أرشيف أسئلة الاختبار
اختبار شهادة سيسكو Cisco CCNA Exam
هذه الصفحة مخصصة للأرشفة وتعرض جميع أسئلة الاختبار وروابط كل سؤال مع الخيارات والنقاشات.
تنبيه مهم
هذه الصفحة للأرشفة فقط. إذا كنت تريد التجربة الحقيقية للاختبار والدخول إلى واجهة الاختبار الأصلية فانتقل إلى صفحة الاختبار من الرابط التالي.
الانتقال إلى صفحة الاختبار الفعلية
الأسئلة
470 سؤال- Refer to the exhibit. Which two configurations must the engineer apply on this network so that R1 becomes the DR? (Choose two.)
- What are two benefits of FHRPs? (Choose two.)
- What are two recommendations for protecting network ports from being exploited when located in an office space outside of an IT closet? (Choose two.)
- Which CRUD operation corresponds to the HTTP GET method?
- Which benefit does Cisco DNA Center provide over traditional campus management?
- Which command must be entered to configure a DHCP relay?
- A network analyst is tasked with configuring the date and time on a router using EXEC mode. The date must be set to January 1, 2020 and the time must be set to ...
- What are two functions of a server on a network? (Choose two.)
- Which 802.11 frame type is Association Response?
- How do AAA operations compare regarding user identification, user services, and access control?
- Refer to the exhibit. Router OldR is replacing another router on the network with the intention of having OldR and R2 exchange routes. After the engineer applie ...
- Refer to the exhibit. An engineer booted a new switch and applied this configuration via the console port. Which additional configuration must be applied to ...
- Refer to the exhibit. Router R1 is running three different routing protocols. Which route characteristic is used by the router to forward the packet that it rec ...
- Refer to the exhibit. An access-list is required to permit traffic from any host on interface Gi0/0 and deny traffic from interface Gi0/1. Which access list mus ...
- What are two facts that differentiate optical-fiber cabling from copper cabling? (Choose two.)
- Refer to the exhibit. Web traffic is coming in from the WAN interface. Which route takes precedence when the router is processing traffic destined for the LAN n ...
- Refer to the exhibit. How much 0SPF be configured on the GigabitEthernet0/0 interface of the neighbor device to achieve the destined neighbor relationship?
- What are two functions of a Layer 2 switch? (Choose two.)
- Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two.)
- Which two commands must the engineer configure on the new switches? (Choose two.)
- Which purpose does a northbound API serve in a controller-based networking architecture?
- What is the difference between AAA authentication and authorization?
- Refer to the exhibit. What is the metric of the route to the 192.168.10.33/28 subnet?
- What are two reasons that cause late collisions to increment on an Ethernet interface? (Choose two.)
- What is an enhancement implemented in WPA3?
- What are two benefits of controller-based networking compared to traditional networking? (Choose two.)
- What must a network administrator consider when deciding whether to configure a new wireless network with APs in autonomous mode or APs running in cloud-based m ...
- When the active router in an HSRP group fails, which router assumes the role and forwards packets?
- Which group of channels in the 802.11b/g/n/ac/ax 2.4 GHz frequency bands are nonoverlapping channels?
- What is a function of TFTP in network operations?
- A DHCP pool has been created with the name CONTROL. The pool uses the next to last usable IP address as the default gateway for the DHCP clients. The server is ...
- Refer to the exhibit. What is the subnet mask of the route to the 10.10.13.160 prefix?
- Refer to the exhibit. What is the subnet mask of the route to the 10.10.13.160 prefix?
- Drag and drop the statements about networking from the left onto the corresponding networking types on the right.
- Drag and drop the DHCP snooping terms from the left onto the descriptions on the right.
- Refer to the exhibit. A network engineer is configuring a WLAN to connect with the 172.16.10.0/24 network on VLAN 20. The engineer wants to limit the number of ...
- Refer to the exhibit. Which route does R1 select for traffic that is destined to 192.168.16.2?
- A network engineer must configure an interface with IP address 10.10.10.145 and a subnet mask equivalent to 11111111.11111111.11111111.11111000. Which subnet ma ...
- Which fact must the engineer consider when implementing IPsec on a new network?
- Refer to the exhibit. An engineer is creating a secure preshared key based SSID using WPA2 for a wireless network running on 2.4 GHz and 5 GHz. Which two tasks ...
- What is a reason to implement LAG on a Cisco WLC?
- Which solution is appropriate when mitigating password attacks where the attacker was able to sniff the clear-text password of the system administrator?
- Which functionality is provided by the console connection on a Cisco WLC?
- In which circumstance would a network architect decide to implement a global unicast subnet instead of a unique local unicast subnet?
- Which networking function occurs on the data plane?
- Refer to the exhibit. What are the two steps an engineer must take to provide the highest encryption and authentication using domain credentials from LDAP? (Cho ...
- Which two conditions must be met before SSH operates normally on a Cisco IOS switch? (Choose two.)
- What is an appropriate use for private IPv4 addressing?
- A switch is forwarding a frame out of all interfaces except the interface that received the frame. What is the technical term for this process?
- Refer to the exhibit. A packet sourced from 10.10.10.32 is destined for the Internet. What is the administrative distance for the destination route?
- A network administrator enabled port security on a switch interface connected to a printer. What is the next configuration action in order to allow the port to ...
