Home Blog Certs Knowledge Base About
Q278 (none)

Which type of VPN uses a hub-and-spoke configuration to establish a full mesh topology?

A GRE over IPsec
B dynamic multipoint VPN
C MPLS VPN
D IPsec virtual tunnel interface
Q279 (none)

What are two purposes of launching a reconnaissance attack on a network? (Choose two.)

Choose 2 — select all that apply
A to prevent other users from accessing the system
B to escalate access privileges
C to gather information about the network and devices
D to scan for accessibility
E to retrieve and modify data
Q280 (none)

Refer to the exhibit. If the switch reboots and all routers have to re-establish OSPF adjacencies, which routers will become the new DR and BDR? A. Router R3 will become the DR and router R1 will become the BDR.

B Router R4 will become the DR and router R3 will become the BDR.
C Router R1 will become the DR and router R2 will become the BDR.
D Router R3 will become the DR and router R2 will become the BDR.
Q281 (none)

The SW1 interface g0/1 is in the down/down state. Which two configurations are valid reasons for the interface conditions?(choose two)

Question diagram
Choose 2 — select all that apply
A There is a duplex mismatch
B There is a speed mismatch
C There is a protocol mismatch
D The interface is shut down
E The interface is error-disabled
Q282 (none)

In which two ways does a password manager reduce the chance of a hacker stealing a users password? (Choose two.)

Choose 2 — select all that apply
A It automatically provides a second authentication factor that is unknown to the original user.
B It uses an internal firewall to protect the password repository from unauthorized access.
C It protects against keystroke logging on a compromised device or web site.
D It stores the password repository on the local workstation with built-in antivirus and anti-malware functionality
E It encourages users to create stronger passwords.
Q283 (none)

What is the primary purpose of a First Hop Redundancy Protocol?

A It allows directly connected neighbors to share configuration information.
B It allows a router to use bridge priorities to create multiple loop-free paths to a single destination.
C It reduces routing failures by allowing Layer 3 load balancing between OSPF neighbors that have the same link metric.
D It reduces routing failures by allowing more than one router to represent itself, as the default gateway of a network.
Q284 (none)

Refer to the exhibit. Which path is used by the router for internet traffic? A. 209.165.200.0/27

B 10.10.10.0/28
C 0.0.0.0/0
D 10.10.13.0/24
Q285 (none)

Refer to Exhibit. The loopback1 interface of the Atlanta router must reach the loopback3 interface of the Washington router. Which two static host routes must be configured on the NEW York router? (Choose two) A. ipv6 route 2000::1/128 2012::1

Question diagram
Choose 2 — select all that apply
B ipv6 route 2000::3/128 2023::3
C ipv6 route 2000::3/128 s0/0/0
D ipv6 route 2000::1/128 2012::2
E ipv6 route 2000::1/128 s0/0/1
Q287 (none)

Which goal is achieved by the implementation of private IPv4 addressing on a network?

A allows servers and workstations to communicate across public network boundaries
B provides a reduction in size of the forwarding table on network routers
C allows communication across the Internet to other private networks
D provides an added level of protection against Internet exposure
Q288 (none)

Refer to the exhibit. A network administrator assumes a task to complete the connectivity between PC A and the File Server Switch A and Switch B have been partially configured with VLANs 10, 11, 12, and 13 What is the next step in the configuration? A. Add PDA to VLAN 10 and the File Server to VLAN 11 for VLAN segmentation

B Add VLAN 13 to the trunk links on Switch A and Switch B for VLAN propagation
C Add a router on a stick between Switch A and Switch B allowing for Inter VLAN routing
D Add PC A to the same subnet as the File Server allowing for intra-VLAN communication