CORRECT ANSWERS
\.What occurs when overlapping Wi-Fi channels are implemented?
Users experience poor wireless network performance.
\.Which two minimum parameters must be configured on an active interface to enable
OSPFv2 to operate?
Which two minimum parameters must be configured on an active interface to enable OSPFv2 to
operate?
\.What occurs to frames during the process of frame flooding?
Frames are sent to every port on the switch in the same VLAN except from the originating port
\.Which security program element involves installing badge readers on data-center doors to
allow workers to enter and exit based on their job roles?
physical access control
\.What is the maximum bandwidth of a T1 point-to-point connection?
1.544 Mbps
\.What are two functions of a server on a network? (Choose two)
1. achieves redundancy by exclusively using virtual server clustering
2. runs applications that send and retrieve data for workstations that make requests
\,What uses HTTP messages to transfer data to applications residing on different hosts?
REST
\.An organization has decided to start using cloud-provided services Which cloud service
allows the organization to install its own operating system on a virtual machine?
Infrastructure as Service (laaS)
,\.What software defined architecture plane assists network devices with making packet-
forwarding decisions by providing Layer 2 reachability and Layer 3 routing information?
control plane
\.In software defined architectures which plane is distributed and responsible for traffic
forwarding?
data plane
\.Which two components are needed to create an Ansible script that configures a VLAN on a
switch?
1- playbook
2- Task
\.What is a function of a remote access VPN?
allows the users to access company internal network resources through a secure tunnel
\.When a site-to-site VPN is configured which IPsec mode provides encapsulation and
encryption of the entire original P packet?
IPsec tunnel mode with ESP
\.Which command enables a router to become a DHCP client?
ip address dhcp
\.Which type of information resides on a DHCP server?
a list of the available IP addresses in a pool
\.Which command automatically generates an IPv6 address from a specified IPv6 prefix and
MAC address of an interface?
ipv6 address autoconfig
\.Which technology is used to improve web traffic performance by proxy caching?
WSA
\.Which type of security program is violated when a group of employees enters a building
using the ID badge of only one person?
physical access control
,\.Which two events occur automatically when a device is added to Cisco DNA Center? (Choose
two. )
A. The device Is assigned to the Global site.
B. The device Is placed into the managed state.
\.What is the benefit of using FHRP?
higher degree of availability
\.If the network environment is operating normally, which type of device must be connected
to interface
router
\.Which function does the range of private IPv4 addresses perform?
allows multiple companies to each use the same addresses without conflicts
\.Which two outcomes are predictable behaviors for HSRP?
1. The two routers negotiate one router as the active router and the other as the standby router
2. The two routers share a virtual IP address that is used as the default gateway for devices on
the LAN
\.When DHCP is configured on a router, which command must be entered so the default
gateway is
automatically distributed?
default-router
\.Which two encoding methods are supported by REST APIs? (Choose two)
1- JSON
2- XML
\.Which two WAN architecture options help a business scalability and reliability for the
network? (Choose
two)
1- asychronous routing
2- static routing
\,What is a benefit of using a Cisco Wireless LAN Controller?
It eliminates the need to configure each access point individually
, \.What is a DHCP client?
a host that is configured to request an IP address automatically
\.How does a switch process a frame received on Fa0/1 with the destination MAC address of
0e38.7363.657b when the table is missing the address?
It floods the frame to all interfaces except Fa0/1.
\.What describes the operation of virtual machines?
Virtual machines are operating system instances that are decoupled from server hardware
\.What is the function of a hub-and-spoke WAN topology?
provides direct connections between subscribers
\.A port security violation has occurred on a switch port due to the maximum MAC address
count being
exceeded. Which command must be configured to increment the security-violation count and
forward an
SNMP trap?
switchport port-security violation restrict
\.What are two characteristics of the distribution layer in a three-tier network architecture?
(Choose two.)
1- provides a boundary between Layer 2 and Layer 3 communications
2- designed to meet continuous, redundant uptime requirements
\.36. What are two characteristics of the distribution layer in a three-tier network
architecture? (Choose two.)
1- provides a boundary between Layer 2 and Layer 3 communications
2- designed to meet continuous, redundant uptime requirements
\.34. What is the function of a hub-and-spoke WAN topology?
provides direct connections between subscribers
\.37. Which statement identifies the functionality of virtual machines?
The hypervisor can virtualize physical components including CPU. memory, and storage