- Which configuration management mechanism uses TCP port 22 by default when communicating with managed nodes?
- What uses HTTP messages to transfer data to applications residing on different hosts?
- Which component controls and distributes physical resources for each virtual machine?
- How does Rapid PVST+ create a fast loop-free network topology?
- Two switches have been implemented and all interfaces are at the default configuration level. A trunk link must be implemented between two switches with these r ...
- What is the role of SNMP in the network?
- What is the difference between IPv6 unicast and anycast addressing?
- Refer to the exhibit. If R1 receives a packet destined to 172.16.1.1, to which IP address does it send the packet?
- Refer to the exhibit. What is the result if Gig1/11 receives an STP BPDU?
- Which command must the engineer configure so that the software clock of the new router synchronizes with the time server?
- Which protocol is implemented when an organization must verify network performance, troubleshoot issues, and use an agent to communicate between monitoring tool ...
- Refer to the exhibit. An administrator must configure interfaces Gi1/1 and Gi1/3 on switch SW11. PC-1 and PC-2 must be placed in the Data VLAN, and Phone-1 must ...
- What is a function performed by a web server?
- What are two facts that differentiate optical-fiber cabling from copper cabling? (Choose two.)
- How is a configuration change made to a wireless AP in lightweight mode?
- Which type of security program is violated when a group of employees enters a building using the ID badge of only one person?
- Which two values does router R1 use to identify valid routes for the R3 loopback address 1.1.1.3/32? (Choose two.)
- Which characteristic differentiates the concept of authentication from authorization and accounting?
- Refer to the exhibit. If the network environment is operating normally, which type of device must be connected to interface fastethernet 0/1?
- What is an Ansible inventory?
- What is a requirement for nonoverlapping Wi-Fi channels?
- Which two commands must the engineer configure on the new switches? (Choose two.)
- What is the PUT method within HTTP?
- Drag and drop the descriptions of device management from the left onto the types of device management on the right.
- Refer to the exhibit. PC1 tries to ping PC3 for the first time and sends out an ARP to S1. Which action is taken by S1?
- What is the primary purpose of private address space?
- What is the role of a firewall in an enterprise network?
- Which command must be issued under the interface configuration on each router to reduce the time required for the adjacency to reach the FULL state?
- Refer to the exhibit. Site A was recently connected to site B over a new single-mode fiber path. Users at site A report intermittent connectivity issues with ...
- What is the definition of backdoor malware?
- Which WAN access technology is preferred for a small office / home office architecture?
- Which WLC management connection type is vulnerable to man-in-the-middle attacks?
- Which two transport layer protocols carry syslog messages? (Choose two.)
- Refer to the exhibit. What is the next-hop IP address for R2 so that PC2 reaches the application server via EIGRP?
- Which two spanning-tree states are bypassed on an interface running PortFast? (Choose two.)
- Which protocol should be used to transfer large files on a company intranet that allows TCP 20 and 21 through the firewall?
- What is the purpose of the ip address dhcp command?
- Which component controls and distributes physical resources for each virtual machine?
- Which feature of Digest Authentication prevents credentials from being sent in plaintext?
- The clients and DHCP server reside on different subnets. Which command must be used to forward requests and replies between clients on the 10.10.0.1/24 subnet a ...
- Refer to the exhibit. How many arrays are present in the JSON data?
- What is a benefit of VRRP?
- Which command must be issued under the interface configuration on each router to reduce the time required for the adjacency to reach the FULL state?
- What is the definition of backdoor malware?
- Which WAN access technology is preferred for a small office/home office architecture?
- Which WLC management connection type is vulnerable to man-in-the-middle attacks?
- Which two transport layer protocols carry syslog messages? (Choose two.)
- Refer to the exhibit. An engineer must configure router R2 so it is elected as the DR on the WAN subnet. Which command sequence must be configured?
- What is the effect when loopback interfaces and the configured router ID are absent during the OSPF Process configuration?
- Which two outcomes are predictable behaviors for HSRP? (Choose two.)
- What is the difference between AAA authentication and authorization?
- Under which condition is TCP preferred over UDP?
- Refer to the exhibit. Users at a branch office are experiencing application performance issues, poor VoIP audio quality, and slow downloads. What is the cause o ...
- Which mechanism carries multicast traffic between remote sites and supports encryption?
- What describes a northbound REST API for SDN?
- Why choose Cisco DNA Center for automated lifecycle management?
- Which two HTTP methods are suitable for actions performed by REST-based APIs? (Choose two.)
- What provides connection redundancy, increased bandwidth, and load sharing between a wireless LAN controller and a Layer 2 switch?
- Which command creates a static NAT binding for a PC address of 10.1.1.1 to the public routable address 209.165.200.225 assigned to the PC?
- In a cloud-computing environment, what is rapid elasticity?
- Which interface condition is occurring in this output?
- Which interface condition is occurring in this output?
- An engineer must update the configuration on two PCs in two different subnets to communicate locally with each other. One PC is configured with IP address 192.1 ...
- Which encryption mode is used when a packet is sent from a site-to-site VPN connection where the source and destination IP address portion of a packet is unencr ...
- In software-defined architecture, which plane handles switching for traffic through a Cisco router?
- Which syslog message logging level displays interface line protocol up/down events?
- Refer to the exhibit. SW2 is replaced because of a hardware failure. A network engineer starts to configure SW2 by copying the fa0/1 interface configuration fro ...
