200-301: Cisco Certified Network Associate (CCNA) Part 18
Question #: 1041
Topic #: 1
What are two reasons to configure PortFast on a switch port attached to an end host? (Choose two.)
A. to block another switch or host from communicating through the port
B. to enable the port to enter the forwarding state immediately when the host boots up
C. to prevent the port from participating in Spanning Tree Protocol operations
D. to protect the operation of the port from topology change processes
E. to limit the number of MAC addresses learned on the port to 1
Selected Answer: BD
Question #: 1042
Topic #: 1
SIMULATION
–
Guidelines
–
This is a lab item in which tasks will be performed on virtual devices
• Refer to the Tasks tab to view the tasks for this lab item.
• Refer to the Topology tab to access the device console(s) and perform the tasks
• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window
• All necessary preconfigurations have been applied
• Do not change the enable password or hostname for any device
• Save your configurations to NVRAM before moving to the next item
• Click Next at the bottom of the screen to submit this lab and move to the next question
• When Next is clicked the lab closes and cannot be reopened
Topology
–
Tasks
–
Physical connectivity is implemented between the two Layer 2 switches, and the network connectivity between them must be configured.
1. Configure an LACP EtherChannel and number it as 44; configure it between switches SW1 and SW2 using interfaces Ethemet0/0 and Ethernet0/1 on both sides. The LACP mode must match on both ends.
2. Configure the EtherChannel as a trunk link.
3. Configure the trunk link with 802.1q tags.
4. Configure VLAN ‘MONITORING’ as the untagged VLAN of the EtherChannel.
Suggestion Answer:
Question #: 1043
Topic #: 1
A network administrator wants the syslog server to filter incoming messages into different files based on their importance. Which filtering criteria must be used?
A. message body
B. level
C. facility
D. process ID
Selected Answer: B
Question #: 1044
Topic #: 1
SIMULATION
–
Guidelines
–
This is a lab item in which tasks will be performed on virtual devices
• Refer to the Tasks tab to view the tasks for this lab item.
• Refer to the Topology tab to access the device console(s) and perform the tasks
• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window
• All necessary preconfigurations have been applied
• Do not change the enable password or hostname for any device
• Save your configurations to NVRAM before moving to the next item
• Click Next at the bottom of the screen to submit this lab and move to the next question
• When Next is clicked, the lab closes and cannot be reopened
Topology
–
Tasks
–
Connectivity between four routers has been established. IP connectivity must be configured in the order presented to complete the implementation. No dynamic routing protocols are included.
1. Configure static routing using host routes to establish connectivity from router R3 to the router R1 Loopback address using the source IP of 209.165.200.230.
2. Configure an IPv4 default route on router R2 destined for router R4.
3. Configure an IPv6 default router on router R2 destined for router R4.
Suggestion Answer:
Question #: 1045
Topic #: 1
Which interface or port on the WLC is the default for in-band device administration and communications between the controller and access points?
A. console port
B. management interface
C. virtual interface
D. service port
Selected Answer: B
Question #: 1046
Topic #: 1
Refer to the exhibit. A network administrator configures the CPE to provide internet access to the company headquarters. Traffic must be load-balanced via ISP1 and ISP2 to ensure redundancy.
Which two command sets must be configured on the CPE router? (Choose two.)
A. ip route 0.0.0.0 0.0.0.0 198.51.100.1 255
ip route 0.0.0.0 0.0.0.0 203.0.113.1 255
ip route 128.0.0.0 128.0.0.0 203.0.113.1
B. ip route 0.0.0.0 128.0.0.0 198.51.100.1
ip route 128.0.0.0 128.0.0.0 203.0.113.1
ip route 0.0.0.0 0.0.0.0 198.51.100.1
ip route 0.0.0.0 0.0.0.0 203.0.113.1
C. ip route 0.0.0.0 0.0.0.0 198.51.100.1
ip route 0.0.0.0 0.0.0.0 203.0.113.1
D. ip route 0.0.0.0 128.0.0.0 198.51.100.1
ip route 128.0.0.0 128.0.0.0 203.0.113.1
E. ip route 0.0.0.0 0.0.0.0 198.51.100.1
ip route 0.0.0.0 0.0.0.0 203.0.113.1 2
Selected Answer: C
Question #: 1047
Topic #: 1
Refer to the exhibit. A network engineer updates the existing configuration on interface fastethernet1/1 switch SW1. It must establish an EtherChannel by using the same group designation with another vendor switch. Which configuration must be performed to complete the process?
