch, 1 server, and 3 workstations. The routers are named R1 through R6 respectively. The switch is named SW1. From top to the bottom, the server SRC is assigned an IPv4 address 10.1.1.1 and is connected to R1. R1 is also labeled as RP. R1 is connected to R2 and R3 separately. R2 is connected to R4 and R3 is connected to R5. An interface on R4 is assigned an IPv4 address 172.16.1.1 and is connected to R6 at its Fa0/0 interface. An interface on R5 is assigned an IPv4 address 172.16.2.1 and is connected to R6 at its Fa0/1 interface. The Fa0/2 interface on R6 is connected to the switch SW1. Three workstations are attached to the switch SW1. There is an IPv4 address 224.1.1.1 next to the workstations. There is a dotted arrow line from R6 to point to R4. The dotted arrow line is labeled with the word Join. There is a text box pointing to R6 with the following information:Unicast Route TableNetwork Int Next-Hop10.1.0.0/24 Fa0/0 172.16.1.110.1.0.0/24 Fa0/1 172.16.2.1 Refer to the exhibit. Router R6 has sent a join message to router R4 requesting multicast traffic for users in the multicast group 224.1.1.1. How will the multicast traffic that is sent from the multicast server SRC through the R1-R3-R5 path be handled at router R6?

  • The multicast traffic will be forwarded to all users in the multicast group 224.1.1.1.
  • The multicast traffic will be sent back to the rendezvous point (RP) through the R4-R2-R1 path.
  • The multicast traffic will be sent to switch SW1, which will drop the traffic.
  • The multicast traffic will be dropped.

2 Drag and Drop

2

Option 4: Gereral membership query. Press spacebar to enter matching mode.

Match the IGMP message type with its value field and description. (Not all options will apply).


Version 2 membership report

Version 1 membership report

Version 2 leave group

Gereral membership query

Group scheduled

Type value 0x12 is used by receivers for backwards compatability with IGMPv1.

Type value 0x16 is used by receivers to join a multicast group.

Type value 0x11 is used to leave a group message to the group of addresses the receiver requested to leave.

Type value 0x17 is used by receivers to indicate they want to stop receiving any multicast traffic for the group joined.

Navigation Bar

3 Refer to the exhibit. Which two conclusions can be derived from the output? (Choose two.)The graphic displays the following output: R1# show ip eigrp topology EIGRP-IPv4 Topology Table for AS(1)/ID(2.2.2.2) Codes: P – Passive, A – Active, U – Update, Q – Query, R – Reply, r – reply Status, s – sia Status P 172.16.3.0/24, 1 successors, FD is 1315 via Connected, GigabitEthernet0/1 P 192.168.1.8/30, 1 successors, FD is 452141 via 192.168.11.1 (452141/216956), Serial0/0/1 via 172.16.6.1 (68024000/216956), Serial0/0/0 P 192.168.1.0/24, 1 successors, FD is 3012096 via 192.168.11.1 (3012096/28116), Serial0/0/1 via 172.16.6.1 (41024256/2170112), Serial0/0/0 P 192.168.10.8/30, 1 successors, FD is 3011840 via Connected, Serial0/0/1

3 The graphic displays the following output:R1# show ip eigrp topologyEIGRP-IPv4 Topology Table for AS(1)/ID(2.2.2.2)Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply, r - reply Status, s - sia StatusP 172.16.3.0/24, 1 successors, FD is 1315 via Connected, GigabitEthernet0/1P 192.168.1.8/30, 1 successors, FD is 452141 via 192.168.11.1 (452141/216956), Serial0/0/1 via 172.16.6.1 (68024000/216956), Serial0/0/0P 192.168.1.0/24, 1 successors, FD is 3012096 via 192.168.11.1 (3012096/28116), Serial0/0/1 via 172.16.6.1 (41024256/2170112), Serial0/0/0P 192.168.10.8/30, 1 successors, FD is 3011840 via Connected, Serial0/0/1 Refer to the exhibit. Which two conclusions can be derived from the output? (Choose two.)

  • The neighbor 172.16.6.1 meets the feasibility condition to reach the 192.168.1.0/24 network.
  • The reported distance to network 192.168.1.0/24 is 41024256.
  • The network 192.168.10.8/30 can be reached through 192.168.11.1.
  • Router R1 has two successors to the 172.16.3.0/24 network.
  • There is one feasible successor to network 192.168.1.8/30.
  • 4 Refer to the exhibit. A network administrator issues the show ip protocols command. Based on the exhibited output, what can be concluded?The exhibit displays the following router command output:R1# show ip protocolsRouting Protocol is “eigrp 1 “<output omitted> EIGRP metric weight K1=1, K2=0, K3=1, K4=0, K5=0 EIGRP maximum hopcount 100 EIGRP maximum metric variance 1 Redistributing: eigrp 1 Automatic network summarization is not in effect Maximum path: 4 Routing for Networks: 192.168.1.0 10.0.0.0

    4 The exhibit displays the following router command output:R1#show ip protocolsRouting Protocol is &quot;eigrp 1 &quot; EIGRP metric weight K1=1, K2=0, K3=1, K4=0, K5=0 EIGRP maximum hopcount 100 EIGRP maximum metric variance 1 Redistributing: eigrp 1 Automatic network summarization is not in effect Maximum path: 4 Routing for Networks: 192.168.1.0 10.0.0.0 Refer to the exhibit. A network administrator issues the show ip protocols command. Based on the exhibited output, what can be concluded?

  • R1 receives routes to the network 192.168.1.0/24 and 10.0.0.0/24.
  • The no auto-summary command is not applied for the EIGRP operation.
  • The EIGRP K values are default values.
  • Up to 4 routes of different metric values to the same destination network will be included in the routing table.
  • 5 Refer to the exhibit. On the basis of the information presented, which two IP SLA related statements are true? (Choose two.)The graphic shows the output result of the show ip sla configuration command on R1:R1# show ip sla configurationIP SLAs Infrastructure Engine-IIIEntry number: 99Owner:Tag:Operation timeout (milliseconds): 5000Type of operation to perform: icmp-echoTarget address/Source address: 192.168.2.1/0.0.0.0Type Of Service parameter: 0x0Request (ARR data portion): 28Verify data: NoVrf Name:Schedule: Operation frequency (seconds): 10 (not considered if randomly scheduled) Next Scheduled Start Time: Start Time already passed Group Scheduled : FALSE Randomly Scheduled : FALSE Life (seconds): Forever Entry Ageout (seconds): never Recurring (Starting Everyday): FALSE Status of entry (SNMP RowStatus): Active<output omitted>

    5 The graphic shows the output result of theshow ip slaconfiguration command on R1:R1#show ip sla configurationIP SLAs Infrastructure Engine-IIIEntry number: 99Owner:Tag:Operation timeout (milliseconds): 5000Type of operation to perform: icmp-echoTarget address/Source address: 192.168.2.1/0.0.0.0Type Of Service parameter: 0x0Request (ARR data portion): 28Verify data: NoVrf Name:Schedule: Operation frequency (seconds): 10 (not considered if randomly scheduled) Next Scheduled Start Time: Start Time already passed Group Scheduled : FALSE Randomly Scheduled : FALSE Life (seconds): Forever Entry Ageout (seconds): never Recurring (Starting Everyday): FALSE Status of entry (SNMP RowStatus): Active Refer to the exhibit. On the basis of the information presented, which two IP SLA related statements are true? (Choose two.)

  • IP SLA 99 is measuring jitter.
  • IP SLA 99 will run forever unless explicitly disabled.
  • IP SLA 99 is sending echo requests every 10 seconds.
  • IP SLA 99 is scheduled to begin in 2 hours.
  • IP SLA 99 is configured with the type dns target-addr 192.168.2.1 command.
  • IP SLA 99 is sending echo requests from IP address 192.168.2.1.
  • 6 What are two benefits of using SNMP traps? (Choose two.)

  • They can passively listen for exported NetFlow datagrams.
  • They can provide statistics on TCP/IP packets that flow through Cisco devices.
  • They limit access for management systems only.
  • They eliminate the need for some periodic polling requests.
  • They reduce the load on network and agent resources.
  • 7 What role does Cisco Umbrella play in the Cisco SAFE framework?

  • It provides malware analysis and protection for organizations across the full attack continuum.
  • It performs file analysis to determine whether a file is malware or not.
  • It provides the first line of defense against threats on the internet by blocking requests to malicious internet destinations.
  • It detects, analyzes, and protects against both known and emerging threats for Cisco products.
  • 8 Which Cisco security solution uses dynamic content analysis to identify inappropriate content in real time for unknown websites?

  • Cisco AMP
  • Cisco WSA
  • Cisco Threat Grid
  • Cisco Umbrella
  • 9 Refer to the exhibit. Spanning-tree port priorities are listed beneath each interface. The network administrator enters the spanning-tree vlan 1 root primary command on S4. What is the effect of the command?The exhibit shows 4 switches named S1, S2, S3, and S4. S1 Gi0/2 port is connected to S3 Gi0/1 port. S3 Gi0/2 port is connected to S4 Gi0/2 port. S4 Gi0/1 port is connected to S2 Gi0/2 port. S2 Gi0/1 port is connected to S1 Gi0/1 port. All switches have port priority 128. S1 has priority 24576 and MAC address 000A00333333. S2 has priority 32768 and MAC address 000A00222222. S3 has priority 32768 and MAC address 000A00111111. S4 has priority 36864 and MAC address 000A00111110.

    9 The exhibit shows 4 switches named S1, S2, S3, and S4. S1 Gi0/2 port is connected to S3 Gi0/1 port. S3 Gi0/2 port is connected to S4 Gi0/2 port. S4 Gi0/1 port is connected to S2 Gi0/2 port. S2 Gi0/1 port is connected to S1 Gi0/1 port. All switches have port priority 128. S1 has priority 24576 and MAC address 000A00333333. S2 has priority 32768 and MAC address 000A00222222. S3 has priority 32768 and MAC address 000A00111111. S4 has priority 36864 and MAC address 000A00111110. Refer to the exhibit. Spanning-tree port priorities are listed beneath each interface. The network administrator enters the spanning-tree vlan 1 root primary command on S4. What is the effect of the command?

  • S2 Gi0/1 becomes a nondesignated port because Gi0/2 has a lower path cost to S4.
  • S3 Gi0/2 transitions from designated port to root port because of path cost changes caused by the root change.
  • Spanning tree blocks Gi0/1 on S3 to prevent a redundant path from S1.
  • S4 is already the root bridge, so there are no port changes.
  • Port priority makes Gi0/2 on S1 a root port.
  • 10 Refer to the exhibit. Spanning-tree port priorities are 128 for all interfaces. The network administrator enters the spanning-tree vlan 1 root primary command on S4. Which two port results are correct? (Choose two.)The exhibit shows 4 switches named S1, S2, S3, and S4. The S1 Gi0/2 port is connected to the S3 Gi0/1 port. The S3 Gi0/2 port is connected to the S4 Gi0/2 port. The S4 Gi0/1 port is connected to the S2 Gi0/2 port. The S2 Gi0/1 port is connected to the S1 Gi0/1 port. All switches have port priority 128. S1 has priority 24576 and MAC address 000A00333333. S2 has priority 32768 and MAC address 000A00222222. S3 has priority 32768 and MAC address 000A00111111. S4 has priority 36864 and MAC address 000A00111110.

    10 The exhibit shows 4 switches named S1, S2, S3, and S4. The S1 Gi0/2 port is connected to the S3 Gi0/1 port. The S3 Gi0/2 port is connected to the S4 Gi0/2 port. The S4 Gi0/1 port is connected to the S2 Gi0/2 port. The S2 Gi0/1 port is connected to the S1 Gi0/1 port. All switches have port priority 128. S1 has priority 24576 and MAC address 000A00333333. S2 has priority 32768 and MAC address 000A00222222. S3 has priority 32768 and MAC address 000A00111111. S4 has priority 36864 and MAC address 000A00111110. Refer to the exhibit. Spanning-tree port priorities are 128 for all interfaces. The network administrator enters the spanning-tree vlan 1 root primary command on S4. Which two port results are correct? (Choose two.)

  • S2 Gi0/1 becomes a nondesignated port.
  • S4 Gi0/1 becomes a root port.
  • S4 Gi0/2 becomes a designated port.
  • S1 Gi0/1 becomes a root port.
  • S3 Gi0/1 becomes a nondesignated port.
  • 11 Drag and Drop

    11

    Option 4: trunk. Press spacebar to enter matching mode.

    Match the DTP mode with its function. (Not all options are used.)

    dynamic desirable

    dynamic auto

    nonegotiate

    trunk

    permanent nontrunking mode

    passively waits for the neighbor to initiate trunking

    requires manual configuration of trunking or nontrunking

    actively attempts to convert the link to a trunk

    permanent trunking mode

    12 Which two mode combinations would result in the successful negotiation of an EtherChannel? (Choose two.)

  • desirable; active
  • passive; auto
  • desirable; desirable
  • active; on
  • auto; auto
  • active; passive
  • 13 What is a purpose of the OSPFv3 type 8 and type 9 LSAs?

  • allow area routers to locate ASBRs in other areas
  • eliminate the need for SPF calculations when interface addresses are added or changed
  • advertise default and external routes learned from other protocols
  • advertise NSSA LSAs for redistributed routes in an area
  • 14 Refer to the exhibit. Both routers R1 and R2 are configured for OSPFv3 and are routing for both IPv4 and IPv6 address families. Which two destination addresses will R1 use to establish a full adjacency with R2? (Choose two.)The exhibit shows R1 and R2 connected by a serial link. Each has a LAN and a loopback interface. R1 addressing is as follows: Interface Lo0 has IPv6 link-local address fe80::1, IPv4 address 172.17.0.100/32, IPv6 address 2001:db8:21::100/128 LAN interface is on the IPv4 network 172.17.2.0/24 and IPv6 network 2001:db8:21:10::/64 Interface S0/1/0 has IPv6 link-local address fe80::1, IPv4 address 172.17.1.1/30, IPv6 address 2001:db8:21:20::1/64 R2 addressing is as follows: Interface Lo0has IPv6 link-local address fe80::2, IPv4 address 172.17.64.100/32, IPv6 address 2001:db8:22::100/128 LAN interface is on the IPv4 network 172.17.66.0/24 and IPv6 network 2001:db8:22:10::/64 Interface S0/1/0 has IPv6 link-local address fe80::2, IPv4 address 172.17.1.2/30, IPv6 address 2001:db8:21:20::2/64

    14 The exhibit shows R1 and R2 connected by a serial link. Each has a LAN and a loopback interface. R1 addressing is as follows: Interface Lo0 has IPv6 link-local address fe80::1, IPv4 address 172.17.0.100/32, IPv6 address 2001:db8:21::100/128 LAN interface is on the IPv4 network 172.17.2.0/24 and IPv6 network 2001:db8:21:10::/64 Interface S0/1/0 has IPv6 link-local address fe80::1, IPv4 address 172.17.1.1/30, IPv6 address 2001:db8:21:20::1/64 R2 addressing is as follows: Interface Lo0has IPv6 link-local address fe80::2, IPv4 address 172.17.64.100/32, IPv6 address 2001:db8:22::100/128 LAN interface is on the IPv4 network 172.17.66.0/24 and IPv6 network 2001:db8:22:10::/64 Interface S0/1/0 has IPv6 link-local address fe80::2, IPv4 address 172.17.1.2/30, IPv6 address 2001:db8:21:20::2/64 Refer to the exhibit. Both routers R1 and R2 are configured for OSPFv3 and are routing for both IPv4 and IPv6 address families. Which two destination addresses will R1 use to establish a full adjacency with R2? (Choose two.)

  • ff02::5
  • 2001:db8:22::100
  • fe80::2
  • 172.17.66.1
  • 2001:db8:21:20::2
  • 15 How does an antenna add gain to a wireless signal?

  • An antenna shapes the RF energy as it is propagated into free space.
  • An antenna uses specific circuitry to increase the gain of a wireless signal before transmission.
  • An antenna is designed to function as if it were isotropic and provides varying levels of gain across 360 degrees of coverage.
  • An antenna uses external power to increase the gain of a wireless signal during transmission.
  • 16 How will user traffic be forwarded between two laptops that are both connected to the same lightweight access point in a large enterprise topology?

  • The lightweight access point will forward the traffic on a trunk link to a distribution layer switch for routing and receive the return traffic to forward to the other laptop.
  • The lightweight access point will forward the traffic through a CAPWAP tunnel to a WLC and receive the return traffic from the WLC to forward to the other laptop.
  • The lightweight access point will switch the traffic between both laptops immediately.
  • The lightweight access point will forward the traffic through an upstream router and receive the return traffic from the router to forward to the other laptop.
  • 17 Cisco has created a security framework to help protect networks from ever-evolving cybersecurity threats. What is the term given to a cloud delivered DNS service, constantly updated with threat information, that provides the first line of defense before an IP connection is established or a file is downloaded by blocking requests to malicious internet destinations?

  • Umbrella
  • AnyConnect
  • Web Security Appliance (WSA)
  • Email Security Appliance (ESA)
  • 18 In which type of deployment is the Chef server hosted in the cloud?

  • hosted Chef
  • Chef Solo
  • private Chef
  • Chef Client and Server
  • 19 A student is studying in preparation for an interview for a job in programming and network automation. What is a characteristic of Puppet?

    19 A student is studying in preparation for an interview for a job in programming and network automation. What is a characteristic of Puppet ?

  • It is a hosted web-based repository that uses version control for storing and sharing code.
  • It is a configuration management and automation tool with a downloadable Cisco module to support Cisco devices.
  • It is a free online tool that can check the format of programmed files to verify that they have valid syntax.
  • It is a markup programming language.
  • 20 What are three benefits of a hierarchical network model? (Choose three.)

  • increased fault tolerance of the network
  • elimination of the need for wiring closets
  • reduced contention for bandwidth
  • elimination of the need for Layer 3 functionality
  • simplification of management and troubleshooting
  • reduced size of the physical layout
  • 21 Which three functions are performed at the distribution layer of the hierarchical network model? (Choose three.)

  • provides a connection point for separate local networks
  • isolates network problems to prevent them from affecting the core layer
  • forwards traffic to other hosts on the same logical network
  • allows end users to access the local network
  • forwards traffic that is destined for other networks
  • transports large amounts of data between different geographic sites
  • 22 The network administrator configures the router with the ip route 172.16.1.0 255.255.255.0 172.16.2.2 command. How will this route appear in the routing table?

    22 The network administrator configures the router with the ip route 172.16.1.0 255.255.255.0 172.16.2.2 command. How will this route appear in the routing table?

  • S 172.16.1.0 [1/0] via 172.16.2.2
  • C 172.16.1.0 is directly connected, Serial0/0
  • C 172.16.1.0 [1/0] via 172.16.2.2
  • S 172.16.1.0 is directly connected, Serial0/0
  • 23 Refer to the exhibit. Which type of IPv6 static route is configured in the exhibit?The figure shows the following command: ipv6 route 2001:0DB8::/32 2001:0DB8:3000::1

    23 The figure shows the following command: ipv6 route 2001:0DB8::/32 2001:0DB8:3000::1 Refer to the exhibit. Which type of IPv6 static route is configured in the exhibit?

  • recursive static route
  • floating static route
  • fully specified static route
  • directly attached static route
  • 24 What is the reason for a network engineer to alter the default reference bandwidth parameter when configuring OSPF?

  • to more accurately reflect the cost of links greater than 100 Mb/s
  • to increase the speed of the link
  • to force that specific link to be used in the destination route
  • to enable the link for OSPF routing
  • 25 On an OSPF multiaccess network, which multicast address must a non-DR router use to send an LSU packet that contains new link-state information?