- Which protocol does Ansible use to push modules to nodes in a network?
- Which command meets the requirements to configure a floating static default route to the backup router at 10.200.0.2?
- Which command meets the requirements to configure a floating static default route to the backup router at 10.200.0.2?
- Which command must be used to fulfill the request to forward traffic for the 172.16.34.0/29 network on R86?
- What is a characteristic of private IPv4 addressing?
- What are two behaviors of a point-to-point WAN topology? (Choose two.)
- How does the switch handle the frame?
- Refer to the exhibit. Users need to connect to the wireless network with IEEE 802.11r-compatible devices. The connection must be maintained as users travel b ...
- What is the function of the controller in a software-defined network?
- How will the device handle a packet destined to IP address 100.100.100.100?
- What is a characteristic of spine-and-leaf architecture?
- Which function generally performed by a traditional network device is replaced by a software-defined controller?
- Which tasks must be performed on the Download File tab to install new software using TCP port 22?
- Refer to the exhibit. An engineer is creating a secure preshared key based SSID using WPA2 for a wireless network running on 2.4 GHz and 5 GHz. Which two tasks ...
- Which physical component is distributed among multiple virtual machines running on the same hypervisor?
- What is a function of Opportunistic Wireless Encryption in an environment?
- Which configuration issue is preventing the OSPF neighbor relationship from being established between the two routers?
- An engineer configured an 0SPF neighbor as a designated router. Which state verifies the designated router is in the proper mode?
- Refer to the exhibit. A network administrator has been tasked with securing VTY access toa router. Which access-list entry accomplishes this task?
- Which IPsec mode encapsulates the entire IP packet?
- Which two security elements support password-less authentication methods in enterprise networks? (Choose two.)
- Refer to the exhibit. How many arrays are present in the JSON data?
- Which type of API allows SDN controllers to dynamically make changes to the network?
- What is the purpose of configuring different levels of syslog for different devices on the network?
- Refer to the exhibit. The P2P Blocking Action option is disabled on the WLC. The security team has a new requirement for each client to retain their assigned IP ...
- Refer to the exhibit. An LACP EtherChannel between two directly connected switches is in the configuration process. Which command must be configured on switch S ...
- What is the benefit of using FHRP?
- How do predictive AI models enhance network resource allocation?
- Which two security elements support password-less authentication methods in enterprise networks? (Choose two.)
- Which type of API allows SDN controllers to dynamically make changes to the network?
- What is the purpose of configuring different levels of syslog for different devices on the network?
- Which two encoding methods are supported by REST APIs? (Choose two.)
- What is a characteristic of a Layer 2 switch?
- Refer to the exhibit. What is the result if Gig1/11 receives an STP BPDU?
- Which AP mode provides a wireless connection between two network segments?
- Which action must be taken to assign a global unicast IPv6 address on an interface that is derived from the MAC address of that interface?
- To increase total throughput and redundancy on the links between the wireless controller and switch, the customer enabled LAG on the wireless controller. Wh ...
- When the current route for 10.227.150.160/27 becomes unavailable, which cost will router Y use to route traffic to 10.227.150.160/27?
- What is a characteristic of encryption in wireless networks?
- Refer to the exhibit. PC1 regularly sends 1800 Mbps of traffic to the server. A network engineer needs to configure the EtherChannel to disable Port Channel 1 b ...
- What are two benefits provided by network automation? (Choose two.)
- Refer to the exhibit. Which command must be executed for Gi1/1 on SW1 to passively become a trunk port if Gi1/1 on SW2 is configured in desirable or trunk mo ...
- What is a function of an endpoint on a network?
- Refer to the exhibit. If the network environment is operating normally, which type of device must be connected to interface fastethernet 0/1?
- Refer to the exhibit. A Cisco engineer is asked to update the configuration on switch 1 so that the EtherChannel stays up when one of the links fails. Which con ...
- Which interface is used to send traffic to the destination network?
- Which interface is used to send traffic to the destination network? Routing Table Output: nginx CopyEdit O 10.90.207.87/26 [110/1912] via F0/7 O 10.90.20 ...
- Which two features are provided by Ansible in network automation? (Choose two.)
- Which two authentication types are used to validate user credentials for connections to a Cisco WLC? (Choose two.)
- A network engineer must configure the link with the following requirements: Consume as few IP addresses as possible. Leave at least two additional usable IP a ...
- An organization developed new security policies and decided to print the policies and distribute them to all personnel so that employees review and apply the po ...
- What is the purpose of classifying network traffic in QoS?
- When a WPA2-PSK WLAN is configured in the Wireless LAN Controller, what is the minimum number of characters that is required in ASCII format?
- How does machine learning strengthen the security measures of the network?
- What is a characteristic of private IPv4 addressing?
- Two switches have been implemented and all interfaces are at the default configuration level. A trunk link must be implemented between two switches with these r ...
- What is the primary purpose of a First Hop Redundancy Protocol?
- A user configured OSPF and advertised the Gigabit Ethernet interface in OSPF. By default, to which type of OSPF network does this interface belong?
- What is the difference between controller-based networks and traditional networks as they relate to control-plane and/or data-plane functions?
- Refer to the exhibit. An engineer is configuring the HO router. Which IPv6 address configuration must be applied to the router fa0/1 interface for the router ...