A. interface port-channel 2
channel-group 2 mode desirable
B. interface fastethernet 1/1
channel-group 2 mode on
C. interface fastethernet 1/1
channel-group 2 mode active
D. interface port-channel 2
channel-group 2 mode auto
Selected Answer: C
Question #: 1048
Topic #: 1
Which two characteristics are representative of virtual machines (VMs)? (Choose two.)
A. multiple VMs operate on the same underlying hardware
B. Each VMs operating system depends on its hypervisor
C. A VM on a hypervisor is automatically interconnected to other VMs
D. A VM on an individual hypervisor shares resources equally
E. Each VM runs independently of any other VM in the same hypervisor
Selected Answer: AE
Question #: 1049
Topic #: 1
What is the recommended switch load-balancing mode for Cisco WLCs?
A. source-destination IP address
B. destination IP address
C. destination MAC address
D. source-destination MAC address
Selected Answer: A
Question #: 1050
Topic #: 1
What must be considered when using 802.11a?
A. It is chosen over 802.11b when a lower-cost solution is necessary
B. It is susceptible to interference from 2.4 GHz devices such as microwave ovens
C. It is compatible with 802.11b- and 802 11g-compliant wireless devices
D. It is used in place of 802.11b/g when many nonoverlapping channels are required
Selected Answer: D
Question #: 1051
Topic #: 1
Refer to the exhibit. An engineer configures interface fa0/1 on SW1 and SW2 to pass traffic from two different VLANs. For security reasons, company policy requires the native VLAN to be set to a nondefault value. Which configuration meets this requirement?
A. Switch(config-if)#switchport mode trunk
Switch(config-if)#switchport trunk encapsulation dot1q
Switch(config-if)#switchport trunk allowed vlan 100,105
Switch(config-if)#switchport trunk native vlan 3
B. Switch(config-if)#switchport mode trunk
Switch(config-if)#switchport trunk encapsulation isl
Switch(config-if)#switchport trunk allowed vlan 100,105
Switch(config-if)#switchport trunk native vlan 1
C. Switch(config-if)#switchport mode dynamic
Switch(config-if)#switchport access vlan 100,105
Switch(config-if)#switchport trunk native vlan 1
D. Switch(config-if)#switchport mode access
Switch(config-if)#switchport trunk encapsulation dot1q
Switch(config-if)#switchport access vlan 100,105
Switch(config-if)#switchport trunk native vlan 3
Selected Answer: A
Question #: 1052
Topic #: 1
Refer to the exhibit A new VLAN and switch are added to the network. A remote engineer configures OldSwitch and must ensure that the configuration meets these requirements:
• accommodates current configured VLANs
• expands the range to include VLAN 20
• allows for IEEE standard support for virtual LANs
Which configuration on the NewSwitch side of the link meets these requirements?
A. switch port mode dynamic
channel group 1 mode active
switchport trunk allowed vlan 5,10,15, 20
B. no switchport mode trunk
switchport trunk encapsulation isl
switchport mode access vlan 20
C. switchport nonegotiate
no switchport trunk allowed vlan 5,10
switchport trunk allowed vlan 5,10,15,20
D. no switchport trunk encapsulation isl
switchport trunk encapsulation dot1q
switchport trunk allowed vlan add 20
Selected Answer: D
Question #: 1053
Topic #: 1
SIMULATION
–
Guidelines
–
This is a lab item in which tasks will be performed on virtual devices.
