web analytics

Which configuration command can you use to implement the requirements?

You are configuring CoS-to-DSCP mappings with three requirements: – AF13 must be marked with COS 1. – AF22 must be marked with COS 2. – EF must be marked with

Which three statements about voice VLANs are true?

Which three statements about voice VLANs are true? (Choose tliree ) A. Incoming OoS values are trusted only for untagged traffic B. When voice VLAMs are enabled. RortFast is configured

Which CoPP feature can you configure after applying the control-plane command?

Which CoPP feature can you configure after applying the control-plane command? A. line card interfaces B. address filters C. aggregates D. drop policies Answer: C

Which component does an IS-IS router construct its link-state database?

From which component does an IS-IS router construct its link-state database? A. SPTs B. LSPs C. hello packets D. LSAs Answer: B

What are two mechanisms that directed ARP uses to help resolve IP addresses to hardware addresses?

What are two mechanisms that directed ARP uses to help resolve IP addresses to hardware addresses? (Choose two) A. It removes address-resolution restrictions, allowing dynamic protocols to advertise routing information

Which two statements about IGMP filter that are operating in access mode are ture?

Which two statements about IGMP filter that are operating in access mode are ture? (Choose two) A. They can be applied on the access port only B. A filter that

Which enhancement to a spanning-tree design prevents unnecessary traffic from crossing the extended LAN segment?

A network engineer is extending a LAN segment between two geographically separated data centers. Which enhancement to a spanning-tree design prevents unnecessary traffic from crossing the extended LAN segment? A.

Which type of area is this router connected to?

The OSPF database of a router shows LSA types 1, 2, 3 and 7 only. Which type of area is this router connected to? A. backbone area B. totally stubby

Which feature can you implement to most effectively protect customer traffic in a rate-limited WAN Ethernet service?

Which feature can you implement to most effectively protect customer traffic in a rate-limited WAN Ethernet service? A. HCBWFQ B. IntServ with RSVP C. DiffServ D. The IPsec VTI qos

An engineer has configured a router to use EUI-64, and was asked to document the IPv6 address of the router. The router has the following interface parameters:

An engineer has configured a router to use EUI-64, and was asked to document the IPv6 address of the router. The router has the following interface parameters: mac address C601.420F.0007

Which command configures port security on a switch to enable permanent MAC address learning on the interface?

Which command configures port security on a switch to enable permanent MAC address learning on the interface? A. switchport port-security mac-address-learning enable B. switchport port-security mac-address timer 0 C. switchport

Which three components are in an MPLS header?

Which three components are in an MPLS header? (choose three) A. a 4-bit experimental use field B. a 4-bit label stack entry C. an 8-bit TTL D. a 2-bottom of

What is the main function of VRF-lite?

What is the main function of VRF-lite? A. To allow devices to use labels to make Layer 2 Path decisions B. To segregate multiple routing tables on a single device

Which two methods do IPsec VTIs used to identify and transmit encrypted traffic through the tunnel?

Which two methods do IPsec VTIs used to identify and transmit encrypted traffic through the tunnel? (choose two) A. static routing B. dynamic routing C. object groups D. ACLs E.

When you deploy DMVPN, what is the purpose of the command crypto isakmp key ciscotest address 0.0.0.0 0.0.0.0 ?

When you deploy DMVPN, what is the purpose of the command crypto isakmp key ciscotest address 0.0.0.0 0.0.0.0 ? A. It is configured on hub and spoke router to establish

Which interface configuration output can be applied to the corporate router to allow communication to the remote sites?

A company has just opened two remote branch offices that need to be connected to the corporate network. Which interface configuration output can be applied to the corporate router to

Which value can you change so that the OSPF becomes the installed routing protocol for all routes?

If EIGRP and OSPF are configured within an administrative domain for the same network, which value can you change so that the OSPF becomes the installed routing protocol for all

Which two statements about VTPv3 are true?

Which two statements about VTPv3 are true? (Choose two) A. Extended VLANs prevent VTPv3 switches from becoming VTPv2 B. VTPv3 must receive VTPv2 packets before it can send VTPv2 packets

Which two statements about IGMP filters that are operating in access mode are true?

Which two statements about IGMP filters that are operating in access mode are true? (Choose Two) A. They can be applied on the access port only. B. A filter that

Which technology can MSDP SA filters use to filter traffic?

Which technology can MSDP SA filters use to filter traffic? A. route maps B. community lists C. prefix lists D. class maps Answer: A

Which two statements about TCP are true?

Which two statements about TCP are true? (Choose two.) A. TCP option must be divisible by 32. B. It has a 16-bit window size. C. Its maximum data offset is

Which three benefits does the Cisco Easy Virtual Network provide to an enterprise network?

Which three benefits does the Cisco Easy Virtual Network provide to an enterprise network? (Choose three.) A. simplified Layer 3 network virtualization B. improved shared services support C. enhanced management,

Which two statements about UDP and latency are true?

Which two statements about UDP and latency are true? (Choose two.) A. UDP is connection oriented, so the size of a UDP stream is independent of latency. B. UDP is

What is a reason for an EIGRP router to send an SIA reply to a peer?

What is a reason for an EIGRP router to send an SIA reply to a peer? A. to respond to an SIA query with the alternative path requested B. to

What is the expected acknowledgment and its usage?

