web analytics

Which technology, in combination with PPPoE, can be used for authentication in this manner?

A network engineer has been asked to ensure that the PPPoE connection is established and authenticated using an encrypted password. Which technology, in combination with PPPoE, can be used for

Which feature can be used to accomplish this task?

A corporate policy requires PPPoE to be enabled and to maintain a connection with the ISP, even if no interesting traffic exists. Which feature can be used to accomplish this

Which encapsulation supports an interface that is configured for an EVN trunk?

Which encapsulation supports an interface that is configured for an EVN trunk? A. 802.1Q B. ISL C. PPP D. Frame Relay E. MPLS F. HDLC Answer: A

Which three characteristics are shared by subinterfaces and associated EVNs?

Which three characteristics are shared by subinterfaces and associated EVNs? (Choose three.) A. IP address B. routing table C. forwarding table D. access control lists E. NetFlow configuration Answer: ABC

Which traffic does the following configuration allow?

Which traffic does the following configuration allow? ipv6 access-list cisco permit ipv6 host 2001:DB8:0:4::32 any eq ssh line vty 0 4 ipv6 access-class cisco in A. all traffic to vty

Which method can you use in combination with the debug ip packet command to limit the amount of output data?

For troubleshooting purposes, which method can you use in combination with the debug ip packet command to limit the amount of output data? A. You can disable the IP route

What is the reason for this?

Refer to the following access list. access-list 100 permit ip any any log After applying the access list on a Cisco router, the network engineer notices that the router CPU

Which address is used by the Unicast Reverse Path Forwarding protocol to validate a packet against the routing table?

Which address is used by the Unicast Reverse Path Forwarding protocol to validate a packet against the routing table? A. source address B. destination address C. router interface D. default

What are the three modes of Unicast Reverse Path Forwarding?

What are the three modes of Unicast Reverse Path Forwarding? A. strict mode, loose mode, and VRF mode B. strict mode, loose mode, and broadcast mode C. strict mode, broadcast

What does the following access list, which is applied on the external interface FastEthernet 1/0 of the perimeter router, accomplish?

What does the following access list, which is applied on the external interface FastEthernet 1/0 of the perimeter router, accomplish? router(config)#access-list 101 deny ip 10.0.0.0 0.255.255.255 any log router (config)#access-list

Which statement is true?

Refer to the following command: router(config)# ip http secure-port 4433 Which statement is true? A. The router will listen on port 4433 for HTTPS traffic. B. The router will listen

Which command satisfies the requirements of this scenario?

A network engineer is configuring SNMP on network devices to utilize one-way SNMP notifications. However, the engineer is not concerned with authentication or encryption. Which command satisfies the requirements of

Which string is matched for authentication?

When using SNMPv3 with NoAuthNoPriv, which string is matched for authentication? A. username B. password C. community-string D. encryption-key Answer: A

Which two actions can you take to provide enhanced logging results?

After a recent DoS attack on a network, senior management asks you to implement better logging functionality on all IOS-based devices. Which two actions can you take to provide enhanced

Which feature can the engineer use to create a crash collection?

A network engineer finds that a core router has crashed without warning. In this situation, which feature can the engineer use to create a crash collection? A. secure copy protocol

What is the result of the command?

A network engineer is trying to implement broadcast-based NTP in a network and executes the ntp broadcast client command. Assuming that an NTP server is already set up, what is

Which three TCP enhancements can be used with TCP selective acknowledgments?

Which three TCP enhancements can be used with TCP selective acknowledgments? (Choose three.) A. header compression B. explicit congestion notification C. keepalive D. time stamps E. TCP path discovery F.

Which UDP characteristic does this scenario describe?

A network administrator uses IP SLA to measure UDP performance and notices that packets on one router have a higher one-way delay compared to the opposite direction. Which UDP characteristic

Under which condition does UDP dominance occur?

Under which condition does UDP dominance occur? A. when TCP traffic is in the same class as UDP B. when UDP flows are assigned a lower priority queue C. when

PPPoE is composed of which two phases?

PPPoE is composed of which two phases? A. Active Authentication Phase and PPP Session Phase B. Passive Discovery Phase and PPP Session Phase C. Active Authorization Phase and PPP Session

Which statement is true about the PPP Session Phase of PPPoE?

Which statement is true about the PPP Session Phase of PPPoE? A. PPP options are negotiated and authentication is not performed. Once the link setup is completed, PPPoE functions as

Which type of traffic does DHCP snooping drop?

Which type of traffic does DHCP snooping drop? A. discover messages B. DHCP messages where the source MAC and client MAC do not match C. traffic from a trusted DHCP

Which prefix is matched by the command ip prefix-list name permit 10.8.0.0/16 ge 24 le 24?

Which prefix is matched by the command ip prefix-list name permit 10.8.0.0/16 ge 24 le 24? A. 10.9.1.0/24 B. 10.8.0.0/24 C. 10.8.0.0/16 D. 10.8.0.0/23 Answer: B

Why is the routing information not being learned by Router B?

Router A and Router B are configured with IPv6 addressing and basic routing capabilities using OSPFv3. The networks that are advertised from Router A do not show up in Router

What do you conclude about these IPv6 addresses?

After you review the output of the command show ipv6 interface brief, you see that several IPv6 addresses have the 16-bit hexadecimal value of “FFFE” inserted into the address. Based

What is the expected acknowledgment and its usage?