• Refer to the Tasks tab to view the tasks for this lab item.
• Refer to the Topology tab to access the device console(s) and perform the tasks.
• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.
• All necessary preconfigurations have been applied.
• Do not change the enable password or hostname for any device.
• Save your configurations to NVRAM before moving to the next item.
• Click Next at the bottom of the screen to submit this lab and move to the next question.
• When Next is clicked, the lab closes and cannot be reopened.
Topology
–
Tasks
–
Connectivity between three routers has been established, and IP services must be configured in the order presented to complete the implementation. Tasks assigned include configuration of NAT, NTP, DHCP, and SSH services.
1. All traffic sent from R3 to the R1 Loopback address must be configured for NAT on R2. All source addresses must be translated from R3 to the IP address of Ethernet0/0 on R2, while using only a standard access list named PUBNET. To verify, a ping must be successful to the R1 Loopback address sourced from R3. Do not use NVI NAT configuration.
2. Configure R1 as an NTP server and R2 as a client, not as a peer, using the IP address of the R1 Ethernet0/2 interface. Set the clock on the NTP server for midnight on May 1, 2018.
3. Configure R1 as a DHCP server for the network 10.1.3.0/24 in a pool named NETPOOL. Using a single command, exclude addresses 1 – 10 from the range. Interface Ethernet0/2 on R3 must be issued the IP address of 10.1.3.11 via DHCP.
4. Configure SSH connectivity from R1 to R3, while excluding access via other remote connection protocols. Access for user netadmin and password N3t4ccess must be set on router R3 using RSA and 1024 bits. Verify connectivity using an SSH session from router R1 using a destination address of 10.1.3.11. Do NOT modify console.
Suggestion Answer:
Question #: 1054
Topic #: 1
Refer to the exhibit. A network engineer is adding another physical interface as a new member to the existing Port-Channel1 bundle. Which command set must be configured on the new interface to complete the process?
A. no switchport
channel group 1 mode active
B. no switchport
channel-group 1 mode on
C. switchport mode trunk
channel-group 1 mode active
D. switchport
switchport mode trunk
Selected Answer: A
Question #: 1055
Topic #: 1
SIMULATION
–
Guidelines
–
This is a lab item in which tasks will be performed on virtual devices.
• Refer to the Tasks tab to view the tasks for this lab item.
• Refer to the Topology tab to access the device console(s) and perform the tasks.
• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.
• All necessary preconfigurations have been applied.
• Do not change the enable password or hostname for any device.
• Save your configurations to NVRAM before moving to the next item.
• Click Next at the bottom of the screen to submit this lab and move to the next question.
• When Next is clicked, the lab closes and cannot be reopened.
Topology
–
Tasks
–
All physical cabling between the two switches is installed. Configure the network connectivity between the switches using the designated VLANs and interfaces.
1. Configure VLAN 12 named Compute and VLAN 34 named Telephony where required for each task.
2. Configure Ethernet0/1 on SW2 to use the existing VLAN named Available.
3. Configure the connection between the switches using access ports.
4. Configure Ethernet0/1 on SW1 using data and voice VLANs.
5. Configure Ethernet0/1 on SW2 so that the Cisco proprietary neighbor discovery protocol is turned off for the designated interface only.
Suggestion Answer:
Question #: 1056
Topic #: 1
Refer to the exhibit. What is occurring on this switch?
A. Frames are dropped after 16 failed transmission attempts
B. The internal transmit buffer is overloaded
C. A high number of frames smaller than 64 bytes are received
D. An excessive number of frames greater than 1518 bytes are received
Selected Answer: A
Question #: 1057
Topic #: 1
Refer to the exhibit SW_1 and SW_12 represent two companies that are merging. They use separate network vendors. The VLANs on both sides have been migrated to share IP subnets. Which command sequence must be issued on both sides to join the two companies and pass all VLANs between the companies?