- A switch receives a frame with the destination MAC address 3C:5D:7E:9F:1A:2B. How does the switch handle the frame?
- Refer to the exhibit.An architect is managing a wireless network with APs from several branch offices connecting to the WLC in the data center. There is a new r ...
- Refer to the exhibit. Which switch in this configuration will be elected as the root bridge? SW1 0C:0A:05:22:05:97 - SW2 0C:4A:82:07:57:58 - SW3 0C:0A:A8:1 ...
- Refer to the exhibit. After applying this configuration to router R1, a network engineer is verifying the implementation. If all links are operating normally ...
- Refer to the exhibit. Users need to connect to the wireless network with IEEE 802.11r-compatible devices. The connection must be maintained as users travel betw ...
- What are two benefits of network automation? (Choose two.)
- Refer to the exhibit. A packet sourced from 10.10.10.1 is destined for 10.10.8.14. What is the subnet mask of the destination route?
- Refer to the exhibit. The network engineer is configuring router R2 as a replacement router on the network. After the initial configuration is applied, it is ...
- A user configured OSPF and advertised the Gigabit Ethernet interface in OSPF. By default, to which type of OSPF network does this interface belong?
- In software-defined architecture, which plane handles switching for traffic through a Cisco router?
- In software-defined architecture, which plane handles switching for traffic through a Cisco router?
- Drag and drop each security feature to the type of threat it prevents.
- Drag and drop each characteristic to the correct cable type.
- Drag and drop the characteristics to the correct transport protocol.
- Drag and drop the characteristics to the correct network design model.
- Drag and Drop the correct values to their matching parameters.
- Drag and drop the protocol characteristics from the left onto the corresponding types on the right.
- Drag and drop the characteristic from the left onto the device type on the right. Not all characteristics are used.
- Refer to the exhibit. A network engineer must update the WPA2 configuration of a WLAN to support non-802.11ac clients. What is the next step in the configuratio ...
- Which statement best describes the IPsec site-to-site VPN?
- Refer to the exhibit. Which two commands, when configured on router R1, fulfill these requirements? (Choose two.) Packets toward the entire network 2001:db8:23 ...
- Refer to the exhibit. Which configuration is needed to configure a WLAN with WPA2 only and with a password that is 63 characters long?
- Refer to the exhibit. A packet sourced from 10.10.10.1 is destined for 10.10.8.14. What is the subnet mask of the destination route?
- Which DSCP per-hop forwarding behavior is divided into subclasses based on drop probability?
- Refer to the exhibit. User traffic originating within site B is failing to reach an application hosted on IP address 192.168.0.10, which is located within site ...
- Refer to the exhibit. What does the host do when using the IPv4 Preferred function?
- Refer to the exhibit. What is the next hop for a packet destined for 10.1.1.1?
- What is the default port-security behavior on a trunk link?
- What is the advantage of separating the control plane from the data plane within an SDN network?
- What is the main capability of multifactor authentication?
- Which function generally performed by a traditional network device is replaced by a software-defined controller?
- A wireless administrator has configured a WLAN; however, the clients need access to a less congested 5-GHz network for their voice quality. Which action must be ...
- Refer to the exhibit. Which switch becomes the root bridge?
- Which port type supports the spanning-tree portfast command without additional configuration?
- How do predictive AI models enhance network resource allocation?
- What is a characteristic of frame switching?
- How does HSRP provide first hop redundancy?
- Refer to the exhibit. A Cisco WLC administrator is creating a new wireless network with enhanced SSID security. The new network must operate at 2.4 GHz with 54 ...
- Refer to the exhibit. Considering default routing protocol configurations were used, which routing protocol is used to learn the 10.255.2.2/32 route?
- Refer to the exhibit. Which command must be issued to enable a floating static default route on router A?
- Which HTTP status code is returned after a successful REST API request?
- Refer to the exhibit. Configurations for the switch and PCs are complete. Which configuration must be applied so that VLANs 2 and 3 communicate back and forth?
- Which interface condition is occurring in this output?
- Which type of encryption does WPA1 use for data protection?
- Refer to the exhibit. An engineer is configuring the HO router. Which IPv6 address configuration must be applied to the router fa0/1 interface for the router to ...
- Refer to the exhibit. The network administrator must prevent the switch Cat9K-2 IP address from being visible in LLDP without disabling the protocol. Which acti ...
- What is a characteristic of a Layer 2 switch?
- Refer to the exhibit. The static routes were implemented on the border router. What is the next hop IP address for a ping sent to 172.16.153.154 from the border ...
- An email user has been lured into clicking a link in an email sent by their company’s security organization. The webpage that opens reports that it was safe, bu ...
- Refer to the exhibit. If configuring a static default route on the router with the command: ip route 0.0.0.0 0.0.0.0 10.13.0.1 120 How does the router respond ...
- What are two advantages of implementing a controller-based architecture instead of a traditional network architecture? (Choose two.)
- What is a reason to implement HSRP on a network?
- A network engineer must migrate a router loopback interface to the IPv6 address space. If the current IPv4 address of the interface is 10.54.73.1/32, and the en ...
- When deploying syslog, which severity level logs informational messages?
- An engineer needs to configure LLDP to send the port description type length value (TLV). Which command sequence must be implemented?
- Refer to the exhibit. What is the metric associated with the route used to forward a packet received by the router destined for the IP address 172.20.0.222?
