A new switch will be installed on an existing network in a distant workplace. The network administrator wants the switch to receive VLAN updates from the VTP domain but does not want the technicians at the distant office to be allowed to add new VLANs to the switch. To comply with these requirements, which two procedures must be followed to set up VTP on the new switch? (Select two)
Correct
Incorrect
Question 2 of 70
2. Question
1 point(s)
When an adjacency is formed between an OSPF router and a neighbor, the OSPF router sends the neighbor an OSPF DBD packet outlining the information in its link-state database. The router sends the packet during which OSPF neighbor state?
Correct
Incorrect
Question 3 of 70
3. Question
1 point(s)
Which IPv6 address do OSPFv3 DR and BDR use to send link-state updates?
Correct
Incorrect
Question 4 of 70
4. Question
1 point(s)
A network administrator sets the MST instance priority using the command spanning-tree mst 0 priority priority. What are the two possible numbers to use in the priority argument? (Select two)
Correct
Incorrect
Question 5 of 70
5. Question
1 point(s)
Using the following commands, a network administrator is configuring MST on switch SW1:
SW1(config)# spanning-tree mode mst
SW1(config)# spanning-tree mst 12 root primary
What happens as soon as the command is entered?
Correct
Incorrect
Question 6 of 70
6. Question
1 point(s)
Consider the display. In autonomous system 65100, a network administrator set up a dual-homed BGP link with an ISP. The administrator wants to ensure that router R1 is used for all ISP traffic entering the autonomous system. Which BGP attribute on routers R1 and R2 may the administrator set to achieve this?
Correct
Incorrect
Question 7 of 70
7. Question
1 point(s)
A technician sets a wireless router’s channel to 1, 6, or 11. What does changing the channel accomplish?
Correct
Incorrect
Question 8 of 70
8. Question
1 point(s)
Consider the display. The network administrator sets up both switches in the manner shown. Both host C and host E are unable to ping hosts D and F, respectively. What steps have to be taken by the administrator to allow this communication?
Correct
Incorrect
Question 9 of 70
9. Question
1 point(s)
What serves as the purpose of IGMP snooping?
Correct
Incorrect
Question 10 of 70
10. Question
1 point(s)
Which OSPF packet type, issued by an OSPF router as it establishes an adjacency with a neighboring OSPF router, contains a summary of the link state database?
Correct
Incorrect
Question 11 of 70
11. Question
1 point(s)
An administrator is doing pre-shared key configuration for a WLAN environment. During the four-way handshake between the client and the AP, the administrator wants to safeguard the WLAN against any man-in-the-middle assaults. Which WPA3-Personal technique will offer the highest level of security?
Correct
Incorrect
Question 12 of 70
12. Question
1 point(s)
Which OSPF network type employs a 10-second hello and 40-second dead interval timer and includes the DR/BDR information in OSPF Hello packets?
Correct
Incorrect
Question 13 of 70
13. Question
1 point(s)
What are the two benefits of utilizing multiple OSPF areas? (Select two)
Correct
Incorrect
Question 14 of 70
14. Question
1 point(s)
Which LSA type does an OSPF DR send to promote connected multi-access network segments?
Correct
Incorrect
Question 15 of 70
15. Question
1 point(s)
What are OSPF type 3 LSAs’ two distinguishing features? (Select two)
Correct
Incorrect
Question 16 of 70
16. Question
1 point(s)
A business is installing a wireless network utilizing portable APs. When wireless clients roam around the campus, what is the benefit of Layer 2 roaming over Layer 3 roaming?
Correct
Incorrect
Question 17 of 70
17. Question
1 point(s)
What is the troubleshooting process for ERSPAN?
Correct
Incorrect
Question 18 of 70
18. Question
1 point(s)
Consider the display. Which zone-member security command term, when used on the GigabitEthernet 0/2 interface, will finish the ZBFW configuration?
Correct
Incorrect
Question 19 of 70
19. Question
1 point(s)
What is the limitation of PACLs?
Correct
Incorrect
Question 20 of 70
20. Question
1 point(s)
The Cisco SAFE security concept of “Segmentation Service” includes which of the following?
