Which subnet summarizes and gives the most efficient distribution of IP addresses for the router configuration?
A corporate office uses four floors in a building.
✑ Floor 1 has 24 users.
✑ Floor 2 has 29 users.
✑ Floor 3 has 28 users.
Floor 4 has 22 users.
Which command must you enter to guarantee that an HSRP router with higher priority becomes the HSRP primary router after it is reloaded?
Refer to the exhibit. To which device does Router1 send packets that are destined to host 10.10.13.165?
Which two must be met before SSH can operate normally on a Cisco IOS switch? (Choose two)
What are two characteristics of a controller-based network? (Choose two)
What are two reasons that cause late collisions to increment on an Ethernet interface? (Choose two.)
Refer to the exhibit. Which prefix does Router1 use for traffic to Host A?
When a site-to-site VPN is used, which protocol is responsible for the transport of user data?
Which unified access point mode continues to serve wireless clients after losing connectivity to the Cisco Wireless LAN Controller?
Which two WAN architecture options help a business scalability and reliability for the network? (Choose two.)
What occurs to frames during the process of frame flooding?
Refer to the exhibit. An extended ACL has been configured and applied to router R2. The configuration started to work as intended. Which two changes stop outbound traffic on TCP ports 25 and 80 to 10.0.20.0/26 from the 10.0.10.0/26 subnet while still allowing all other traffic? (Choose two)
Which command automatically generates an IPv6 address from a specified IPv6 prefix and MAC address of an interface?
Refer to the exhibit. Which type of route does R1 use to reach host 10.10.13.10/32?
Refer to Exhibit. How does SW2 interact with other switches in this VTP domain?
Which function is performed by the collapsed core layer in a two-tier architecture?
An email user has been lured into clicking a link in an email sent by their company’s security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?
Which technique can you use to route IPv6 traffic over an IPv4 infrastructure?
When configuring IPv6 on an interface, which two IPv6 multicast groups are joined? (Choose two.)
A Cisco IP phone receive untagged data traffic from an attached PC. Which action is taken by the phone?
In which way does a spine-and-leaf architecture allow for scalability in a network when additional access ports are required?
What are two benefits that the UDP protocol provide for application traffic? (Choose two.)
What are two benefits of private IPv4 IP addresses? (Choose two.)
Refer to the exhibit. When PC1 sends a packet to PC2, the packet has which source and destination IP address when it arrives at interface Gi0/0 on router R2?
Which type of wireless encryption is used for WPA2 in pre-shared key mode?
What are two southbound APIs? (Choose two)
Which network allows devices to communicate without the need to access the Internet?
Refer to the exhibit. Which outcome is expected when PC_A sends data to PC_B after their initial communication?
Refer to the exhibit. Which path is used by the router for Internet traffic?
What is the primary effect of the spanning-tree portfast command?
Which set of action satisfy the requirement for multi-factor authentication?
Which command should you enter to view the error log in an EIGRP for IPv6 environment?
Which action must be taken to assign a global unicast IPv6 address on an interface that is derived from the MAC address of that interface?
What are two benefits of network automation? (Choose two)
Which two statements about exterior routing protocols are true? (Choose two.)
An engineer is asked to protect unused ports that are configured in the default VLAN on a switch. Which two steps will fulfill the request? (Choose two)
For what two purposes does the Ethernet protocol use physical addresses?
Refer to the exhibit. An engineer must add a subnet for a new office that will add 20 users to the network. Which IPv4 network and subnet mask combination does the engineer assign to minimize wasting addresses?
Which mode allows access points to be managed by Cisco Wireless LAN Controllers?
What are two differences between optical-fiber cabling and copper cabling? (Choose two.)
How do TCP and UDP differ in the way they provide reliability for delivery of packets?
Refer to the exhibit. After the configuration is applied, the two routers fail to establish an OSPF neighbor relationship. What is the reason for the problem?
Which design element is a best practice when deploying an 802.11b wireless infrastructure?
An office has 8 floors with approximately 30-40 users per floor. One subnet must be used. Which command must be configured on the router Switched Virtual Interface to use address space efficiently?
Which two outcomes are predictable behaviors for HSRP? (Choose two.)
You have configured a router with an OSPF router ID, but its IP address still reflects the physical interface. Which action can you take to correct the problem in the least disruptive way?
What is the primary different between AAA authentication and authorization?
Which type of address is the public IP address of a NAT device?
Which WAN access technology is preferred for a small office / home office architecture?
How do TCP and UDP differ in the way that they establish a connection between two endpoints?
Which two encoding methods are supported by REST APIs? (Choose two)
Which IPv6 address block sends packets to a group address rather than a single address?
What is the binary pattern of unique ipv6 unique local address?
Refer to the exhibit. What does router R1 use as its OSPF router-ID?