  • 224.0.0.9
  • 224.0.0.6
  • 224.0.0.1
  • 224.0.0.5
  • 224.0.0.2
  • 26 What advantage does WPA2 have over WPA?

  • WPA2 uses a 32-bit WEP key for encryption.
  • WPA2 uses static key management.
  • WPA2 allows the caching of key information.
  • WPA2 uses AES instead of TKIP.
  • 27 Which WLAN security protocol avoids attacks by strengthening the key exchange between clients and APs using a method known as Simultaneous Authentication of Equals?

  • WPA2-Personal
  • WPA-Personal
  • WEP
  • WPA3-Personal
  • 28 Which type of OSPF link-state advertisement is an AS external LSA?

  • type 6
  • type 4
  • type 3
  • type 5
  • 29 What are three types of IP packets that require process switching and cannot be forwarded by CEF in a Cisco router? (Choose three.)

  • packets that are sourced or destined to the router
  • packets that are received on a routed port of a multilayer switch
  • packets that are to be sent over a VLAN 802.1Q trunk link
  • packets that require extra information that is not currently known
  • packets that are marked as low priority for QoS purposes
  • packets that are too complex for the hardware to handle
  • 30 How do Layer 3 switches differ from traditional routers?

  • Layer 3 switches never perform routing lookups. Routers must always perform routing lookups.
  • Layer 3 switches forward packets based on MAC addresses only. Routers use IP addresses for forwarding.
  • Layer 3 switches are used in LANs. Routers are used in WANs.
  • Layer 3 switches use ASICs for routing. Routers are software based.
  • 31 On what type of OSPF router is interarea route summarization configured?

  • intra-area routers
  • ABRs
  • backbone routers
  • ASBRs
  • 32 Refer to the exhibit. What can be concluded about network 192.168.4.0 in the R2 routing table?The graphic shows the partial output of the show ip route command:R2# show ip route<output omitted> 172.16.0.0/16 is variably subnetted, 2 subnets, 2 masksC 172.16.1.0/24 is directly connected, GigabitEthernet0/1L 172.16.1.1/32 is directly connected, GigabitEthernet0/1O IA 192.168.1.0/24 [110/2] via 192.168.2.1, 00:07:08, GigabitEthernet0/0 192.168.2.0/24 is variably subnetted, 2 subnets, 2 masksC 192.168.2.0/24 is directly connected, GigabitEthernet0/0L 192.168.2.2/32 is directly connected, GigabitEthernet0/0O 192.168.4.0/24 [110/2] via 172.16.1.2, 00:00:07, GigabitEthernet0/1 192.168.6.0/32 is subnetted, 1 subnetsO 192.168.6.1/32 [110/2] via 172.16.1.2, 00:00:07, GigabitEthernet0/1O*E2 0.0.0.0/0 [110/1] via 192.168.2.1, 00:04:53, GigabitEthernet0/0R2#

    32 The graphic shows the partial output of theshow ip routecommand:R2#show ip route 172.16.0.0/16 is variably subnetted, 2 subnets, 2 masksC 172.16.1.0/24 is directly connected, GigabitEthernet0/1L 172.16.1.1/32 is directly connected, GigabitEthernet0/1O IA 192.168.1.0/24 [110/2] via 192.168.2.1, 00:07:08, GigabitEthernet0/0 192.168.2.0/24 is variably subnetted, 2 subnets, 2 masksC 192.168.2.0/24 is directly connected, GigabitEthernet0/0L 192.168.2.2/32 is directly connected, GigabitEthernet0/0O 192.168.4.0/24 [110/2] via 172.16.1.2, 00:00:07, GigabitEthernet0/1 192.168.6.0/32 is subnetted, 1 subnetsO 192.168.6.1/32 [110/2] via 172.16.1.2, 00:00:07, GigabitEthernet0/1O*E2 0.0.0.0/0 [110/1] via 192.168.2.1, 00:04:53, GigabitEthernet0/0R2# Refer to the exhibit. What can be concluded about network 192.168.4.0 in the R2 routing table?

  • The network was learned through summary LSAs from an ABR.
  • The network can be reached through the GigabitEthernet0/0 interface.
  • This network should be used to forward traffic toward external networks.
  • The network was learned from a router within the same area as R2.
  • 33 Refer to the exhibit. All the displayed switches are Cisco 2960 switches with the same default priority and operating at the same bandwidth. Which three ports will be STP designated ports? (Choose three.)The exhibit displays 3 switches called SW1,SW2, and SW3. SW2 has a MAC address of 00ff.0ba0.0002 and has its fa0/9 port connected to the fa0/10 port of SW1. SW2 has its port fa0/20 connected to port fa0/21 of SW3. SW3 has a MAC address of 00f0.0ba0.0ff2 and has its port fa0/13 connected to port fa0/11 of SW1 whose MAC address is 00fe.0ba0.00b2.

    33 The exhibit displays 3 switches called SW1,SW2, and SW3. SW2 has a MAC address of 00ff.0ba0.0002 and has its fa0/9 port connected to the fa0/10 port of SW1. SW2 has its port fa0/20 connected to port fa0/21 of SW3. SW3 has a MAC address of 00f0.0ba0.0ff2 and has its port fa0/13 connected to port fa0/11 of SW1 whose MAC address is 00fe.0ba0.00b2. Refer to the exhibit. All the displayed switches are Cisco 2960 switches with the same default priority and operating at the same bandwidth. Which three ports will be STP designated ports? (Choose three.)

  • fa0/20
  • fa0/10
  • fa0/13
  • fa0/9
  • fa0/21
  • fa0/11
  • 34 Refer to the exhibit. Which trunk link will not forward any traffic after the root bridge election process is complete?Four switches labeled S1, S2, S3, and S4 are connected. S1 port Gi1/1 connects to S2 Gi1/1. S1 port Fa0/1 connects to S3 Fa0/1. S4 also connects to S2 and S3. S4 Fa0/1 connects to S2 Fa0/1. S4 Fa0/2 connects to S3 Fa0/2. The link between S1 and S2 is labeled as Trunk1. The link between S1 and S3 is labeled as Trunk2. The link between S2 and S4 is labeled as Trunk3. The link between S3 and S4 is labeled as Trunk4. There is a text box attached to each switch: S1 text box shows: Bridge ID: Priority: 32769 MAC: 000A00032222 S2 text box shows: Bridge ID: Priority: 32769 MAC: 000A00032321 S3 text box shows: Bridge ID: Priority: 32769 MAC: 000A00033333 S4 text box shows: Bridge ID: Priority: 32769 MAC: 000A00031212

    34 Four switches labeled S1, S2, S3, and S4 are connected. S1 port Gi1/1 connects to S2 Gi1/1. S1 port Fa0/1 connects to S3 Fa0/1. S4 also connects to S2 and S3. S4 Fa0/1 connects to S2 Fa0/1. S4 Fa0/2 connects to S3 Fa0/2. The link between S1 and S2 is labeled as Trunk1. The link between S1 and S3 is labeled as Trunk2. The link between S2 and S4 is labeled as Trunk3. The link between S3 and S4 is labeled as Trunk4. There is a text box attached to each switch: S1 text box shows: Bridge ID: Priority: 32769 MAC: 000A00032222 S2 text box shows: Bridge ID: Priority: 32769 MAC: 000A00032321 S3 text box shows: Bridge ID: Priority: 32769 MAC: 000A00033333 S4 text box shows: Bridge ID: Priority: 32769 MAC: 000A00031212 Refer to the exhibit. Which trunk link will not forward any traffic after the root bridge election process is complete?

  • Trunk1
  • Trunk2
  • Trunk3
  • Trunk4
  • 35 Which function is provided by the Cisco SD-Access Architecture controller layer?

  • It interconnects all of the network devices, thus forming a fabric of interconnected nodes.
  • It presents all information to the user via a centralized management dashboard.
  • It delivers data packets to and from the network devices participating in SD-Access.
  • It provides network automation and operational status information to the management layer.
  • 36 Drag and Drop

    36

    Option 2: vSmart controller, is matched with description 4: authenticates each SD-WAN router that comes online. Press spacebar to enter matching mode.

    Match the Cisco SD-WAN solution component with the description. (Not all options are used.)

    vManage Network Management System

    vSmart controller

    vBond orchestrator

    supports standard router features, such as OSPF, BGP, ACLs, QoS, and routing policies

    enables centralized provisioning and simplifies network changes

    configured with a public IP address so that all SD-WAN devices in the network can connect to it

    authenticates each SD-WAN router that comes online

    37 Which QoS model uses the DSCP bits to mark packets and provides 64 possible classes of service?

  • DiffServ
  • IntServ
  • FIFO
  • best-effort
  • 38 Which two statements are true about WRED? (Choose two.)

  • WRED uses a tail drop system for its queue buffers.
  • WRED does not support ECN.
  • WRED will drop packets marked AFx1 more aggressively than it will drop packets marked AFx3 from the queue.
  • WRED will use the average queue depth of an interface when determining if a packet should be dropped.
  • WRED uses the IP precedence or DSCP marking of a packet when determining if a packet should be dropped.
  • 39 Which authentication protocol is server-based and preferred for device access control?

  • SSHv2
  • RADIUS
  • TACACS+
  • 802.1x
  • 40 An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?

  • R1(config-if)# ip access-group 1 in
  • R1(config-line)# access-class 1 out
  • R1(config-line)# access-class 1 in
  • R1(config-if)# ip access-group 1 out
  • 41 Refer to the exhibit. A network administrator is configuring MST tuning on SW1. The objective is to change the priority value of the interface Gi1/0/5 so that the interface is preferred when determining the root ports. Which value could be used in the spanning-tree mst 0 port-priority command to achieve this objective?The exhibit shows a partial output of the show spanning-tree mst 0 command on SW1: SW1# show spanning-tree mst 0 output omitted Interface Role Sts Cost Prio.Nbr Type —————- —- — ——— ——– ——————– Gi1/0/1 Root FWD 20000 128.1 P2p Gi1/0/2 Altn BLK 20000 128.2 P2p Gi1/0/5 Desg FWD 20000 128.5 P2p

    41 The exhibit shows a partial output of theshow spanning-tree mst 0command on SW1:SW1#show spanning-tree mst 0output omittedInterface Role Sts Cost Prio.Nbr Type---------------- ---- --- --------- -------- --------------------Gi1/0/1 Root FWD 20000 128.1 P2pGi1/0/2 Altn BLK 20000 128.2 P2pGi1/0/5 Desg FWD 20000 128.5 P2p Refer to the exhibit. A network administrator is configuring MST tuning on SW1. The objective is to change the priority value of the interface Gi1/0/5 so that the interface is preferred when determining the root ports. Which value could be used in the spanning-tree mst 0 port-priority command to achieve this objective?

  • 64
  • 160
  • 192
  • 224
  • 42 Which parameter must match for all switches in the same MST region?

  • trunk link encapsulation method
  • IOS version
  • version number
  • bridge priority
  • 43 What are three features of a GRE tunnel? (Choose three.)

  • creates additional packet overhead
  • supports hosts as GRE tunnel endpoints by installing Cisco VPN client software
  • creates nonsecure tunnels between remote sites
  • transports multiple Layer 3 protocols
  • provides encryption to keep VPN traffic confidential
  • uses RSA signatures to authenticate peers
  • 44 Which three statements describe the building blocks that make up the IPsec protocol framework? (Choose three.)

  • IPsec uses Diffie-Hellman as a hash algorithm to ensure integrity of data that is transmitted through a VPN.
  • IPsec uses Diffie-Hellman algorithms to encrypt data that is transferred through the VPN.
  • IPsec uses 3DES algorithms to provide the highest level of security for data that is transferred through a VPN.
  • IPsec uses secret key cryptography to encrypt messages that are sent through a VPN.
  • IPsec uses encryption algorithms and keys to provide secure transfer of data.
  • IPsec uses ESP to provide confidential transfer of data by encrypting IP packets.
  • 45 Drag and Drop

    45

    Option 3: PUT/PATCH. Press spacebar to enter matching mode.

    Match the RESTful API method to CRUD function.

    POST

    GET

    PUT/PATCH

    DELETE

    READ

    CREATE

    UPDATE

    46 What is JSON?

  • It is a compiled programming language.
  • It is a data format for storing and transporting data.
  • It is a database.
  • It is a scripting language.
  • 47 A network administrator is configuring an ACL to match networks for BGP route filtering. The administrator creates an ACE permit ip 10.0.32.0 0.0.31.0 255.255.255.0 0.0.0.192. Which network matches the ACE?

    47 A network administrator is configuring an ACL to match networks for BGP route filtering. The administrator creates an ACE permit ip 10.0.32.0 0.0.31.0 255.255.255.0 0.0.0.192 . Which network matches the ACE?

  • 10.0.62.0/25
  • 10.0.66.0/24
  • 10.0.31.0/26
  • 10.0.32.0/27
  • 48 Refer to the exhibit. For which autonomous system would running BGP not be appropriate?The graphic shows four autonomous systems (AS). AS 65002 is connected to AS 65003 and to AS 65004. AS 65003 is connected only to AS 65002. AS 65004 is connected to AS 65002 and AS 65005. AS 65005 is connected to AS 65003 and to the Internet.

    48 The graphic shows four autonomous systems (AS). AS 65002 is connected to AS 65003 and to AS 65004. AS 65003 is connected only to AS 65002. AS 65004 is connected to AS 65002 and AS 65005. AS 65005 is connected to AS 65003 and to the Internet. Refer to the exhibit. For which autonomous system would running BGP not be appropriate?

  • 65002
  • 65004
  • 65005
  • 65003
  • 49 Which factor can be used by an AP to improve the accuracy of locating a wireless client?

  • RSS
  • DHCP
  • 802.11r
  • BSS
  • 50 A company deploys a Cisco wireless network over a large campus. A network administrator is configuring the Layer 3 roaming capability on WLCs. What is the purpose of using Layer 3 roaming?

  • to enable internet access for clients on the wireless network
  • to ensure that APs belonging to different mobility groups can communicate
  • to provide clients with the same IP address while they roam around campus
  • to provide intracontroller roaming for clients
  • 51 Refer to the exhibit. A network administrator configured routers R1 and R2 as part of HSRP group 1. After the routers have been reloaded, a user on Host1 complained of lack of connectivity to the Internet The network administrator issued the show standby brief command on both routers to verify the HSRP operations. In addition, the administrator observed the ARP table on Host1. Which entry should be seen in the ARP table on Host1 in order to gain connectivity to the Internet?A WAN cloud has connectivity to two routers labeled R1 and R2. Between the two routers the following words appear:Virtual IP: 10.1.1.254/24 Virtual MAC: 00-00-0C-07-AC-01R1 and R2 connect through an Ethernet connection to SW_A. SW-A also has connections to Host1 and Host2. Host1 has the following address: 10.1.1.3/24. Host2 has the following laddress: 10.1.1.4/24. Below the network drawing is the following command output:R1# show standby briefInterface Grp Prio P State Active Standby Virtual IP Fa0/0 1 110 P Active local 10.1.1.2 10.1.1.254R2# show standby brief Interface Grp Prio P State Active Standby Virtual IP Fa0/0 1 100 P Active 10.1.1.1 local 10.1.1.254C:\> arp -a Interface: 10.1.1.3 —- 0x4 Internet Address Physical Address Type 10.1.1.2 00-00-0c-ab-c0-d4 dynamic

    51 A WAN cloud has connectivity to two routers labeled R1 and R2. Between the two routers the following words appear:Virtual IP: 10.1.1.254/24Virtual MAC: 00-00-0C-07-AC-01R1 and R2 connect through an Ethernet connection to SW_A. SW-A also has connections to Host1 and Host2. Host1 has the following address: 10.1.1.3/24. Host2 has the following laddress: 10.1.1.4/24. Below the network drawing is the following command output:R1#show standby briefInterface Grp Prio P State Active Standby Virtual IPFa0/0 1 110 P Active local 10.1.1.2 10.1.1.254R2#show standby briefInterface Grp Prio P State Active Standby Virtual IPFa0/0 1 100 P Active 10.1.1.1 local 10.1.1.254C:\&gt;arp –aInterface: 10.1.1.3 ---- 0x4 Internet Address Physical Address Type 10.1.1.2 00-00-0c-ab-c0-d4 dynamic Refer to the exhibit. A network administrator configured routers R1 and R2 as part of HSRP group 1. After the routers have been reloaded, a user on Host1 complained of lack of connectivity to the Internet The network administrator issued the show standby brief command on both routers to verify the HSRP operations. In addition, the administrator observed the ARP table on Host1. Which entry should be seen in the ARP table on Host1 in order to gain connectivity to the Internet?

  • the IP address and the MAC address of R1
  • the virtual IP address of the HSRP group 1 and the MAC address of R1
  • the virtual IP address of the HSRP group 1 and the MAC address of R2
  • the virtual IP address and the virtual MAC address for the HSRP group 1
  • 52 A network engineer has issued the command standby 10 track 1 decrement 20 on an SVI of a multilayer switch. What is the purpose of this command?

    52 A network engineer has issued the command standby 10 track 1 decrement 20 on an SVI of a multilayer switch. What is the purpose of this command?

  • It creates a tracked object against the interface line protocol and links the HSRP instance to the tracked object so that the priority decrements by 20 if that interface goes down.
  • HSRP tracks that interface and dynamically decrements its priority by 20 every time it fails, up to a maximum of 10 failures.
  • It decrements the priority of the interface by 20 so that objects tracked by the HSRP instance do not use that interface unless the active interface goes down.
  • HSRP tracks 10 objects on that interface and decrements the priority of each object by 20 if the interface fails once.
  • 53 A company uses APs to create multiple wireless networks. In one particular area users complain that there is no wireless connectivity. When the network engineer uses the WLC GUI to verify connectivity to the APs, one of the APs does not appear in the list. What should the engineer check first?

  • RF conditions in the surrounding area
  • AP connectivity to an access layer switch
  • operation of client radios
  • interference in the surrounding area
  • 54 A medium-sized company uses APs, WLCs, and laptops for employee workstations. An employee reports the inability to connect to the Internet. A technician verifies that other workstations can successfully connect to the Internet. What are two possible reasons for the problem? (Choose two.)

  • A bad cable exists between the client and the WLC.
  • The workstation is out of range.
  • A default gateway is improperly configured on the AP.
  • The AP does not have power.
  • The wireless client is not configured for DHCP.
  • 55 A network administrator is configuring IPv6 route summarization on a BGP router with the command aggregate-address 2001:db8::/60 summary-only. Which two component networks match the aggregated route? (Choose two.)

    55 A network administrator is configuring IPv6 route summarization on a BGP router with the command aggregate-address 2001:db8::/60 summary-only . Which two component networks match the aggregated route? (Choose two.)

  • 2001:db8:0:12::/64
  • 2001:db8:0:24::/64
  • 2001:db8:0:15::/64
  • 2001:db8:0:0::/64
  • 2001:db8:0:e::/64
  • 56 What does BGP use to exchange routing updates with neighbors?

  • area numbers
  • TCP connections
  • hellos
  • group identification numbers
  • 57 A network administrator is setting up the wireless network in a small office. The administrator wants to choose a wireless protocol standard that takes advantage of 5 GHz throughput but is also compatible with a few existing devices that operate at 2.4 GHz. Which wireless standard should the administrator deploy?

  • 802.11g
  • 802.11ac
  • 802.11n
  • 802.11a
  • 802.11b
  • 58 Which wireless technology can combine the use of multiple antennas and radio chains to receive multiple copies of degraded wireless signals and convert them into one usable reconstructed wireless signal?

