Home Blog Certs Knowledge Base About
Q430 (none)

Refer to the exhibit. Shortly after SiteA was connected to SiteB over a new single-mode fiber path users at SiteA report intermittent connectivity issues with applications hosted at SiteB What is the cause of the intermittent connectivity issue?

A Interface errors are incrementing
B An incorrect SFP media type was used at SiteA
C High usage is causing high latency
D The sites were connected with the wrong cable type
Q431 (none)

Refer to the exhibit. An engineer must configure GigabitEthernet1/1 to accommodate voice and data traffic Which configuration accomplishes this task? A. Option A

Question diagram Question diagram Question diagram
B Option B
C Option C
D Option D
Q433 (none)

Which security program element involves installing badge readers on data-center doors to allow workers to enter and exit based on their job roles?

A role-based access control
B biometrics
C multifactor authentication
D physical access control
Q434 (none)

Which network action occurs within the data plane?

A compare the destination IP address to the IP routing table.
B run routing protocols (OSPF, EIGRP, RIP, BGP)
C make a configuration change from an incoming NETCONF RPC
D reply to an incoming ICMP echo request
Q436 (none)

A network administrator must to configure SSH for remote access to router R1 The requirement is to use a public and private key pair to encrypt management traffic to and from the connecting client. Which configuration, when applied, meets the requirements?

A Option A
B Option B
C Option C
D Option D
Q437 (none)

Which protocol does an access point use to draw power from a connected switch?

Question diagram
A Internet Group Management Protocol
B Adaptive Wireless Path Protocol
C Cisco Discovery Protocol
D Neighbor Discovery Protocol
Q438 (none)

What is the benefit of using FHRP?

A reduced management overhead on network routers
B balancing traffic across multiple gateways in proportion to their loads
C higher degree of availability
D reduced ARP traffic on the network
Q439 (none)

An administrator must secure the WLC from receiving spoofed association requests. Which steps must be taken to configure the WLC to restrict the requests and force the user to wait 10 ms to retry an association request?

A Enable Security Association Teardown Protection and set the SA Query timeout to 10
B Enable MAC filtering and set the SA Query timeout to 10
C Enable 802.1x Layer 2 security and set me Comeback timer to 10
D Enable the Protected Management Frame service and set the Comeback timer to 10
Q440 (none)

A network engineer must configure the router R1 GigabitEthernet1/1 interface to connect to the router R2 GigabitEthernet1/1 interface. For the configuration to be applied the engineer must compress the address 2001:0db8:0000:0000:0500:000a:400F:583B. Which command must be issued on the interface?

A ipv6 address 2001:0db8::5: a: 4F 583B
B ipv6 address 2001:db8::500:a:400F:583B
C ipv6 address 2001 db8:0::500:a:4F:583B
D ipv6 address 2001::db8:0000::500:a:400F:583B
Q441 (none)

What does an SDN controller use as a communication protocol to relay forwarding changes to a southbound API? A. OpenFlow

B Java
C REST
D XML