- What is a characteristic of an SSID in wireless networks?
- Which AP mode provides a wireless connection between two network segments?
- Which interface condition is occurring in this output?
- What is the function of generative AI in network operations?
- Which benefit does automation provide in network management?
- What is the function of the controller in a software-defined network?
- Which interface on the WLC is limited to one when LAG is in use?
- Which interface on the WLC is limited to one when LAG is in use?
- Refer to the exhibit. With which metric does router R1 learn the route to host 172.16.0.202?
- What is an Ansible inventory?
- What is a characteristic of private IPv4 addressing?
- Refer to the exhibit. A network engineer is in the process of establishing IP connectivity between two sites. Routers R1 and R2 are partially configured with IP ...
- Which interface is used to send traffic to the destination network?
- Refer to the exhibit. Which entry is the longest prefix match for host IP address 192.168.10.5?
- Refer to the exhibit. An engineer must configure a floating static route on an external EIGRP network. The destination subnet is the /29 on the LAN interface of ...
- Refer to the exhibit. All VLANs are present in the VLAN database. Which command sequence must be applied to complete the configuration?
- How does the switch handle the frame?
- Drag and drop the characteristic from the left onto the cable type on the right.
- Drag and drop the network topology architecture types from the left onto the corresponding function on the right. Not all architecture types are used.
- Drag and drop the IPv6 address from the left onto the type on the right.
- Drag and drop the common functions from the left onto the corresponding network topology architecture layer on the right. Not all common functions are used.
- Refer to the exhibit. IPv6 must be implemented on R1 to the ISP. The uplink between R1 and the ISP must be configured with a manual assignment, and the LAN inte ...
- Refer to the exhibit. The router has been configured with a supernet to accommodate the requirement for 380 users on a subnet. The requirement already considers ...
- Refer to the exhibit. Switch A is newly configured. All VLANs are present in the VLAN database. The IP phone and PC A on Gi0/1 must be configured for the approp ...
- Refer to the exhibit. VoIP is being implemented in the network using VLAN ID 73 and named "VoIP". Each user needs a Cisco IP phone at their desk. Switchport e0/ ...
- Refer to the exhibit. A network engineer must update the configuration on Switch2 so that it sends LLDP packets every minute and the information sent via LLDP i ...
- What is represented by the word "R20" within this JSON schema?
- Drag and drop the characteristic from the left onto the device type on the right. Not all characteristics are used.
- Refer to the exhibit. Which functionalities will this SSID have while being used by wireless clients?
- Refer to the exhibit. A network engineer must update the WPA2 configuration of a WLAN to support non-802.11ac clients. What is the next step in the configuratio ...
- Refer to the exhibit. Which switch becomes the root bridge?
- Which communication interaction takes place when a southbound API is used?
- Which two tasks support the physical access control element of a security program? (Choose two.)
- How does automation affect network management processes?
- Refer to the exhibit. How will the device handle a packet destined to IP address 100.100.100.100?
- Which IPsec encryption mode is appropriate when the destination of a packet differs from the security termination point?
- Refer to the exhibit. A packet sourced from 10.10.10.1 is destined for 172.16.3.254. What is the subnet mask of the destination route?
- Drag and drop the characteristic from the left onto the cable type on the right.
- Which role does machine learning play in identifying network security breaches?
- Drag and drop the statements about networking from the left onto the corresponding networking types on the right.
- Refer to the exhibit. Routers R1, R2, and R3 use a protocol to identify their neighbors' IP addresses, hardware platforms, and software versions. A network engi ...
- What is the main difference between traditional networks and controller-based networking?
- Which type of encryption does WPA1 use for data protection?
- What are two capabilities provided by VRRP within a LAN network? (Choose two.)
- What is the primary purpose of the first hop redundancy protocols?
- Refer to the exhibit. Which configuration is needed to configure a WLAN with WPA2 only and with a password that is 63 characters long?
- Refer to the exhibit. Which configuration is needed to configure a WLAN with WPA2 only and with a password that is 63 characters long?
- Refer to the exhibit. Which action must be taken so that neighboring devices rapidly discover switch Cat9300?
- Which configuration management mechanism uses TCP port 22 by default when communicating with managed nodes?
- How do servers connect to the network in a virtual environment?
- Which interface condition is occurring in this output?
- What is a function of a southbound API?
- Refer to the exhibit. What is the result if Gig1/11 receives an STP BPDU?
- What differentiates the TCP and UDP protocols?
- Drag and drop the IPv6 address from the left onto the type on the right:
- Which AP mode is used in a wireless mesh deployment?
- What is the purpose of the logging facility?
- Refer to the exhibit. An engineer is configuring the HO router. Which IPv6 address configuration must be applied to the router fa0/1 interface for the router to ...
- How are VLAN hopping attacks mitigated?
- Refer to the exhibit. A static route must be configured on R14 to forward traffic for the 172.21.34.0/25 network that resides on R86. Which command must be used ...
- Which advantage does machine learning offer for network security?
- Which WAN topology provides a combination of simplicity quality, and availability?
- Which default condition must be considered when an encrypted mobility tunnel is used between two Cisco WLCs?
- What is represented by the word "firewall" within this JSON schema?
- An engineer must configure a core router with a floating static default route to the backup router at 10.200.0.2. Which command meets the requirements?