  • transmit beamforming
  • maximal-ratio combining
  • spatial streams
  • spatial multiplexing
  • 59 What are three examples of hypervisors? (Choose three.)

  • Hyper-V
  • vSphere
  • Docker
  • rkt
  • VServer
  • XenServer
  • 60 Which Cisco technology is based on the ETSI NFV architectural framework for reducing operational complexity of enterprise branch environments?

  • Cisco UCS
  • Cisco ISE
  • Cisco ENFV
  • Cisco DNA
  • 1 A network administrator has configured a Cisco router with the ip flow-export destination 205.168.1.3 2055 command. What are two results of the issued command? (Choose two.)

    1 A network administrator has configured a Cisco router with the ip flow-export destination 205.168.1.3 2055 command . What are two results of the issued command? (Choose two.)

  • It uses UDP port 2055 to capture the traffic.
  • It captures the traffic exiting towards the device 205.168.1.3.
  • It sets the NetFlow cache for device 205.168.1.3 to 2055 megabytes.
  • It sends the NetFlow data to the host 205.168.1.3.
  • It uses TCP port 2055 to capture the traffic.
  • 2 Which situation is a good case for a network technician to troubleshoot a problem using the ERSPAN tool?

  • a problem that is at a different location, but within the same company
  • a problem in the purchasing department and accessing the switch that connects to all the purchasing network devices
  • a problem appeared on one switch, but the technician wants to have the mirrored traffic captured on another switch in the same building that is close to the workstation used by the technician
  • a problem where the technician suspects that traffic from one VLAN is affecting another VLAN
  • 3 Which parameter must match for all switches in the same MST region?

    4 Which term is used to describe a mapping of one or more VLANs into a single STP tree using MST technology?

  • container
  • domain
  • region
  • instance
  • 5 Refer to the exhibit. A network administrator configured routers R1 and R2 as part of HSRP group 1. After the routers have been reloaded, a user on Host1 complained of lack of connectivity to the Internet The network administrator issued the show standby brief command on both routers to verify the HSRP operations. In addition, the administrator observed the ARP table on Host1. Which entry should be seen in the ARP table on Host1 in order to gain connectivity to the Internet?A WAN cloud has connectivity to two routers labeled R1 and R2. Between the two routers the following words appear: Virtual IP: 10.1.1.254/24 Virtual MAC: 00-00-0C-07-AC-01 R1 and R2 connect through an Ethernet connection to SW_A. SW-A also has connections to Host1 and Host2. Host1 has the following address: 10.1.1.3/24. Host2 has the following laddress: 10.1.1.4/24. Below the network drawing is the following command output: R1# show standby brief Interface Grp Prio P State Active Standby Virtual IP Fa0/0 1 110 P Active local 10.1.1.2 10.1.1.254 R2# show standby brief Interface Grp Prio P State Active Standby Virtual IP Fa0/0 1 100 P Active 10.1.1.1 local 10.1.1.254 C:\> arp -a Interface: 10.1.1.3 —- 0x4 Internet Address Physical Address Type 10.1.1.2 00-00-0c-ab-c0-d4 dynamic

    5 A WAN cloud has connectivity to two routers labeled R1 and R2. Between the two routers the following words appear: Virtual IP: 10.1.1.254/24 Virtual MAC: 00-00-0C-07-AC-01 R1 and R2 connect through an Ethernet connection to SW_A. SW-A also has connections to Host1 and Host2. Host1 has the following address: 10.1.1.3/24. Host2 has the following laddress: 10.1.1.4/24. Below the network drawing is the following command output: R1# show standby brief Interface Grp Prio P State Active Standby Virtual IP Fa0/0 1 110 P Active local 10.1.1.2 10.1.1.254 R2# show standby brief Interface Grp Prio P State Active Standby Virtual IP Fa0/0 1 100 P Active 10.1.1.1 local 10.1.1.254 C:\&gt; arp –a Interface: 10.1.1.3 ---- 0x4 Internet Address Physical Address Type 10.1.1.2 00-00-0c-ab-c0-d4 dynamic Refer to the exhibit. A network administrator configured routers R1 and R2 as part of HSRP group 1. After the routers have been reloaded, a user on Host1 complained of lack of connectivity to the Internet The network administrator issued the show standby brief command on both routers to verify the HSRP operations. In addition, the administrator observed the ARP table on Host1. Which entry should be seen in the ARP table on Host1 in order to gain connectivity to the Internet?

    6 Refer to the exhibit. R1 is configured for NAT as displayed. What is wrong with the configuration?The exhibit contains a PC that is labeled PC1 with an address 192.168.11.11/24. PC1 is connected to switch SW1, which is connected to interface Fa0/0 on router R1. Interface Fa0/1 on R1 is connected to switch SW2. SW2 is connected to PC2, which has an IP address of 192.168.12.1/24. R1 is connected to the Internet through interface S0/0/0, which has an IP address of 209.165.200.1/27. The router is configured thus: R1(config)# ip nat pool NAT-POOL2 209.165.200.5 209.165.200.10 netmask 255.255.255.224 R1(config)# access-list 1 permit 192.168.0.0 0.0.255.255 R1(config)# interface Fa0/0 R1(config-if)# ip nat inside R1(config)# interface Fa0/1 R1(config-if)# ip nat inside R1(config)# interface Serial0/0/0 R1(config-if)# ip nat outside

    6 The exhibit contains a PC that is labeled PC1 with an address 192.168.11.11/24. PC1 is connected to switch SW1, which is connected to interface Fa0/0 on router R1. Interface Fa0/1 on R1 is connected to switch SW2. SW2 is connected to PC2, which has an IP address of 192.168.12.1/24. R1 is connected to the Internet through interface S0/0/0, which has an IP address of 209.165.200.1/27. The router is configured thus: R1(config)# ip nat pool NAT-POOL2 209.165.200.5 209.165.200.10 netmask 255.255.255.224 R1(config)# access-list 1 permit 192.168.0.0 0.0.255.255 R1(config)# interface Fa0/0 R1(config-if)# ip nat inside R1(config)# interface Fa0/1 R1(config-if)# ip nat inside R1(config)# interface Serial0/0/0 R1(config-if)# ip nat outside Refer to the exhibit. R1 is configured for NAT as displayed. What is wrong with the configuration?

  • NAT-POOL2 is not bound to ACL 1.
  • Access-list 1 is misconfigured.
  • Interface Fa0/0 should be identified as an outside NAT interface.
  • The NAT pool is incorrect.
  • 7 Refer to the exhibit. Spanning-tree port priorities are listed beneath each interface. The network administrator enters the spanning-tree vlan 1 root primary command on S4. What is the effect of the command?The exhibit shows 4 switches named S1, S2, S3, and S4. S1 Gi0/2 port is connected to S3 Gi0/1 port. S3 Gi0/2 port is connected to S4 Gi0/2 port. S4 Gi0/1 port is connected to S2 Gi0/2 port. S2 Gi0/1 port is connected to S1 Gi0/1 port. All switches have port priority 128. S1 has priority 24576 and MAC address 000A00333333. S2 has priority 32768 and MAC address 000A00222222. S3 has priority 32768 and MAC address 000A00111111. S4 has priority 36864 and MAC address 000A00111110.

    7 The exhibit shows 4 switches named S1, S2, S3, and S4. S1 Gi0/2 port is connected to S3 Gi0/1 port. S3 Gi0/2 port is connected to S4 Gi0/2 port. S4 Gi0/1 port is connected to S2 Gi0/2 port. S2 Gi0/1 port is connected to S1 Gi0/1 port. All switches have port priority 128. S1 has priority 24576 and MAC address 000A00333333. S2 has priority 32768 and MAC address 000A00222222. S3 has priority 32768 and MAC address 000A00111111. S4 has priority 36864 and MAC address 000A00111110. Refer to the exhibit. Spanning-tree port priorities are listed beneath each interface. The network administrator enters the spanning-tree vlan 1 root primary command on S4. What is the effect of the command?

    8 Network users complain that the network is running very slowly. Upon investigation, a network technician discovers CPU spikes and exhausted memory resources on all the network devices. Also, numerous syslog messages are being generated that note continuous MAC address relearning. What is the most likely cause of the problem?

  • Keepalives are expected but do not arrive.
  • The routing protocol has been misconfigured and a routing loop is evident.
  • An incorrect encapsulation has been configured on one of the trunks that connect a Layer 2 device to a Layer 3 device within the affected segment.
  • The dynamic routing protocol has not yet converged the network.
  • A Layer 2 forwarding loop condition is present.
  • 9 The network administrator configures the router with the ip route 172.16.1.0 255.255.255.0 172.16.2.2 command. How will this route appear in the routing table?

    9 The network administrator configures the router with the ip route 172.16.1.0 255.255.255.0 172.16.2.2 command. How will this route appear in the routing table?

    10 Which two options best describe an exterior routing protocol (EGP)? (Choose two.)

  • a routing protocol that exchanges routing information within an autonomous system
  • an intradomain routing protocol
  • a routing protocol that is used for intradomain routing such as IS-IS and OSPFv3
  • an interdomain routing protocol
  • a routing protocol that exchanges routing information between different autonomous systems
  • 11 What command specifies a BGP neighbor that has an IP address of 5.5.5.5/24 and that is in AS 500?

  • (config-router)# neighbor 5.5.5.5 remote-as 500
  • (config-router)# router bgp 500
  • (config-router)# network 5.0.0.0 0.0.0.255
  • (config-router)# neighbor 500 remote-as 5.5.5.5
  • 12 A network administrator is configuring IPv6 route summarization on a BGP router with the command aggregate-address 2001:db8::/60 summary-only. Which two component networks match the aggregated route? (Choose two.)

    12 A network administrator is configuring IPv6 route summarization on a BGP router with the command aggregate-address 2001:db8::/60 summary-only . Which two component networks match the aggregated route? (Choose two.)

    13 Which configuration will prevent two directly connected Cisco routers from forming an OSPFv2 neighbor adjacency?

  • configuring mismatched OSPF process IDs on two adjacent routers
  • configuring a router ID on two adjacent routers
  • configuring mismatched MTU values on two adjacent routers
  • configuring a LAN interface connected to a switch as a passive interface
  • 14 What is the reason for a network engineer to alter the default reference bandwidth parameter when configuring OSPF?

    15 Which three protocols are components in the operation of 802.1x? (Choose three.)

  • EAP
  • EAPoL
  • IPsec
  • SSH
  • 16 Drag and Drop

    16

    Option 2: Cisco Stealthwatch. Press spacebar to enter matching mode.

    Match the security platform to the description. (Not all options are used.)

    Cisco Firepower Management Center

    Cisco Stealthwatch

    Cisco Identity Services Engine

    a centralized management platform that aggregates and correlates threat events

    a security policy management platform that

    provides highly secure network access control (NAC)

    a malware analysis and

    protection solution that goes beyond point-in-time detection

    a collector and aggregator of network telemetry data

    17 Refer to the exhibit. All the displayed switches are Cisco 2960 switches with the same default priority and operating at the same bandwidth. Which three ports will be STP designated ports? (Choose three.)The exhibit displays 3 switches called SW1,SW2, and SW3. SW2 has a MAC address of 00ff.0ba0.0002 and has its fa0/9 port connected to the fa0/10 port of SW1. SW2 has its port fa0/20 connected to port fa0/21 of SW3. SW3 has a MAC address of 00f0.0ba0.0ff2 and has its port fa0/13 connected to port fa0/11 of SW1 whose MAC address is 00fe.0ba0.00b2.

    17 The exhibit displays 3 switches called SW1,SW2, and SW3. SW2 has a MAC address of 00ff.0ba0.0002 and has its fa0/9 port connected to the fa0/10 port of SW1. SW2 has its port fa0/20 connected to port fa0/21 of SW3. SW3 has a MAC address of 00f0.0ba0.0ff2 and has its port fa0/13 connected to port fa0/11 of SW1 whose MAC address is 00fe.0ba0.00b2. Refer to the exhibit. All the displayed switches are Cisco 2960 switches with the same default priority and operating at the same bandwidth. Which three ports will be STP designated ports? (Choose three.)

    18 Refer to the exhibit. Which trunk link will not forward any traffic after the root bridge election process is complete?Four switches labeled S1, S2, S3, and S4 are connected. S1 port Gi1/1 connects to S2 Gi1/1. S1 port Fa0/1 connects to S3 Fa0/1. S4 also connects to S2 and S3. S4 Fa0/1 connects to S2 Fa0/1. S4 Fa0/2 connects to S3 Fa0/2. The link between S1 and S2 is labeled as Trunk1. The link between S1 and S3 is labeled as Trunk2. The link between S2 and S4 is labeled as Trunk3. The link between S3 and S4 is labeled as Trunk4. There is a text box attached to each switch: S1 text box shows: Bridge ID: Priority: 32769 MAC: 000A00032222 S2 text box shows: Bridge ID: Priority: 32769 MAC: 000A00032321 S3 text box shows: Bridge ID: Priority: 32769 MAC: 000A00033333 S4 text box shows: Bridge ID: Priority: 32769 MAC: 000A00031212

    18 Four switches labeled S1, S2, S3, and S4 are connected. S1 port Gi1/1 connects to S2 Gi1/1. S1 port Fa0/1 connects to S3 Fa0/1. S4 also connects to S2 and S3. S4 Fa0/1 connects to S2 Fa0/1. S4 Fa0/2 connects to S3 Fa0/2. The link between S1 and S2 is labeled as Trunk1. The link between S1 and S3 is labeled as Trunk2. The link between S2 and S4 is labeled as Trunk3. The link between S3 and S4 is labeled as Trunk4. There is a text box attached to each switch: S1 text box shows: Bridge ID: Priority: 32769 MAC: 000A00032222 S2 text box shows: Bridge ID: Priority: 32769 MAC: 000A00032321 S3 text box shows: Bridge ID: Priority: 32769 MAC: 000A00033333 S4 text box shows: Bridge ID: Priority: 32769 MAC: 000A00031212 Refer to the exhibit. Which trunk link will not forward any traffic after the root bridge election process is complete?

    19 What is true about TCAM lookups that are associated with CEF switching?

  • TCAM lookup tables are used only for the Layer 3 forwarding operation.
  • TCAM includes only Layer 3 lookup information.
  • TCAM lookup tables are used only for the rapid processing of ACLs within CEF.
  • A single TCAM lookup provides Layer 2, Layer 3, and ACL information
  • 20 What are three characteristics of a VLAN access port? (Choose three.)

  • An access port is created with the switchport mode access command and then associated with a VLAN with the switchport access vlan command.
  • An access port is associated with a single VLAN.
  • A switch port can become an access port through static or dynamic configuration.
  • The VLAN that the access port is assigned to will be automatically deleted if it does not exist in the VLAN database of the switch.
  • An access port created with the switchport mode access command will send DTP frames by default.
  • An access port should have the 802.1Q encapsulation associated with it.
  • 21 Refer to the exhibit. Based on the command output shown, what is the status of the EtherChannel?The exhibit displays the following command and some partial output: S1# show etherchannel summary <output omitted> Number of channel-groups in use: 1Number of aggregators: 1 Group Port-channel Protocol Ports 1 Po1(SU) – Fa0/10(P) Fa0/11(p)

    21 The exhibit displays the following command and some partial output: S1# show etherchannel summary Number of channel-groups in use: 1Number of aggregators: 1 Group Port-channel Protocol Ports 1 Po1(SU) - Fa0/10(P) Fa0/11(p) Refer to the exhibit. Based on the command output shown, what is the status of the EtherChannel?

  • The EtherChannel is dynamic and is using ports Fa0/10 and Fa0/11 as passive ports.
  • The EtherChannel is in use and functional as indicated by the SU and P flags in the command output.
  • The EtherChannel is partially functional as indicated by the P flags for the FastEthernet ports.
  • The EtherChannel is down as evidenced by the protocol field being empty.
  • 22 Drag and Drop

    22

    23 Drag and Drop

    23

    Option 2: vSmart controller. Press spacebar to enter matching mode.

    24 Which function is provided by the Cisco SD-Access Architecture controller layer?

    25 Drag and Drop

    25

    Option 3: Version 2 leave group. Press spacebar to enter matching mode.

    26 Which two statements describe characteristics of shared trees for PIM distribution? (Choose two.)

  • A shared tree places an (S,G) entry in the multicast routing table of each router.
  • A shared tree places an (*,G) entry in the multicast routing table of each router.
  • A shared tree creates an optimal path between each source router and each last hop router.
  • A shared tree has a mandatory rendezvous point.
  • A shared distribution tree requires higher memory resources than the source distribution tree does.
  • 27 What is JSON?

    28 What are two differences between SNMP and NETCONF? (Choose two.)

  • SNMP runs over TCP, whereas NETCONF runs over UDP.
  • SNMP uses JSON to encode data, whereas NETCONF uses XML.
  • SNMP cannot distinguish between configuration data and operational data, whereas NETCONF can.
  • SNMP uses object identifiers (OIDs) to describe resources, whereas NETCONF uses paths.
  • SNMP can collect device status but cannot make configuration changes, whereas NETCONF can make configuration changes.
  • 29 A company uses APs to create multiple wireless networks. In one particular area users complain that there is no wireless connectivity. When the network engineer uses the WLC GUI to verify connectivity to the APs, one of the APs does not appear in the list. What should the engineer check first?

    30 A network engineer that works for a company that uses lightweight APs is examining various performance factors for the wireless network in a particular area of the company. The engineer notices that one AP has an index value of 40 for air quality. What significance, if any, does this value provide?

  • An air quality value of 40 is within acceptable performance range for a lightweight AP, so no action is required by the network engineer.
  • The engineer should physically examine the surrounding area of the AP for potential RF obstructions.
  • The engineer might evaluate this index value over a period of 30 days to see if the air conditioning or heat is affecting the RF range of the AP.
  • Because of poor air quality, the engineer should be concerned and evaluate other wireless channels for possible use.
  • 31 Which factor can be used by an AP to improve the accuracy of locating a wireless client?

    32 A company deploys a Cisco wireless network over a large campus. A network administrator is configuring the Layer 3 roaming capability on WLCs. What is the purpose of using Layer 3 roaming?

    33 Which service should be disabled on a router to prevent a malicious host from falsely responding to ARP requests with the intent to redirect the Ethernet frames?

  • proxy ARP
  • LLDP
  • reverse ARP
  • CDP
  • 34 What is a characteristic of TACACS+?

  • TACACS+ is an open IETF standard.
  • TACACS+ is backward compatible with TACACS and RADIUS.
  • TACACS+ uses UDP port 1645 or 1812 for authentication, and UDP port 1646 or 1813 for accounting.
  • TACACS+ provides authorization of router commands on a per-user or per-group basis.
  • 35 Refer to the exhibit. A network administrator issues the show ip protocols command. Based on the exhibited output, what can be concluded?The exhibit displays the following router command output: R1# show ip protocols Routing Protocol is “eigrp 1 ” <output omitted> EIGRP metric weight K1=1, K2=0, K3=1, K4=0, K5=0 EIGRP maximum hopcount 100 EIGRP maximum metric variance 1 Redistributing: eigrp 1 Automatic network summarization is not in effect Maximum path: 4 Routing for Networks: 192.168.1.0 10.0.0.0

    35 The exhibit displays the following router command output: R1# show ip protocols Routing Protocol is &quot;eigrp 1 &quot; EIGRP metric weight K1=1, K2=0, K3=1, K4=0, K5=0 EIGRP maximum hopcount 100 EIGRP maximum metric variance 1 Redistributing: eigrp 1 Automatic network summarization is not in effect Maximum path: 4 Routing for Networks: 192.168.1.0 10.0.0.0 Refer to the exhibit. A network administrator issues the show ip protocols command. Based on the exhibited output, what can be concluded?

