A) TACACS
B) CPU ACL
C) Flex ACL
D) RADIUS
Correct Answer
verified
Multiple Choice
A) username authentication with MD5 or SHA encryption
B) MD5 or SHA authentication with DES encryption
C) username authentication with DES encryption
D) DES authentication with MD5 or SHA encryption
Correct Answer
verified
Multiple Choice
A) broadband cable access
B) frame-relay packet switching
C) dedicated point-to-point leased line
D) Integrated Services Digital Network switching
Correct Answer
verified
Multiple Choice
A) A network device has restarted.
B) A debug operation is running.
C) A routing instance has flapped.
D) An ARP inspection has failed.
Correct Answer
verified
Multiple Choice
A) WEP
B) AES
C) RC4
D) TKIP
Correct Answer
verified
Multiple Choice
A) ip address 192.168.0.0 255.255.0.0
B) ip address 192.168.0.0 255.255.254.0
C) ip address 192.168.0.0 255.255.255.128
D) ip address 192.168.0.0 255.255.255.224
Correct Answer
verified
Multiple Choice
A) acts as a central point for association and authentication servers
B) selects the best route between networks on a WAN
C) moves packets within a VLAN
D) moves packets between different VLANs
E) makes forwarding decisions based on the MAC address of a packet
Correct Answer
verified
Multiple Choice
A) The router encapsulates the original packet and then includes a tag that identifies the source router MAC address and transmits it transparently to the destination.
B) The router encapsulates the source and destination IP addresses with the sending router IP address as the source and the neighbor IP address as the destination.
C) The router replaces the original source and destination MAC addresses with the sending router MAC address as the source and neighbor MAC address as the destination.
D) The router replaces the source and destination labels with the sending router interface label as a source and the next hop router label as a destination.
Correct Answer
verified
Multiple Choice
A) static
B) EIGRP
C) eBGP
D) OSPF
Correct Answer
verified
Multiple Choice
A) nonbroadcast
B) point-to-point
C) point-to-multipoint
D) broadcast
Correct Answer
verified
Multiple Choice
A) switchport access vlan 67
B) switchport trunk allowed vlan 67
C) switchport private-vlan association host 67
D) switchport trunk native vlan 67
Correct Answer
verified
Multiple Choice
A) The area numbers on R1 and R2 are mismatched
B) The IPv6 network addresses on R1 and R2 are mismatched
C) The autonomous system numbers on R1 and R2 are mismatched
D) The router ids on R1 and R2 are mismatched
Correct Answer
verified
Multiple Choice
A) infrastructure-as-a-service
B) platform-as-a-service
C) business process as service to support different types of service
D) software-as-a-service
Correct Answer
verified
Multiple Choice
A) Only controller-based networks decouple the control plane and the data plane.
B) Traditional and controller-based networks abstract policies from device configurations.
C) Only traditional networks natively support centralized management.
D) Only traditional networks offer a centralized control plane.
Correct Answer
verified
Multiple Choice
A) The distribution layer runs Layer 2 and Layer 3 technologies
B) The network core is designed to maintain continuous connectivity when devices fail
C) The access layer manages routing between devices in different domains
D) The core layer maintains wired connections for each host
E) The core and distribution layers perform the same functions
Correct Answer
verified
Multiple Choice
A) It provides dynamic neighbor discovery.
B) It detects unreachable neighbors in 90 second intervals.
C) It maintains neighbor relationships.
D) It negotiates correctness parameters between neighboring interfaces.
E) It uses timers to elect the router with the fastest links as the designated router.
F) It broadcasts hello packets throughout the internetwork to discover all routers that are running OSPF.
Correct Answer
verified
Multiple Choice
A) The trunk does not form, and the ports go into an err-disabled status.
B) The trunk forms, but the mismatched native VLANs are merged into a single broadcast domain.
C) The trunk forms, but VLAN 99 and VLAN 999 are in a shutdown state.
D) The trunk does not form, but VLAN 99 and VLAN 999 are allowed to traverse the link.
Correct Answer
verified
Multiple Choice
A) allows configuration and monitoring of the network from one centralized point
B) provides an added layer of security to protect from DDoS attacks
C) combines control and data plane functionality on a single device to minimize latency
D) moves from a two-tier to a three-tier network architecture to provide maximum redundancy
Correct Answer
verified
Multiple Choice
A) These commands need to be added to the configuration: C-router(config) # router eigrp 123 C-router(config-router) # network 172.19.0.0
B) C-router(config) # router ospf 1 C-router(config-router) # network 172.19.0.0 0.0.3.255 area 0
C) C-router(config) # router rip
D) No further routing configuration is required.
Correct Answer
verified
Multiple Choice
A) It starts sending traffic without a specific matching entry in the routing table to GigabitEthernet0/1.
B) It immediately replaces the existing OSPF route in the routing table with the newly configured static route.
C) It starts load-balancing traffic between the two default routes.
D) It ignores the new static route until the existing OSPF default route is removed.
Correct Answer
verified
Showing 101 - 120 of 411
Related Exams