An office has 8 floors with approximately 30-40 users per floor What command must be configured on the router Switched Virtual Interface to use address space efficiently?
Aip address 192.168.0.0 255.255.0.0
Bip address 192.168.0.0 255.255.254.0
Cip address 192.168.0.0 255.255.255.128
Dip address 192.168.0.0 255.255.255.224
Correct Answer:B
Q301(none)
Which device performs stateful inspection of traffic?
Afirewall
Bswitch
Caccess point
Dwireless controller
Correct Answer:A
Q302(none)
What criteria is used first during the root port selection process?
Alocal port ID
Blowest path cost to the root bridge
Clowest neighbor’s bridge ID
Dlowest neighbor’s port ID
Correct Answer:B
Q303(none)
Router R2 is configured with multiple routes to reach network 10 1.1.0/24 from router R1. What protocol is chosen by router R2 to reach the destination network 10.1.1.0/24?
AeBGP
Bstatic C. OSPF
DEIGRP
Correct Answer:B
Q304(none)
A network administrator enabled port security on a switch interface connected to a printer. What is the next configuration action in order to allow the port to learn the MAC address of the printer and insert it into the table automatically?
Aenable dynamic MAC address learning
Bimplement static MAC addressing.
Cenable sticky MAC addressing
Dimplement auto MAC address learning
Correct Answer:C
Q305(none)
Which configuration ensures that the switch is always the root for VLAN 750?
Although the "spanning-tree vlan 10 root primary" command will ensure a switch will have a bridge priority value lower than other bridges introduced to the network, the "spanning-tree vlan 10 priority 0" command ensures the bridge priority takes precedence over all other priorities.
Q307(none)
What protocol allows an engineer to back up 20 network router configurations globally while using the copy function?
ASMTP
BSNMP
CTCP
DFTP
Correct Answer:B
Q308(none)
Which state does the switch port move to when PortFast is enabled?
Alearning
Bforwarding
Cblocking
Dlistening
Correct Answer:B
Q309(none)
What are two roles of Domain Name Services (DNS)? (Choose Two)
Choose 2 — select all that apply
Abuilds a flat structure of DNS names for more efficient IP operations
Bencrypts network Traffic as it travels across a WAN by default
Cimproves security by protecting IP addresses under Fully Qualified Domain Names (FQDNs)
Denables applications to identify resources by name instead of IP address
Eallows a single host name to be shared across more than one IP address
Correct Answer:DE
Q310(none)
How do TCP and UDP differ in the way they guarantee packet delivery? A. TCP uses checksum, acknowledgement, and retransmissions, and UDP uses checksums only.
BTCP uses retransmissions, acknowledgement and parity checks and UDP uses cyclic redundancy checks only.
CTCP uses checksum, parity checks, and retransmissions, and UDP uses acknowledgements only.
DTCP uses two-dimensional parity checks, checksums, and cyclic redundancy checks and UDP uses retransmissions only.