- Which action must be taken to assign a global unicast IPv6 address on an interface that is derived from the MAC address of that interface?
- In QoS, which prioritization method is appropriate for interactive voice and video?
- A default route must be configured to temporarily use a local broadband modem with the IP address of 192.168.1.1 until a WAN circuit is installed. The WAN circu ...
- Refer to the exhibit. Router R14 is in the process of being configured. Which configuration must be used to establish a host route to PC 10?
- Drag and drop the descriptions of security features from the left onto the corresponding features on the right.
- Refer to the exhibit. An engineer has started to configure replacement switch SW1. To verify part of the configuration, the engineer issued the commands as show ...
- What is the recommended switch load-balancing mode for Cisco WLCs?
- What is the recommended switch load-balancing mode for Cisco WLCs?
- Refer to the exhibit. Configurations for the switch and PCs are complete. Which configuration must be applied so that VLANs 2 and 3 communicate back and forth?
- Refer to the exhibit. How must router A be configured so that it only sends Cisco Discovery Protocol information to router C?
- How is noise defined in Wi-Fi?
- Refer to the exhibit. Which network prefix was learned via EIGRP?
- Refer to the exhibit. The router has been configured with a supernet to accommodate the requirement for 380 users on a subnet. The requirement already considers ...
- Refer to the exhibit. After applying this configuration to router R1, a network engineer is verifying the implementation. If all links are operating normally ...
- Refer to the exhibit. During initial configuration testing, the Windows workstation PC1 cannot connect with the 172.16.2.0 /24 network. Which set of actions cor ...
- Refer to the exhibit. IPv6 must be implemented on R1 to the ISP. The uplink between R1 and the ISP must be configured with a manual assignment, and the LAN inte ...
- Refer to the exhibit. Which routes are configured with their default administrative distances?
- Refer to the exhibit. The engineer configured the VLANs on the new AccSw2 switch. A router-on-a-stick is connected to both switches. How must the ports be confi ...
- Refer to the exhibit. A packet is destined for 192.168.20.100. Drag and drop the parameters of the destination route from the left onto the routing table compon ...
- Which interface is used to send traffic to the destination network?
- Refer to the exhibit. OSPF neighbors routers A, B, C, and D are sending a route for 10.227.150.160/27. When the current route for 10.227.150.160/27 becomes unav ...
- Refer to the exhibit. Shortly after SiteA was connected to SiteB over a new single-mode fiber path, users at SiteA report intermittent connectivity issues with ...
- Refer to the exhibit. The default-information originate command is configured under the R1 OSPF configuration. After testing, workstations on VLAN 20 at Site B ...
- Refer to the exhibit. An engineer is bringing up a new circuit to the MPLS provider on the Gi0/1 interface of Router1. The new circuit uses eBGP and learns the ...
- Refer to the exhibit. An engineer must configure a floating static route on an external EIGRP network. The destination subnet is the /29 on the LAN interface of ...
- Which interface on the WLC is used exclusively as a DHCP relay?
- When a 5 GHz wireless network is implemented using 20 MHz channels with no DFS, how many nonoverlapping channels are available?
- Refer to the exhibit. What must be configured to enable WPA2 with AES encryption and fast roaming with a preshared key length of 64 characters?
- Which default condition must be considered when an encrypted mobility tunnel is used between two Cisco WLCs?
- Refer to the exhibit. Inter-VLAN routing is configured on SW1. Client A is running Linux as an OS in VLAN 10 with a default gateway IP 10.0.0.1 but cannot ping ...
- How does network automation help reduce network downtime?
- A Cisco engineer is configuring a WLC interface to handle RADIUS user-authentication traffic, WLC-to-WLC communication, SSH, and GUI sessions. Which type of int ...
- In which way does a spine-and-leaf architecture allow for scalability in a network when additional access ports are required?
- Drag and drop the characteristics from the left onto the corresponding protocol types on the right.
- Refer to the exhibit. Load-balanced traffic is coming in from the WAN destined to a host at 172.16.1.190. Which next-hop is used by the router to forward the re ...
- An engineer requires a switch interface to actively attempt to establish a trunk link with a neighbor switch. What command must be configured?
- Refer to the exhibit. Which interface is chosen to forward traffic to the host at 192.168.0.55?
- Which function generally performed by a traditional network device is replaced by a software-defined controller?
- What are two characteristics of a controller-based network? (Choose two.)
- Where are the real-time control functions processed in a split MAC architecture?
- Which two transport layer protocols carry syslog messages? (Choose two.)
- Which action must be taken to assign a global unicast IPv6 address on an interface that is derived from the MAC address of that interface?
- How does WPA3 improve security?
- Refer to the exhibit. Which commands are needed to add a sub-interface to Ethernet0/0 on R1 to allow for VLAN 20, with IP address 10.20.20.1/24?
- What is a characteristic of private IPv4 addressing?
- Refer to the exhibit. Which interface does a packet take to reach the destination address of 10.10.10.14?
- What is the definition of backdoor malware?
- Drag and drop the characteristic from the left onto the cable type on the right.
- Why would VRRP be implemented when configuring a new subnet in a multivendor environment?
- What are two benefits of FHRPs? (Choose two.)
- What must be added to a Cisco 9800 WLC to ensure that secure (HTTPS) web authentication takes place?
- Refer to the exhibit. A network engineer must configure router R1 with a host route to the server. Which command must the engineer configure?