Correct
Incorrect
Question 21 of 70
21. Question
1 point(s)
A company is establishing a network access security policy for endpoint devices to access the campus network. The IT department has set up multiple network access control methods, including 802.1x, WebAuth, and MAB. MAB and WebAuth are set up to fall back to 802.1x. What steps does an employee need to take to connect their laptop to a network switch?
Correct
Incorrect
Question 22 of 70
22. Question
1 point(s)
Consider the following diagram. All of the routers establish BGP connections. With the weight attribute set to 3000, autonomous system 300 sends route updates to RTC for network 209.165.200.224/27. Additionally, autonomous system 200 with a weight of 2000 teaches RTB about the network 209.165.200.224/27. Which router will RTA use to connect to this network in the following step?
Correct
Incorrect
Question 23 of 70
23. Question
1 point(s)
A corporation will make the Postman application available as a network device management solution. What are the top two security-related best practices to take into account? (Select two)
Correct
Incorrect
Question 24 of 70
24. Question
1 point(s)
What instrument can be used to determine the interference and strength of a wireless RF signal?
Correct
Incorrect
Question 25 of 70
25. Question
1 point(s)
What characters are used to hold objects in the JSON data format?
Correct
Incorrect
Question 26 of 70
26. Question
1 point(s)
What qualifies as the PIM dense mode’s characteristic?
Correct
Incorrect
Question 27 of 70
27. Question
1 point(s)
Which agentless automation solution uses playbooks to distribute configuration changes or gather data from hosts within a network?
Correct
Incorrect
Question 28 of 70
28. Question
1 point(s)
A network administrator configures the MST instance priority using the command spanning-tree mst 0 priority priority. What are the two possible numbers to use in the priority argument? (Select two)
Correct
Incorrect
Question 29 of 70
29. Question
1 point(s)
What prerequisites must be met to set up a trunking EtherChannel between two switches?
Correct
Incorrect
Question 30 of 70
30. Question
1 point(s)
Which three packet types do EIGRP neighbors exchange? (Select three)
Correct
Incorrect
Question 31 of 70
31. Question
1 point(s)
Consider the display. Which two sentences best describe what happens when you input these commands? (Select two)
Correct
Incorrect
Question 32 of 70
32. Question
1 point(s)
Consider the display. The overall number of packet flows does not match the network administrator’s expectations. Only half of the flows that are routinely recorded for the interface are shown in the results. There are successful pings between the router and the collector. What caused the surprising outcomes, and why?
Correct
Incorrect
Question 33 of 70
33. Question
1 point(s)
Consider the display. How will SPAN function on the switch based on the show monitor session 1 output?
Correct
Incorrect
Question 34 of 70
34. Question
1 point(s)
Which two statements best represent what should be considered while configuring NetFlow? (Select two)
Correct
Incorrect
Question 35 of 70
35. Question
1 point(s)
What are the three definitions of SPAN and RSPAN? (Select three)
Correct
Incorrect
Question 36 of 70
36. Question
1 point(s)
Consider the display. A network administrator is configuring BGP on router RT1. Which series of commands will enable RT1 and RT2 to become neighbors?
Correct
Incorrect
Question 37 of 70
37. Question
1 point(s)
A sizable mall intends to set up a wireless network for patrons. The AP topology used by the network will be minimal. The roaming of wireless clients is taken into account by network designers. Which of the following best depicts how Layer 2 and Layer 3 roaming differ?
Correct
Incorrect
Question 38 of 70
38. Question
1 point(s)
In a network context, which two types of probes can be set up to monitor traffic by IP SLA? (Select two)
Correct
Incorrect
Question 39 of 70
39. Question
1 point(s)
What role does the Diffie-Hellman algorithm play in the IPsec architecture?
Correct
Incorrect
Question 40 of 70
40. Question
1 point(s)
Consider the display. Which IP address would be set up on the destination router’s tunnel interface?
Correct
Incorrect
Question 41 of 70
41. Question
1 point(s)
What function does the generic routing encapsulation tunneling protocol serve?
Correct
Incorrect
Question 42 of 70
42. Question
1 point(s)
Which three IPsec services perform essential roles in the system? (Select three)
Correct
Incorrect
Question 43 of 70
43. Question
1 point(s)
Which three services does the syslog logging service offer? (Select three)
Correct
Incorrect
Question 44 of 70
44. Question
1 point(s)
What are the ZBFW default zone’s two operational characteristics? (Select two)
Correct
Incorrect
Question 45 of 70
45. Question
1 point(s)
Which password type is considered simple to crack and use the Cisco-owned Vigenere cypher encryption algorithm?
