361. How does the dynamically-learned MAC address feature function?
A. The CAM table is empty until ingress traffic arrives at each port
B. Switches dynamically learn MAC addresses of each connecting CAM table.
C. The ports are restricted and learn up to a maximum of 10 dynamically-learned addresses
D. It requires a minimum number of secure MAC addresses to be filled dynamically[br] [br] [br] [br]
When implementing a router as a DHCP server, which two features must be configured? (Choose
A. relay agent information
B. database agent
C. address pool
E. manual bindings[br] [br] [br] [br]
363. Which command must be entered to configure a DHCP relay?
A. ip helper-address
B. ip address dhcp
C. ip dhcp pool
D. ip dhcp relay[br] [br] [br] [br]
A. in the MAC address table
B. in the CAM table
C. in the binding database
D. in the frame forwarding database[br] [br] [br] [br]
Which type of security program is violated when a group of employees enters a building using the ID badge of only one person?
A. intrusion detection
B. user awareness
C. physical access control
D. network authorization[br] [br] [br] [br]
A network administrator needs to aggregate 4 ports into a single logical link which must negotiate layer 2 connectivity to ports on another switch What must be configured when using active mode on both sides of the connection?
A. 802.1q trunks
B. Cisco vPC
D. LACP[br] [br] [br] [br]
In which situation is private IPv4 addressing appropriate for a new subnet on the network of an organization?
A. There is limited unique address space, and traffic on the new subnet will stay local within the organization
B. The network has multiple endpoint listeners, and it is desired to limit the number of broadcasts
C. Traffic on the subnet must traverse a site-to-site VPN to an outside organization
D. The ISP requires the new subnet to be advertised to the internet for web services[br] [br] [br] [br]
Aside from discarding, which two states does the switch port transition through while using RSTP
(802.1w)? (Choose two)
E. speaking[br] [br] [br] [br]
369. Which state does the switch port move to when PortFast is enabled?
D. learning[br] [br] [br] [br]
Refer to the exhibit. An access list is created to deny Telnet access from host PC-1 to RTR-1 and allow access from all other hosts A Telnet attempt from PC-2 gives this message:”% Connection refused by remote host” Without allowing Telnet access from PC-1, which action must be taken to permit the traffic?
A. Add the access-list 10 permit any command to the configuration
B. Remove the access-class 10 in command from line vty 0.4
C. Add the ip access-group 10 out command to interface g0/0
D. Remove the password command from line vty 0 4[br] [br] [br] [br]
371. What is a role of wireless controllers in an enterprise network?
A. centralize the management of access points in an enterprise network
B. support standalone or controller-based architectures
C. serve as the first line of defense in an enterprise network
D. provide secure user logins to devices on the network[br] [br] [br] [br]
What is the effect when loopback interfaces and the configured router ID are absent during the OSPF Process configuration?
A. No router ID is set, and the OSPF protocol does not run
B. The highest up/up physical interface IP address is selected as the router ID
C. The lowest IP address is incremented by 1 and selected as the router ID
D. The router ID 0.0.0.0 is selected and placed in the OSPF process[br] [br] [br] [br]
What is recommended for the wireless infrastructure design of an organization?
B. configure the first three access points are configured to use Channels 1, 6, and 11
C. include a least two access points on nonoverlapping channels to support load balancing
D. assign physically adjacent access points to the same Wi-Fi channel[br] [br] [br] [br]
374. Which 802.11 frame type is indicated by a probe response after a client sends a probe request?
D. data[br] [br] [br] [br]
375. How do servers connect to the network in a virtual environment?
A. wireless to an access point that is physically connected to the network
B. a cable connected to a physical switch on the network
C. a virtual switch that links to an access point that is physically connected to the network
D. a software switch on a hypervisor that is physically connected to the network[br] [br] [br] [br]
376. Which CRUD operation corresponds to the HTTP GET method?
D. delete[br] [br] [br] [br]
With REST API, which standard HTTP header tells a server which media type is expected by the client?
A. Accept-Encoding: gzip. deflate
B. Accept-Patch: text/example; charset=utf-8
C. Content-Type: application/json; charset=utf-8
D. Accept: application/json[br] [br] [br] [br]
Which device tracks the state of active connections in order to make a decision to forward a packet through?
A. wireless access point
C. wireless LAN controller
D. router[br] [br] [br] [br]
A. It forwards it out G0/3 only
B. It is flooded out every port except G0/0
C. It drops the frame
D. It forwards it out interface G0/2 only[br] [br] [br] [br]
Refer to the exhibit. A network administrator has been tasked with securing VTY access to a router. Which access-list entry accomplishes this task?
A. access-list 101 permit tcp 10.1.10 0.0.0.255 172.16.10 0.0.0.255 eq ssh
B. access-list 101 permit tcp 10.11.0 0.0.0.255 172.16.10 0.0.0.255 eq scp
C. access-list 101 permit tcp 10.11.0 0.0.0.255 172.16.10 0.0.0.255 eq telnet
D. access-list 101 permit tcp 10.1.10 0.0.0.255 172.16.10 0.0.0.255 eq https[br] [br] [br] [br]
A network administrator must enable DHCP services between two sites. What must be configured for the router to pass DHCPDISCOVER messages on to the server?