A. switchport mode trunk
switchport trunk encapsulation dot1q
B. switchport mode trunk
switchport trunk allowed vlan all
switchport dot1q ethertype 0800
C. switchport mode dynamic desirable
switchport trunk allowed vlan all
switchport trunk native vlan 7
D. switchport dynamic auto
switchport nonegotiate
Selected Answer: A
Question #: 1058
Topic #: 1
An engineer is configuring a switch port that is connected to a VoIP handset. Which command must the engineer configure to enable port security with a manually assigned MAC address of abcd.abcd.abcd on voice VLAN 4?
A. switchport port-security mac-address abcd.abcd.abcd vlan 4
B. switchport port-security mac-address abcd.abcd.abcd vlan voice
C. switchport port-security mac-address abcd.abcd.abcd
D. switchport port-security mac-address sticky abcd.abcd.abcd vlan 4
Selected Answer: B
Question #: 1059
Topic #: 1
SIMULATION
–
Guidelines
–
This is a lab item in which tasks will be performed on virtual devices
• Refer to the Tasks tab to view the tasks for this lab item.
• Refer to the Topology tab to access the device console(s) and perform the tasks.
• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.
• All necessary preconfigurations have been applied.
• Do not change the enable password or hostname for any device.
• Save your configurations to NVRAM before moving to the next item.
• Click Next at the bottom of the screen to submit this lab and move to the next question.
• When Next is clicked the lab closes and cannot be reopened.
Topology
–
Tasks
–
Configure IPv4 and IPv6 connectivity between two routers. For IPv4, use a /28 network from the 192.168.180.0/24 private range. For IPv6, use the first /64 subnet from the 2001:0db8:acca::/48 subnet.
1. Using Ethernet0/1 on routers R1 and R2, configure the next usable /28 from the 192.168.180.0/24 range. The network 192.168.180.0/28 is unavailable.
2. For the IPv4 /28 subnet, router R1 must be configured with the first usable host address.
3. For the IPv4 /28 subnet, router R2 must be configured with the last usable host address.
4. For the IPv6 /64 subnet, configure the routers with the IP addressing provided from the topology.
5. A ping must work between the routers on the IPv4 and IPv6 address ranges.
Suggestion Answer:
Question #: 1060
Topic #: 1
SIMULATION
–
Guidelines
–
This is a lab item in which tasks will be performed on virtual devices
• Refer to the Tasks tab to view the tasks for this lab item.
• Refer to the Topology tab to access the device console(s) and perform the tasks.
• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.
• All necessary preconfigurations have been applied.
• Do not change the enable password or hostname for any device.
• Save your configurations to NVRAM before moving to the next item.
• Click Next at the bottom of the screen to submit this lab and move to the next question.
• When Next is clicked the lab closes and cannot be reopened.
Topology
–
Tasks
–
Three switches must be configured for Layer 2 connectivity. The company requires only the designated VLANs to be configured on their respective switches and permitted across any links between switches for security purposes. Do not modify or delete VTP configurations.
The network needs two user-defined VLANs configured:
VLAN 202: MARKETING
–
VLAN 303: FINANCE
–
1. Configure the VLANs on the designated switches and assign them as access ports to the interfaces connected to the PCs.
2. Configure the e0/2 interfaces on Sw1 and Sw2 as 802.1q trunks with only the required VLANs permitted.
3. Configure the e0/3 interfaces on Sw2 and Sw3 as 802.1q trunks with only the required VLANs permitted.
Suggestion Answer:
Question #: 1061
Topic #: 1
SIMULATION
–
Guidelines
–
This is a lab item in which tasks will be performed on virtual devices
• Refer to the Tasks tab to view the tasks for this lab item.
• Refer to the Topology tab to access the device console(s) and perform the tasks.
• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.
• All necessary preconfigurations have been applied.
• Do not change the enable password or hostname for any device.
• Save your configurations to NVRAM before moving to the next item.
• Click Next at the bottom of the screen to submit this lab and move to the next question.
• When Next is clicked the lab closes and cannot be reopened.
