Refer to the exhibit. Which two events occur on the interface, if packets from an unknown Source address arrive after the interface learns the maximum number of secure MAC address? (Choose two.) A. The security violation counter dose not increment
Choose 2 — select all that apply
BThe port LED turns off
CThe interface is error-disabled
DA syslog message is generated
EThe interface drops traffic from unknown MAC address
Correct Answer:AE
Q111Not categorized
Refer to the exhibit. Which two statements about the network environment of router R1 must be true? (Choose two.) A. there are 20 different network masks within the 10.0.0.0/8 network
Choose 2 — select all that apply
BA static default route to 10.85.33.14 was defined
CTen routes are equally load-balanced between Te0/1/0.100 and Te0/2/0.100
DThe 10.0.0.0/8 network was learned via external EIGRP
EThe EIGRP administrative distance was manually changed from 90 to 170
Correct Answer:AC
Q112Not categorized
Refer to the exhibit. Which statement about the interface that generated the output is true? A. Five secure MAC addresses are dynamically learned on the interface.
BA syslog message is generated when a violation occurs.
COne secure MAC address is manually configured on the interface.
DOne secure MAC address is dynamically configured on the interface.
Correct Answer:C
Q113Not categorized
Refer to the exhibit. When PC 1 sends a packet to PC2,the packet has. Which source and destination IP address when it arrives at interface Gi0/0 on router R2? A. source 192.168.10.10 and destination 10.10.2.2
Bsource 192.168.20.10 and destination 192.168.20.1
Csource 192.168.10.10 and destination 192.168.20.10
Dsource 10.10.1.1 and destination 10.10.2.2
Correct Answer:C
The source and destination IP addresses of the packets are unchanged on all the way. Only source and destination MAC addresses are changed.
Q114Not categorized
Refer to the exhibit Users in your office are complaining that they cannot connect to the severs at a remote site. When troubleshooting, you find that you can successfully reach the severs from router R2. What is the most likely reason that the other users are experiencing connection failure? A. interface ports are shut down on the remote servers
BThe DHCP address pool has been exhausted
CThe ip helper-address command is missing on the R2 interface that connects to the switch
DVLSM is misconfigured between the router interface and the DHCP pool.
Correct Answer:D
Q115Not categorized
After you deploy a new WLAN controller on your network, which two additional tasks should you consider? (Choose two)
Choose 2 — select all that apply
Adeploy load balancers
Bconfigure additional vlans
Cconfigure multiple VRRP groups
Ddeploy POE switches
Econfigure additional security policies
Correct Answer:AE
Q116Not categorized
Refer to the exhibit. The default-information originate command is configured under the R1 OSPF configuration. After testing, workstations on VLAN 20 at Site B cannot reach a DNS server on the Internet. Which action corrects the configuration issue?
AAdd the default-information originate command on R2.
BAdd the always keyword to the default-information originate command on R1.
CConfigure the ip route 0.0.0.0 0.0.0.0 10.10.10.18 command on R1.
DConfigure the ip route 0.0.0.0 0.0.0.0 10.10.10.2 command on R2.
Correct Answer:C
Q117Not categorized
Which of the following is the JSON encoding of a dictionary or hash?
A{“key”:”value”}
B[“key”,”value”]
C{“key”,”value”}
D(“key”:”value”)
Correct Answer:A
QUESTION 118 Which option best describes an API? A. A contract that describes how various components communicate and exchange data with each other. B. an architectural style (versus a protocol) for designing applications C. a stateless client-server model D. request a certain type of data by specifying the URL path that models the data Correct Answer: A Section: Not categorized Explanation Explanation/Reference:
Q119Not categorized
Which command verifies whether any IPv6 ACLs are configured on a router?
Ashow ipv6 interface
Bshow access-list
Cshow ipv6 access-list
Dshow ipv6 route
Correct Answer:C
Q120Not categorized
Which command can you enter to allow Telnet to be supported in addition to SSH?