Correct
Incorrect
Question 46 of 70
46. Question
1 point(s)
Which threat protection feature does Cisco ESA offer?
Correct
Incorrect
Question 47 of 70
47. Question
1 point(s)
Which industry standard allows for the control of port-based network access?
Correct
Incorrect
Question 48 of 70
48. Question
1 point(s)
Consider the display. On R1, a network administrator sets up AAA authentication. Which password should the administrator use to log in successfully while testing the settings by telneting to R1, and no ACS servers can be contacted?
Correct
Incorrect
Question 49 of 70
49. Question
1 point(s)
What distinguishes using the login local command vs. local AAA authentication when configuring device access authentication?
Correct
Incorrect
Question 50 of 70
50. Question
1 point(s)
Consider the display. On the router, only the ACL statement is explicitly configured. Which two inferences about remote access network connections can be made in light of this information? (Select two.)
What are these access lists’ two distinguishing features? (Select two)
Correct
Incorrect
Question 52 of 70
52. Question
1 point(s)
Consider the display. An extended access list has been made to restrict people from accessing the accounting server. All additional network traffic must be allowed. Which router, interface, and direction should the access list be applied when using the ACL configuration guidelines?
Correct
Incorrect
Question 53 of 70
53. Question
1 point(s)
Consider the display. Which data representation format is employed for network automation applications?
Correct
Incorrect
Question 54 of 70
54. Question
1 point(s)
Which Python function produces output on the console?
Correct
Incorrect
Question 55 of 70
55. Question
1 point(s)
What two traits does the programming language Python have? (Select two)
Correct
Incorrect
Question 56 of 70
56. Question
1 point(s)
What is the file format used to store Python definitions and statements?
Correct
Incorrect
Question 57 of 70
57. Question
1 point(s)
Which characteristics do both Chef and Puppet share?
Correct
Incorrect
Question 58 of 70
58. Question
1 point(s)
Which automation tool matches the architecture components description “control station and remote hosts”?
Correct
Incorrect
Question 59 of 70
59. Question
1 point(s)
Which data format is anticipated by Cisco DNA Center for all incoming data from the REST API?
Correct
Incorrect
Question 60 of 70
60. Question
1 point(s)
Which three orchestration tools demand the management of agent software on client machines? (Select three)
Correct
Incorrect
Question 61 of 70
61. Question
1 point(s)
What three makeup puppet module components? (Select three)
Correct
Incorrect
Question 62 of 70
62. Question
1 point(s)
What distinguishes a type 1 hypervisor from a type 2 hypervisor in particular?
Correct
Incorrect
Question 63 of 70
63. Question
1 point(s)
After completing the fundamental BGP configuration, a network administrator performs the show bgp ipv4 unicast summary command to confirm the BGP session. What three facts are contained in the BGP session summary? (Select three)
Correct
Incorrect
Question 64 of 70
64. Question
1 point(s)
To enable a BPDU guard on a switch, a network administrator uses the spanning-tree portfast bpduguard default global configuration command. However, not all access ports have the BPDU guard turned on. What is the problem’s cause?
Correct
Incorrect
Question 65 of 70
65. Question
1 point(s)
Consider the display. To inspect the routes in the BGP table, a network administrator runs the show bgp ipv4 unicast | begin Network command. What does the sign function at a route’s end indicate?
Correct
Incorrect
Question 66 of 70
66. Question
1 point(s)
Which two OSPFv3 LSA types are used to inform neighbors about IPv6 prefixes? (Select two.)
Correct
Incorrect
Question 67 of 70
67. Question
1 point(s)
What operational plane does the vSmart component of the Cisco SD-WAN solution operate on?
Correct
Incorrect
Question 68 of 70
68. Question
1 point(s)
What issue is addressed by FHRP in order to reestablish network connectivity for endpoint hosts?
Correct
Incorrect
Question 69 of 70
69. Question
1 point(s)
What does NOT constitute a processor redundancy mode?
Correct
Incorrect
Question 70 of 70
70. Question
1 point(s)
What is the SD-Access fabric architecture’s data plane overlay?
Correct
Incorrect
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.