Topology
–
Tasks
–
Refer to the topology. All physical cabling is in place. Configure a local user account, a Named ACL (NACL), and security.
Task 1
–
Configure a local account on Sw101 with telnet access only on virtual ports 0-4. Use the following information:
• Username: support
• Password: max2learn
• Privilege level: Exec mode
Task 2
–
Configure and apply a single NACL on Sw101 using the following:
• Name: ENT_ACL
• Restrict only PC2 on VLAN 200 from pinging PC1
• Allow only PC2 on VLAN 200 to telnet to Sw101
• Prevent all other devices from telnetting from VLAN 200
• Allow all other network traffic from VLAN 200
Task 3
–
Configure security on interface Ethernet 0/0 of Sw102:
• Set the maximum number of secure MAC addresses to four.
• Drop packets with unknown source addresses until the number of secure MAC addresses drops below the configured maximum value. No notification action is required.
• Allow secure MAC addresses to be learned dynamically.
Suggestion Answer:
Question #: 1062
Topic #: 1
SIMULATION
–
Guidelines
–
This is a lab item in which tasks will be performed on virtual devices:
• Refer to the Tasks tab to view the tasks for this lab item.
• Refer to the Topology tab to access the device console(s) and perform the tasks.
• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.
• All necessary preconfigurations have been applied.
• Do not change the enable password or hostname for any device.
• Save your configurations to NVRAM before moving to the next item.
• Click Next at the bottom of the screen to submit this lab and move to the next question.
• When Next is clicked the lab closes and cannot be reopened.
Topology
–
Tasks
–
Refer to the topology. All physical cabling is in place. Configure local users accounts, modify the Named ACL (NACL), and configure DHCP Snooping. The current contents of the NACL must remain intact.
Task 1
–
Configure a local account on Gw1 with telnet access only on virtual ports 0-4. Use the following information:
• Username: wheel
• Password: lock3path
• Algorithm type: Scrypt
• Privilege level: Exec mode
Task 2
–
Configure and apply a NACL on Gw1 to control network traffic from VLAN 10:
• Name: CORP_ACL
• Allow BOOTP and HTTPS
• Restrict all other traffic and log the ingress interface, source MAC address, the packet’s source and destination IP addresses, and ports
Task 3
–
Configure Sw1:
• Enable DNCP Snooping for VLAN 10
• Disable DHCP Option-82 data insertion
• Enable DHCP Snooping MAC address verification
• Enable trusted interfaces
Suggestion Answer:
Question #: 1063
Topic #: 1
What is represented by the word “LB20” within this JSON schema?
A. value
B. array
C. object
D. key
Selected Answer: A
Question #: 1064
Topic #: 1
What is represented beginning with line 1 and ending with line 5 within this JSON schema?
A. key
B. object
C. array
D. value
Selected Answer: C
Question #: 1065
Topic #: 1
What is represented by the word “IDS” within this JSON schema?
A. object
B. value
C. array
D. key
Selected Answer: D
Question #: 1066
Topic #: 1
What is represented in line 4 within this JSON schema?
A. object
B. array
C. key
D. value
Selected Answer: A
Question #: 1067
Topic #: 1
What is represented by the word “port” within this JSON schema?
A. key
B. value
C. array
D. object
Selected Answer: B
Question #: 1068
Topic #: 1
What provides connection redundancy, increased bandwidth, and load sharing between a wireless LAN controller and a Layer 2 switch?
A. first hop redundancy
B. VLAN trunking
C. tunneling
D. link aggregation
Selected Answer: D
Question #: 1069
Topic #: 1
DRAG DROP
–
Drag and drop the IPv6 address from the left onto the type on the right.
Suggestion Answer:
Question #: 1070
Topic #: 1
Which interface is used to send traffic to the destination network?
A. F0/5
B. F0/6
C. F0/12
D. F0/9
Selected Answer: C
Question #: 1071
Topic #: 1
What is the purpose of an SSID?