A packet capture log indicates that several router solicitation messages were sent from a local host on the IPv6 segment. What is the expected acknowledgment and its usage? A. Router

Which type of remote access did the engineer enable?

A user is having issues accessing file shares on a network. The network engineer advises the user to open a web browser, input a prescribed IP address, and follow the

Which Cisco IOS VPN technology leverages IPsec, mGRE, dynamic routing protocol, NHRP, and Cisco Express Forwarding?

Which Cisco IOS VPN technology leverages IPsec, mGRE, dynamic routing protocol, NHRP, and Cisco Express Forwarding? A. FlexVPN B. DMVPN C. GETVPN D. Cisco Easy VPN Answer: B

Which action will allow for manual switching of HSRP nodes?

A network engineer is configuring a solution to allow failover of HSRP nodes during maintenance windows, as an alternative to powering down the active router and letting the network respond

Which feature should the engineer use to gather the required information?

A network engineer is notified that several employees are experiencing network performance related issues, and bandwidth-intensive applications are identified as the root cause. In order to identify which specific type

What can you determine based on this information?

An organization decides to implement NetFlow on its network to monitor the fluctuation of traffic that is disrupting core services. After reviewing the output of NetFlow, the network engineer is

What is the expected output?

A network engineer has left a NetFlow capture enabled over the weekend to gather information regarding excessive bandwidth utilization. The following command is entered: switch#show flow exporter Flow_Exporter-1 What is

What is the best solution to ensure compliance with this new policy?

A company’s corporate policy has been updated to require that stateless, 1-to-1, and IPv6 to IPv6 translations at the Internet edge are performed. What is the best solution to ensure

Which two functions are completely independent when implementing NAT64 over NAT-PT?

Which two functions are completely independent when implementing NAT64 over NAT-PT? (Choose two.) A. DNS B. NAT C. port redirection D. stateless translation E. session handling Answer: AB

Which two methods of deployment can you use when implementing NAT64?

Which two methods of deployment can you use when implementing NAT64? (Choose two.) A. stateless B. stateful C. manual D. automatic E. static F. functional G. dynamic Answer: AB

Which NetFlow component is applied to an interface and collects information about flows?

Which NetFlow component is applied to an interface and collects information about flows? A. flow monitor B. flow exporter C. flow sampler D. flow collector Answer: A

What is the result of the command ip flow-export destination 10.10.10.1 5858?

What is the result of the command ip flow-export destination 10.10.10.1 5858? A. It configures the router to export cache flow information to IP 10.10.10.1 on port UDP/5858. B. It

Which condition causes this?

A network engineer notices that transmission rates of senders of TCP traffic sharply increase and decrease simultaneously during periods of congestion. Which condition causes this? A. global synchronization B. tail

Which three problems result from application mixing of UDP and TCP streams within a network with no QoS?

Which three problems result from application mixing of UDP and TCP streams within a network with no QoS? (Choose three.) A. starvation B. jitter C. latency D. windowing E. lower

Which method allows IPv4 and IPv6 to work together without requiring both to be used for a single connection during the migration process?

Which method allows IPv4 and IPv6 to work together without requiring both to be used for a single connection during the migration process? A. dual-stack method B. 6to4 tunneling C.

Which statement about the use of tunneling to migrate to IPv6 is true?

Which statement about the use of tunneling to migrate to IPv6 is true? A. Tunneling is less secure than dual stack or translation. B. Tunneling is more difficult to configure

Which task must be completed?

Prior to enabling PPPoE in a virtual private dialup network group, which task must be completed? A. Disable CDP on the interface. B. Execute the vpdn enable command. C. Execute

Which command should be applied to the configuration to allow this?

A network engineer is configuring a routed interface to forward broadcasts of UDP 69, 53, and 49 to 172.20.14.225. Which command should be applied to the configuration to allow this?

What is a function of NPTv6?

What is a function of NPTv6? A. It interferes with encryption of the full IP payload. B. It maintains a per-node state. C. It is checksum-neutral. D. It rewrites transport

Which feature allows IPv6 devices to communicate with IPv4 servers?

IPv6 has just been deployed to all of the hosts within a network, but not to the servers. Which feature allows IPv6 devices to communicate with IPv4 servers? A. NAT

Which type of statistics does the engineer see?

A network engineer initiates the ip sla responder tcp-connect command in order to gather statistics for performance gauging. Which type of statistics does the engineer see? A. connectionless-oriented B. service-oriented

What is the result?

A network engineer executes the ipv6 flowset command. What is the result? A. Flow-label marking in 1280-byte or larger packets is enabled. B. Flow-set marking in 1280-byte or larger packets

Which line in the output indicates that the send queue is full and export packets are not being sent?

A network engineer executes the show ip flow export command. Which line in the output indicates that the send queue is full and export packets are not being sent? A.

Which functions do the two commands serve in this scenario?

A network engineer is asked to configure a “site-to-site” IPsec VPN tunnel. One of the last things that the engineer does is to configure an access list (access-list 1 permit

Which two tables does this command clear and rebuild?

A network administrator executes the command clear ip route. Which two tables does this command clear and rebuild? (Choose two.) A. IP routing B. FIB C. ARP cache D. MAC