How does HSRP provide first hop redundancy?
Which two tasks must be performed to configure NTP to a trusted server in client mode on a single network device? (Choose two)
Refer to Exhibit. Which action do the switches take on the trunk link?
Several new coverage cells are required to improve the Wi-Fi network of an organization. Which two standard designs are recommended? (Choose two.)
Which function does the range of private IPv4 addresses perform?
What are two descriptions of three-tier network topologies? (Choose two.)
What is the expected outcome when an EUI-64 address is generated?
An engineer must configure a /30 subnet between two routes. Which usable IP address and subnet mask combination meets this criteria?
Which action is taken by switch port enabled for PoE power classification override?
How does a Cisco Unified Wireless Network respond to Wi-Fi channel overlap?
A network engineer must back up 20 network router configurations globally within a customer environment. Which protocol allows the engineer to perform this function using the Cisco IOS MIB?
Refer to the exhibit. What commands are needed to add a subinterface to Ethernet0/0 on R1 to allow for VLAN 20, with IP address 10.20.20.1/24?
Which two actions influence the EIGRP route selection process? (Choose two.)
Which command is used to specify the delay time in seconds for LLDP to initialize on any interface?
A customer has an application that is being identified as unknown-tcp for one of their custom PostgreSQL database connections. Which two configuration options can be used to correctly categorize their custom database application? (Choose two.)
What is the same for both copper and fiber interfaces when using SFP modules?
A user configured OSPF in a single area between two routers A serial interface connecting R1 and R2 is running encapsulation PPP. By default, which OSPF network type is seen on this interface when the user types show ip ospf interface on R1 or R2?
What is the default behavior of a Layer 2 switch when a frame with an unknown destination MAC address is received?
Refer to the exhibit. A network technician is asked to design a small network with redundancy. The exhibit represents this design, with all hosts configured in the same VLAN. What conclusions can be made about this design?
Which command automatically generates an IPv6 address from a specified IPvô prefix and MAC address of an interface?
What identifies the functionality of virtual machines?
Which three describe the reasons large OSPF networks use a hierarchical design? (Choose three.)
Why does a switch flood a frame to all ports?
A frame that enters a switch fails the Frame Check Sequence. Which two interface counters are incremented? (Choose two.)
Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4? (Choose two.)
You have two paths for the 10.10.10.0 network - one that has a feasible distance of 3072 and the other of 6144. What do you need to do to load balance your EIGRP routes?
Which two options are the best reasons to use an IPV4 private IP space? (Choose two.)
Which two values or settings must be entered when configuring a new WLAN in the Cisco Wireless LAN Controller GUI? (Choose two)
Refer to the exhibit. Which configuration when applied to switch A accomplishes this task? A network engineer must block access for all computers on VLAN 20 to the web server via HTTP. All other computers must be able to access the web server. Which configuration when applied to switch A accomplishes this task?
A device detects two stations transmitting frames at the same time. This condition occurs after the first 64 bytes of the frame is received. Which interface counter increments?
Refer to the exhibit. Which command provides this output?
Refer to the exhibit. How does router R1 handle traffic to 192.168.10.16?
How does CAPWAP communicate between an access point in local mode and a WLC?
A manager asks a network engineer to advise which cloud service models are used so employees do not have to waste their time installing, managing, and updating software that is only used occasionally. Which cloud service model does the engineer recommend?
Refer to the exhibit. Which statement explains the configuration error message that is received?
You are configuring your edge routers interface with a public IP address for Internet connectivity. The router needs to obtain the IP address from the service provider dynamically. Which command is needed on interface Fast Ethernet 0/0 to accomplish this?
What are two functions of a server on a network? (Choose two.)
Which IPv6 address type provides communication between subnets and cannot route on the Internet?
Which option about JSON is true?
Refer to the exhibit. What is the effect of this configuration?
Which component of an Ethernet frame is used to notify a host that traffic is coming?
Which feature on the Cisco Wireless LAN Controller when enabled restricts management access from specific networks?
Which 802.11 frame type is Association Response?
Which statement identifies the functionality of virtual machines?
Which mode must be used to configure EtherChannel between two switches without using a negotiation protocol?
R1 has learned route 10.10.10.0/24 via numerous routing protocols. Which route is installed?
Which two statements about the purpose of the OSI model are accurate? (Choose two.)
What makes Cisco DNA Center different from traditional network management applications and their management of networks?
Using direct sequence spread spectrum, which three 2.4-GHz channels are used to limit collisions?
Which QoS Profile is selected in the GUI when configuring a voice over WLAN deployment?
Refer to the exhibit. Shortly after SiteA was connected to SiteB over a new single-mode fiber path, users at SiteA report intermittent connectivity issues with applications hosted at SiteB. What is the cause of the intermittent connectivity issue?