    36 A network engineer examining the operation of EIGRP on a router notices that one particular route is in an active state. What can the engineer determine about this route?

  • The EIGRP processes are still calculating the administrative distance for this route.
  • Data packets to be sent to the specified network will be forwarded on this route.
  • EIGRP query messages are being sent to other routers requesting paths to this network.
  • The Diffusing Update Algorithm has determined a successor and a feasible successor for this route.
  • 37 Which two statements are true about WRED? (Choose two.)

    38 Which type of QoS marking is applied to Ethernet frames?

  • DSCP
  • ToS
  • IP precedence
  • CoS
  • 39 Which three statements describe the characteristics of the Cisco hierarchical network design model? (Choose three.)

  • The access layer provides a means of connecting end devices to the network.
  • Route summarization is not necessary at the core and distribution layers.
  • The core layer is commonly implemented as a star topology.
  • Two goals of the core layer are high availability and maximizing throughput.
  • The distribution layer is responsible for route summarization and isolating failures from the core.
  • The distribution layer distributes network traffic directly to end users.
  • 40 Refer to the exhibit. A company adopts the hierarchical network model in the corporate LAN design. Layer 3 switches are deployed in the core and distribution layers. On which of the devices in this network should routing between workstation VLANs take place?The exhibit shows a router named RTA connected to a Layer 3 switch named CSA (they both belong to the core layer). CSA is connected to two Layer 3 switches, named DSA and DSB, that belong to the distribution layer. DSA is connected to two Layer 2 switches unnamed, and DSB is also connected to these two Layer 2 switches. Each Layer 2 switch is connected to a desktop. Both Layer 2 switches and both desktops belong to the access layer.

    40 The exhibit shows a router named RTA connected to a Layer 3 switch named CSA (they both belong to the core layer). CSA is connected to two Layer 3 switches, named DSA and DSB, that belong to the distribution layer. DSA is connected to two Layer 2 switches unnamed, and DSB is also connected to these two Layer 2 switches. Each Layer 2 switch is connected to a desktop. Both Layer 2 switches and both desktops belong to the access layer. Refer to the exhibit. A company adopts the hierarchical network model in the corporate LAN design. Layer 3 switches are deployed in the core and distribution layers. On which of the devices in this network should routing between workstation VLANs take place?

  • the access layer devices
  • the distribution layer devices
  • the core and distribution layer devices
  • the core layer devices
  • 41 A student is studying in preparation for an interview for a job in programming and network automation. What is a characteristic of Puppet?

    41 A student is studying in preparation for an interview for a job in programming and network automation. What is a characteristic of Puppet ?

    42 In which type of deployment is the Chef server hosted in the cloud?

    43 What advantage does WPA2 have over WPA?

    44 A network administrator is designing the wireless network for a law office. The security policy requires that access to the wireless network must be authenticated with the credentials of employees. The administrator decides to use the WPA2 Enterprise authentication method. Which server is a requirement to deploy WPA2 Enterprise?

  • HTTPS
  • TFTP
  • IEEE 802.1x
  • 45 What are three examples of hypervisors? (Choose three.)

    46 Which two methods are used by a single-root I/O virtualization (SR-IOV) enabled switch to switch traffic between VNFs? (Choose two.)

  • through the pNIC
  • through a VXLAN
  • through a vSwitch
  • through an external switch
  • through a DMVPN
  • 47 How does an antenna add gain to a wireless signal?

    48 A wireless engineer is deploying an autonomous Cisco access point. What must be configured on the access point to enable remote management?

  • CISCO-CAPWAP-CONTROLLER. localdomain target
  • TFTP server IP address target
  • management IP address
  • DHCP option 43
  • 49 Which type of OSPF link-state advertisement advertises redistributed routes in NSSAs?

  • type 7
  • 50 Cisco has created a security framework to help protect networks from ever-evolving cybersecurity threats. What is the term given to a centralized management platform that aggregates and correlates threat events, contextual information, and network device performance data?

  • Next-Generation Intrusion Prevention System (NGIPS)
  • Next-Generation Firewall (NGFW)
  • Firepower Management Center (FMC)
  • 51 Refer to the exhibit. What can be concluded about network 192.168.4.0 in the R2 routing table?The graphic shows the partial output of the show ip route command: R2# show ip route <output omitted> 172.16.0.0/16 is variably subnetted, 2 subnets, 2 masks C 172.16.1.0/24 is directly connected, GigabitEthernet0/1 L 172.16.1.1/32 is directly connected, GigabitEthernet0/1 O IA 192.168.1.0/24 [110/2] via 192.168.2.1, 00:07:08, GigabitEthernet0/0 192.168.2.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.2.0/24 is directly connected, GigabitEthernet0/0 L 192.168.2.2/32 is directly connected, GigabitEthernet0/0 O 192.168.4.0/24 [110/2] via 172.16.1.2, 00:00:07, GigabitEthernet0/1 192.168.6.0/32 is subnetted, 1 subnets O 192.168.6.1/32 [110/2] via 172.16.1.2, 00:00:07, GigabitEthernet0/1 O*E2 0.0.0.0/0 [110/1] via 192.168.2.1, 00:04:53, GigabitEthernet0/0 R2#

    51 The graphic shows the partial output of the show ip route command: R2# show ip route 172.16.0.0/16 is variably subnetted, 2 subnets, 2 masks C 172.16.1.0/24 is directly connected, GigabitEthernet0/1 L 172.16.1.1/32 is directly connected, GigabitEthernet0/1 O IA 192.168.1.0/24 [110/2] via 192.168.2.1, 00:07:08, GigabitEthernet0/0 192.168.2.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.2.0/24 is directly connected, GigabitEthernet0/0 L 192.168.2.2/32 is directly connected, GigabitEthernet0/0 O 192.168.4.0/24 [110/2] via 172.16.1.2, 00:00:07, GigabitEthernet0/1 192.168.6.0/32 is subnetted, 1 subnets O 192.168.6.1/32 [110/2] via 172.16.1.2, 00:00:07, GigabitEthernet0/1 O*E2 0.0.0.0/0 [110/1] via 192.168.2.1, 00:04:53, GigabitEthernet0/0 R2# Refer to the exhibit. What can be concluded about network 192.168.4.0 in the R2 routing table?

    52 What is the correct method to configure route summarization on an OSPF router?

  • Do nothing because summarization is on by default.
  • Configure OSPF and instruct the ABR to summarize specific area routes.
  • Configure the ABR and ASBR to summarize routes on an interface basis.
  • Configure OSPF and instruct the ASBR to summarize internal area routes.
  • 53 A network administrator is configuring an ACL to match networks for BGP route filtering. The administrator creates an ACE permit ip 10.0.32.0 0.0.31.0 255.255.255.0 0.0.0.192. Which network matches the ACE?

    53 A network administrator is configuring an ACL to match networks for BGP route filtering. The administrator creates an ACE permit ip 10.0.32.0 0.0.31.0 255.255.255.0 0.0.0.192 . Which network matches the ACE?

    54 Multiple paths exist in the BGP table. Assuming the weights are the same, what will the next determining factor be?

  • locally originated
  • lowest MED
  • lowest origin type
  • shortest AS_Path
  • highest local preference
  • 55 Which three addresses could be used as the destination address for OSPFv3 messages? (Choose three.)

  • 2001:db8:cafe::1
  • FF02::6
  • FF02::1:2
  • FF02::5
  • FF02::A
  • FE80::1
  • 56 What is the IPv6 address used by OSPFv3 non-DR/BDR routers to send link-state updates and link-state acknowledgments?

  • FF02::2
  • FF02::9
  • 57 What type of signal requires little extra bandwidth because data is being sent at a relatively low bit rate?

  • narrowband
  • orthogonal frequency division multiplexing
  • direct sequence spread spectrum
  • parallel
  • 58 When comparing two absolute power values, what can a wireless engineer conclude after calculating a result of 10 dB?

  • The power level of interest is ten times the reference value.
  • The power level of interest is one tenth of the reference value.
  • The power level of interest is half the reference value.
  • The value of the two power levels is the same.
  • The power level of interest is double the reference value.
  • 59 Refer to the exhibit. What two commands are needed to complete the GRE tunnel configuration on router R1? (Choose two.)The exhibit shows two routers, R1 and R2, that connect to an ISP over serial links on network 209.165.202.128. The IP address of the serial interface on R1 is 209.165.202.129 and the IP address of the serial interface on R2 is 209.165.202.130. There is a site attached to each router. Site A is attached to router R1 and site B is attached to router R2. A GRE tunnel is shown spanning the Internet between the two routers with router R1 having the IP address 172.16.2.1 and router R2 having IP address 172.16.2.2. The configuration on R1 is shown: R1(config)# interface Tunnel0 R1(config-if)# tunnel mode gre ip R1(config-if)# ip address 172.16.2.1 255.255.255.0

    59 The exhibit shows two routers, R1 and R2, that connect to an ISP over serial links on network 209.165.202.128. The IP address of the serial interface on R1 is 209.165.202.129 and the IP address of the serial interface on R2 is 209.165.202.130. There is a site attached to each router. Site A is attached to router R1 and site B is attached to router R2. A GRE tunnel is shown spanning the Internet between the two routers with router R1 having the IP address 172.16.2.1 and router R2 having IP address 172.16.2.2. The configuration on R1 is shown:R1(config)# interface Tunnel0R1(config-if)# tunnel mode gre ipR1(config-if)# ip address 172.16.2.1 255.255.255.0 Refer to the exhibit. What two commands are needed to complete the GRE tunnel configuration on router R1? (Choose two.)

  • R1(config-if)# tunnel destination 209.165.202.130
  • R1(config-if)# tunnel destination 172.16.2.2
  • R1(config-if)# tunnel source 209.165.202.129
  • R1(config-if)# tunnel source 209.165.202.130
  • R1(config-if)# tunnel source 172.16.2.1
  • R1(config-if)# tunnel destination 209.165.202.129
  • 60 What are two purposes of LISP? (Choose two.)

  • It performs load balancing of SD-WAN routers across vSmart controllers.
  • It authenticates vSmart controllers and SD-WAN routers.
  • It is an overlay tunneling technology.
  • It provides a permanent control plane connection over a DTLS tunnel.
  • It is an architecture created to address routing scalability problems.
  • 1 Refer to the exhibit. For which autonomous system would running BGP not be appropriate?The graphic shows four autonomous systems (AS). AS 65002 is connected to AS 65003 and to AS 65004. AS 65003 is connected only to AS 65002. AS 65004 is connected to AS 65002 and AS 65005. AS 65005 is connected to AS 65003 and to the Internet.

    1 The graphic shows four autonomous systems (AS). AS 65002 is connected to AS 65003 and to AS 65004. AS 65003 is connected only to AS 65002. AS 65004 is connected to AS 65002 and AS 65005. AS 65005 is connected to AS 65003 and to the Internet. Refer to the exhibit. For which autonomous system would running BGP not be appropriate?

    2 Multiple paths exist in the BGP table. Assuming the weights are the same, what will the next determining factor be?

    3 Refer to the exhibit. Which type of IPv6 static route is configured in the exhibit?The figure shows the following command: ipv6 route 2001:0DB8::/32 2001:0DB8:3000::1

    3 The figure shows the following command: ipv6 route 2001:0DB8::/32 2001:0DB8:3000::1 Refer to the exhibit. Which type of IPv6 static route is configured in the exhibit?

    4 Which two statements describe characteristics of load balancing? (Choose two.)

  • Unequal cost load balancing is supported by EIGRP.
  • Load balancing allows a router to forward packets over multiple paths to the same destination network.
  • Load balancing occurs when the same number of packets are sent over static and dynamic routes.
  • If multiple paths with different metrics to a destinations exist, the router cannot support load balancing.
  • Load balancing occurs when a router sends the same packet to different destination networks.
  • 5 Refer to the exhibit. Router R6 has sent a join message to router R4 requesting multicast traffic for users in the multicast group 224.1.1.1. How will the multicast traffic that is sent from the multicast server SRC through the R1-R3-R5 path be handled at router R6?The exhibit shows a network with 6 routers, 1 switch, 1 server, and 3 workstations. The routers are named R1 through R6 respectively. The switch is named SW1. From top to the bottom, the server SRC is assigned an IPv4 address 10.1.1.1 and is connected to R1. R1 is also labeled as RP. R1 is connected to R2 and R3 separately. R2 is connected to R4 and R3 is connected to R5. An interface on R4 is assigned an IPv4 address 172.16.1.1 and is connected to R6 at its Fa0/0 interface. An interface on R5 is assigned an IPv4 address 172.16.2.1 and is connected to R6 at its Fa0/1 interface. The Fa0/2 interface on R6 is connected to the switch SW1. Three workstations are attached to the switch SW1. There is an IPv4 address 224.1.1.1 next to the workstations. There is a dotted arrow line from R6 to point to R4. The dotted arrow line is labeled with the word Join. There is a text box pointing to R6 with the following information: Unicast Route Table Network Int Next-Hop 10.1.0.0/24 Fa0/0 172.16.1.1 10.1.0.0/24 Fa0/1 172.16.2.1

    5 The exhibit shows a network with 6 routers, 1 switch, 1 server, and 3 workstations. The routers are named R1 through R6 respectively. The switch is named SW1. From top to the bottom, the server SRC is assigned an IPv4 address 10.1.1.1 and is connected to R1. R1 is also labeled as RP. R1 is connected to R2 and R3 separately. R2 is connected to R4 and R3 is connected to R5. An interface on R4 is assigned an IPv4 address 172.16.1.1 and is connected to R6 at its Fa0/0 interface. An interface on R5 is assigned an IPv4 address 172.16.2.1 and is connected to R6 at its Fa0/1 interface. The Fa0/2 interface on R6 is connected to the switch SW1. Three workstations are attached to the switch SW1. There is an IPv4 address 224.1.1.1 next to the workstations. There is a dotted arrow line from R6 to point to R4. The dotted arrow line is labeled with the word Join. There is a text box pointing to R6 with the following information:Unicast Route TableNetwork Int Next-Hop10.1.0.0/24 Fa0/0 172.16.1.110.1.0.0/24 Fa0/1 172.16.2.1 Refer to the exhibit. Router R6 has sent a join message to router R4 requesting multicast traffic for users in the multicast group 224.1.1.1. How will the multicast traffic that is sent from the multicast server SRC through the R1-R3-R5 path be handled at router R6?

    6 Which two statements describe characteristics of shared trees for PIM distribution? (Choose two.)

    7 What are two purposes of LISP? (Choose two.)

    8 Refer to the exhibit. What two commands are needed to complete the GRE tunnel configuration on router R1? (Choose two.)The exhibit shows two routers, R1 and R2, that connect to an ISP over serial links on network 209.165.202.128. The IP address of the serial interface on R1 is 209.165.202.129 and the IP address of the serial interface on R2 is 209.165.202.130. There is a site attached to each router. Site A is attached to router R1 and site B is attached to router R2.A GRE tunnel is shown spanning the Internet between the two routers with router R1 having the IP address 172.16.2.1 and router R2 having IP address 172.16.2.2. The configuration on R1 is shown: R1(config)# interface Tunnel0 R1(config-if)# tunnel mode gre ip R1(config-if)# ip address 172.16.2.1 255.255.255.0

    8 The exhibit shows two routers, R1 and R2, that connect to an ISP over serial links on network 209.165.202.128. The IP address of the serial interface on R1 is 209.165.202.129 and the IP address of the serial interface on R2 is 209.165.202.130. There is a site attached to each router. Site A is attached to router R1 and site B is attached to router R2.A GRE tunnel is shown spanning the Internet between the two routers with router R1 having the IP address 172.16.2.1 and router R2 having IP address 172.16.2.2. The configuration on R1 is shown:R1(config)# interface Tunnel0R1(config-if)# tunnel mode gre ipR1(config-if)# ip address 172.16.2.1 255.255.255.0 Refer to the exhibit. What two commands are needed to complete the GRE tunnel configuration on router R1? (Choose two.)

    9 What are three types of IP packets that require process switching and cannot be forwarded by CEF in a Cisco router? (Choose three.)

    10 What two additional features does a Layer 3 switch offer compared with a Layer 2 switch? (Choose two.)

  • routing that is based upon IP addresses
  • forwarding between different networks
  • traffic that is forwarded at wire speeds
  • forwarding that is based upon MAC addresses
  • hardware-based switching
  • 11 Refer to the exhibit. R1 is configured for NAT as displayed. What is wrong with the configuration?The exhibit contains a PC that is labeled PC1 with an address 192.168.11.11/24. PC1 is connected to switch SW1, which is connected to interface Fa0/0 on router R1. Interface Fa0/1 on R1 is connected to switch SW2. SW2 is connected to PC2, which has an IP address of 192.168.12.1/24. R1 is connected to the Internet through interface S0/0/0, which has an IP address of 209.165.200.1/27. The router is configured thus: R1(config)# ip nat pool NAT-POOL2 209.165.200.5 209.165.200.10 netmask 255.255.255.224 R1(config)# access-list 1 permit 192.168.0.0 0.0.255.255 R1(config)# interface Fa0/0 R1(config-if)# ip nat inside R1(config)# interface Fa0/1 R1(config-if)# ip nat inside R1(config)# interface Serial0/0/0 R1(config-if)# ip nat outside

    11 The exhibit contains a PC that is labeled PC1 with an address 192.168.11.11/24. PC1 is connected to switch SW1, which is connected to interface Fa0/0 on router R1. Interface Fa0/1 on R1 is connected to switch SW2. SW2 is connected to PC2, which has an IP address of 192.168.12.1/24. R1 is connected to the Internet through interface S0/0/0, which has an IP address of 209.165.200.1/27. The router is configured thus: R1(config)# ip nat pool NAT-POOL2 209.165.200.5 209.165.200.10 netmask 255.255.255.224 R1(config)# access-list 1 permit 192.168.0.0 0.0.255.255 R1(config)# interface Fa0/0 R1(config-if)# ip nat inside R1(config)# interface Fa0/1 R1(config-if)# ip nat inside R1(config)# interface Serial0/0/0 R1(config-if)# ip nat outside Refer to the exhibit. R1 is configured for NAT as displayed. What is wrong with the configuration?

    12 Refer to the exhibit. A corporate network is using NTP to synchronize the time across devices. What can be determined from the displayed output?The exhibit shows the CLI output: Router03# show ntp status Clock is synchronized, stratum 2, reference is 209.165.200.225 nominal freq is 250.0000 Hz, actual freq is 249.9995 Hz, precision is 2**19 ntp uptime is 589900 (1/100 of seconds), resolution is 4016 reference time is DA088DD3.C4E659D3 (13:21:23.769 PST Fri Nov 15 2019) clock offset is 7.0883 msec, root delay is 99.77 msec root dispersion is 13.43 msec, peer dispersion is 2.48 msec loopfilter state is ‘CTRL’ (Normal Controlled Loop), drift is 0.000001803 s/s system poll interval is 64, last update was 169 sec ago.

    12 The exhibit shows the CLI output:Router03# show ntp statusClock is synchronized, stratum 2, reference is 209.165.200.225nominal freq is 250.0000 Hz, actual freq is 249.9995 Hz, precision is 2**19ntp uptime is 589900 (1/100 of seconds), resolution is 4016reference time is DA088DD3.C4E659D3 (13:21:23.769 PST Fri Nov 15 2019)clock offset is 7.0883 msec, root delay is 99.77 msecroot dispersion is 13.43 msec, peer dispersion is 2.48 msecloopfilter state is 'CTRL' (Normal Controlled Loop), drift is 0.000001803 s/ssystem poll interval is 64, last update was 169 sec ago. Refer to the exhibit. A corporate network is using NTP to synchronize the time across devices. What can be determined from the displayed output?

