When a WPA2-PSK WLAN is configured in the Wireless LAN Controller, what is the minimum number of characters that is required in ASCII formar?
A6
B8
C12
D18
Correct Answer:B
Q290(none)
Refer to the exhibit Which outcome is expected when PC_A sends data to PC_B?
AThe switch rewrites the source and destination MAC addresses with its own
BThe source and destination MAC addresses remain the same
CThe source MAC address is changed
DThe destination MAC address is replaced with ffff.ffff.ffff
Correct Answer:B
Q292(none)
Refer to the exhibit. Which switch becomes the root bridge?
AS1
BS2
CS3
DS4
Correct Answer:B
Q293(none)
Refer to the exhibit. What is the next hop address for traffic that is destined to host 10.0.1.5? A. Loopback 0
B10.0.1.4
C10.0.1.50
D10.0.1.3
Correct Answer:C
Q294(none)
When the active router in an HSRP group fails, what router assumes the role and forwards packets?
Aforwarding
Bbackup
Cstandby
Dlistening
Correct Answer:C
Q295(none)
An organization secures its network with multi-factor authentication using an authenticator app on employee smartphones. How is the applic secured in the case of a user’s smartphone being lost or stolen?
AThe application requires the user to enter a PIN before it provides the second factor
BThe application challenges a user by requiring an administrator password to reactivate when the smartphone is rebooted
CThe application requires an aadministrator password to reactivate after a configured interval
DThe application verifies that the user is in a specific location before it provides the second factor
Correct Answer:A
Q296(none)
Refer to the exhibit. What action establishes the OSPF neighbor relationship without forming an adjacency?
Amodify priority
Bmodify process ID
Cmodify hello interval
Dmodity network type
Correct Answer:C
Q297(none)
Refer to the exhibit. An engineer booted a new switch and applied this configuration via the console port. Which additional configuration must be applied to allow administrators to authenticate directly to enable privilege mode via Telnet using a local username and password? A. R1(config)#username admin R1(config-if)#line vty 0 4 R1(config-line)#password p@ss1234
Refer to the exhibit. Which switch in this configuration will be elected as the root bridge? SW1: 0C:E0:38:00:36:75 SW2: 0C:0E:15:22:05:97 SW3: 0C:0E:15:1A:3C:9D SW4: 0C:E0:18:A1:B3:19
ASW1
BSW2
CSW3
DSW4
Correct Answer:C
Q299(none)
An engineer is configuring NAT to translate the source subnet of 10.10.0.0/24 to any of three addresses 192.168.3.1, 192.168.3.2, 192.168.3.3 . Which configuration should be used?
Aenable configure terminal ip nat pool mypool 192.168.3.1 192.168.3.3 prefix-length 30 route-map permit 10.10.0.0 255.255.255.0 ip nat outside destination list 1 pool mypool interface g1/1 ip nat inside interface g1/2 ip nat outside
Benable configure terminal ip nat pool mypool 192.168.3.1 192.168.3.3 prefix-length 30 access-list 1 permit 10.10.0.0 0.0.0.255 ip nat outside destination list 1 pool mypool interface g1/1 ip nat inside interface g1/2 ip nat outside
Cenable configure terminal ip nat pool mypool 192.168.3.1 192.168.3.3 prefix-length 30 access-list 1 permit 10.10.0 0.0 0.255 ip nat inside source list 1 pool mypool interface g1/1 ip nat inside interface g1/2 ip nat outside
Denable configure terminal ip nat pool mypool 192.168.3.1 192.168.3.3 prefix-length 30 access-list 1 permit 10.10.0.0 0.0.0.255 interface g1/1 ip nat inside interface g1/2 ip nat outside