Please enter your email:


VLANs 50 and 60 exist on the trunk links between all switches. All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server.

Which command ensures that SW3 receives frames only from VLAN 50?


2. Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?


3. When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?


4. What is the JSON syntax that is formed from the data?


5. Based on this interface configuration, what is the expected state of OSPF adjacency?


6. What are two common sources of interference for Wi-Fi networks? (Choose two.)



Which IP address becomes the active next hop for when fails?


8. In OSPF, which LSA type is responsible for pointing to the ASBR router?


9. Which QoS component alters a packet to change the way that traffic is treated in the


10. If a VRRP master router fails, which router is selected as the new master router?


11. Which JSON syntax is valid ?


12. Which statement explains why Type 1 hypervisor is considered more efficient than Type2 hypervisor?



Based on the configuration in this WLAN security setting, which method can a client use to authenticate to the network?


14. Which two mechanisms are available to secure NTP? (Choose two.)


15. Which two methods are used by an AP that is trying to discover a wireless LAN controller? (Choose two.)


16. Which protocol does REST API rely on to secure the communication channel?



Link1 is a copper connection and Link2 is a fiber connection. The fiber port must be the primary port for all forwarding. The output of the show spanning-tree command on SW2 shows that the fiber port is blocked by spanning tree. An engineer enters the spanning-tree port-priority 32 command on G0/1 on SW2, but the port remains blocked.

Which command should be entered on the ports that are connected to Link2 to resolve the issue?


18. R1# *Feb 14 37:09:53.129: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1, changed state to up What is the logging severity level?


19. Which PAgP mode combination prevents an EtherChannel from forming?



Assuming that R1 is a CE router, which VRF is assigned to Gi0/0 on R1?


21. A client with IP address must access a web server on port 80 at To allow this traffic, an engineer must add a statement to an access control list that is applied in the inbound direction on the port connecting to the web servers.

Which statement allows this traffic?


22. Which behavior can be expected when the HSRP version is changed from 1 to 2?


23. Which IP SLA operation requires the IP SLA responder to be configured on the remote end?


24. What is a benefit of data modeling languages like YANG?



An engineer must block all traffic from a router to its directly connected subnet The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router. However, the router can still ping hosts on the subnet.

Which explanation of this behavior is true?


Question 1 of 25