  • The time on Router03 may not be reliable because it is offset by more than 7 seconds to the time server.
  • Router03 time is synchronized to a stratum 2 time server.
  • The interface on Router03 that connects to the time sever has the IPv4 address 209.165.200.225.
  • Router03 is a stratum 2 device that can provide NTP service to other devices in the network.
  • 13 Drag and Drop

    13

    Option 2: Chef. Press spacebar to enter matching mode.

    Match the configuration management tool with the component terminology.

    Puppet

    Chef

    Ansible

    SaltStack

    pillars and grains

    playbooks and plays

    modules and manifests

    cookbooks and recipes

    14 A student is studying in preparation for an interview for a job in programming and network automation. What is a characteristic of Puppet?

    14 A student is studying in preparation for an interview for a job in programming and network automation. What is a characteristic of Puppet ?

    15 A company uses APs to create multiple wireless networks. In one particular area users complain that there is no wireless connectivity. When the network engineer uses the WLC GUI to verify connectivity to the APs, one of the APs does not appear in the list. What should the engineer check first?

    16 A wireless network engineer who is new to the Cisco lightweight architecture is becoming familiar with common baselines for the APs in the company. One particular AP shows no clients attached, but shows 30% channel utilization on the 2.4 GHz channel and 0% channel utilization on the 5 GHz channel. What is the issue, if any?

  • The channel is significantly utilized by other nearby APs and clients using the 2.4 GHz frequency range.
  • Because no clients are attached to the AP, the AP itself is suspect.
  • There is an issue with the 5 GHz settings or the antenna.
  • Because no clients are attached to the AP and at least one of the frequency channels is showing utilization, authentication issues between the clients and the authentication server exist.
  • 17 A network administrator uses the spanning-tree portfast bpduguard default global configuration command to enable BPDU guard on a switch. However, BPDU guard is not activated on all access ports. What is the cause of the issue?

    17 A network administrator uses the spanning-tree portfast bpduguard default global configuration command to enable BPDU guard on a switch. However, BPDU guard is not activated on all access ports. What is the cause of the issue?

  • Access ports configured with root guard cannot be configured with BPDU guard.
  • BPDU guard needs to be activated in the interface configuration command mode.
  • Access ports belong to different VLANs.
  • PortFast is not configured on all access ports.
  • 18 Refer to the exhibit. A network administrator is verifying the bridge ID and the status of this switch in the STP election. Which statement is correct based on the command output?The exhibit consists of the following: Switch_2# show spanning-tree vlan 10VLAN0010 Spanning tree enabled protocol ieee <output omitted> Bridge ID Priority 24586 (priority 24576 sys-id-ext 10) Address 000C.8533.5044 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Aging Time 20Interface Role Sts Cost Prio.Nbr Type—————- —- — ——— ——– ——————————–Fa0/2 Desg FWD 19 128.2 P2pFa0/3 Desg FWD 19 128.3 P2p

    18 The exhibit consists of the following: Switch_2#show spanning-tree vlan 10VLAN0010 Spanning tree enabled protocol ieee Bridge ID Priority 24586 (priority 24576 sys-id-ext 10) Address 000C.8533.5044 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Aging Time 20Interface Role Sts Cost Prio.Nbr Type---------------- ---- --- --------- -------- --------------------------------Fa0/2 Desg FWD 19 128.2 P2pFa0/3 Desg FWD 19 128.3 P2p Refer to the exhibit. A network administrator is verifying the bridge ID and the status of this switch in the STP election. Which statement is correct based on the command output?

  • The STP instance on Switch_2 is failing due to no ports being blocked and all switches believing they are the root.
  • The bridge priority of Switch_2 has been lowered to a predefined value to become the backup root bridge.
  • The STP instance on Switch_2 is using the default STP priority and the election is based on Switch_2 MAC address.
  • The bridge priority of Switch_2 has been lowered to a predefined value to become the root bridge.
  • 19 Drag and Drop

    19

    20 Which function is provided by the Cisco SD-Access Architecture controller layer?

    21 A network administrator is setting up the wireless network in a small office. The administrator wants to choose a wireless protocol standard that takes advantage of 5 GHz throughput but is also compatible with a few existing devices that operate at 2.4 GHz. Which wireless standard should the administrator deploy?

    22 When comparing two absolute power values, what can a wireless engineer conclude after calculating a result of 10 dB?

    23 Refer to the exhibit. Which data format is used to describe the list of interfaces?The exhibit shows a data format: list interface { key “name”; leaf name { type string; } leaf speed { type enumeration { enum 10m; enum 100m; enum auto; } } leaf observed-speed { type uint32; config false; } }

    23 The exhibit shows a data format: list interface { key &quot;name&quot;; leaf name { type string; } leaf speed { type enumeration { enum 10m; enum 100m; enum auto; } } leaf observed-speed { type uint32; config false; } } Refer to the exhibit. Which data format is used to describe the list of interfaces?

  • YANG
  • XML
  • YAML
  • JSON
  • 24 Drag and Drop

    24

    25 Which QoS model uses the DSCP bits to mark packets and provides 64 possible classes of service?

    26 Which type of QoS marking is applied to Ethernet frames?

    27 Cisco has created a security framework to help protect networks from ever-evolving cybersecurity threats. What is the term given to a VPN client that provides VPN access and enhanced security to assess the compliance of an endpoint for things like antivirus, antispyware, and firewall software installed on the host?

  • Advanced Malware Protection (AMP)
  • 28 A new network administrator has been asked to verify the metrics that are used by EIGRP on a Cisco device. Which two EIGRP metrics are measured by using static values on a Cisco device? (Choose two.)

  • load
  • delay
  • bandwidth
  • reliability
  • MTU
  • 29 Refer to the exhibit. Which two conclusions can be derived from the output? (Choose two.)The graphic displays the following output: R1# show ip eigrp topology EIGRP-IPv4 Topology Table for AS(1)/ID(2.2.2.2) Codes: P – Passive, A – Active, U – Update, Q – Query, R – Reply, r – reply Status, s – sia Status P 172.16.3.0/24, 1 successors, FD is 1315 via Connected, GigabitEthernet0/1 P 192.168.1.8/30, 1 successors, FD is 452141 via 192.168.11.1 (452141/216956), Serial0/0/1 via 172.16.6.1 (68024000/216956), Serial0/0/0 P 192.168.1.0/24, 1 successors, FD is 3012096 via 192.168.11.1 (3012096/28116), Serial0/0/1 via 172.16.6.1 (41024256/2170112), Serial0/0/0 P 192.168.10.8/30, 1 successors, FD is 3011840 via Connected, Serial0/0/1

    29 The graphic displays the following output:R1# show ip eigrp topologyEIGRP-IPv4 Topology Table for AS(1)/ID(2.2.2.2)Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply, r - reply Status, s - sia StatusP 172.16.3.0/24, 1 successors, FD is 1315 via Connected, GigabitEthernet0/1P 192.168.1.8/30, 1 successors, FD is 452141 via 192.168.11.1 (452141/216956), Serial0/0/1 via 172.16.6.1 (68024000/216956), Serial0/0/0P 192.168.1.0/24, 1 successors, FD is 3012096 via 192.168.11.1 (3012096/28116), Serial0/0/1 via 172.16.6.1 (41024256/2170112), Serial0/0/0P 192.168.10.8/30, 1 successors, FD is 3011840 via Connected, Serial0/0/1 Refer to the exhibit. Which two conclusions can be derived from the output? (Choose two.)

    30 What are three benefits of a hierarchical network model? (Choose three.)

    31 Which three statements describe the characteristics of the Cisco hierarchical network design model? (Choose three.)

    32 Which two methods are used by a single-root I/O virtualization (SR-IOV) enabled switch to switch traffic between VNFs? (Choose two.)

    33 Which function is the responsibility of the NFV element manager in the ETSI NFV architectural framework?

  • performing all FCAPS functions for VNFs
  • providing life cycle management of all NFVI resources
  • collecting performance measurements and fault information
  • creating end-to-end network services over multiple VNFs
  • 34 Drag and Drop

    34

    35 Which Cisco security solution uses dynamic content analysis to identify inappropriate content in real time for unknown websites?

    36 Which situation is an example of EAP deployment?

  • when both the AP and client are configured with the same key or secret word for authentication by the AP
  • when a wireless client sends its MAC address to the AP for authentication after being validated by the internal database of the AP
  • when unauthenticated clients associate with the AP
  • when a client communicates with a RADIUS server for authenticated access to the network through the AP
  • 37 A network administrator is designing the wireless network for a law office. The security policy requires that access to the wireless network must be authenticated with the credentials of employees. The administrator decides to use the WPA2 Enterprise authentication method. Which server is a requirement to deploy WPA2 Enterprise?

    38 Which type of OSPF link-state advertisement advertises redistributed routes in NSSAs?

    39 Refer to the exhibit. All the displayed switches are Cisco 2960 switches with the same default priority and operating at the same bandwidth. Which three ports will be STP designated ports? (Choose three.)The exhibit displays 3 switches called SW1,SW2, and SW3. SW2 has a MAC address of 00ff.0ba0.0002 and has its fa0/9 port connected to the fa0/10 port of SW1. SW2 has its port fa0/20 connected to port fa0/21 of SW3. SW3 has a MAC address of 00f0.0ba0.0ff2 and has its port fa0/13 connected to port fa0/11 of SW1 whose MAC address is 00fe.0ba0.00b2.

    39 The exhibit displays 3 switches called SW1,SW2, and SW3. SW2 has a MAC address of 00ff.0ba0.0002 and has its fa0/9 port connected to the fa0/10 port of SW1. SW2 has its port fa0/20 connected to port fa0/21 of SW3. SW3 has a MAC address of 00f0.0ba0.0ff2 and has its port fa0/13 connected to port fa0/11 of SW1 whose MAC address is 00fe.0ba0.00b2. Refer to the exhibit. All the displayed switches are Cisco 2960 switches with the same default priority and operating at the same bandwidth. Which three ports will be STP designated ports? (Choose three.)

    40 Refer to the exhibit. What are the possible port roles for ports A, B, C, and D in this RSTP-enabled network?The graphic shows the following information: Switch S1 (the root bridge) uses a port that is labeled B to connect to switch S3 on a port labeled D. S3 is connected to switch S2 on a port labeled A. S2 uses a port labeled C to connect to S1. S2 is connected also to three PC workstations labeled A, B, and C.

    40 The graphic shows the following information: Switch S1 (the root bridge) uses a port that is labeled B to connect to switch S3 on a port labeled D. S3 is connected to switch S2 on a port labeled A. S2 uses a port labeled C to connect to S1. S2 is connected also to three PC workstations labeled A, B, and C. Refer to the exhibit. What are the possible port roles for ports A, B, C, and D in this RSTP-enabled network?

  • designated, root, alternate, root
  • designated, alternate, root, root
  • alternate, designated, root, root
  • alternate, root, designated, root
  • 41 What is a solution to mitigate the MST misconfiguration with improper VLAN assignment to the IST?

  • Move all active VLANs to the IST.
  • Ensure that only VLANs in the same MSTI for a trunk link are pruned.
  • Ensure that the MST region name is consistent across MST regions.
  • Move the affected VLAN to an MSTI other than the IST.
  • 42 Which feature is used by an MST region to send VLAN information to a switch that runs PVST+?

  • PVST translation mechanism
  • PVST simulation mechanism
  • PVST conversion mechanism
  • PVST transition mechanism
  • 43 A network administrator has configured a Cisco router with the ip flow-export destination 205.168.1.3 2055 command. What are two results of the issued command? (Choose two.)

    43 A network administrator has configured a Cisco router with the ip flow-export destination 205.168.1.3 2055 command . What are two results of the issued command? (Choose two.)

    44 Which situation is a good case for a network technician to troubleshoot a problem using the ERSPAN tool?

    45 A high school is deploying a wireless network for the campus. The wireless network consists of 100 lightweight APs and 3 WLCs. These 3 WLCs manage APs in 3 areas: (1) classroom buildings, (2) the library, the dining hall, and an indoor gymnasium, and (3) administration buildings. Which term is used to describe the type of roaming that occurs when a student using a smartphone roams from a classroom to the library?

  • autonomous roaming
  • intercontroller roaming
  • intracontroller roaming
  • end user roaming
  • 46 Which factor can be used by an AP to improve the accuracy of locating a wireless client?

    47 Which service should be disabled on a router to prevent a malicious host from falsely responding to ARP requests with the intent to redirect the Ethernet frames?

    48 Refer to the exhibit. An ACL was configured on R1 with the intention of denying traffic from subnet 172.16.4.0/24 into subnet 172.16.3.0/24. All other traffic into subnet 172.16.3.0/24 should be permitted. This standard ACL was then applied outbound on interface G0/0/0. Which conclusion can be drawn from this configuration?​The exhibit contains a router labeled R1 that has three interfaces connected. GigabitEthernet 0/0/0 is connected to a switch, which is connected to a PC and which belongs to the 172.16.3.0/24 subnet. GigabitEthernet 0/0/1 is connected to a switch, which is connected to another PC and which belongs to the 172.16.4.0/24 subnet. Serial 0/0/0 is connected to the Internet. Below the graphic is a text box with the following commands:R1(config)# access-list 1 deny 172.16.4.0 0.0.0.255R1(config)# interface GigabitEthernet 0/0/0R1(config-if)# ip access-group 1 out​

    48 The exhibit contains a router labeled R1 that has three interfaces connected. GigabitEthernet 0/0/0 is connected to a switch, which is connected to a PC and which belongs to the 172.16.3.0/24 subnet. GigabitEthernet 0/0/1 is connected to a switch, which is connected to another PC and which belongs to the 172.16.4.0/24 subnet. Serial 0/0/0 is connected to the Internet. Below the graphic is a text box with the following commands:R1(config)#access-list 1 deny 172.16.4.0 0.0.0.255R1(config)#interface GigabitEthernet 0/0/0R1(config-if)#ip access-group 1 out​ Refer to the exhibit. An ACL was configured on R1 with the intention of denying traffic from subnet 172.16.4.0/24 into subnet 172.16.3.0/24. All other traffic into subnet 172.16.3.0/24 should be permitted. This standard ACL was then applied outbound on interface G0/0/0. Which conclusion can be drawn from this configuration?​

  • The ACL should be applied outbound on all interfaces of R1.
  • Only traffic from the 172.16.4.0/24 subnet is blocked, and all other traffic is allowed.​
  • All traffic will be blocked, not just traffic from the 172.16.4.0/24 subnet.
  • The ACL should be applied to the GigabitEthernet 0/0/0 interface of R1 inbound to accomplish the requirements.
  • An extended ACL must be used in this situation.
  • 49 On what type of OSPF router is interarea route summarization configured?

    50 What is the correct method to configure route summarization on an OSPF router?

    51 Refer to the exhibit. Switch SW-A is to be used as a temporary replacement for another switch in the VTP Student domain. What two pieces of information are indicated from the exhibited output? (Choose two.)The exhibit has the following command output: SW-A# show vtp status VTP Version : 2 Configuration Revision : 58 Maximum VLANs supported locally : 64 Number of existing VLANs : 5 VTP Operating Mode : Client VTP Domain Name : Student VTP Pruning Mode : Enabled VTP V2 Mode : Disabled VTP Traps Generation : Disabled MD5 digest : 0xFE 0x69 0x2F 0xEC 0x8D 0x2F 0x80 0xCA Local updater ID is 0.0.0.0 (no valid interface found) SW-A#

    51 The exhibit has the following command output: SW-A# show vtp status VTP Version : 2 Configuration Revision : 58 Maximum VLANs supported locally : 64 Number of existing VLANs : 5 VTP Operating Mode : Client VTP Domain Name : Student VTP Pruning Mode : Enabled VTP V2 Mode : Disabled VTP Traps Generation : Disabled MD5 digest : 0xFE 0x69 0x2F 0xEC 0x8D 0x2F 0x80 0xCA Local updater ID is 0.0.0.0 (no valid interface found) SW-A# Refer to the exhibit. Switch SW-A is to be used as a temporary replacement for another switch in the VTP Student domain. What two pieces of information are indicated from the exhibited output? (Choose two.)

  • This switch will update its VLAN configuration when VLAN changes are made on a VTP server in the same domain.
  • There is a risk that the switch may cause incorrect VLAN information to be sent through the domain.
  • The other switches in the domain can be running either VTP version 1 or 2.
  • VTP will block frame forwarding on at least one redundant trunk port that is configured on this switch.
  • VLAN configuration changes made on this switch will be sent to other devices in the VTP domain.
  • 52 Which two mode combinations would result in the successful negotiation of an EtherChannel? (Choose two.)

    53 What determines the software image release that a lightweight access point will be running?

  • the IOS version of the access switch connected to the AP
  • the version information provided by the DHCP server as part of the AP boot process
  • the WLC software release version on the WLC to which the AP joins
  • the wireless NIC driver version of the mobile device that connects to the AP
  • 54 Which special-purpose mode is configured on a lightweight AP that is acting as a dedicated sensor while determining the position of stations using location-based services?

  • sniffer
  • monitor
  • rogue detector
  • local
  • 56 Refer to the exhibit. Both routers R1 and R2 are configured for OSPFv3 and are routing for both IPv4 and IPv6 address families. Which two destination addresses will R1 use to establish a full adjacency with R2? (Choose two.)The exhibit shows R1 and R2 connected by a serial link. Each has a LAN and a loopback interface. R1 addressing is as follows: Interface Lo0 has IPv6 link-local address fe80::1, IPv4 address 172.17.0.100/32, IPv6 address 2001:db8:21::100/128 LAN interface is on the IPv4 network 172.17.2.0/24 and IPv6 network 2001:db8:21:10::/64 Interface S0/1/0 has IPv6 link-local address fe80::1, IPv4 address 172.17.1.1/30, IPv6 address 2001:db8:21:20::1/64 R2 addressing is as follows: Interface Lo0has IPv6 link-local address fe80::2, IPv4 address 172.17.64.100/32, IPv6 address 2001:db8:22::100/128 LAN interface is on the IPv4 network 172.17.66.0/24 and IPv6 network 2001:db8:22:10::/64 Interface S0/1/0 has IPv6 link-local address fe80::2, IPv4 address 172.17.1.2/30, IPv6 address 2001:db8:21:20::2/64

    56 The exhibit shows R1 and R2 connected by a serial link. Each has a LAN and a loopback interface. R1 addressing is as follows: Interface Lo0 has IPv6 link-local address fe80::1, IPv4 address 172.17.0.100/32, IPv6 address 2001:db8:21::100/128 LAN interface is on the IPv4 network 172.17.2.0/24 and IPv6 network 2001:db8:21:10::/64 Interface S0/1/0 has IPv6 link-local address fe80::1, IPv4 address 172.17.1.1/30, IPv6 address 2001:db8:21:20::1/64 R2 addressing is as follows: Interface Lo0has IPv6 link-local address fe80::2, IPv4 address 172.17.64.100/32, IPv6 address 2001:db8:22::100/128 LAN interface is on the IPv4 network 172.17.66.0/24 and IPv6 network 2001:db8:22:10::/64 Interface S0/1/0 has IPv6 link-local address fe80::2, IPv4 address 172.17.1.2/30, IPv6 address 2001:db8:21:20::2/64 Refer to the exhibit. Both routers R1 and R2 are configured for OSPFv3 and are routing for both IPv4 and IPv6 address families. Which two destination addresses will R1 use to establish a full adjacency with R2? (Choose two.)

