0%
1. Drag and drop the attack-mitigation techniques from the left onto the types of attack that they mitigate on the right.

 
802.1q double-tagging VLAN-hopping attack:
configure DHCP snooping

Unselect

disable DTP

Unselect

configure 802.1x authenticate

Unselect

configure the native VLAN with a nondefault VLAN ID

Unselect

MAC flooding attack:
configure DHCP snooping

Unselect

disable DTP

Unselect

configure 802.1x authenticate

Unselect

configure the native VLAN with a nondefault VLAN ID

Unselect

man-in-the-middle spoofing attack:
configure DHCP snooping

Unselect

disable DTP

Unselect

configure 802.1x authenticate

Unselect

configure the native VLAN with a nondefault VLAN ID

Unselect

switch-spoofing VLAN-hopping attack:
configure DHCP snooping

Unselect

disable DTP

Unselect

configure 802.1x authenticate

Unselect

configure the native VLAN with a nondefault VLAN ID

Unselect

2. Match the functions to the corresponding layers. (Not all options are used)
provides network access to the user
Access layer

Unselect

Distribution layer

Unselect

Core layer

Unselect

Access layer

Unselect

Distribution layer

Unselect

Core layer

Unselect

provides high-speed backbone connectivity
Access layer

Unselect

Distribution layer

Unselect

Core layer

Unselect

Access layer

Unselect

Distribution layer

Unselect

Core layer

Unselect

represents the network edge
Access layer

Unselect

Distribution layer

Unselect

Core layer

Unselect

Access layer

Unselect

Distribution layer

Unselect

Core layer

Unselect

functions as an aggregator for all the campus blocks
Access layer

Unselect

Distribution layer

Unselect

Core layer

Unselect

Access layer

Unselect

Distribution layer

Unselect

Core layer

Unselect

implements network access policy
Access layer

Unselect

Distribution layer

Unselect

Core layer

Unselect

Access layer

Unselect

Distribution layer

Unselect

Core layer

Unselect

establishes Layer 3 routing boundaries
Access layer

Unselect

Distribution layer

Unselect

Core layer

Unselect

Access layer

Unselect

Distribution layer

Unselect

Core layer

Unselect

3. Drag the descriptions of device management from the left onto the types of device management on the right.

monitors the cloud for software updates
Cisco DNA Center Device Management

Unselect

Traditional Device Management

Unselect

Cisco DNA Center Device Management

Unselect

Traditional Device Management

Unselect

Cisco DNA Center Device Management

Unselect

Traditional Device Management

Unselect

manages device configurations on a per-device basis
Cisco DNA Center Device Management

Unselect

Traditional Device Management

Unselect

Cisco DNA Center Device Management

Unselect

Traditional Device Management

Unselect

Cisco DNA Center Device Management

Unselect

Traditional Device Management

Unselect

implements changes via an SSH terminal
Cisco DNA Center Device Management

Unselect

Traditional Device Management

Unselect

Cisco DNA Center Device Management

Unselect

Traditional Device Management

Unselect

Cisco DNA Center Device Management

Unselect

Traditional Device Management

Unselect

uses CLI templates to apply a consistent configuration to multiple devices at an individual location
Cisco DNA Center Device Management

Unselect

Traditional Device Management

Unselect

Cisco DNA Center Device Management

Unselect

Traditional Device Management

Unselect

Cisco DNA Center Device Management

Unselect

Traditional Device Management

Unselect

security is managed near the perimeter of the network with firewalls, VPNs and IPS
Cisco DNA Center Device Management

Unselect

Traditional Device Management

Unselect

Cisco DNA Center Device Management

Unselect

Traditional Device Management

Unselect

Cisco DNA Center Device Management

Unselect

Traditional Device Management

Unselect

uses NetFlow to analyze potential security threats throughout the network and take appropriate action on that traffic
Cisco DNA Center Device Management

Unselect

Traditional Device Management

Unselect

Cisco DNA Center Device Management

Unselect

Traditional Device Management

Unselect

Cisco DNA Center Device Management

Unselect

Traditional Device Management

Unselect

4. Refer to the exhibit.

 

An engineer is tasked with verifying network configuration parameters on a client workstation to report back to the team lead. Drag and drop the node identifiers from the left onto the network parameters on the right.