- How does MAC learning function?
- Drag and drop the VLAN port modes from the left onto the descriptions on the right.
- A default route must be configured to temporarily use a local broadband modem with the IP address of 192.168.1.1 until a WAN circuit is installed. The WAN circu ...
- How are the switches in a spine-and-leaf topology interconnected?
- Which two components are needed to create an Ansible script that configures a VLAN on a switch? (Choose two.)
- Drag and drop the characteristic from the left onto the IPv6 address type on the right.
- Which interface condition is occurring in this output?
- Refer to the exhibit. Which functionalities will this SSID have while being used by wireless clients?
- Why are API keys used to enforce rate limiting?
- Refer to the exhibit. The router has been configured with a supernet to accommodate the requirement for 380 users on a subnet. The requirement already considers ...
- What describes a northbound REST API for SDN?
- How does machine learning improve the detection of unauthorized network access?
- What is the purpose of classifying network traffic in QoS?
- Refer to the exhibit. The primary route across Gi0/0 is configured on both routers. A secondary route must be configured to establish connectivity between the w ...
- Refer to the exhibit. A network administrator configures an interface on a new switch so that it connects to interface Gi1/0/1 on switch Cat9300-1. Which config ...
- What describes multifactor authentication in security password policies?
- Which virtualization technology requires a base OS installation but does not require a hypervisor?
- An administrator must secure the WLC from receiving spoofed association requests. Which steps must be taken to configure the WLC to restrict the requests and fo ...
- Which mechanism is used to ensure that a new key exchange takes place with every session within IPsec?
- Which technology is appropriate for communication between an SDN controller and applications running over the network?
- Refer to the exhibit. What is the next hop for a packet destined for 10.1.1.1?
- Which security program element helps protect against employees unintentionally leaking sensitive information via email?
- Refer to the exhibit. An engineer is configuring the HO router. Which IPv6 address configuration must be applied to the router fa0/1 interface for the router to ...
- Refer to the exhibit. What is the administrative distance for the advertised prefix that includes the host IP address 10.30.0.1?
- Refer to the exhibit. Considering default routing protocol configurations were used, which routing protocol is used to learn the 10.255.2.2/32 route?
- Refer to the exhibit. An engineer is updating the R1 configuration to connect a new server to the management network. The PCs on the management network must be ...
- Which two command sequences must be configured on a switch to establish a Layer 3 EtherChannel with an open-standard protocol?
- How is AI used to identify issues within network traffic?
- How is AI used to identify issues within network traffic?
- Refer to the exhibit. How does router R1 forward packets destined to 10.0.4.10?
- Which interface condition is occurring in this output?
- A switch receives a frame with the destination MAC address 3C:5D:7E:9F:1A:2B. How does the switch handle the frame?
- Which level of severity must be set to get informational syslogs?
- What are the two main capabilities of tunnel mode in IPsec site-to-site VPNs? (Choose two.)
- Refer to the exhibit. R1 learns all routes via OSPF. Which command configures a backup static route on R1 to reach the 192.168.20.0/24 network via R3?
- Refer to the exhibit. How must router A be configured so that it only sends Cisco Discovery Protocol information to router C?
- Drag and drop the characteristic from the left onto the IPv6 address type on the right.
- Refer to the exhibit. The New York router is configured with static routes pointing to the Atlanta and Washington sites. Which two tasks must be performed so th ...
- What differentiates the TCP and UDP protocols?
- Refer to the exhibit. VoIP is being implemented in the network using VLAN ID 73 and named "VoIP". Each user needs a Cisco IP phone at their desk. Switchport e0/ ...
- Refer to the exhibit. Drag and drop the prefix lengths from the left onto the corresponding prefixes on the right.
- Refer to the exhibit. How does router R1 forward packets destined to 10.0.4.10?
- Refer to the exhibit. Which next-hop IP address has the least desirable metric when sourced from R1?
- Refer to the exhibit. What is the administrative distance for the advertised prefix that includes the host IP address 10.30.0.1?
- Which action must be taken to assign a global unicast IPv6 address on an interface that is derived from the MAC address of that interface?
- Refer to the exhibit. Which settings must be verified on workstation 1 to establish IP connectivity to server 1 using the server's fully qualified domain name?
- How does network automation help reduce network downtime?
- An engineer is configuring data and voice services to pass through the same port. The designated switch interface fastethernet0/1 must transmit packets using th ...
- Drag and drop the characteristic from the left onto the device type on the right
- Refer to the exhibit. A network engineer must configure router R1 with a host route to the server. Which command must the engineer configure?
- Which WPA mode uses PSK authentication?
- Refer to the exhibit. Packets received by the router from BGP enter via a serial interface at 209.165.201.1. Each route is present within the routing table. Whi ...
- What is a characteristic of a Layer 2 switch?
- Refer to the exhibit. Which interface does a packet take to reach the host address of 192.168.18.16?
- Refer to the exhibit. A network engineer must update the WPA2 configuration of a WLAN to support non-802.11ac clients. What is the next step in the configuratio ...
- Refer to the exhibit. Which tasks must be performed on the Download File tab to install new software using TCP port 22?
- Which statement describes virtual machines?
- In software-defined architectures, which plane is distributed and responsible for traffic forwarding?
- Refer to the exhibit. Router R1 receives static routing updates from routers A, B, C, and D. The network engineer wants R1 to advertise static routes in OSPF ar ...