    57 What does BGP use to exchange routing updates with neighbors?

    58 Refer to the exhibit. A network administrator issues the show bgp ipv4 unicast 172.16.0.0 command to check the route information in the BGP table. Which statement describes the characteristic of the advertisement of this route?The exhibit shows the output after the command show bgp ipv4 unicast 172.16.0.0 is issued: R3# show bgp ipv4 unicast 172.16.0.0 BGP routing table entry for 172.16.0.0/20, version 25 Paths: (1 available, best #1, table default) Not advertised to any peer Refresh Epoch 2 65200, (aggregated by 65200 192.168.2.2) 10.23.1.2 from 10.23.1.2 (192.168.2.2) Origin IGP, metric 0, localpref 100, valid, external, atomic-aggregate, best rx pathid: 0, tx pathid: 0x0

    58 The exhibit shows the output after the command show bgp ipv4 unicast 172.16.0.0 is issued:R3# show bgp ipv4 unicast 172.16.0.0BGP routing table entry for 172.16.0.0/20, version 25Paths: (1 available, best #1, table default) Not advertised to any peer Refresh Epoch 2 65200, (aggregated by 65200 192.168.2.2) 10.23.1.2 from 10.23.1.2 (192.168.2.2) Origin IGP, metric 0, localpref 100, valid, external, atomic-aggregate, best rx pathid: 0, tx pathid: 0x0 Refer to the exhibit. A network administrator issues the show bgp ipv4 unicast 172.16.0.0 command to check the route information in the BGP table. Which statement describes the characteristic of the advertisement of this route?

  • The route is advertised for networks directly connected to the BGP router 192.168.2.2.
  • The route is advertised through a static route.
  • The route is advertised through an IGP.
  • The route is advertised with the aggregate-address 172.16.0.0 255.255.240.0 summary-only command.
  • 59 What function is performed by the OSPF designated router?

  • dissemination of LSAs
  • maintaining the link-state database
  • redistribution of external routes into OSPF
  • summarizing routes between areas
  • 60 Which configuration will prevent two directly connected Cisco routers from forming an OSPFv2 neighbor adjacency?

    1 What are two purposes of LISP? (Choose two.)

    2 Refer to the exhibit. What two commands are needed to complete the GRE tunnel configuration on router R1? (Choose two.)The exhibit shows two routers, R1 and R2, that connect to an ISP over serial links on network 209.165.202.128. The IP address of the serial interface on R1 is 209.165.202.129 and the IP address of the serial interface on R2 is 209.165.202.130. There is a site attached to each router. Site A is attached to router R1 and site B is attached to router R2.A GRE tunnel is shown spanning the Internet between the two routers with router R1 having the IP address 172.16.2.1 and router R2 having IP address 172.16.2.2. The configuration on R1 is shown: R1(config)# interface Tunnel0 R1(config-if)# tunnel mode gre ip R1(config-if)# ip address 172.16.2.1 255.255.255.0

    2 The exhibit shows two routers, R1 and R2, that connect to an ISP over serial links on network 209.165.202.128. The IP address of the serial interface on R1 is 209.165.202.129 and the IP address of the serial interface on R2 is 209.165.202.130. There is a site attached to each router. Site A is attached to router R1 and site B is attached to router R2.A GRE tunnel is shown spanning the Internet between the two routers with router R1 having the IP address 172.16.2.1 and router R2 having IP address 172.16.2.2. The configuration on R1 is shown:R1(config)# interface Tunnel0R1(config-if)# tunnel mode gre ipR1(config-if)# ip address 172.16.2.1 255.255.255.0 Refer to the exhibit. What two commands are needed to complete the GRE tunnel configuration on router R1? (Choose two.)

    3 Refer to the exhibit. Switch SW-A is to be used as a temporary replacement for another switch in the VTP Student domain. What two pieces of information are indicated from the exhibited output? (Choose two.)The exhibit has the following command output: SW-A# show vtp status VTP Version : 2 Configuration Revision : 58 Maximum VLANs supported locally : 64 Number of existing VLANs : 5 VTP Operating Mode : Client VTP Domain Name : Student VTP Pruning Mode : Enabled VTP V2 Mode : Disabled VTP Traps Generation : Disabled MD5 digest : 0xFE 0x69 0x2F 0xEC 0x8D 0x2F 0x80 0xCA Local updater ID is 0.0.0.0 (no valid interface found) SW-A#

    3 The exhibit has the following command output: SW-A# show vtp status VTP Version : 2 Configuration Revision : 58 Maximum VLANs supported locally : 64 Number of existing VLANs : 5 VTP Operating Mode : Client VTP Domain Name : Student VTP Pruning Mode : Enabled VTP V2 Mode : Disabled VTP Traps Generation : Disabled MD5 digest : 0xFE 0x69 0x2F 0xEC 0x8D 0x2F 0x80 0xCA Local updater ID is 0.0.0.0 (no valid interface found) SW-A# Refer to the exhibit. Switch SW-A is to be used as a temporary replacement for another switch in the VTP Student domain. What two pieces of information are indicated from the exhibited output? (Choose two.)

    4 Which three options must match in order to establish an EtherChannel between two directly connected switches? (Choose three.)

  • port security settings on the interfaces that used for EtherChannel
  • speed of the interfaces that are used for EtherChannel
  • domain names on the switches
  • VLAN memberships of the interfaces that are used for EtherChannel
  • duplex settings of the interfaces that are used for EtherChannel
  • port numbers that are used for the EtherChannel
  • 5 Which term is used to describe a mapping of one or more VLANs into a single STP tree using MST technology?

    6 Which parameter must match for all switches in the same MST region?

    7 Refer to the exhibit. Spanning-tree port priorities are 128 for all interfaces. The network administrator enters the spanning-tree vlan 1 root primary command on S4. Which two port results are correct? (Choose two.)The exhibit shows 4 switches named S1, S2, S3, and S4. The S1 Gi0/2 port is connected to the S3 Gi0/1 port. The S3 Gi0/2 port is connected to the S4 Gi0/2 port. The S4 Gi0/1 port is connected to the S2 Gi0/2 port. The S2 Gi0/1 port is connected to the S1 Gi0/1 port. All switches have port priority 128. S1 has priority 24576 and MAC address 000A00333333. S2 has priority 32768 and MAC address 000A00222222. S3 has priority 32768 and MAC address 000A00111111. S4 has priority 36864 and MAC address 000A00111110.

    7 The exhibit shows 4 switches named S1, S2, S3, and S4. The S1 Gi0/2 port is connected to the S3 Gi0/1 port. The S3 Gi0/2 port is connected to the S4 Gi0/2 port. The S4 Gi0/1 port is connected to the S2 Gi0/2 port. The S2 Gi0/1 port is connected to the S1 Gi0/1 port. All switches have port priority 128. S1 has priority 24576 and MAC address 000A00333333. S2 has priority 32768 and MAC address 000A00222222. S3 has priority 32768 and MAC address 000A00111111. S4 has priority 36864 and MAC address 000A00111110. Refer to the exhibit. Spanning-tree port priorities are 128 for all interfaces. The network administrator enters the spanning-tree vlan 1 root primary command on S4. Which two port results are correct? (Choose two.)

    9 How will user traffic be forwarded between two laptops that are both connected to the same lightweight access point in a large enterprise topology?

    10 How does an antenna add gain to a wireless signal?

    11 A network administrator is configuring IPv6 route summarization on a BGP router with the command aggregate-address 2001:db8::/60 summary-only. Which two component networks match the aggregated route? (Choose two.)

    11 A network administrator is configuring IPv6 route summarization on a BGP router with the command aggregate-address 2001:db8::/60 summary-only . Which two component networks match the aggregated route? (Choose two.)

    12 Refer to the exhibit. A network administrator issues the show bgp ipv4 unicast 172.16.0.0 command to check the route information in the BGP table. Which statement describes the characteristic of the advertisement of this route?The exhibit shows the output after the command show bgp ipv4 unicast 172.16.0.0 is issued: R3# show bgp ipv4 unicast 172.16.0.0 BGP routing table entry for 172.16.0.0/20, version 25 Paths: (1 available, best #1, table default) Not advertised to any peer Refresh Epoch 2 65200, (aggregated by 65200 192.168.2.2) 10.23.1.2 from 10.23.1.2 (192.168.2.2) Origin IGP, metric 0, localpref 100, valid, external, atomic-aggregate, best rx pathid: 0, tx pathid: 0x0

    12 The exhibit shows the output after the command show bgp ipv4 unicast 172.16.0.0 is issued:R3# show bgp ipv4 unicast 172.16.0.0BGP routing table entry for 172.16.0.0/20, version 25Paths: (1 available, best #1, table default) Not advertised to any peer Refresh Epoch 2 65200, (aggregated by 65200 192.168.2.2) 10.23.1.2 from 10.23.1.2 (192.168.2.2) Origin IGP, metric 0, localpref 100, valid, external, atomic-aggregate, best rx pathid: 0, tx pathid: 0x0 Refer to the exhibit. A network administrator issues the show bgp ipv4 unicast 172.16.0.0 command to check the route information in the BGP table. Which statement describes the characteristic of the advertisement of this route?

    13 Which type of OSPF link-state advertisement advertises LSAs for routes that have been redistributed?

    14 A new network administrator has been asked to verify the metrics that are used by EIGRP on a Cisco device. Which two EIGRP metrics are measured by using static values on a Cisco device? (Choose two.)

    15 Refer to the exhibit. Which two networks contain feasible successors? (Choose two.)R4# show ip eigrp topologyIP-EIGRP Topology Table for AS 54 Codes: P – Passive, A – Active, U – Update, Q – Query, R – Reply, r – Reply status P 192.168.41.0/25, 1 successors, FD is 128256 via Connected, Loopback0P 10.44.103.252/30, 1 successors, FD is 2816 via Connected, GigabitEthernet0/0P 10.44.104.252/30, 1 successors, FD is 25600256 via Connected, GigabitEthernet0/1P 192.168.51.0/25, 1 successors, FD is 130816 via 10.44.103.253 (130816/128256), GigabitEthernet0/0 via 10.44.104.253 (25600512/261899), GigabitEthernet0/1P 10.44.101.252/30, 1 successors, FD is 3072 via 10.44.103.253 (3072/2816), GigabitEthernet0/0P 10.44.100.252/30, 1 successors, FD is 3072 via 10.44.103.253 (3072/2816), GigabitEthernet0/0 via 10.44.104.253 (25600512/2816), GigabitEthernet0/1P 192.168.71.0/25, 1 successors, FD is 131072 via 10.44.103.253 (131072/130816), GigabitEthernet0/0 via 10.44.104.253 (25728256/128256), GigabitEthernet0/1 ?

    15 R4#show ip eigrp topologyIP-EIGRP Topology Table for AS 54 Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply, r - Reply status P 192.168.41.0/25, 1 successors, FD is 128256 via Connected, Loopback0P 10.44.103.252/30, 1 successors, FD is 2816 via Connected, GigabitEthernet0/0P 10.44.104.252/30, 1 successors, FD is 25600256 via Connected, GigabitEthernet0/1P 192.168.51.0/25, 1 successors, FD is 130816 via 10.44.103.253 (130816/128256), GigabitEthernet0/0 via 10.44.104.253 (25600512/261899), GigabitEthernet0/1P 10.44.101.252/30, 1 successors, FD is 3072 via 10.44.103.253 (3072/2816), GigabitEthernet0/0P 10.44.100.252/30, 1 successors, FD is 3072 via 10.44.103.253 (3072/2816), GigabitEthernet0/0 via 10.44.104.253 (25600512/2816), GigabitEthernet0/1P 192.168.71.0/25, 1 successors, FD is 131072 via 10.44.103.253 (131072/130816), GigabitEthernet0/0 via 10.44.104.253 (25728256/128256), GigabitEthernet0/1 ? Refer to the exhibit. Which two networks contain feasible successors? (Choose two.)

  • 10.44.104.253
  • 192.168.71.0
  • 10.44.100.252
  • 10.44.101.252
  • 192.168.51.0
  • 17 A network engineer that works for a company that uses lightweight APs is examining various performance factors for the wireless network in a particular area of the company. The engineer notices that one AP has an index value of 40 for air quality. What significance, if any, does this value provide?

    18 Which configuration will prevent two directly connected Cisco routers from forming an OSPFv2 neighbor adjacency?

    19 On an OSPF multiaccess network, which multicast address must a non-DR router use to send an LSU packet that contains new link-state information?

    20 Refer to the exhibit. Assuming both routers have IPv6 routing enabled and router R1 is configured for OSPFv3 as shown, which set of configuration commands on R2 is required to allow an OSPFv3 adjacency to form between the two routers?The exhibit shows two routers, R1 and R2, connected over a serial link in network 2001:db8:cafe:1::/64. R1 connects to R2 with interface serial 0/0/0, which has an interface ID of ::1. The output of the command show ospfv3 interface s0/0/0 and the show ipv6 interface s0/0/0 is as follows: R1# show ospfv3 interface s0/0/0 Serial0/0/0 is up, line protocol is up Link Local Address FE80::1, Interface ID 6 Area 0, Process ID 1, Instance ID 0, Router ID 1.1.1.1 output omitted R1# show ipv6 interface s0/0/0 Serial0/0/0 is up, line protocol is up IPv6 is enabled, link-local address is FE80::1 No Virtual link-local address(es): Global unicast address(es): 2001:DB8:CAFE:1::1, subnet is 2001:DB8:CAFE:1::/64 output omitted

    20 The exhibit shows two routers, R1 and R2, connected over a serial link in network 2001:db8:cafe:1::/64. R1 connects to R2 with interface serial 0/0/0, which has an interface ID of ::1. The output of the commandshow ospfv3 interface s0/0/0and theshow ipv6 interface s0/0/0is as follows:R1#show ospfv3 interface s0/0/0Serial0/0/0 is up, line protocol is upLink Local Address FE80::1, Interface ID 6Area 0, Process ID 1, Instance ID 0, Router ID 1.1.1.1output omittedR1#show ipv6 interface s0/0/0Serial0/0/0 is up, line protocol is upIPv6 is enabled, link-local address is FE80::1No Virtual link-local address(es):Global unicast address(es):2001:DB8:CAFE:1::1, subnet is 2001:DB8:CAFE:1::/64output omitted Refer to the exhibit. Assuming both routers have IPv6 routing enabled and router R1 is configured for OSPFv3 as shown, which set of configuration commands on R2 is required to allow an OSPFv3 adjacency to form between the two routers?

  • R2(config)# router ospfv3 1 R2(config)# router-id 2.2.2.2 R2(config)# interface s0/0/0 R2(config-if)# ipv6 address fe80::1 link-local R2(config-if)# ipv6 address 2001:db8:0:cafe::2/64 R2(config-if)# ospfv3 1 ipv6 area 0
  • R2(config)# router ospfv3 1 R2(config)# router-id 2.2.2.2 R2(config)# interface s0/0/0 R2(config-if)# ipv6 address fe80::2 link-local R2(config-if)# ipv6 address 2001:db8:0:cafe::2/64
  • R2(config)# router ospfv3 1 R2(config)# router-id 2.2.2.2 R2(config)# interface s0/0/0 R2(config-if)# ipv6 address fe80::2 link-local R2(config-if)# ipv6 address 2001:db8:0:cafe::2/64 R2(config-if)# ospfv3 1 ipv6 area 20
  • R2(config)# router ospfv3 99 R2(config)# router-id 2.2.2.2 R2(config)# interface s0/0/0 R2(config-if)# ipv6 address fe80::2 link-local R2(config-if)# ospfv3 1 ipv6 area 0
  • 21 What is the IPv6 address used by OSPFv3 non-DR/BDR routers to send link-state updates and link-state acknowledgments?

    22 How does an RP MA announcement provide redundancy in a PIM domain configured with the auto-RP mechanism?

  • RP MA announcements contain the unicast address to ensure the election with the highest unicast address succeeds as the new RP.
  • RP MA announcements are sent out every 60 seconds only to ensure an election every 60 seconds in the event an RP goes down.
  • RP MA announcements contain prune times to ensure a fast election if a change is detected.
  • RP MA announcements contain elected RPs and group to RP mappings to ensure changes are detected and an election held if necessary.
  • 23 Refer to the exhibit. Router R6 has sent a join message to router R4 requesting multicast traffic for users in the multicast group 224.1.1.1. How will the multicast traffic that is sent from the multicast server SRC through the R1-R3-R5 path be handled at router R6?The exhibit shows a network with 6 routers, 1 switch, 1 server, and 3 workstations. The routers are named R1 through R6 respectively. The switch is named SW1. From top to the bottom, the server SRC is assigned an IPv4 address 10.1.1.1 and is connected to R1. R1 is also labeled as RP. R1 is connected to R2 and R3 separately. R2 is connected to R4 and R3 is connected to R5. An interface on R4 is assigned an IPv4 address 172.16.1.1 and is connected to R6 at its Fa0/0 interface. An interface on R5 is assigned an IPv4 address 172.16.2.1 and is connected to R6 at its Fa0/1 interface. The Fa0/2 interface on R6 is connected to the switch SW1. Three workstations are attached to the switch SW1. There is an IPv4 address 224.1.1.1 next to the workstations. There is a dotted arrow line from R6 to point to R4. The dotted arrow line is labeled with the word Join. There is a text box pointing to R6 with the following information: Unicast Route Table Network Int Next-Hop 10.1.0.0/24 Fa0/0 172.16.1.1 10.1.0.0/24 Fa0/1 172.16.2.1

    23 The exhibit shows a network with 6 routers, 1 switch, 1 server, and 3 workstations. The routers are named R1 through R6 respectively. The switch is named SW1. From top to the bottom, the server SRC is assigned an IPv4 address 10.1.1.1 and is connected to R1. R1 is also labeled as RP. R1 is connected to R2 and R3 separately. R2 is connected to R4 and R3 is connected to R5. An interface on R4 is assigned an IPv4 address 172.16.1.1 and is connected to R6 at its Fa0/0 interface. An interface on R5 is assigned an IPv4 address 172.16.2.1 and is connected to R6 at its Fa0/1 interface. The Fa0/2 interface on R6 is connected to the switch SW1. Three workstations are attached to the switch SW1. There is an IPv4 address 224.1.1.1 next to the workstations. There is a dotted arrow line from R6 to point to R4. The dotted arrow line is labeled with the word Join. There is a text box pointing to R6 with the following information:Unicast Route TableNetwork Int Next-Hop10.1.0.0/24 Fa0/0 172.16.1.110.1.0.0/24 Fa0/1 172.16.2.1 Refer to the exhibit. Router R6 has sent a join message to router R4 requesting multicast traffic for users in the multicast group 224.1.1.1. How will the multicast traffic that is sent from the multicast server SRC through the R1-R3-R5 path be handled at router R6?

    24 Which Cisco technology is based on the ETSI NFV architectural framework for reducing operational complexity of enterprise branch environments?