broadcast address:
192.168.1.255

Unselect

192.168.1.1

Unselect

B8-76-3F-7C-57-DF

Unselect

192.168.1.20

Unselect

192.168.1.254

Unselect

default gateway:
192.168.1.255

Unselect

192.168.1.1

Unselect

B8-76-3F-7C-57-DF

Unselect

192.168.1.20

Unselect

192.168.1.254

Unselect

host IP address:
192.168.1.255

Unselect

192.168.1.1

Unselect

B8-76-3F-7C-57-DF

Unselect

192.168.1.20

Unselect

192.168.1.254

Unselect

MAC address:
192.168.1.255

Unselect

192.168.1.1

Unselect

B8-76-3F-7C-57-DF

Unselect

192.168.1.20

Unselect

192.168.1.254

Unselect

last assignable IP address in the subnet:
192.168.1.255

Unselect

192.168.1.1

Unselect

B8-76-3F-7C-57-DF

Unselect

192.168.1.20

Unselect

192.168.1.254

Unselect

5. Drag the IPv6 DNS record types from the left onto the description on the right.

correlates a host name with an IP address:
: PTR

Unselect

CNAME

Unselect

SOA

Unselect

AAAA

Unselect

NS

Unselect

associates the domain serial number with its owner:
: PTR

Unselect

CNAME

Unselect

SOA

Unselect

AAAA

Unselect

NS

Unselect

aliases one name to another:
: PTR

Unselect

CNAME

Unselect

SOA

Unselect

AAAA

Unselect

NS

Unselect

supports reverse name lookups
: PTR

Unselect

CNAME

Unselect

SOA

Unselect

AAAA

Unselect

NS

Unselect

correlates a domain with its authoritative name servers:
: PTR

Unselect

CNAME

Unselect

SOA

Unselect

AAAA

Unselect

NS

Unselect

6. Drag and drop the SNMP components from the left onto the descriptions on the right.

unsolicited message:
MIB

Unselect

SNMP trap

Unselect

SNMP agent

Unselect

SNMP manager

Unselect

responds to status requests and requests for information about a device:
MIB

Unselect

SNMP trap

Unselect

SNMP agent

Unselect

SNMP manager

Unselect

collection of variables that can be monitored:
MIB

Unselect

SNMP trap

Unselect

SNMP agent

Unselect

SNMP manager

Unselect

resides on an NMS:
MIB

Unselect

SNMP trap

Unselect

SNMP agent

Unselect

SNMP manager

Unselect

7. Refer to the exhibit.

 

An engineer is required to verify that the network parameters are valid for the users wireless LAN connectivity on a /24 subnet. Drag and drop the values from the left onto the network parameters on the right. Not all values are used.

 
host IP address:
192.168.1.0

Unselect

1A-76-3F-7C-57-DF

Unselect

192.168.1.255

Unselect

192.168.1.254

Unselect

192.168.1.1

Unselect

B8-76-3F-7C-57-DF

Unselect

192.168.1.20

Unselect

broadcast address:
192.168.1.0

Unselect

1A-76-3F-7C-57-DF

Unselect

192.168.1.255

Unselect

192.168.1.254

Unselect

192.168.1.1

Unselect

B8-76-3F-7C-57-DF

Unselect

192.168.1.20

Unselect

network address:
192.168.1.0

Unselect

1A-76-3F-7C-57-DF

Unselect

192.168.1.255

Unselect

192.168.1.254

Unselect

192.168.1.1

Unselect

B8-76-3F-7C-57-DF

Unselect

192.168.1.20

Unselect

default gateway:
192.168.1.0

Unselect

1A-76-3F-7C-57-DF

Unselect

192.168.1.255

Unselect

192.168.1.254

Unselect

192.168.1.1

Unselect

B8-76-3F-7C-57-DF

Unselect

192.168.1.20

Unselect

MAC address:
192.168.1.0

Unselect

1A-76-3F-7C-57-DF

Unselect

192.168.1.255

Unselect

192.168.1.254

Unselect

192.168.1.1

Unselect

B8-76-3F-7C-57-DF

Unselect

192.168.1.20

Unselect

last assignable IP address in the subnet:
192.168.1.0

Unselect

1A-76-3F-7C-57-DF

Unselect

192.168.1.255

Unselect

192.168.1.254

Unselect

192.168.1.1

Unselect

B8-76-3F-7C-57-DF

Unselect

192.168.1.20

Unselect

ليس ضمن الخيارات
192.168.1.0

Unselect

1A-76-3F-7C-57-DF

Unselect

192.168.1.255

Unselect

192.168.1.254

Unselect

192.168.1.1

Unselect

B8-76-3F-7C-57-DF

Unselect

192.168.1.20

Unselect

8. An engineer is tasked to configure a switch with port security to ensure devices that forward unicasts, multicasts, and broadcasts are unable to flood the port. The port must be configured to permit only two random MAC addresses at a time. Drag and drop the required configuration commands from the left onto the sequence on the right. (Not all commands are used)

