1. Which two QoS tools are used to guarantee minimum bandwidth to certain traffic? (Choose two)
A.
B.
C.
D.
E.

Question 1 of 51

2. Drag and drop the SNMP manager and agent identifier commands from the left onto the functions on the right.

show snmp group:
displays information about the SNMP recipient

Unselect

displays the SNMP access string

Unselect

displays the IP address of the remote SNMP device

Unselect

displays the SNMP security model in use

Unselect

displays the SNMP server serial number

Unselect

show snmp community:
displays information about the SNMP recipient

Unselect

displays the SNMP access string

Unselect

displays the IP address of the remote SNMP device

Unselect

displays the SNMP security model in use

Unselect

displays the SNMP server serial number

Unselect

show snmp chassis:
displays information about the SNMP recipient

Unselect

displays the SNMP access string

Unselect

displays the IP address of the remote SNMP device

Unselect

displays the SNMP security model in use

Unselect

displays the SNMP server serial number

Unselect

show snmp engineID:
displays information about the SNMP recipient

Unselect

displays the SNMP access string

Unselect

displays the IP address of the remote SNMP device

Unselect

displays the SNMP security model in use

Unselect

displays the SNMP server serial number

Unselect

show snmp host:
displays information about the SNMP recipient

Unselect

displays the SNMP access string

Unselect

displays the IP address of the remote SNMP device

Unselect

displays the SNMP security model in use

Unselect

displays the SNMP server serial number

Unselect

Question 2 of 51

3. Which type of security program is violated when a group of employees enters a building using the ID badge of only one person?
A.
B.
C.
D.

Question 3 of 51

4. A network administrator needs to aggregate 4 ports into a single logical link which must negotiate layer 2 connectivity to ports on
another switch. What must be configured when using active mode on both sides of the connection?
A.
B.
C.
D.

Question 4 of 51

5. In which situation is private IPv4 addressing appropriate for a new subnet on the network of an organization?
A.
B.
C.
D.

Question 5 of 51

6. Aside from discarding, which two states does the switch port transition through while using RSTP (802.1w)? (Choose two)
A.
B.
C.
D.
E.

Question 6 of 51

7. What is a role of wireless controllers in an enterprise network?
A.
B.
C.
D.

Question 7 of 51

8. How do servers connect to the network in a virtual environment?
A.
B.
C.
D.

Question 8 of 51

9. Which CRUD operation corresponds to the HTTP GET method?
A.
B.
C.
D.

Question 9 of 51

10. With REST API, which standard HTTP header tells a server which media type is expected by the client?
A.
B.
C.
D.

Question 10 of 51

11. Which device tracks the state of active connections in order to make a decision to forward a packet through?
A.
B.
C.
D.

Question 11 of 51

12. Which device controls the forwarding of authentication requests for users when connecting to the network using a lightweight access point?
A.
B.
C.
D.

Question 12 of 51

13. Refer to the exhibit. A network administrator has been tasked with securing VTY access to a router. Which access-list entry accomplishes this task?

A.
B.
C.
D.

Question 13 of 51

14. A network administrator must enable DHCP services between two sites. What must be configured for the router to pass DHCPDISCOVER messages on to the server?
A.
B.
C.
D.

Question 14 of 51

15. Refer to the exhibit. PC1 is trying to ping PC3 for the first time and sends out an ARP to S1. Which action is taken by S1?

A.
B.
C.
D.

Question 15 of 51

16. Refer to the exhibit. What is the result if Gig1/11 receives an STP BPDU?
switch(config)#interface gigabitEthernet 1/11
switch(config-if)#switchport mode access
switch(config-if)#spanning-tree portfast
switch(config-if)#spanning-tree bpduguard enable
A.
B.
C.
D.

Question 16 of 51

17. An engineer must configure traffic for a VLAN that is untagged by the switch as it crosses a trunk link. Which command should be used?
A.
B.
C.
D.

Question 17 of 51

18. What is the maximum bandwidth of a T1 point-to-point connection?
A.
B.
C.
D.

Question 18 of 51

19. How does a Cisco Unified Wireless network respond to Wi-Fi channel overlap?
A.
B.
C.
D.

Question 19 of 51

20. What does a switch use to build its MAC address table?
A.
B.
C.
D.

Question 20 of 51

21. Which network plane is centralized and manages routing decisions?
A.
B.
C.
D.

Question 21 of 51

22. What does a router do when configured with the default DNS lookup settings, and a URL is entered on the CLI?
A.
B.
C.
D.