    25 What are three examples of hypervisors? (Choose three.)

    26 Refer to the exhibit. R1 is configured for NAT as displayed. What is wrong with the configuration?The exhibit contains a PC that is labeled PC1 with an address 192.168.11.11/24. PC1 is connected to switch SW1, which is connected to interface Fa0/0 on router R1. Interface Fa0/1 on R1 is connected to switch SW2. SW2 is connected to PC2, which has an IP address of 192.168.12.1/24. R1 is connected to the Internet through interface S0/0/0, which has an IP address of 209.165.200.1/27. The router is configured thus: R1(config)# ip nat pool NAT-POOL2 209.165.200.5 209.165.200.10 netmask 255.255.255.224 R1(config)# access-list 1 permit 192.168.0.0 0.0.255.255 R1(config)# interface Fa0/0 R1(config-if)# ip nat inside R1(config)# interface Fa0/1 R1(config-if)# ip nat inside R1(config)# interface Serial0/0/0 R1(config-if)# ip nat outside

    26 The exhibit contains a PC that is labeled PC1 with an address 192.168.11.11/24. PC1 is connected to switch SW1, which is connected to interface Fa0/0 on router R1. Interface Fa0/1 on R1 is connected to switch SW2. SW2 is connected to PC2, which has an IP address of 192.168.12.1/24. R1 is connected to the Internet through interface S0/0/0, which has an IP address of 209.165.200.1/27. The router is configured thus: R1(config)# ip nat pool NAT-POOL2 209.165.200.5 209.165.200.10 netmask 255.255.255.224 R1(config)# access-list 1 permit 192.168.0.0 0.0.255.255 R1(config)# interface Fa0/0 R1(config-if)# ip nat inside R1(config)# interface Fa0/1 R1(config-if)# ip nat inside R1(config)# interface Serial0/0/0 R1(config-if)# ip nat outside Refer to the exhibit. R1 is configured for NAT as displayed. What is wrong with the configuration?

    27 Refer to the exhibit. A network administrator configured routers R1 and R2 as part of HSRP group 1. After the routers have been reloaded, a user on Host1 complained of lack of connectivity to the Internet The network administrator issued the show standby brief command on both routers to verify the HSRP operations. In addition, the administrator observed the ARP table on Host1. Which entry should be seen in the ARP table on Host1 in order to gain connectivity to the Internet?A WAN cloud has connectivity to two routers labeled R1 and R2. Between the two routers the following words appear:Virtual IP: 10.1.1.254/24 Virtual MAC: 00-00-0C-07-AC-01R1 and R2 connect through an Ethernet connection to SW_A. SW-A also has connections to Host1 and Host2. Host1 has the following address: 10.1.1.3/24. Host2 has the following laddress: 10.1.1.4/24. Below the network drawing is the following command output:R1# show standby briefInterface Grp Prio P State Active Standby Virtual IP Fa0/0 1 110 P Active local 10.1.1.2 10.1.1.254R2# show standby brief Interface Grp Prio P State Active Standby Virtual IP Fa0/0 1 100 P Active 10.1.1.1 local 10.1.1.254C:\> arp -a Interface: 10.1.1.3 —- 0x4 Internet Address Physical Address Type 10.1.1.2 00-00-0c-ab-c0-d4 dynamic

    27 A WAN cloud has connectivity to two routers labeled R1 and R2. Between the two routers the following words appear:Virtual IP: 10.1.1.254/24Virtual MAC: 00-00-0C-07-AC-01R1 and R2 connect through an Ethernet connection to SW_A. SW-A also has connections to Host1 and Host2. Host1 has the following address: 10.1.1.3/24. Host2 has the following laddress: 10.1.1.4/24. Below the network drawing is the following command output:R1#show standby briefInterface Grp Prio P State Active Standby Virtual IPFa0/0 1 110 P Active local 10.1.1.2 10.1.1.254R2#show standby briefInterface Grp Prio P State Active Standby Virtual IPFa0/0 1 100 P Active 10.1.1.1 local 10.1.1.254C:\&gt;arp –aInterface: 10.1.1.3 ---- 0x4 Internet Address Physical Address Type 10.1.1.2 00-00-0c-ab-c0-d4 dynamic Refer to the exhibit. A network administrator configured routers R1 and R2 as part of HSRP group 1. After the routers have been reloaded, a user on Host1 complained of lack of connectivity to the Internet The network administrator issued the show standby brief command on both routers to verify the HSRP operations. In addition, the administrator observed the ARP table on Host1. Which entry should be seen in the ARP table on Host1 in order to gain connectivity to the Internet?

    28 A network administrator is configuring an ACL to match networks for BGP route filtering. The administrator creates an ACE permit ip 10.0.32.0 0.0.31.0 255.255.255.0 0.0.0.192. Which network matches the ACE?

    28 A network administrator is configuring an ACL to match networks for BGP route filtering. The administrator creates an ACE permit ip 10.0.32.0 0.0.31.0 255.255.255.0 0.0.0.192 . Which network matches the ACE?

    29 Multiple paths exist in the BGP table. Assuming the weights are the same, what will the next determining factor be?

    30 Cisco has created a security framework to help protect networks from ever-evolving cybersecurity threats. What is the term given to an elite team of security experts who track evolving threats across all parts of networks, cloud environments, and the web to provide a comprehensive understanding and solution for protection against these cyber threats?

  • Talos
  • Threat Grid
  • 31 Which two options best describe an exterior routing protocol (EGP)? (Choose two.)

    32 Refer to the exhibit. Which type of IPv6 static route is configured in the exhibit?The figure shows the following command: ipv6 route 2001:0DB8::/32 2001:0DB8:3000::1

    32 The figure shows the following command: ipv6 route 2001:0DB8::/32 2001:0DB8:3000::1 Refer to the exhibit. Which type of IPv6 static route is configured in the exhibit?

    33 What type of signal requires little extra bandwidth because data is being sent at a relatively low bit rate?

    34 Which wireless technology can combine the use of multiple antennas and radio chains to receive multiple copies of degraded wireless signals and convert them into one usable reconstructed wireless signal?

    35 Which two statements are true about WRED? (Choose two.)

    36 Which type of QoS marking is applied to Ethernet frames?

    37 Refer to the exhibit. An ACL was configured on R1 with the intention of denying traffic from subnet 172.16.4.0/24 into subnet 172.16.3.0/24. All other traffic into subnet 172.16.3.0/24 should be permitted. This standard ACL was then applied outbound on interface G0/0/0. Which conclusion can be drawn from this configuration?​The exhibit contains a router labeled R1 that has three interfaces connected. GigabitEthernet 0/0/0 is connected to a switch, which is connected to a PC and which belongs to the 172.16.3.0/24 subnet. GigabitEthernet 0/0/1 is connected to a switch, which is connected to another PC and which belongs to the 172.16.4.0/24 subnet. Serial 0/0/0 is connected to the Internet. Below the graphic is a text box with the following commands:R1(config)# access-list 1 deny 172.16.4.0 0.0.0.255R1(config)# interface GigabitEthernet 0/0/0R1(config-if)# ip access-group 1 out​

    37 The exhibit contains a router labeled R1 that has three interfaces connected. GigabitEthernet 0/0/0 is connected to a switch, which is connected to a PC and which belongs to the 172.16.3.0/24 subnet. GigabitEthernet 0/0/1 is connected to a switch, which is connected to another PC and which belongs to the 172.16.4.0/24 subnet. Serial 0/0/0 is connected to the Internet. Below the graphic is a text box with the following commands:R1(config)#access-list 1 deny 172.16.4.0 0.0.0.255R1(config)#interface GigabitEthernet 0/0/0R1(config-if)#ip access-group 1 out​ Refer to the exhibit. An ACL was configured on R1 with the intention of denying traffic from subnet 172.16.4.0/24 into subnet 172.16.3.0/24. All other traffic into subnet 172.16.3.0/24 should be permitted. This standard ACL was then applied outbound on interface G0/0/0. Which conclusion can be drawn from this configuration?​

    38 An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?

    40 Which three functions are performed at the distribution layer of the hierarchical network model? (Choose three.)

    41 Which function is provided by the Cisco SD-Access Architecture controller layer?

    42 Which overlay tunnel technology is established by fabric APs to transport wireless client data in an SD-Access wireless deployment?

  • VXLAN
  • MPLS
  • GRE
  • 43 Refer to the exhibit. What are the possible port roles for ports A, B, C, and D in this RSTP-enabled network?The graphic shows the following information: Switch S1 (the root bridge) uses a port that is labeled B to connect to switch S3 on a port labeled D. S3 is connected to switch S2 on a port labeled A. S2 uses a port labeled C to connect to S1. S2 is connected also to three PC workstations labeled A, B, and C.

    43 The graphic shows the following information: Switch S1 (the root bridge) uses a port that is labeled B to connect to switch S3 on a port labeled D. S3 is connected to switch S2 on a port labeled A. S2 uses a port labeled C to connect to S1. S2 is connected also to three PC workstations labeled A, B, and C. Refer to the exhibit. What are the possible port roles for ports A, B, C, and D in this RSTP-enabled network?

    44 Refer to the exhibit. Which trunk link will not forward any traffic after the root bridge election process is complete?Four switches labeled S1, S2, S3, and S4 are connected. S1 port Gi1/1 connects to S2 Gi1/1. S1 port Fa0/1 connects to S3 Fa0/1. S4 also connects to S2 and S3. S4 Fa0/1 connects to S2 Fa0/1. S4 Fa0/2 connects to S3 Fa0/2. The link between S1 and S2 is labeled as Trunk1. The link between S1 and S3 is labeled as Trunk2. The link between S2 and S4 is labeled as Trunk3. The link between S3 and S4 is labeled as Trunk4. There is a text box attached to each switch: S1 text box shows: Bridge ID: Priority: 32769 MAC: 000A00032222 S2 text box shows: Bridge ID: Priority: 32769 MAC: 000A00032321 S3 text box shows: Bridge ID: Priority: 32769 MAC: 000A00033333 S4 text box shows: Bridge ID: Priority: 32769 MAC: 000A00031212

    44 Four switches labeled S1, S2, S3, and S4 are connected. S1 port Gi1/1 connects to S2 Gi1/1. S1 port Fa0/1 connects to S3 Fa0/1. S4 also connects to S2 and S3. S4 Fa0/1 connects to S2 Fa0/1. S4 Fa0/2 connects to S3 Fa0/2. The link between S1 and S2 is labeled as Trunk1. The link between S1 and S3 is labeled as Trunk2. The link between S2 and S4 is labeled as Trunk3. The link between S3 and S4 is labeled as Trunk4. There is a text box attached to each switch: S1 text box shows: Bridge ID: Priority: 32769 MAC: 000A00032222 S2 text box shows: Bridge ID: Priority: 32769 MAC: 000A00032321 S3 text box shows: Bridge ID: Priority: 32769 MAC: 000A00033333 S4 text box shows: Bridge ID: Priority: 32769 MAC: 000A00031212 Refer to the exhibit. Which trunk link will not forward any traffic after the root bridge election process is complete?

    45 What two additional features does a Layer 3 switch offer compared with a Layer 2 switch? (Choose two.)

    46 What are three types of IP packets that require process switching and cannot be forwarded by CEF in a Cisco router? (Choose three.)

    47 Which WLAN security protocol avoids attacks by strengthening the key exchange between clients and APs using a method known as Simultaneous Authentication of Equals?

    48 What advantage does WPA2 have over WPA?

    49 In which type of deployment is the Chef server hosted in the cloud?

    50 Drag and Drop

    50

    51 Which three protocols are components in the operation of 802.1x? (Choose three.)

    52 Which Cisco security architectural framework helps design secure solutions for the various places in the network (PINs)?

  • Cisco SAFE
  • Cisco NGFW
  • 53 What is JSON?

    54 Refer to the exhibit. Which data format is used to describe the list of interfaces?The exhibit shows a data format: list interface { key “name”; leaf name { type string; } leaf speed { type enumeration { enum 10m; enum 100m; enum auto; } } leaf observed-speed { type uint32; config false; } }

    54 The exhibit shows a data format: list interface { key &quot;name&quot;; leaf name { type string; } leaf speed { type enumeration { enum 10m; enum 100m; enum auto; } } leaf observed-speed { type uint32; config false; } } Refer to the exhibit. Which data format is used to describe the list of interfaces?

    55 Refer to the exhibit. On the basis of the information presented, which two IP SLA related statements are true? (Choose two.)The graphic shows the output result of the show ip sla configuration command on R1:R1# show ip sla configurationIP SLAs Infrastructure Engine-IIIEntry number: 99Owner:Tag:Operation timeout (milliseconds): 5000Type of operation to perform: icmp-echoTarget address/Source address: 192.168.2.1/0.0.0.0Type Of Service parameter: 0x0Request (ARR data portion): 28Verify data: NoVrf Name:Schedule: Operation frequency (seconds): 10 (not considered if randomly scheduled) Next Scheduled Start Time: Start Time already passed Group Scheduled : FALSE Randomly Scheduled : FALSE Life (seconds): Forever Entry Ageout (seconds): never Recurring (Starting Everyday): FALSE Status of entry (SNMP RowStatus): Active<output omitted>

    55 The graphic shows the output result of theshow ip slaconfiguration command on R1:R1#show ip sla configurationIP SLAs Infrastructure Engine-IIIEntry number: 99Owner:Tag:Operation timeout (milliseconds): 5000Type of operation to perform: icmp-echoTarget address/Source address: 192.168.2.1/0.0.0.0Type Of Service parameter: 0x0Request (ARR data portion): 28Verify data: NoVrf Name:Schedule: Operation frequency (seconds): 10 (not considered if randomly scheduled) Next Scheduled Start Time: Start Time already passed Group Scheduled : FALSE Randomly Scheduled : FALSE Life (seconds): Forever Entry Ageout (seconds): never Recurring (Starting Everyday): FALSE Status of entry (SNMP RowStatus): Active Refer to the exhibit. On the basis of the information presented, which two IP SLA related statements are true? (Choose two.)

    56 A network administrator has configured a Cisco router with the ip flow-export destination 205.168.1.3 2055 command. What are two results of the issued command? (Choose two.)

    56 A network administrator has configured a Cisco router with the ip flow-export destination 205.168.1.3 2055 command . What are two results of the issued command? (Choose two.)

    57 On what type of OSPF router is interarea route summarization configured?

    58 What are two reasons for creating an OSPF network with multiple areas? (Choose two.)

  • to provide areas in the network for routers that are not running OSPF
  • to simplify configuration
  • to reduce SPF calculations
  • to reduce use of memory and processor resources
  • to ensure that an area is used to connect the network to the Internet
  • 59 A company deploys a Cisco wireless network over a large campus. A network administrator is configuring the Layer 3 roaming capability on WLCs. What is the purpose of using Layer 3 roaming?

    60 A high school is deploying a wireless network for the campus. The wireless network consists of 100 lightweight APs and 3 WLCs. These 3 WLCs manage APs in 3 areas: (1) classroom buildings, (2) the library, the dining hall, and an indoor gymnasium, and (3) administration buildings. Which term is used to describe the type of roaming that occurs when a student using a smartphone roams from a classroom to the library?

    1 Which parameter must match for all switches in the same MST region?

    2 Which feature is used by an MST region to send VLAN information to a switch that runs PVST+?

    3 What advantage does WPA2 have over WPA?

    4 Which WLAN security protocol avoids attacks by strengthening the key exchange between clients and APs using a method known as Simultaneous Authentication of Equals?

    5 Multiple paths exist in the BGP table. Assuming the weights are the same, what will the next determining factor be?

    6 A network administrator is configuring an ACL to match networks for BGP route filtering. The administrator creates an ACE permit ip 10.0.32.0 0.0.31.0 255.255.255.0 0.0.0.192. Which network matches the ACE?

    6 A network administrator is configuring an ACL to match networks for BGP route filtering. The administrator creates an ACE permit ip 10.0.32.0 0.0.31.0 255.255.255.0 0.0.0.192 . Which network matches the ACE?

    7 What are three examples of hypervisors? (Choose three.)

    8 Which Cisco technology is based on the ETSI NFV architectural framework for reducing operational complexity of enterprise branch environments?

    10 Refer to the exhibit. Which type of IPv6 static route is configured in the exhibit?The figure shows the following command: ipv6 route 2001:0DB8::/32 2001:0DB8:3000::1

    10 The figure shows the following command: ipv6 route 2001:0DB8::/32 2001:0DB8:3000::1 Refer to the exhibit. Which type of IPv6 static route is configured in the exhibit?

    11 A network engineer that works for a company that uses lightweight APs is examining various performance factors for the wireless network in a particular area of the company. The engineer notices that one AP has an index value of 40 for air quality. What significance, if any, does this value provide?

    12 A wireless network engineer who is new to the Cisco lightweight architecture is becoming familiar with common baselines for the APs in the company. One particular AP shows no clients attached, but shows 30% channel utilization on the 2.4 GHz channel and 0% channel utilization on the 5 GHz channel. What is the issue, if any?

    13 What are three characteristics of a VLAN access port? (Choose three.)

    14 What two additional features does a Layer 3 switch offer compared with a Layer 2 switch? (Choose two.)

    15 Network users complain that the network is running very slowly. Upon investigation, a network technician discovers CPU spikes and exhausted memory resources on all the network devices. Also, numerous syslog messages are being generated that note continuous MAC address relearning. What is the most likely cause of the problem?

    16 Refer to the exhibit. Spanning-tree port priorities are listed beneath each interface. The network administrator enters the spanning-tree vlan 1 root primary command on S4. What is the effect of the command?The exhibit shows 4 switches named S1, S2, S3, and S4. S1 Gi0/2 port is connected to S3 Gi0/1 port. S3 Gi0/2 port is connected to S4 Gi0/2 port. S4 Gi0/1 port is connected to S2 Gi0/2 port. S2 Gi0/1 port is connected to S1 Gi0/1 port. All switches have port priority 128. S1 has priority 24576 and MAC address 000A00333333. S2 has priority 32768 and MAC address 000A00222222. S3 has priority 32768 and MAC address 000A00111111. S4 has priority 36864 and MAC address 000A00111110.

    16 The exhibit shows 4 switches named S1, S2, S3, and S4. S1 Gi0/2 port is connected to S3 Gi0/1 port. S3 Gi0/2 port is connected to S4 Gi0/2 port. S4 Gi0/1 port is connected to S2 Gi0/2 port. S2 Gi0/1 port is connected to S1 Gi0/1 port. All switches have port priority 128. S1 has priority 24576 and MAC address 000A00333333. S2 has priority 32768 and MAC address 000A00222222. S3 has priority 32768 and MAC address 000A00111111. S4 has priority 36864 and MAC address 000A00111110. Refer to the exhibit. Spanning-tree port priorities are listed beneath each interface. The network administrator enters the spanning-tree vlan 1 root primary command on S4. What is the effect of the command?

    17 Refer to the exhibit. Assuming both routers have IPv6 routing enabled and router R1 is configured for OSPFv3 as shown, which set of configuration commands on R2 is required to allow an OSPFv3 adjacency to form between the two routers?The exhibit shows two routers, R1 and R2, connected over a serial link in network 2001:db8:cafe:1::/64. R1 connects to R2 with interface serial 0/0/0, which has an interface ID of ::1. The output of the command show ospfv3 interface s0/0/0 and the show ipv6 interface s0/0/0 is as follows: R1# show ospfv3 interface s0/0/0 Serial0/0/0 is up, line protocol is up Link Local Address FE80::1, Interface ID 6 Area 0, Process ID 1, Instance ID 0, Router ID 1.1.1.1 output omitted R1# show ipv6 interface s0/0/0 Serial0/0/0 is up, line protocol is up IPv6 is enabled, link-local address is FE80::1 No Virtual link-local address(es): Global unicast address(es): 2001:DB8:CAFE:1::1, subnet is 2001:DB8:CAFE:1::/64 output omitted

    17 The exhibit shows two routers, R1 and R2, connected over a serial link in network 2001:db8:cafe:1::/64. R1 connects to R2 with interface serial 0/0/0, which has an interface ID of ::1. The output of the commandshow ospfv3 interface s0/0/0and theshow ipv6 interface s0/0/0is as follows:R1#show ospfv3 interface s0/0/0Serial0/0/0 is up, line protocol is upLink Local Address FE80::1, Interface ID 6Area 0, Process ID 1, Instance ID 0, Router ID 1.1.1.1output omittedR1#show ipv6 interface s0/0/0Serial0/0/0 is up, line protocol is upIPv6 is enabled, link-local address is FE80::1No Virtual link-local address(es):Global unicast address(es):2001:DB8:CAFE:1::1, subnet is 2001:DB8:CAFE:1::/64output omitted Refer to the exhibit. Assuming both routers have IPv6 routing enabled and router R1 is configured for OSPFv3 as shown, which set of configuration commands on R2 is required to allow an OSPFv3 adjacency to form between the two routers?