 
switchport mode access
ليس ضمن الخيارات

Unselect

ليس ضمن الخيارات

Unselect

4

Unselect

1

Unselect

2

Unselect

3

Unselect

switchport port-security
ليس ضمن الخيارات

Unselect

ليس ضمن الخيارات

Unselect

4

Unselect

1

Unselect

2

Unselect

3

Unselect

switchport port-security mac-address 0060.3EDD.77ab
ليس ضمن الخيارات

Unselect

ليس ضمن الخيارات

Unselect

4

Unselect

1

Unselect

2

Unselect

3

Unselect

switchport port-security mac-address 00D0.D443.4546
ليس ضمن الخيارات

Unselect

ليس ضمن الخيارات

Unselect

4

Unselect

1

Unselect

2

Unselect

3

Unselect

switchport port-security mac-address sticky
ليس ضمن الخيارات

Unselect

ليس ضمن الخيارات

Unselect

4

Unselect

1

Unselect

2

Unselect

3

Unselect

switchport port-security maximum 2
ليس ضمن الخيارات

Unselect

ليس ضمن الخيارات

Unselect

4

Unselect

1

Unselect

2

Unselect

3

Unselect

9. Drag the characteristics of network architectures from the left onto the type of architecture on the right.

most appropriate for small network designs
Collapsed Core

Unselect

Collapsed Core

Unselect

Collapsed Core

Unselect

Three-Tier

Unselect

Three-Tier

Unselect

single device handles the core and the distribution layer
Collapsed Core

Unselect

Collapsed Core

Unselect

Collapsed Core

Unselect

Three-Tier

Unselect

Three-Tier

Unselect

separate devices handle the core and the distribution layer
Collapsed Core

Unselect

Collapsed Core

Unselect

Collapsed Core

Unselect

Three-Tier

Unselect

Three-Tier

Unselect

more cost-effective than other options
Collapsed Core

Unselect

Collapsed Core

Unselect

Collapsed Core

Unselect

Three-Tier

Unselect

Three-Tier

Unselect

enhances network availability
Collapsed Core

Unselect

Collapsed Core

Unselect

Collapsed Core

Unselect

Three-Tier

Unselect

Three-Tier

Unselect

10. Drag and drop the QoS congestion management terms from the left onto the description on the right.

services a specified number of bytes in one queue before continuing to the next queue:
PQ

Unselect

CQ

Unselect

WFQ

Unselect

CBWFQ

Unselect

FIFO

Unselect

provides guaranteed bandwidth to a specified class of traffic:
PQ

Unselect

CQ

Unselect

WFQ

Unselect

CBWFQ

Unselect

FIFO

Unselect

places packets into one of four priority-based queues:
PQ

Unselect

CQ

Unselect

WFQ

Unselect

CBWFQ

Unselect

FIFO

Unselect

provides minimum guaranteed bandwidth to one or more flows:
PQ

Unselect

CQ

Unselect

WFQ

Unselect

CBWFQ

Unselect

FIFO

Unselect

uses store-and-forward queuing:
PQ

Unselect

CQ

Unselect

WFQ

Unselect

CBWFQ

Unselect

FIFO

Unselect

11. Refer to the exhibit.

 

An engineer is configuring the router to provide static NAT for the webserver. Drag and drop the configuration commands from the left onto the letters that correspond to its position in the configuration on the right.

 
ip address 45.83.2.214 255.255.255.240
position B

Unselect

position D

Unselect

position C

Unselect

position A

Unselect

position F

Unselect

position E

Unselect

ip address 172.16.1.1 255.255.255.0
position B

Unselect

position D

Unselect

position C

Unselect

position A

Unselect

position F

Unselect

position E

Unselect

ip nat outside
position B

Unselect

position D

Unselect

position C

Unselect

position A

Unselect

position F

Unselect

position E

Unselect

ip nat inside
position B

Unselect

position D

Unselect

position C

Unselect

position A

Unselect

position F

Unselect

position E

Unselect

ip nat inside source static tcp 172.16.1.2 80 45.83.2.214 80 extendable
position B

Unselect

position D

Unselect

position C

Unselect

position A

Unselect

position F

Unselect

position E

Unselect

ip nat inside source list 1 interface s0 overload
position B

Unselect

position D

Unselect

position C

Unselect

position A

Unselect

position F

Unselect

position E

Unselect

12. Drag and drop the DHCP snooping terms from the left onto the descriptions on the right.

list of hosts on the network that are unknown to the administrative domain:
untrusted

Unselect

spurious DHCP server

Unselect

DHCP server

Unselect

trusted

Unselect

snooping binding database

Unselect

unknown DHCP server within an administrative domain:
untrusted

Unselect

spurious DHCP server

Unselect

DHCP server

Unselect

trusted

Unselect

snooping binding database

Unselect

network component that propagates IP addresses to hosts on the network:
untrusted

Unselect

spurious DHCP server

Unselect

DHCP server

Unselect

trusted

Unselect

snooping binding database

Unselect

default state of all interfaces:
untrusted

Unselect

spurious DHCP server

Unselect

DHCP server

Unselect

trusted

Unselect

snooping binding database

Unselect

internal device under the control of the network administrator:
untrusted

Unselect

spurious DHCP server

Unselect

DHCP server

Unselect

trusted

Unselect

snooping binding database

Unselect