Home Blog Certs Knowledge Base About
Q333 (none)

Which two functions are performed by the core layer in a three-tier architecture? (Choose two)

Choose 2 — select all that apply
A Provide uninterrupted forwarding service.
B Police traffic that is sent to the edge of the network.
C Provide direct connectivity for end user devices.
D Ensure timely data transfer between layers.
E Inspect packets for malicious activity.
Q334 (none)

When using Rapid PVST+, which command guarantees the switch is always the root bridge for VLAN 200?

A spanning -tree vlan 200 priority 614440
B spanning -tree vlan 200 priority 0
C spanning -tree vlan 200 priority 38572422
D spanning -tree vlan 200 root primary
Q335 (none)

What are two functions of a server on a network? (Choose two)

Choose 2 — select all that apply
A achieves redundancy by exclusively using virtual server clustering
B runs applications that send and retrieve data for workstations that make requests
C handles requests from multiple workstations at the same time
D runs the same operating system in order to communicate with other servers
E housed solely in a data center that is dedicated to a single client
Q336 (none)

What is the primary function of a Layer 3 device?

A to analyze traffic and drop unauthorized traffic from the Internet
B to transmit wireless traffic between hosts
C to pass traffic between different networks
D forward traffic within the same broadcast domain
Q337 (none)

Refer to the exhibit. After the election process what is the root bridge in the HQ LAN? A. Switch 1

B Switch 2
C Switch 3
D Switch 4
Q338 (none)

An engineer requires a scratch interface to actively attempt to establish a trunk link with a neighbor switch. What command must be configured? A. switchport mode trunk

Question diagram
B switchport mode dynamic desirable
C switchport mode dynamic auto
D switchport nonegotiate
Q339 (none)

What is a function of TFTP in network operations?

A transfers a backup configuration file from a server to a switch using a username and password
B transfers files between file systems on a router
C transfers a configuration files from a server to a router on a congested link
D transfers IOS images from a server to a router for firmware upgrades
Q340 (none)

What are two recommendations for protecting network ports from being exploited when located in an office space outside of an IT closet? (Choose two)

Choose 2 — select all that apply
A configure static ARP entries
B enable the PortFast feature on ports
C implement port-based authentication
D configure ports to a fixed speed
E shut down unused ports
Q341 (none)

What is a recommended approach to avoid co-channel congestion while installing access points that use the 2.4 GHz frequency?

A different nonoverlapping channels
B different overlapping channels
C one overlapping channel
D one nonoverlapping channel
Q342 (none)

Refer to the exhibit. An engineer configured the New York router with state routes that point to the Atlanta and Washington sites. When command must be configured on the Atlanta and Washington routers so that both sites are able to reach the loopback2 interface on the New York router?

A ipv6 route ::/0 Serial 0/0/1
B ipv6 route 0/0 Serial 0/0/0
C ipv6 route ::/0 Serial 0/0/0
D ip route 0.0.0.0.0.0.0.0 Serial 0/0/0
E ipv6 route ::/0 2000::2