A. It identifies an individual access point on a WLAN.
B. It differentiates traffic entering access points.
C. It provides network security.
D. It identifies a WLAN.
Selected Answer: D
Question #: 1072
Topic #: 1
Which two types of attack are categorized as social engineering? (Choose two.)
A. phoning
B. malvertising
C. probing
D. pharming
E. phishing
Selected Answer: AE
Question #: 1073
Topic #: 1
SIMULATION
–
Guidelines
–
This is a lab item in which tasks will be performed on virtual devices
• Refer to the Tasks tab to view the tasks for this lab item.
• Refer to the Topology tab to access the device console(s) and perform the tasks.
• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.
• All necessary preconfigurations have been applied.
• Do not change the enable password or hostname for any device.
• Save your configurations to NVRAM before moving to the next item.
• Click Next at the bottom of the screen to submit this lab and move to the next question.
• When Next is clicked the lab closes and cannot be reopened.
Topology
–
Tasks
–
IP connectivity and OSPF are preconfigured on all devices where necessary. Do not make any changes to the IP addressing or OSPF. The company policy uses connected interfaces and next hops when configuring static routes except for load balancing or redundancy without floating static. Connectivity must be established between subnet 172.20.20.128/25 on the Internet and the LAN at 192.168.0.0/24 connected to SW1:
1. Configure reachability to the switch SW1 LAN subnet in router R2.
2. Configure default reachability to the Internet subnet in router R1.
3. Configure a single static route in router R2 to reach to the Internet subnet considering both redundant links between routers R1 and R2. A default route is NOT allowed in router R2.
4. Configure a static route in router R1 toward the switch SW1 LAN subnet where the primary link must be through Ethernet0/1, and the backup link must be through Ethernet0/2 using a floating route. Use the minimal administrative distance value when required.
Suggestion Answer:
Question #: 1074
Topic #: 1
What describes the functionality of southbound APIs?
A. They enable communication between the controller and the network device.
B. They communicate with the management plane.
C. They use HTTP messages to communicate.
D. They convey information from the controller to the SDN applications.
Selected Answer: A
Question #: 1075
Topic #: 1
Refer to the exhibit. A network engineer is verifying the settings on a new OSPF network. All OSPF configurations use the default values unless otherwise indicated. Which router does the engineer expect will be elected as the DR when all devices boot up simultaneously?
A. R1
B. R2
C. R3
D. R4
Selected Answer: D
Question #: 1076
Topic #: 1
Which command must be entered so that the default gateway is automatically distributed when DHCP is configured on a router?
A. dns-server
B. default-router
C. ip helper-address
D. default-gateway
Selected Answer: B
Question #: 1077
Topic #: 1
What are two functions of a firewall within an enterprise? (Choose two.)
A. It enables traffic filtering based on URLs.
B. It serves as an endpoint for a site-to-site VPN in standalone mode.
C. It provides support as an endpoint for a remote access VPN in multiple context mode.
D. It offers Layer 2 services between hosts.
E. It enables wireless devices to connect to the network.
Selected Answer: AB
Question #: 1078
Topic #: 1
What is the maximum number of concurrent Telnet sessions that a Cisco WLC supports?
A. 3
B. 5
C. 6
D. 15
Selected Answer: B
Question #: 1079
Topic #: 1
Which 802.11 management frame type is sent when a client roams between access points on the same SSID?
A. Reassociation Request
B. Authentication Request
C. Association Request
D. Probe Request
Selected Answer: A
Question #: 1080
Topic #: 1
What is a functionality of the control plane in the network?
A. It looks up an egress interface in the forwarding information base.
B. It forwards traffic to the next hop.
C. It exchanges topology information with other routers.
D. It provides CLI access to the network device.
Selected Answer: C
Question #: 1081
Topic #: 1
Refer to the exhibit. All switches are configured with the default STP priorities. During the STP elections, which switch becomes the root bridge if all interfaces are in the same VLAN?