Question 22 of 51

23. Refer to the exhibit.

 
Switch 1
VLAN 110 – 32778 0018.184e.3c00
Switch 2
VLAN 110 – 24586 001a.e3ff.a680
Switch 3
VLAN 110 – 28682 0022.55cf.cc00
Switch 4
VLAN 110 – 64000 0e38.7363.657f
Which switch becomes the root of the spanning tree for VLAN 110?
A.
B.
C.
D.

Question 23 of 51

24. Refer to the exhibit.

 

An administrator must configure interfaces Gi1/1 and Gi1/3 on switch SW11 PC-1 and PC-2 must be placed in the Data VLAN and Phone-1 must be placed in the Voice VLAN. Which configuration meets these requirements?
A.
B.
C.
D.

Question 24 of 51

25. Refer to exhibit.

 

Which configuration must be applied to the router that configures PAT to translate all addresses in VLAN 200 while allowing devices on VLAN 100 to use their own IP addresses?
A.
B.
C.
D.

Question 25 of 51

26. How does a switch process a frame received on Fa0/1 with the destination MAC address of 0e38.7363.657b when the table is missing the address?
A.
B.
C.
D.

Question 26 of 51

27. What is a benefit of VRRP?
A.
B.
C.
D.

Question 27 of 51

28. Which protocol does an IPv4 host use to obtain a dynamically assigned IP address?
A.
B.
C.
D.

Question 28 of 51

29. Refer to the exhibit.
A.
B.
C.
D.

Question 29 of 51

30. Which condition must be met before an NMS handles an SNMP trap from an agent?
A.
B.
C.
D.

Question 30 of 51

31. What is a characteristic of a SOHO network?
A.
B.
C.
D.

Question 31 of 51

32. Which resource is able to be shared among virtual machines deployed on the same physical server?
A.
B.
C.
D.

Question 32 of 51

33. Which implementation provides the strongest encryption combination for the wireless environment?
A.
B.
C.
D.

Question 33 of 51

34. Refer to the exhibit.

 

After running the code in the exhibit, which step reduces the amount of data that the NETCONF server returns to the NETCONF client, to only the interface’s configuration?
A.
B.
C.
D.

Question 34 of 51

35. What are two functions of an SDN controller? (Choose two)
A.
B.
C.
D.
E.

Question 35 of 51

36. If a switch port receives a new frame while it is actively transmitting a previous frame, how does it process the frames?
A.
B.
C.
D.

Question 36 of 51

37. Which WAN topology provides a combination of simplicity quality, and availability?
A.
B.
C.
D.

Question 37 of 51

38. Refer to the exhibit.

The ntp server 192.168.0.3 command has been configured on Router1 to make it an NTP client of router 2. Which command must be configured on Router2 so that it operates in server-only mode and relies only on its internal clock?
A.
B.
C.
D.

Question 38 of 51

39. Refer to the exhibit.

Switch A
Vlan 10,11,12,13
interface Gigabitethernet0/1
switchport mode trunk
switchport trunk allowed vlan 10-12
!
interface Gigabitethernet0/4
switchport access vlan 13
switchport mode access
Switch B
Vlan 10,11,12,13
interface Gigabitethernet0/1
switchport mode trunk
!
interface Gigabitethernet0/3
switchport access vlan 13
switchport mode access
A network engineer must configured communication between PC A and the File Server. To prevent interruption for any other  communications, which command must be configured?
A.
B.
C.
D.

Question 39 of 51

40. Why does a switch flood a frame to all ports?
A.
B.
C.
D.

Question 40 of 51

41. When DHCP is configured on a router, which command must be entered so the default gateway is automatically distributed?
A.
B.
C.
D.

Question 41 of 51

42. What is a network appliance that checks the state of a packet to determine whether the packet is legitimate?
A.
B.
C.
D.

Question 42 of 51

43. How is the native VLAN secured in a network?
A.
B.
C.
D.

Question 43 of 51

44. Which command on a port enters the forwarding state immediately when a PC is connected to it?
A.
B.
C.
D.

Question 44 of 51

45. What is the purpose of a southbound API in a control based networking architecture?
A.
B.
C.
D.

Question 45 of 51

46. Which switch technology establishes a network connection immediately when it is plugged in?
A.
B.
C.
D.

Question 46 of 51

47. What causes a port to be placed in the err-disabled state?
A.
B.
C.
D.

Question 47 of 51

48. Which technology is appropriate for communication between an SDN controller and applications running over the network?
A.
B.
C.
D.

Question 48 of 51

49. Which security program element involves installing badge readers on data-center doors to allow workers to enter and exit based on their job roles?
A.
B.
C.
D.

Question 49 of 51

50. What is a characteristic of private IPv4 addressing?
A.
B.
C.
D.

Question 50 of 51

51. Which network action occurs within the data plane?
A.
B.
C.
D.

Question 51 of 51