Which two functions are performed by the core layer in a three-tier architecture? (Choose two)
Choose 2 — select all that apply
AProvide uninterrupted forwarding service.
BPolice traffic that is sent to the edge of the network.
CProvide direct connectivity for end user devices.
DEnsure timely data transfer between layers.
EInspect packets for malicious activity.
Correct Answer:AD
Cisco is very clear about the purpose of this layer. Its only role is to forward traffic, the fastest it can. Here you don’t apply any policy, as you must try to reduce the load of the core so it can focus on routing. https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Campus/campover.html#wp708831
Q334(none)
When using Rapid PVST+, which command guarantees the switch is always the root bridge for VLAN 200?
Aspanning -tree vlan 200 priority 614440
Bspanning -tree vlan 200 priority 0
Cspanning -tree vlan 200 priority 38572422
Dspanning -tree vlan 200 root primary
Correct Answer:B
Q335(none)
What are two functions of a server on a network? (Choose two)
Choose 2 — select all that apply
Aachieves redundancy by exclusively using virtual server clustering
Bruns applications that send and retrieve data for workstations that make requests
Chandles requests from multiple workstations at the same time
Druns the same operating system in order to communicate with other servers
Ehoused solely in a data center that is dedicated to a single client
Correct Answer:BC
Q336(none)
What is the primary function of a Layer 3 device?
Ato analyze traffic and drop unauthorized traffic from the Internet
Bto transmit wireless traffic between hosts
Cto pass traffic between different networks
Dforward traffic within the same broadcast domain
Correct Answer:C
Q337(none)
Refer to the exhibit. After the election process what is the root bridge in the HQ LAN? A. Switch 1
BSwitch 2
CSwitch 3
DSwitch 4
Correct Answer:C
The root bridge is determined by the lowest bridge ID, which consists of the priority value and the MAC address. Because the priority values of all of the switches are not avalable, the MAC address is used to determine the root bridge. Because S3 has the lowest MAC address, S3 becomes the root bridge.
Q338(none)
An engineer requires a scratch interface to actively attempt to establish a trunk link with a neighbor switch. What command must be configured? A. switchport mode trunk
Bswitchport mode dynamic desirable
Cswitchport mode dynamic auto
Dswitchport nonegotiate
Correct Answer:B
Q339(none)
What is a function of TFTP in network operations?
Atransfers a backup configuration file from a server to a switch using a username and password
Btransfers files between file systems on a router
Ctransfers a configuration files from a server to a router on a congested link
Dtransfers IOS images from a server to a router for firmware upgrades
Correct Answer:D
Q340(none)
What are two recommendations for protecting network ports from being exploited when located in an office space outside of an IT closet? (Choose two)
Choose 2 — select all that apply
Aconfigure static ARP entries
Benable the PortFast feature on ports
Cimplement port-based authentication
Dconfigure ports to a fixed speed
Eshut down unused ports
Correct Answer:CE
Q341(none)
What is a recommended approach to avoid co-channel congestion while installing access points that use the 2.4 GHz frequency?
Adifferent nonoverlapping channels
Bdifferent overlapping channels
Cone overlapping channel
Done nonoverlapping channel
Correct Answer:A
Q342(none)
Refer to the exhibit. An engineer configured the New York router with state routes that point to the Atlanta and Washington sites. When command must be configured on the Atlanta and Washington routers so that both sites are able to reach the loopback2 interface on the New York router?