Which action does the router take as rt forwards a packet through the network?
AThe router replaces the source and desinaoon labels wth the sending router uterface label as a source and the next hop router label as a desbnabon
BThe router encapsulates the source and destination IP addresses with the sending router P address as the source and the neighbor IP address as the destination
CThe router replaces the original source and destination MAC addresses with the sending router MAC address as the source and neighbor MAC address as the destination
DThe router encapsulates the original packet and then includes a tag that identifies the source router MAC address and transmit transparently to the destination
Correct Answer:C
Q476(none)
When a site-to-site VPN is configured, which IPsec mode provides encapsulation and encryption of the entire original P packet?
AIPsec tunnel mode with AH
BIPsec transport mode with AH
CIPsec tunnel mode with ESP
DIPsec transport mode with ESP
Correct Answer:C
Q477(none)
Refer to the exhibit. Which two commands, when configured on router R1, fulfill these requirements? (Choose two.) Packets towards the entire network 2001:db8:2::/64 must be forwarded through router R2. Packets toward host 2001:db8:23::14 preferably must be forwarded through R3.
Choose 2 — select all that apply
AIpv6 route 2001:db8:23::/128 fd00:12::2
BIpv6 route 2001:db8:23::14/128 fd00:13::3
CIpv6 route 2001:db8:23::14/64 fd00:12::2
DIpv6 route 2001:db8:23::/64 fd00:12::2
EIpv6 route 2001:db8:23::14/64 fd00:12::2 200
Correct Answer:BD
Therefore, we use a host route meaning that all bits of the ipv6 destination address must match (prefix-length of /128). Also, the next hop address should be that of R3 (fd00:13::3) since the question asks that packets for the host must be forwarded through it.
Q478(none)
What is the role of a firewall in an enterprise network?
AForwards packets based on stateless packet inspection
BProcesses unauthorized packets and allows passage to less secure segments of the network
Cdetermines which packets are allowed to cross from unsecured to secured networks
Dexplicitly denies all packets from entering an administrative domain
Correct Answer:C
Q479(none)
What is the benefit of configuring PortFast on an interface?
AAfter the cable is connected, the interface uses the fastest speed setting available for that cable type
BAfter the cable is connected, the interface is available faster to send and receive user data
CThe frames entering the interface are marked with higher priority and then processed faster by a switch.
DReal-time voice and video frames entering the interface are processed faster
Correct Answer:B
Q480(none)
How are VLAN hopping attacks mitigated?
Aenable dynamic ARP inspection
Bmanually implement trunk ports and disable DTP
Cactivate all ports and place in the default VLAN
Dconfigure extended VLANs
Correct Answer:B
Q481(none)
Which two protocols must be disabled to increase security for management connections to a Wireless LAN Controller? (Choose two)
Choose 2 — select all that apply
ATelnet
BSSH
CHTTP
DHTTPS
ETFTP
Correct Answer:AC
Q482(none)
When a client and server are not on the same physical network, which device is used to forward requests and replies between client and server for DHCP?
ADHCP relay agent
BDHCP server
CDHCPDISCOVER
DDHCPOFFER
Correct Answer:A
Q483(none)
Which QoS tool is used to optimize voice traffic on a network that is primarily intended for data traffic?
AFIFO
BWFQ
CPQ
DWRED
Correct Answer:C
Q484(none)
On workstations running Microsoft Windows, which protocol provides the default gateway for the device?