Home Blog Certs Knowledge Base About
Q300 (none)

An office has 8 floors with approximately 30-40 users per floor What command must be configured on the router Switched Virtual Interface to use address space efficiently?

A ip address 192.168.0.0 255.255.0.0
B ip address 192.168.0.0 255.255.254.0
C ip address 192.168.0.0 255.255.255.128
D ip address 192.168.0.0 255.255.255.224
Q301 (none)

Which device performs stateful inspection of traffic?

A firewall
B switch
C access point
D wireless controller
Q302 (none)

What criteria is used first during the root port selection process?

A local port ID
B lowest path cost to the root bridge
C lowest neighbor’s bridge ID
D lowest neighbor’s port ID
Q303 (none)

Router R2 is configured with multiple routes to reach network 10 1.1.0/24 from router R1. What protocol is chosen by router R2 to reach the destination network 10.1.1.0/24?

A eBGP
B static C. OSPF
D EIGRP
Q304 (none)

A network administrator enabled port security on a switch interface connected to a printer. What is the next configuration action in order to allow the port to learn the MAC address of the printer and insert it into the table automatically?

A enable dynamic MAC address learning
B implement static MAC addressing.
C enable sticky MAC addressing
D implement auto MAC address learning
Q305 (none)

Which configuration ensures that the switch is always the root for VLAN 750?

A Switch(config)#spanning-tree vlan 750 priority 38003685
B Switch(config)#spanning-tree vlan 750 root primary
C Switch(config)#spanning-tree vlan 750 priority 614440
D Switch(config)#spanning-tree vlan 750 priority 0
Q307 (none)

What protocol allows an engineer to back up 20 network router configurations globally while using the copy function?

A SMTP
B SNMP
C TCP
D FTP
Q308 (none)

Which state does the switch port move to when PortFast is enabled?

A learning
B forwarding
C blocking
D listening
Q309 (none)

What are two roles of Domain Name Services (DNS)? (Choose Two)

Choose 2 — select all that apply
A builds a flat structure of DNS names for more efficient IP operations
B encrypts network Traffic as it travels across a WAN by default
C improves security by protecting IP addresses under Fully Qualified Domain Names (FQDNs)
D enables applications to identify resources by name instead of IP address
E allows a single host name to be shared across more than one IP address
Q310 (none)

How do TCP and UDP differ in the way they guarantee packet delivery? A. TCP uses checksum, acknowledgement, and retransmissions, and UDP uses checksums only.

B TCP uses retransmissions, acknowledgement and parity checks and UDP uses cyclic redundancy checks only.
C TCP uses checksum, parity checks, and retransmissions, and UDP uses acknowledgements only.
D TCP uses two-dimensional parity checks, checksums, and cyclic redundancy checks and UDP uses retransmissions only.