A packet capture log indicates that several router solicitation messages were sent from a local host on the IPv6 segment. What is the expected acknowledgment and its usage? A. Router

What are the three required attributed in a BGP update message?

What are the three required attributed in a BGP update message? (Choose three ) A. AS_PATH B. COMMUNITY C. AGGREGATOR D. MED E. NEXT_HOP F. ORIGIN Answer: AEF

Which value does EIGRP use to determine the metric for a summary address?

Which value does EIGRP use to determine the metric for a summary address? A. The average of the component metrics B. A default fixed value C. The lowest metric among

Which CoS value is mapped to DSCP 48 by default?

Which CoS value is mapped to DSCP 48 by default? A. 6 B. 7 C. AF21 D. AF44 E. AF41 F. 46 Answer: A

Which condition does UDP dominance occur?

Under which condition does UDP dominance occur? A. when TCP traffic is in the same class as UDP B. when UDP flows are assigned a lower priority queue C. when

Which option is a correct match criterion for policy-based routing?

Which option is a correct match criterion for policy-based routing? A. length B. interface type C. interface D. cost Answer: A

Which statement about the spanning-tree portfast feature on the switch is true?

Which statement about the spanning-tree portfast feature on the switch is true? A. If an interface is enabled for portfast receives BDPU, the port goes through the spanning-tree listening, learning,

Which configuration must be added to the new switch before it can be added to the switch stack?

A network engineer wants to add a new switch to an existing switch stack. Which configuration must be added to the new switch before it can be added to the

What are the three modes of Unicast Reverse Path Forwarding?

What are the three modes of Unicast Reverse Path Forwarding? A. strict mode, loose mode, and VRF mode B. strict mode, loose mode, and broadcast mode C. strict mode, broadcast

What is the function of NSF?

What is the function of NSF? A. forward traffic simultaneously using both supervisors B. forward traffic based on Cisco Express Forwarding C. provide automatic failover to back up supervisor in

When you configure an IPv6 IPsec tunnel, which two fields can represent the ISAKMP identity of a peer?

When you configure an IPv6 IPsec tunnel, which two fields can represent the ISAKMP identity of a peer? (Choose two) A. Authentication method B. DH group identifier C. Hostname D.

Which two statements about 6PE are true?

Which two statements about 6PE are true? (choose two) A. iBGP peering between the PE routers should be done using an IPv6 address. B. It does not require MPLS between

An access switch at a remote location is connected to the spanning-tree root with redundant uplinks. A network engineer notices that there are issues with the physical cabling of the current root port. The engineer decides to force the secondary link to be the desired forwarding root port. Which action accomplishes this task?

An access switch at a remote location is connected to the spanning-tree root with redundant uplinks. A network engineer notices that there are issues with the physical cabling of the

Which command correctly configures standby tracking for group 1 using the default decrement priority value?

Which command correctly configures standby tracking for group 1 using the default decrement priority value? A. standby 1 track 100 B. standby 1 track 100 decrement 1 C. standby 1

Which two statements about IP SLA are true?

Which two statements about IP SLA are true? (Choose two) A. SNMP access is not supported B. It uses active traffic monitoring C. It is Layer 2 transport-independent D. The

Which three characteristics are shared by subinterfaces and associated EVNs?

Which three characteristics are shared by subinterfaces and associated EVNs? (Choose three.) A. IP address B. routing table C. forwarding table D. access control lists E. NetFlow configuration Answer: ABC

How long will the root bridge continue to send configuration BPDUs to notify all bridges to age out their MAC address tables?

How long will the root bridge continue to send configuration BPDUs to notify all bridges to age out their MAC address tables? A. Three times the hello interval B. The

How frequently are hello packets are sent?

If OSPF fast hellos are configured on an interface and the hello-multiplier is set to 10, how frequently are hello packets are sent? A. every 200 milliseconds B. every 50

Which two statements about the various types or DevOps tools are true?

Which two statements about the various types or DevOps tools are true? (Choose two) A. Puppet requires the installation of a master (server) and agents (clients) architecture for configuring systems.

Which option best describes “contracts”?

In a Cisco ACI environment, which option best describes “contracts”? A. a set of interaction rules between endpoint groups B. a Layer 3 forwarding domain C. to determine endpoint group

Which two components are part of the controller node?

In a typical three-node OpenStack deployment, which two components are part of the controller node? (Choose two ) A. Neutron Layer 3 agent B. Neutron DHCP agent C. Identity service

Which option is the common primary use case for tools such as Puppet. Chef. Ansible, and Salt?

Which option is the common primary use case for tools such as Puppet. Chef. Ansible, and Salt? A. network function visualization B. policy assurance C. Configuration management. D. network orchestration.

Which two platforms provide hypervisor virtualization?

Which two platforms provide hypervisor virtualization? (Choose two.) A. DevStack B. Docker C. KVM D. OpenStack E. Xen Answer: CE

Which two characteristics of an loT network are true?

Which two characteristics of an loT network are true? (Choose two.) A. The transmission rate in an loT network is consistent. B. loT networks must be designed for low-powered devices.

Which two options are benefits of moving the application development workload to the cloud?

Which two options are benefits of moving the application development workload to the cloud? (Select Two) A. it provides you full control over the software packages and vendor used B.

Which two statements about RIPng are true?

Which two statements about RIPng are true? (Choose two.) A. RIPng can support as many as 8 equal-cost routes. B. RIPng can support aa many as 32 equal-cost routes. C.