0 of 70 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
You must sign in or sign up to start the quiz.
You must first complete the following:
Quiz complete. Results are being recorded.
0 of 70 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0 )
Earned Point(s): 0 of 0 , (0 )
0 Essay(s) Pending (Possible Point(s): 0 )
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
Current
Review
Answered
Correct
Incorrect
Question 1 of 70
1 point(s)
A new switch will be installed on an existing network in a distant workplace. The network administrator wants the switch to receive VLAN updates from the VTP domain but does not want the technicians at the distant office to be allowed to add new VLANs to the switch. To comply with these requirements, which two procedures must be followed to set up VTP on the new switch? (Select two)
Question 2 of 70
1 point(s)
When an adjacency is formed between an OSPF router and a neighbor, the OSPF router sends the neighbor an OSPF DBD packet outlining the information in its link-state database. The router sends the packet during which OSPF neighbor state?
Question 3 of 70
1 point(s)
Which IPv6 address do OSPFv3 DR and BDR use to send link-state updates?
Question 4 of 70
1 point(s)
A network administrator sets the MST instance priority using the command spanning-tree mst 0 priority priority. What are the two possible numbers to use in the priority argument? (Select two)
Question 5 of 70
1 point(s)
Using the following commands, a network administrator is configuring MST on switch SW1:
SW1(config)# spanning-tree mode mst
SW1(config)# spanning-tree mst 12 root primary
What happens as soon as the command is entered?
Question 6 of 70
1 point(s)
Consider the display. In autonomous system 65100, a network administrator set up a dual-homed BGP link with an ISP. The administrator wants to ensure that router R1 is used for all ISP traffic entering the autonomous system. Which BGP attribute on routers R1 and R2 may the administrator set to achieve this?
Question 7 of 70
1 point(s)
A technician sets a wireless router’s channel to 1, 6, or 11. What does changing the channel accomplish?
Question 8 of 70
1 point(s)
Consider the display. The network administrator sets up both switches in the manner shown. Both host C and host E are unable to ping hosts D and F, respectively. What steps have to be taken by the administrator to allow this communication?
Question 9 of 70
1 point(s)
What serves as the purpose of IGMP snooping?
Question 10 of 70
1 point(s)
Which OSPF packet type, issued by an OSPF router as it establishes an adjacency with a neighboring OSPF router, contains a summary of the link state database?
Question 11 of 70
1 point(s)
An administrator is doing pre-shared key configuration for a WLAN environment. During the four-way handshake between the client and the AP, the administrator wants to safeguard the WLAN against any man-in-the-middle assaults. Which WPA3-Personal technique will offer the highest level of security?
Question 12 of 70
1 point(s)
Which OSPF network type employs a 10-second hello and 40-second dead interval timer and includes the DR/BDR information in OSPF Hello packets?
Question 13 of 70
1 point(s)
What are the two benefits of utilizing multiple OSPF areas? (Select two)
Question 14 of 70
1 point(s)
Which LSA type does an OSPF DR send to promote connected multi-access network segments?
Question 15 of 70
1 point(s)
What are OSPF type 3 LSAs’ two distinguishing features? (Select two)
Question 16 of 70
1 point(s)
A business is installing a wireless network utilizing portable APs. When wireless clients roam around the campus, what is the benefit of Layer 2 roaming over Layer 3 roaming?
Question 17 of 70
1 point(s)
What is the troubleshooting process for ERSPAN?
Question 18 of 70
1 point(s)
Consider the display. Which zone-member security command term, when used on the GigabitEthernet 0/2 interface, will finish the ZBFW configuration?
Question 19 of 70
1 point(s)
What is the limitation of PACLs?
Question 20 of 70
1 point(s)
The Cisco SAFE security concept of “Segmentation Service” includes which of the following?
Question 21 of 70
1 point(s)
A company is establishing a network access security policy for endpoint devices to access the campus network. The IT department has set up multiple network access control methods, including 802.1x, WebAuth, and MAB. MAB and WebAuth are set up to fall back to 802.1x. What steps does an employee need to take to connect their laptop to a network switch?
Question 22 of 70
1 point(s)
Consider the following diagram. All of the routers establish BGP connections. With the weight attribute set to 3000, autonomous system 300 sends route updates to RTC for network 209.165.200.224/27. Additionally, autonomous system 200 with a weight of 2000 teaches RTB about the network 209.165.200.224/27. Which router will RTA use to connect to this network in the following step?
Question 23 of 70
1 point(s)
A corporation will make the Postman application available as a network device management solution. What are the top two security-related best practices to take into account? (Select two)
Question 24 of 70
1 point(s)
What instrument can be used to determine the interference and strength of a wireless RF signal?
Question 25 of 70
1 point(s)
What characters are used to hold objects in the JSON data format?
Question 26 of 70
1 point(s)
What qualifies as the PIM dense mode’s characteristic?
Question 27 of 70
1 point(s)
Which agentless automation solution uses playbooks to distribute configuration changes or gather data from hosts within a network?
Question 28 of 70
1 point(s)
A network administrator configures the MST instance priority using the command spanning-tree mst 0 priority priority. What are the two possible numbers to use in the priority argument? (Select two)
Question 29 of 70
1 point(s)
What prerequisites must be met to set up a trunking EtherChannel between two switches?
Question 30 of 70
1 point(s)
Which three packet types do EIGRP neighbors exchange? (Select three)
Question 31 of 70
1 point(s)
Consider the display. Which two sentences best describe what happens when you input these commands? (Select two)
Question 32 of 70
1 point(s)
Consider the display. The overall number of packet flows does not match the network administrator’s expectations. Only half of the flows that are routinely recorded for the interface are shown in the results. There are successful pings between the router and the collector. What caused the surprising outcomes, and why?
