Home Blog Certs Knowledge Base About
Q11 5. Security Fundamentals

An email user has been lured into clicking a link in an email sent by their company’s security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?

A Physical access control
B Social engineering attack
C brute force attack
D user awareness
Q12 5. Security Fundamentals

Which type of wireless encryption is used for WPA2 in pre-shared key mode?

A TKIP with RC4
B RC4
C AES-128
D AES-256
Q14 Not categorized

Which type of address is the public IP address of a NAT device?

A outside global
B outsdwde local
C inside global
D insride local
E outside public F. inside public
Q15 1. Network Fundamentals

Refer to the exhibit. Which prefix does Router 1 use for traffic to Host A? A. 10.10.10.0/28

B 10.10.13.0/25
C 10.10.13.144/28
D 10.10.13.208/29
Q16 3. IP Connectivity

How does HSRP provide first hop redundancy?

Question diagram
A It load-balances traffic by assigning the same metric value to more than one route to the same destination m the IP routing table.
B It load-balances Layer 2 traffic along the path by flooding traffic out all interfaces configured with the same VLAN.
C It forwards multiple packets to the same destination over different routed links n the data path.
D It uses a shared virtual MAC and a virtual IP address to a group of routers that serve as the default gateway for hosts on a LAN.
Q17 1. Network Fundamentals

In Which way does a spine-and-leaf architecture allow for scalability in a network when additional access ports are required?

A A spine switch and a leaf switch can be added with redundant connections between them.
B A spine switch can be added with at least 40 GB uplinks.
C A leaf switch can be added with a single connection to a core spine switch.
D A leaf switch can be added with connections to every spine switch.
Q18 4. IP Services

Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)

Choose 2 — select all that apply
A It drops lower-priority packets before it drops higher-priority packets.
B It can identify different flows with a high level of granularity.
C It guarantees the delivery of high-priority packets.
D It can mitigate congestion by preventing the queue from filling up.
E It supports protocol discovery.
Q19 4. IP Services

A network engineer must back up 20 network router configurations globally within a customer environment. Which protocol allows the engineer to perform this function using the Cisco IOS MIB?

A CDP
B SNMP
C SMTP
D ARP
Q20 5. Security Fundamentals

Refer to the exhibit. What is the effect of this configuration?

A The switch port interface trust state becomes untrusted.
B The switch port remains administratively down until the interface is connected to another switch.
C Dynamic ARP inspection is disabled because the ARP ACL is missing.
D The switch port remains down until it is configured to trust or untrust incoming packets.
Q21 1. Network Fundamentals

A frame that enters a switch fails the Frame Check Sequence. Which two interface counters are incremented? (Choose two) A. runts

Question diagram
Choose 2 — select all that apply
B giants
C frame
D CRC
E input errors