Home Blog Certs Knowledge Base About
Q364 (none)

Where does a switch maintain DHCP snooping information?

A in the MAC address table
B in the CAM table
C in the binding database D. in the frame forwarding database
Q365 (none)

Which type of security program is violated when a group of employees enters a building using the ID badge of only one person?

A intrusion detection
B user awareness
C physical access control
D network authorization
Q366 (none)

A network administrator needs to aggregate 4 ports into a single logical link which must negotiate layer 2 connectivity to ports on another switch What must be configured when using active mode on both sides of the connection?

A 802.1q trunks
B Cisco vPC
C LLDP
D LACP
Q367 (none)

In which situation is private IPv4 addressing appropriate for a new subnet on the network of an organization?

A There is limited unique address space, and traffic on the new subnet will stay local within the organization.
B The network has multiple endpoint listeners, and it is desired to limit the number of broadcasts.
C Traffic on the subnet must traverse a site-to-site VPN to an outside organization.
D The ISP requires the new subnet to be advertised to the internet for web services.
Q369 (none)

Which state does the switch port move to when PortFast is enabled?

A forwarding
B listening
C blocking
D learning
Q370 (none)

Refer to the exhibit. An access list is created to deny Telnet access from host PC-1 to RTR-1 and allow access from all other hosts A Telnet attempt from PC-2 gives this message:”% Connection refused by remote host” Without allowing Telnet access from PC-1, which action must be taken to permit the traffic? A. Add the access-list 10 permit any command to the configuration

B Remove the access-class 10 in command from line vty 0.4.
C Add the ip access-group 10 out command to interface g0/0.
D Remove the password command from line vty 0 4.
Q371 (none)

What is a role of wireless controllers in an enterprise network?

A centralize the management of access points in an enterprise network
B support standalone or controller-based architectures
C serve as the first line of defense in an enterprise network
D provide secure user logins to devices on the network.
Q372 (none)

What is the effect when loopback interfaces and the configured router ID are absent during the OSPF Process configuration?

Question diagram
A No router ID is set, and the OSPF protocol does not run.
B The highest up/up physical interface IP address is selected as the router ID.
C The lowest IP address is incremented by 1 and selected as the router ID.
D The router ID 0.0.0.0 is selected and placed in the OSPF process.
Q373 (none)

What is recommended for the wireless infrastructure design of an organization?

A group access points together to increase throughput on a given channel
B configure the first three access points are configured to use Channels 1, 6, and 11
C include a least two access points on nonoverlapping channels to support load balancing
D assign physically adjacent access points to the same Wi-Fi channel
Q374 (none)

Which 802.11 frame type is indicated by a probe response after a client sends a probe request?

A action
B management
C control
D data