A. MDF-DC-1: 0d:E0:43:96:02:30
B. MDF-DC-2: 0d:0E:18:1B:05:97
C. MDF-DC-4: 0d:E0:19:A1:B3:19
D. MDF-DC-3: 0d:0E:18:2A:3C:9D
Selected Answer: B
Question #: 1082
Topic #: 1
DRAG DROP
–
Drag and drop the characteristic from the left onto the cable type on the right.
Suggestion Answer:
Question #: 1083
Topic #: 1
What is represented by the word “VPN11” within this JSON schema?
A. key
B. array
C. object
D. value
Selected Answer: D
Question #: 1084
Topic #: 1
Which port type supports the spanning-tree portfast command without additional configuration?
A. Layer 3 main interfaces
B. Layer 3 subinterfaces
C. trunk ports
D. access ports
Selected Answer: D
Question #: 1085
Topic #: 1
What is represented by the word “R29” within this JSON schema?
A. array
B. key
C. object
D. value
Selected Answer: D
Question #: 1086
Topic #: 1
What is represented in line 2 within this JSON schema?
A. object
B. value
C. key
D. array
Selected Answer: A
Question #: 1087
Topic #: 1
DRAG DROP
–
Drag and drop the characteristic from the left onto the cable type on the right.
Suggestion Answer:
Question #: 1088
Topic #: 1
DRAG DROP
–
Drag and drop the characteristic from the left onto the cable type on the right.
Suggestion Answer:
Question #: 1089
Topic #: 1
DRAG DROP
–
Drag and drop the characteristic from the left onto the cable type on the right.
Suggestion Answer:
Question #: 1090
Topic #: 1
DRAG DROP
–
Drag and drop the characteristic from the left onto the cable type on the right.
Suggestion Answer:
Question #: 1091
Topic #: 1
DRAG DROP
–
Drag and drop the IPv6 address from the left onto the type on the right.
Suggestion Answer:
Question #: 1092
Topic #: 1
DRAG DROP
–
Drag and drop the characteristic from the left onto the cable type on the right.
Suggestion Answer:
Question #: 1093
Topic #: 1
DRAG DROP
–
Drag and drop the IPv6 address from the left onto the type on the right.
Suggestion Answer:
Question #: 1094
Topic #: 1
DRAG DROP
–
Drag and drop the characteristic from the left onto the cable type on the right.
Suggestion Answer:
Question #: 1095
Topic #: 1
What is a characteristic of private IPv4 addressing?
A. is used without allocation from a regional internet authority
B. is used when traffic on the subnet must traverse a site-to-site VPN to an outside organization
C. reduces the forwarding table on network routers
D. provides unlimited address ranges
Selected Answer: A
Question #: 1096
Topic #: 1
Which interface condition is occurring in this output?
A. bad NIC
B. high throughput
C. queueing
D. broadcast storm
Selected Answer: C
Question #: 1097
Topic #: 1
What is a characteristic of private IPv4 addressing?
A. is used when the ISP requires the new subnet to be advertised to the internet for web services
B. provides unlimited address ranges
C. is used when the network has multiple endpoint listeners
D. alleviates the shortage of IPv4 addresses
Selected Answer: D
Question #: 1098
Topic #: 1
What is a characteristic of private IPv4 addressing?
A. is used when traffic on the subnet must traverse a site-to-site VPN to an outside organization
B. allows endpoints to communicate across public network boundaries
C. is used on hosts that communicate only with other internal hosts
D. reduces network complexity
Selected Answer: C
Question #: 1099
Topic #: 1
What is a characteristic of private IPv4 addressing?
A. traverses the internet when an outbound ACL is applied
B. alleviates the shortage of IPv4 addresses
C. is used when the ISP requires the new subnet to be advertised to the internet for web services
D. enables secure connectivity over the internet
Selected Answer: B
Question #: 1100
Topic #: 1
Which interface condition is occurring in this output?
A. broadcast storm
B. duplex mismatch
C. high throughput
D. queueing
Selected Answer: C