A. a DHCP Relay Agent
B. DHCP Binding
C. a DHCP Pool
D. DHCP Snooping[br] [br] [br] [br]
A. TACACS server
B. wireless access point
C. RADIUS server
D. wireless LAN controller[br] [br] [br] [br]
383. Refer to the exhibit. What is the result if Gig1/11 receives an STP BPDU?
A. The port transitions to STP blocking
B. The port transitions to the root port
C. The port immediately transitions to STP forwarding.
D. The port goes into error-disable state[br] [br] [br] [br]
384. Which configuration is needed to generate an RSA key for SSH on a router?
A. Configure the version of SSH
B. Configure VTY access
C. Create a user with a password
D. Assign a DNS domain name[br] [br] [br] [br]
385. What is the maximum bandwidth of a T1 point-to-point connection?
A. 1.544 Mbps
B. 2.048 Mbps
C. 34.368 Mbps
D. 43.7 Mbps[br] [br] [br] [br]
An engineer must configure traffic for a VLAN that is untagged by the switch as it crosses a trunk link. Which command should be used?
A. switchport trunk allowed vlan 10
B. switchport trunk native vlan 10
C. switchport mode trunk
D. switchport trunk encapsulation dot1q[br] [br] [br] [br]
A. It alternates automatically between 2.4 GHz and 5 GHz on adjacent access points
B. It allows the administrator to assign channels on a per-device or per-interface basis
C. It segregates devices from different manufacturers onto different channels
D. It analyzes client load and background noise and dynamically assigns a channel[br] [br] [br] [br]
388. What does a switch use to build its MAC address table?
C. egress traffic
D. ingress traffic[br] [br] [br] [br]
389. Which network plane is centralized and manages routing decisions?
A. policy plane
B. management plane
C. control plane
D. data plane[br] [br] [br] [br]
What does a router do when configured with the default DNS lookup settings, and a URL is entered on the CLI?
A. initiates a ping request to the URL
B. prompts the user to specify the desired IP address
C. continuously attempts to resolve the URL until the command is cancelled
D. sends a broadcast message in an attempt to resolve the URL[br] [br] [br] [br]
391. What is a DNS lookup operation?
A. DNS server pings the destination to verify that it is available
B. serves requests over destination port 53
C. DNS server forwards the client to an alternate IP address when the primary IP is down
D. responds to a request for IP address to domain name resolution to the DNS server[br] [br] [br] [br]
Refer to the exhibit. A network engineer must configured communication between PC A and the File Server. To prevent interruption for any other communications, which command must be configured?
A. Switch trunk allowed vlan 12
B. Switchport trunk allowed vlan none
C. Switchport trunk allowed vlan add 13
D. Switchport trunk allowed vlan remove 10-11[br] [br] [br] [br]
393. What is a characteristic of a SOHO network?
A. connects each switch to every other switch in the network
B. enables multiple users to share a single broadband connection
C. provides high throughput access for 1000 or more users
D. includes at least three tiers of devices to provide load balancing and redundancy[br] [br] [br] [br]
394. Which resource is able to be shared among virtual machines deployed on the same physical server?
C. VM configuration file
D. operating system[br] [br] [br] [br]
Which implementation provides the strongest encryption combination for the wireless environment?
A. WPA2 + AES
B. WPA + AES
D. WPA + TKIP[br] [br] [br] [br]
A. Use the Ixml library to parse the data returned by the NETCONF server for the interface’s configuration
B. Create an XML filter as a string and pass it to get_config() method as an argument
C. Create a JSON filter as a string and pass it to the get_config() method as an argument
D. Use the JSON library to parse the data returned by the NETCONF server for the interface’s configuration[br] [br] [br] [br]
397. What is an appropriate use for private IPv4 addressing?
A. on the public-facing interface of a firewall
B. to allow hosts inside to communicate in both directions with hosts outside the organization
C. on internal hosts that stream data solely to external resources
D. on hosts that communicates only with other internal hosts[br] [br] [br] [br]
398. What are two functions of an SDN controller? (Choose two)
A. Layer 2 forwarding
B. coordinating VTNs
C. tracking hosts
D. managing the topology
E. protecting against DDoS attacks[br] [br] [br] [br]
If a switch port receives a new frame while it is actively transmitting a previous frame, how does it process the frames?
A. The new frame is delivered first, the previous frame is dropped, and a retransmission request is sent
B. The previous frame is delivered, the new frame is dropped, and a retransmission request is sent
C. The new frame is placed in a queue for transmission after the previous frame
D. The two frames are processed and delivered at the same time[br] [br] [br] [br]
Refer to the exhibit. The ntp server 192.168.0.3 command has been configured on router 1 to make it an NTP client of router 2. Which command must be configured on router 2 so that it operates in server-only mode and relies only on its internal clock?
A. Router2(config)#ntp passive
B. Router2(config)#ntp server 172.17.0.1
C. Router2(config)#ntp master 4
D. Router2(config)#ntp server 192.168.0.2[br] [br] [br] [br]
401. Which WAN topology provides a combination of simplicity quality, and availability?
A. partial mesh
B. full mesh
D. hub-and-spoke[br] [br] [br] [br]
402. Why does a switch flood a frame to all ports?
A. The frame has zero destination MAC addresses
B. The source MAC address of the frame is unknown
C. The source and destination MAC addresses of the frame are the same
D. The destination MAC address of the frame is unknown[br] [br] [br] [br]
When DHCP is configured on a router, which command must be entered so the default gateway is automatically distributed?
C. ip helper-address
D. dns-server[br] [br] [br] [br]
What is a network appliance that checks the state of a packet to determine whether the packet is legitimate?
A. Layer 2 switch
B. load balancer
D. LAN controller[br] [br] [br] [br]
405. How is the native VLAN secured in a network?
A. separate from other VLANs within the administrative domain
B. give it a value in the private VLAN range
C. assign it as VLAN 1
D. configure it as a different VLAN ID on each end of the link[br] [br] [br] [br]