- What is a characteristic of RSA?
- What is the main difference between traditional networks and controller-based networking?
- What does the host do when the status of the IP address is "Preferred"?
- What does the host do when the status of the IP address is "Preferred"?
- When deploying a new network that includes both Cisco and third-party network devices, which redundancy protocol avoids the interruption of network traffic if t ...
- In which way does a spine-and-leaf architecture allow for scalability in a network when additional access ports are required?
- Refer to the exhibit. A network engineer must configure the CPE router to allow computers in the 172.20.1.0/24 network to obtain their IP configurations from th ...
- Refer to the exhibit. A network engineer must configure the CPE router to allow computers in the 172.20.1.0/24 network to obtain their IP configurations from th ...
- What is a characteristic of an SSID in wireless networks?
- What is a characteristic of an SSID in wireless networks?
- How is AI used to identify issues within network traffic?
- Refer to the exhibit. HQC needs to use a configuration that: • handles up to 150,000 concurrent connections • minimizes consumption of public IP addresses Wh ...
- A new user account must meet the following requirements: • It must be configured in the local database. • The username is engineer2. • It must use the strong ...
- Configure a factory-default router with these three passwords: •The user EXEC password for console access is p4sswOrd1. •The user EXEC password for Telnet acc ...
- Refer to the exhibit. Site A was recently connected to site B over a new single-mode fiber path. Users at site A report intermittent connectivity issues with ...
- Refer to the exhibit. A network engineer must configure router R1 with a host route to the server. Which command must the engineer configure?
- An abnormally high number of syslog messages are generated by a device with the debug process turned on. Which action prevents debug messages from being sent vi ...
- What is the purpose of classifying network traffic in QoS?
- Refer to the exhibit. The loopback1 interface of the Atlanta router must reach the loopback3 interface of the Washington router. Which two static host routes mu ...
- What is a service that is provided by a wireless controller?
- What are two recommendations for protecting network ports from being exploited when located in an office space outside of an IT closet? (Choose two.)
- What does apple represent within the JSON data?
- What does apple represent within the JSON data?
- Refer to the exhibit. An engineer must configure a static network route between two networks so that host A communicates with host B. Drag and drop the commands ...
- Refer to the exhibit. The static routes were implemented on the border router. What is the next hop IP address for a ping sent to 172.16.153.154 from the border ...
- Refer to the exhibit, An aineer WLAN wLAN > Edit General Security O Select the WPA2 Policy, AES, and TKIP check boxes. Layer2 n Select the WPA2 Policy and ...
- What are two benefits of controller-based networking? (Choose two)
- Which authentication method requires the user to provide a physical attribute to authenticate successfully?
- Which authentication method requires the user to provide a physical attribute to authenticate successfully?
- Which IPsec mode provides encapsulation and encryption of the entire original IP packet on a site-to-site VPN?
- What is a characteristic of cloud-based network topology?
- Which file transfer protocol omits a username or password requirement and acknowledges all data sent?
- What is the difference between the TCP and UDP protocols?
- What is the function of the controller in a software-defined network?
- Which technology is appropriate for communication between an SDN controller and applications running over the network?
- Which Cisco proprietary protocol ensures traffic recovers automatically when the active gateway fails?
- CCNA Lab: Configure SW1 and SW2 for Data VLAN 77 (User_VLAN), Voice VLAN 177 (Voice_VLAN), apply settings on E0/1-3, and enable LLDP on both switches.
- CCNA Lab: Configure OSPF on R2 (process 122), set router-id 10.22.22.22, advertise 10.0.223.0/28 and 10.0.122.0/30 in area 0, set e0/0 OSPF priority 255, and sa ...
- CCNA Lab: Configure addressing on R1 and R2 e0/0 using IPv4 10.0.12.0/28 and IPv6 2001:db8:12::/124, with no shutdown on both interfaces, then save.
- CCNA Lab: Configure Sw1/Sw2 with VLAN 100 Engineering, VLAN 102 Engineering_Voice, LLDP, and disable CDP on e0/0.
- CCNA Lab: Configure R1/R2 e0/0 with IPv4 172.16.16.33/29 and 172.16.16.38/29, IPv6 2001:db8:12::35/126 and ::36/126, then no shutdown.
- CCNA Lab: Configure OSPF process 30 on R1, set router-id 10.0.12.1, enable OSPF area 0 on e0/0 and e0/1, and set priority 255 on both interfaces.
- CCNA Lab: Configure Sw1/Sw2 trunk links on e0/0-1 with native VLAN 99, allowed VLANs 99,110, bundle with channel-group 20 mode active, and configure Port-Channe ...
- 2-802.1Q Trunking & LACP
- 3-Voice VLAN & LLDP Sim
- IPV4 IPV6 Address Assignment [New]
- Static Routing [New]
- OSPF Routing [New]
- OSPF 2 Routing [New]
- VLAN CDP LLDP LAB 1
- Trunking and Etherchannel LAB 2
- VLAN And LLDP new LAB 3
- Access List DHCP Snooping LAB 4
- VLAN, LLDP, and CDP LAB 5
- Trunking and ether-channel LAB
- Trunk and Ether-channel LAB
- VLAN Trunking LAB
- IPv4 static and default LAB
- Trunking LACP
- Trunking LACP LAB