Home Blog Certs Knowledge Base About
Q289 (none)

When a WPA2-PSK WLAN is configured in the Wireless LAN Controller, what is the minimum number of characters that is required in ASCII formar?

Question diagram
A 6
B 8
C 12
D 18
Q290 (none)

Refer to the exhibit Which outcome is expected when PC_A sends data to PC_B?

A The switch rewrites the source and destination MAC addresses with its own
B The source and destination MAC addresses remain the same
C The source MAC address is changed
D The destination MAC address is replaced with ffff.ffff.ffff
Q292 (none)

Refer to the exhibit. Which switch becomes the root bridge?

A S1
B S2
C S3
D S4
Q293 (none)

Refer to the exhibit. What is the next hop address for traffic that is destined to host 10.0.1.5? A. Loopback 0

Question diagram
B 10.0.1.4
C 10.0.1.50
D 10.0.1.3
Q294 (none)

When the active router in an HSRP group fails, what router assumes the role and forwards packets?

A forwarding
B backup
C standby
D listening
Q295 (none)

An organization secures its network with multi-factor authentication using an authenticator app on employee smartphones. How is the applic secured in the case of a user’s smartphone being lost or stolen?

Question diagram
A The application requires the user to enter a PIN before it provides the second factor
B The application challenges a user by requiring an administrator password to reactivate when the smartphone is rebooted
C The application requires an aadministrator password to reactivate after a configured interval
D The application verifies that the user is in a specific location before it provides the second factor
Q296 (none)

Refer to the exhibit. What action establishes the OSPF neighbor relationship without forming an adjacency?

A modify priority
B modify process ID
C modify hello interval
D modity network type
Q297 (none)

Refer to the exhibit. An engineer booted a new switch and applied this configuration via the console port. Which additional configuration must be applied to allow administrators to authenticate directly to enable privilege mode via Telnet using a local username and password? A. R1(config)#username admin R1(config-if)#line vty 0 4 R1(config-line)#password p@ss1234

Question diagram
B R1(config)#username admin R1(config-if)#line vty 0 4 R1(config-line)#password p@ss1234 R1(config-line)#transport input telnet
C R1(config)#username admin secret p@ss1234 R1(config-if)#line vty 0 4 R1(config-line)#login local R1(config)#enable secret p@ss1234
D R1(config)#username admin privilege 15 secret p@ss1234 R1(config-if)#line vty 0 4 R1(config-line)#login local
Q298 (none)

Refer to the exhibit. Which switch in this configuration will be elected as the root bridge? SW1: 0C:E0:38:00:36:75 SW2: 0C:0E:15:22:05:97 SW3: 0C:0E:15:1A:3C:9D SW4: 0C:E0:18:A1:B3:19

Question diagram Question diagram
A SW1
B SW2
C SW3
D SW4
Q299 (none)

An engineer is configuring NAT to translate the source subnet of 10.10.0.0/24 to any of three addresses 192.168.3.1, 192.168.3.2, 192.168.3.3 . Which configuration should be used?

A enable configure terminal ip nat pool mypool 192.168.3.1 192.168.3.3 prefix-length 30 route-map permit 10.10.0.0 255.255.255.0 ip nat outside destination list 1 pool mypool interface g1/1 ip nat inside interface g1/2 ip nat outside
B enable configure terminal ip nat pool mypool 192.168.3.1 192.168.3.3 prefix-length 30 access-list 1 permit 10.10.0.0 0.0.0.255 ip nat outside destination list 1 pool mypool interface g1/1 ip nat inside interface g1/2 ip nat outside
C enable configure terminal ip nat pool mypool 192.168.3.1 192.168.3.3 prefix-length 30 access-list 1 permit 10.10.0 0.0 0.255 ip nat inside source list 1 pool mypool interface g1/1 ip nat inside interface g1/2 ip nat outside
D enable configure terminal ip nat pool mypool 192.168.3.1 192.168.3.3 prefix-length 30 access-list 1 permit 10.10.0.0 0.0.0.255 interface g1/1 ip nat inside interface g1/2 ip nat outside