Please enter your email:

1. What is the JSON syntax that is formed from the data?

 
 
 
 

2. Which QoS component alters a packet to change the way that traffic is treated in the

 
 
 
 

3.

Link1 is a copper connection and Link2 is a fiber connection. The fiber port must be the primary port for all forwarding. The output of the show spanning-tree command on SW2 shows that the fiber port is blocked by spanning tree. An engineer enters the spanning-tree port-priority 32 command on G0/1 on SW2, but the port remains blocked.

Which command should be entered on the ports that are connected to Link2 to resolve the issue?

 
 
 
 

4.

Based on the configuration in this WLAN security setting, which method can a client use to authenticate to the network?

 
 
 
 

5. Which two mechanisms are available to secure NTP? (Choose two.)

 
 
 
 

6. When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?

 
 
 
 

7. In OSPF, which LSA type is responsible for pointing to the ASBR router?

 
 
 
 

8. Which two methods are used by an AP that is trying to discover a wireless LAN controller? (Choose two.)

 
 
 
 
 

9. Based on this interface configuration, what is the expected state of OSPF adjacency?

 
 
 
 

10. If a VRRP master router fails, which router is selected as the new master router?

 
 
 
 

11.

Which IP address becomes the active next hop for 192.168.102.0/24 when 192.168.101.2 fails?

 
 
 
 

12. Which IP SLA operation requires the IP SLA responder to be configured on the remote end?

 
 
 
 

13. R1# *Feb 14 37:09:53.129: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1, changed state to up What is the logging severity level?

 
 
 
 

14. Which protocol does REST API rely on to secure the communication channel?
A

 
 
 
 

15.

Assuming that R1 is a CE router, which VRF is assigned to Gi0/0 on R1?

 
 
 
 

16. Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?

 
 
 
 

17. A client with IP address 209.165.201.25 must access a web server on port 80 at 209.165.200.225. To allow this traffic, an engineer must add a statement to an access control list that is applied in the inbound direction on the port connecting to the web servers.

Which statement allows this traffic?

 
 
 
 

18. Which PAgP mode combination prevents an EtherChannel from forming?

 
 
 
 

19. Which JSON syntax is valid ?

 
 
 
 

20. Which behavior can be expected when the HSRP version is changed from 1 to 2?

 
 
 
 

21. What is a benefit of data modeling languages like YANG?

 
 
 
 

22.

VLANs 50 and 60 exist on the trunk links between all switches. All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server.

Which command ensures that SW3 receives frames only from VLAN 50?

 
 
 
 

23. What are two common sources of interference for Wi-Fi networks? (Choose two.)

 
 
 
 
 

24. Which statement explains why Type 1 hypervisor is considered more efficient than Type2 hypervisor?

 
 
 
 

25.

An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24. The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router. However, the router can still ping hosts on the 209.165.200.0/24 subnet.

Which explanation of this behavior is true?

 
 
 
 

Question 1 of 25