Which type of VPN uses a hub-and-spoke configuration to establish a full mesh topology?
AGRE over IPsec
Bdynamic multipoint VPN
CMPLS VPN
DIPsec virtual tunnel interface
Correct Answer:B
Q279(none)
What are two purposes of launching a reconnaissance attack on a network? (Choose two.)
Choose 2 — select all that apply
Ato prevent other users from accessing the system
Bto escalate access privileges
Cto gather information about the network and devices
Dto scan for accessibility
Eto retrieve and modify data
Correct Answer:CD
Gathering information about a network and scanning for access is a reconnaissance attack. Preventing other users from accessing a system is a denial of service attack. Attempting to retrieve and modify data, and attempting to escalate access privileges are types of access attacks.
Q280(none)
Refer to the exhibit. If the switch reboots and all routers have to re-establish OSPF adjacencies, which routers will become the new DR and BDR? A. Router R3 will become the DR and router R1 will become the BDR.
BRouter R4 will become the DR and router R3 will become the BDR.
CRouter R1 will become the DR and router R2 will become the BDR.
DRouter R3 will become the DR and router R2 will become the BDR.
Correct Answer:A
OSPF elections of a DR are based on the following in order of precedence: highest pritority from 1 -255 (0 = never a DR) highest router ID highest IP address of a loopback or active interface in the absence of a manually configured router ID. Loopback IP addresses take higher precedence than other interfaces. In this case routers R1 and R3 have the highest router priority. Between the two, R3 has the higher router ID. Therefore, R3 will become the DR and R1 will become the BDR.
Q281(none)
The SW1 interface g0/1 is in the down/down state. Which two configurations are valid reasons for the interface conditions?(choose two)
Choose 2 — select all that apply
AThere is a duplex mismatch
BThere is a speed mismatch
CThere is a protocol mismatch
DThe interface is shut down
EThe interface is error-disabled
Correct Answer:BE
Q282(none)
In which two ways does a password manager reduce the chance of a hacker stealing a users password? (Choose two.)
Choose 2 — select all that apply
AIt automatically provides a second authentication factor that is unknown to the original user.
BIt uses an internal firewall to protect the password repository from unauthorized access.
CIt protects against keystroke logging on a compromised device or web site.
DIt stores the password repository on the local workstation with built-in antivirus and anti-malware functionality
EIt encourages users to create stronger passwords.
Correct Answer:CE
Q283(none)
What is the primary purpose of a First Hop Redundancy Protocol?
AIt allows directly connected neighbors to share configuration information.
BIt allows a router to use bridge priorities to create multiple loop-free paths to a single destination.
CIt reduces routing failures by allowing Layer 3 load balancing between OSPF neighbors that have the same link metric.
DIt reduces routing failures by allowing more than one router to represent itself, as the default gateway of a network.
Correct Answer:D
Q284(none)
Refer to the exhibit. Which path is used by the router for internet traffic? A. 209.165.200.0/27
B10.10.10.0/28
C0.0.0.0/0
D10.10.13.0/24
Correct Answer:C
Q285(none)
Refer to Exhibit. The loopback1 interface of the Atlanta router must reach the loopback3 interface of the Washington router. Which two static host routes must be configured on the NEW York router? (Choose two) A. ipv6 route 2000::1/128 2012::1
Choose 2 — select all that apply
Bipv6 route 2000::3/128 2023::3
Cipv6 route 2000::3/128 s0/0/0
Dipv6 route 2000::1/128 2012::2
Eipv6 route 2000::1/128 s0/0/1
Correct Answer:AB
Q287(none)
Which goal is achieved by the implementation of private IPv4 addressing on a network?
Aallows servers and workstations to communicate across public network boundaries
Bprovides a reduction in size of the forwarding table on network routers
Callows communication across the Internet to other private networks
Dprovides an added level of protection against Internet exposure
Correct Answer:D
Q288(none)
Refer to the exhibit. A network administrator assumes a task to complete the connectivity between PC A and the File Server Switch A and Switch B have been partially configured with VLANs 10, 11, 12, and 13 What is the next step in the configuration? A. Add PDA to VLAN 10 and the File Server to VLAN 11 for VLAN segmentation
BAdd VLAN 13 to the trunk links on Switch A and Switch B for VLAN propagation
CAdd a router on a stick between Switch A and Switch B allowing for Inter VLAN routing
DAdd PC A to the same subnet as the File Server allowing for intra-VLAN communication