    18 Refer to the exhibit. Both routers R1 and R2 are configured for OSPFv3 and are routing for both IPv4 and IPv6 address families. Which two destination addresses will R1 use to establish a full adjacency with R2? (Choose two.)The exhibit shows R1 and R2 connected by a serial link. Each has a LAN and a loopback interface. R1 addressing is as follows: Interface Lo0 has IPv6 link-local address fe80::1, IPv4 address 172.17.0.100/32, IPv6 address 2001:db8:21::100/128 LAN interface is on the IPv4 network 172.17.2.0/24 and IPv6 network 2001:db8:21:10::/64 Interface S0/1/0 has IPv6 link-local address fe80::1, IPv4 address 172.17.1.1/30, IPv6 address 2001:db8:21:20::1/64 R2 addressing is as follows: Interface Lo0has IPv6 link-local address fe80::2, IPv4 address 172.17.64.100/32, IPv6 address 2001:db8:22::100/128 LAN interface is on the IPv4 network 172.17.66.0/24 and IPv6 network 2001:db8:22:10::/64 Interface S0/1/0 has IPv6 link-local address fe80::2, IPv4 address 172.17.1.2/30, IPv6 address 2001:db8:21:20::2/64

    18 The exhibit shows R1 and R2 connected by a serial link. Each has a LAN and a loopback interface. R1 addressing is as follows: Interface Lo0 has IPv6 link-local address fe80::1, IPv4 address 172.17.0.100/32, IPv6 address 2001:db8:21::100/128 LAN interface is on the IPv4 network 172.17.2.0/24 and IPv6 network 2001:db8:21:10::/64 Interface S0/1/0 has IPv6 link-local address fe80::1, IPv4 address 172.17.1.1/30, IPv6 address 2001:db8:21:20::1/64 R2 addressing is as follows: Interface Lo0has IPv6 link-local address fe80::2, IPv4 address 172.17.64.100/32, IPv6 address 2001:db8:22::100/128 LAN interface is on the IPv4 network 172.17.66.0/24 and IPv6 network 2001:db8:22:10::/64 Interface S0/1/0 has IPv6 link-local address fe80::2, IPv4 address 172.17.1.2/30, IPv6 address 2001:db8:21:20::2/64 Refer to the exhibit. Both routers R1 and R2 are configured for OSPFv3 and are routing for both IPv4 and IPv6 address families. Which two destination addresses will R1 use to establish a full adjacency with R2? (Choose two.)

    19 A wireless engineer is deploying an autonomous Cisco access point. What must be configured on the access point to enable remote management?

    20 How will user traffic be forwarded between two laptops that are both connected to the same lightweight access point in a large enterprise topology?

    21 What is the reason for a network engineer to alter the default reference bandwidth parameter when configuring OSPF?

    22 What function is performed by the OSPF designated router?

    23 Which two statements are true about WRED? (Choose two.)

    24 Which QoS model uses the DSCP bits to mark packets and provides 64 possible classes of service?

    25 A company has decided to implement VXLANs. What are two types of VTEP interfaces that will be deployed? (Choose two.)

  • tunnel interface
  • IP interface
  • VNI
  • local LAN interface
  • PETR
  • 26 What are three features of a GRE tunnel? (Choose three.)

    27 Refer to the exhibit. On the basis of the information presented, which two IP SLA related statements are true? (Choose two.)The graphic shows the output result of the show ip sla configuration command on R1:R1# show ip sla configurationIP SLAs Infrastructure Engine-IIIEntry number: 99Owner:Tag:Operation timeout (milliseconds): 5000Type of operation to perform: icmp-echoTarget address/Source address: 192.168.2.1/0.0.0.0Type Of Service parameter: 0x0Request (ARR data portion): 28Verify data: NoVrf Name:Schedule: Operation frequency (seconds): 10 (not considered if randomly scheduled) Next Scheduled Start Time: Start Time already passed Group Scheduled : FALSE Randomly Scheduled : FALSE Life (seconds): Forever Entry Ageout (seconds): never Recurring (Starting Everyday): FALSE Status of entry (SNMP RowStatus): Active<output omitted>

    27 The graphic shows the output result of theshow ip slaconfiguration command on R1:R1#show ip sla configurationIP SLAs Infrastructure Engine-IIIEntry number: 99Owner:Tag:Operation timeout (milliseconds): 5000Type of operation to perform: icmp-echoTarget address/Source address: 192.168.2.1/0.0.0.0Type Of Service parameter: 0x0Request (ARR data portion): 28Verify data: NoVrf Name:Schedule: Operation frequency (seconds): 10 (not considered if randomly scheduled) Next Scheduled Start Time: Start Time already passed Group Scheduled : FALSE Randomly Scheduled : FALSE Life (seconds): Forever Entry Ageout (seconds): never Recurring (Starting Everyday): FALSE Status of entry (SNMP RowStatus): Active Refer to the exhibit. On the basis of the information presented, which two IP SLA related statements are true? (Choose two.)

    28 Which situation is a good case for a network technician to troubleshoot a problem using the ERSPAN tool?

    29 Which type of OSPF link-state advertisement advertises LSAs for routes that have been redistributed?

    30 What is the correct method to configure route summarization on an OSPF router?

    31 Refer to the exhibit. What can be concluded about network 192.168.4.0 in the R2 routing table?The graphic shows the partial output of the show ip route command:R2# show ip route<output omitted> 172.16.0.0/16 is variably subnetted, 2 subnets, 2 masksC 172.16.1.0/24 is directly connected, GigabitEthernet0/1L 172.16.1.1/32 is directly connected, GigabitEthernet0/1O IA 192.168.1.0/24 [110/2] via 192.168.2.1, 00:07:08, GigabitEthernet0/0 192.168.2.0/24 is variably subnetted, 2 subnets, 2 masksC 192.168.2.0/24 is directly connected, GigabitEthernet0/0L 192.168.2.2/32 is directly connected, GigabitEthernet0/0O 192.168.4.0/24 [110/2] via 172.16.1.2, 00:00:07, GigabitEthernet0/1 192.168.6.0/32 is subnetted, 1 subnetsO 192.168.6.1/32 [110/2] via 172.16.1.2, 00:00:07, GigabitEthernet0/1O*E2 0.0.0.0/0 [110/1] via 192.168.2.1, 00:04:53, GigabitEthernet0/0R2#

    31 The graphic shows the partial output of theshow ip routecommand:R2#show ip route 172.16.0.0/16 is variably subnetted, 2 subnets, 2 masksC 172.16.1.0/24 is directly connected, GigabitEthernet0/1L 172.16.1.1/32 is directly connected, GigabitEthernet0/1O IA 192.168.1.0/24 [110/2] via 192.168.2.1, 00:07:08, GigabitEthernet0/0 192.168.2.0/24 is variably subnetted, 2 subnets, 2 masksC 192.168.2.0/24 is directly connected, GigabitEthernet0/0L 192.168.2.2/32 is directly connected, GigabitEthernet0/0O 192.168.4.0/24 [110/2] via 172.16.1.2, 00:00:07, GigabitEthernet0/1 192.168.6.0/32 is subnetted, 1 subnetsO 192.168.6.1/32 [110/2] via 172.16.1.2, 00:00:07, GigabitEthernet0/1O*E2 0.0.0.0/0 [110/1] via 192.168.2.1, 00:04:53, GigabitEthernet0/0R2# Refer to the exhibit. What can be concluded about network 192.168.4.0 in the R2 routing table?

    32 Refer to the exhibit. Which trunk link will not forward any traffic after the root bridge election process is complete?Four switches labeled S1, S2, S3, and S4 are connected. S1 port Gi1/1 connects to S2 Gi1/1. S1 port Fa0/1 connects to S3 Fa0/1. S4 also connects to S2 and S3. S4 Fa0/1 connects to S2 Fa0/1. S4 Fa0/2 connects to S3 Fa0/2. The link between S1 and S2 is labeled as Trunk1. The link between S1 and S3 is labeled as Trunk2. The link between S2 and S4 is labeled as Trunk3. The link between S3 and S4 is labeled as Trunk4. There is a text box attached to each switch: S1 text box shows: Bridge ID: Priority: 32769 MAC: 000A00032222 S2 text box shows: Bridge ID: Priority: 32769 MAC: 000A00032321 S3 text box shows: Bridge ID: Priority: 32769 MAC: 000A00033333 S4 text box shows: Bridge ID: Priority: 32769 MAC: 000A00031212

    32 Four switches labeled S1, S2, S3, and S4 are connected. S1 port Gi1/1 connects to S2 Gi1/1. S1 port Fa0/1 connects to S3 Fa0/1. S4 also connects to S2 and S3. S4 Fa0/1 connects to S2 Fa0/1. S4 Fa0/2 connects to S3 Fa0/2. The link between S1 and S2 is labeled as Trunk1. The link between S1 and S3 is labeled as Trunk2. The link between S2 and S4 is labeled as Trunk3. The link between S3 and S4 is labeled as Trunk4. There is a text box attached to each switch: S1 text box shows: Bridge ID: Priority: 32769 MAC: 000A00032222 S2 text box shows: Bridge ID: Priority: 32769 MAC: 000A00032321 S3 text box shows: Bridge ID: Priority: 32769 MAC: 000A00033333 S4 text box shows: Bridge ID: Priority: 32769 MAC: 000A00031212 Refer to the exhibit. Which trunk link will not forward any traffic after the root bridge election process is complete?

    33 Refer to the exhibit. What are the possible port roles for ports A, B, C, and D in this RSTP-enabled network?The graphic shows the following information: Switch S1 (the root bridge) uses a port that is labeled B to connect to switch S3 on a port labeled D. S3 is connected to switch S2 on a port labeled A. S2 uses a port labeled C to connect to S1. S2 is connected also to three PC workstations labeled A, B, and C.

    33 The graphic shows the following information: Switch S1 (the root bridge) uses a port that is labeled B to connect to switch S3 on a port labeled D. S3 is connected to switch S2 on a port labeled A. S2 uses a port labeled C to connect to S1. S2 is connected also to three PC workstations labeled A, B, and C. Refer to the exhibit. What are the possible port roles for ports A, B, C, and D in this RSTP-enabled network?

    35 Which three protocols are components in the operation of 802.1x? (Choose three.)

    36 What is JSON?

    37 What are two differences between SNMP and NETCONF? (Choose two.)

    38 Drag and Drop

    38

    39 Which component of the Cisco SD-Access Architecture provides policy-based network segmentation and mobility for wired and wireless hosts?

  • network control platform
  • DNA Center
  • overlay network
  • underlay network
  • 40 Drag and Drop

    40

    Option 4: trunk. Press spacebar to enter matching mode.

    41 Which three options must match in order to establish an EtherChannel between two directly connected switches? (Choose three.)

    42 How does an RP MA announcement provide redundancy in a PIM domain configured with the auto-RP mechanism?

    43 Drag and Drop

    43

    Option 4: Gereral membership query, is matched with description 3: Type value 0x11 is used to leave a group message to the group of addresses the receiver requested to leave.. Press spacebar to enter matching mode.

    44 A network engineer examining the operation of EIGRP on a router notices that one particular route is in an active state. What can the engineer determine about this route?

    45 Refer to the exhibit. A network administrator issues the show ip protocols command. Based on the exhibited output, what can be concluded?The exhibit displays the following router command output:R1# show ip protocolsRouting Protocol is “eigrp 1 “<output omitted> EIGRP metric weight K1=1, K2=0, K3=1, K4=0, K5=0 EIGRP maximum hopcount 100 EIGRP maximum metric variance 1 Redistributing: eigrp 1 Automatic network summarization is not in effect Maximum path: 4 Routing for Networks: 192.168.1.0 10.0.0.0

    45 The exhibit displays the following router command output:R1#show ip protocolsRouting Protocol is &quot;eigrp 1 &quot; EIGRP metric weight K1=1, K2=0, K3=1, K4=0, K5=0 EIGRP maximum hopcount 100 EIGRP maximum metric variance 1 Redistributing: eigrp 1 Automatic network summarization is not in effect Maximum path: 4 Routing for Networks: 192.168.1.0 10.0.0.0 Refer to the exhibit. A network administrator issues the show ip protocols command. Based on the exhibited output, what can be concluded?

    46 Which three statements describe the characteristics of the Cisco hierarchical network design model? (Choose three.)

    47 Refer to the exhibit. A network administrator needs to implement inter-VLAN routing on a hierarchical network. On which devices should the inter-VLAN routing be configured?The exhibit shows a router named Gateway connected to a Layer 3 switch named CS1 (they both belong to the core layer). CS1 is connected to two Layer 3 switches, named DS1 and DS2, that belong to the distribution layer. DS1 is connected to two Layer 2 switches named AS1 and AS2. DS2 is also connected to AS1 and AS2. AS1 is connected to a desktop, and AS2 is connected to another desktop. AS1, AS2, and both desktops belong to the access layer.

    47 The exhibit shows a router named Gateway connected to a Layer 3 switch named CS1 (they both belong to the core layer). CS1 is connected to two Layer 3 switches, named DS1 and DS2, that belong to the distribution layer. DS1 is connected to two Layer 2 switches named AS1 and AS2. DS2 is also connected to AS1 and AS2. AS1 is connected to a desktop, and AS2 is connected to another desktop. AS1, AS2, and both desktops belong to the access layer. Refer to the exhibit. A network administrator needs to implement inter-VLAN routing on a hierarchical network. On which devices should the inter-VLAN routing be configured?

  • Gateway, CS1, DS1, and DS2
  • DS1 and DS2
  • Gateway and CS1
  • AS1 and AS2
  • 48 Which authentication protocol is server-based and preferred for device access control?

    49 Which service should be disabled on a router to prevent a malicious host from falsely responding to ARP requests with the intent to redirect the Ethernet frames?

    50 A network engineer has issued the command standby 10 track 1 decrement 20 on an SVI of a multilayer switch. What is the purpose of this command?

    50 A network engineer has issued the command standby 10 track 1 decrement 20 on an SVI of a multilayer switch. What is the purpose of this command?

    51 Refer to the exhibit. A corporate network is using NTP to synchronize the time across devices. What can be determined from the displayed output?The exhibit shows the CLI output: Router03# show ntp status Clock is synchronized, stratum 2, reference is 209.165.200.225 nominal freq is 250.0000 Hz, actual freq is 249.9995 Hz, precision is 2**19 ntp uptime is 589900 (1/100 of seconds), resolution is 4016 reference time is DA088DD3.C4E659D3 (13:21:23.769 PST Fri Nov 15 2019) clock offset is 7.0883 msec, root delay is 99.77 msec root dispersion is 13.43 msec, peer dispersion is 2.48 msec loopfilter state is ‘CTRL’ (Normal Controlled Loop), drift is 0.000001803 s/s system poll interval is 64, last update was 169 sec ago.

    51 The exhibit shows the CLI output:Router03# show ntp statusClock is synchronized, stratum 2, reference is 209.165.200.225nominal freq is 250.0000 Hz, actual freq is 249.9995 Hz, precision is 2**19ntp uptime is 589900 (1/100 of seconds), resolution is 4016reference time is DA088DD3.C4E659D3 (13:21:23.769 PST Fri Nov 15 2019)clock offset is 7.0883 msec, root delay is 99.77 msecroot dispersion is 13.43 msec, peer dispersion is 2.48 msecloopfilter state is 'CTRL' (Normal Controlled Loop), drift is 0.000001803 s/ssystem poll interval is 64, last update was 169 sec ago. Refer to the exhibit. A corporate network is using NTP to synchronize the time across devices. What can be determined from the displayed output?

    52 What is required by wireless clients that participate in Cisco centralized key management for intracontroller roaming?

  • IEEE 802.11r support
  • maintaining a list of keys used with prior AP associations
  • Cisco Compatible Extensions (CCX) support
  • caching a portion of the key of the authentication server
  • 53 A high school is deploying a wireless network for the campus. The wireless network consists of 100 lightweight APs and 3 WLCs. These 3 WLCs manage APs in 3 areas: (1) classroom buildings, (2) the library, the dining hall, and an indoor gymnasium, and (3) administration buildings. Which term is used to describe the type of roaming that occurs when a student using a smartphone roams from a classroom to the library?

    54 What protocol is used by puppet masters to push configuration code to puppet agents?

  • SSL
  • 55 Drag and Drop

    55

    56 Refer to the exhibit. Which routing protocol would likely be used to distribute routes between these routers?Router A connects to a cloud labeled AS 65001. Router A connects to router D. Router D connects to a cloud labeled AS 65004. Router D connects to router C. Router C connects to a cloud labeled AS 65003. Router C connects to router B. Router B connects to a cloud labeled AS 65002 and to router A.

    56 Router A connects to a cloud labeled AS 65001. Router A connects to router D. Router D connects to a cloud labeled AS 65004. Router D connects to router C. Router C connects to a cloud labeled AS 65003. Router C connects to router B. Router B connects to a cloud labeled AS 65002 and to router A. Refer to the exhibit. Which routing protocol would likely be used to distribute routes between these routers?

  • EIGRP
  • OSPF
  • RIP
  • BGP
  • 57 Refer to the exhibit. A network administrator issues the show bgp ipv4 unicast 172.16.0.0 command to check the route information in the BGP table. Which statement describes the characteristic of the advertisement of this route?The exhibit shows the output after the command show bgp ipv4 unicast 172.16.0.0 is issued: R3# show bgp ipv4 unicast 172.16.0.0 BGP routing table entry for 172.16.0.0/20, version 25 Paths: (1 available, best #1, table default) Not advertised to any peer Refresh Epoch 2 65200, (aggregated by 65200 192.168.2.2) 10.23.1.2 from 10.23.1.2 (192.168.2.2) Origin IGP, metric 0, localpref 100, valid, external, atomic-aggregate, best rx pathid: 0, tx pathid: 0x0

    57 The exhibit shows the output after the command show bgp ipv4 unicast 172.16.0.0 is issued:R3# show bgp ipv4 unicast 172.16.0.0BGP routing table entry for 172.16.0.0/20, version 25Paths: (1 available, best #1, table default) Not advertised to any peer Refresh Epoch 2 65200, (aggregated by 65200 192.168.2.2) 10.23.1.2 from 10.23.1.2 (192.168.2.2) Origin IGP, metric 0, localpref 100, valid, external, atomic-aggregate, best rx pathid: 0, tx pathid: 0x0 Refer to the exhibit. A network administrator issues the show bgp ipv4 unicast 172.16.0.0 command to check the route information in the BGP table. Which statement describes the characteristic of the advertisement of this route?

    58 Cisco has created a security framework to help protect networks from ever-evolving cybersecurity threats. What is the term given to a tool that searches for potential network intrusion attacks by monitoring, analysis, and logging of network traffic and also provides advanced threat protection and remediation?

    59 What happens to the signal strength of an RF signal due to wave spreading?

  • The signal strength of the RF signal will fall off equally near the transmitter and also farther away.
  • The signal strength of the RF signal will fall off quickly near the transmitter but more slowly farther away.
  • The signal strength of the RF signal will fall off slowly near the receiver and more quickly farther away.
  • The signal strength of the RF signal will fall off slowly near the transmitter but more quickly farther away.
  • 60 Which wireless technology can combine the use of multiple antennas and radio chains to receive multiple copies of degraded wireless signals and convert them into one usable reconstructed wireless signal?

    Leave a Reply