Question 33 of 70
1 point(s)
Consider the display. How will SPAN function on the switch based on the show monitor session 1 output?
Question 34 of 70
1 point(s)
Which two statements best represent what should be considered while configuring NetFlow? (Select two)
Question 35 of 70
1 point(s)
What are the three definitions of SPAN and RSPAN? (Select three)
Question 36 of 70
1 point(s)
Consider the display. A network administrator is configuring BGP on router RT1. Which series of commands will enable RT1 and RT2 to become neighbors?
Question 37 of 70
1 point(s)
A sizable mall intends to set up a wireless network for patrons. The AP topology used by the network will be minimal. The roaming of wireless clients is taken into account by network designers. Which of the following best depicts how Layer 2 and Layer 3 roaming differ?
Question 38 of 70
1 point(s)
In a network context, which two types of probes can be set up to monitor traffic by IP SLA? (Select two)
Question 39 of 70
1 point(s)
What role does the Diffie-Hellman algorithm play in the IPsec architecture?
Question 40 of 70
1 point(s)
Consider the display. Which IP address would be set up on the destination router’s tunnel interface?
Question 41 of 70
1 point(s)
What function does the generic routing encapsulation tunneling protocol serve?
Question 42 of 70
1 point(s)
Which three IPsec services perform essential roles in the system? (Select three)
Question 43 of 70
1 point(s)
Which three services does the syslog logging service offer? (Select three)
Question 44 of 70
1 point(s)
What are the ZBFW default zone’s two operational characteristics? (Select two)
Question 45 of 70
1 point(s)
Which password type is considered simple to crack and use the Cisco-owned Vigenere cypher encryption algorithm?
Question 46 of 70
1 point(s)
Which threat protection feature does Cisco ESA offer?
Question 47 of 70
1 point(s)
Which industry standard allows for the control of port-based network access?
Question 48 of 70
1 point(s)
Consider the display. On R1, a network administrator sets up AAA authentication. Which password should the administrator use to log in successfully while testing the settings by telneting to R1, and no ACS servers can be contacted?
Question 49 of 70
1 point(s)
What distinguishes using the login local command vs. local AAA authentication when configuring device access authentication?
Question 50 of 70
1 point(s)
Consider the display. On the router, only the ACL statement is explicitly configured. Which two inferences about remote access network connections can be made in light of this information? (Select two.)
R1 (config)# access-list 101 permit tcp 192.168.1.0 0.0.0.255
192.168.2.0. 0.0.0.255 eq 22 log
Question 51 of 70
1 point(s)
Take the configured access list into account.
What are these access lists’ two distinguishing features? (Select two)
Question 52 of 70
1 point(s)
Consider the display. An extended access list has been made to restrict people from accessing the accounting server. All additional network traffic must be allowed. Which router, interface, and direction should the access list be applied when using the ACL configuration guidelines?
router R1, interface S0/1/0, outbound
router R2, interface Gi0/0/1, outbound
router R2, interface Gi0/0/1, inbound
router R1, interface Gi0/0/0, inbound
router R2, interface S0/1/1, inbound
router R1, interface Gi0/0/0, outbound
Question 53 of 70
1 point(s)
Consider the display. Which data representation format is employed for network automation applications?
Question 54 of 70
1 point(s)
Which Python function produces output on the console?
Question 55 of 70
1 point(s)
What two traits does the programming language Python have? (Select two)
Question 56 of 70
1 point(s)
What is the file format used to store Python definitions and statements?
Question 57 of 70
1 point(s)
Which characteristics do both Chef and Puppet share?
Question 58 of 70
1 point(s)
Which automation tool matches the architecture components description “control station and remote hosts”?
Question 59 of 70
1 point(s)
Which data format is anticipated by Cisco DNA Center for all incoming data from the REST API?
Question 60 of 70
1 point(s)
Which three orchestration tools demand the management of agent software on client machines? (Select three)
Question 61 of 70
1 point(s)
What three makeup puppet module components? (Select three)
Question 62 of 70
1 point(s)
What distinguishes a type 1 hypervisor from a type 2 hypervisor in particular?
Question 63 of 70
1 point(s)
After completing the fundamental BGP configuration, a network administrator performs the show bgp ipv4 unicast summary command to confirm the BGP session. What three facts are contained in the BGP session summary? (Select three)
Question 64 of 70
1 point(s)
To enable a BPDU guard on a switch, a network administrator uses the spanning-tree portfast bpduguard default global configuration command. However, not all access ports have the BPDU guard turned on. What is the problem’s cause?
Question 65 of 70
1 point(s)
Consider the display. To inspect the routes in the BGP table, a network administrator runs the show bgp ipv4 unicast | begin Network command. What does the sign function at a route’s end indicate?
Question 66 of 70
1 point(s)
Which two OSPFv3 LSA types are used to inform neighbors about IPv6 prefixes? (Select two.)
Question 67 of 70
1 point(s)
What operational plane does the vSmart component of the Cisco SD-WAN solution operate on?
Question 68 of 70
1 point(s)
What issue is addressed by FHRP in order to reestablish network connectivity for endpoint hosts?
Question 69 of 70
1 point(s)
What does NOT constitute a processor redundancy mode?
Question 70 of 70
1 point(s)
What is the SD-Access fabric architecture’s data plane overlay?