-
Refer to the exhibit.
What is the configuration an example of? ()
https://assets.asklib.com/images/image2/2018073015220049716.jpg
A . GLBP weighting
B . default AVF and AVG configuration
C . GLBP MD5 authentication
D . GLBP text authentication
E . GLBP timer manipulatio
-
Refer to the exhibit. The output that is shown is generated at a switch. Which three of these statements are true? ()
A . All ports will be in a state of discarding, learning, or forwarding.
B . Thirty VLANs have been configured on this switch.
C . The bridge priority is lower than the default value for spanning tree.
D . All interfaces that are shown are on shared media.
E . All designated ports are in a forwarding state.
F . The switch must be the root bridge for all VLANs on this switch.
-
Refer to the exhibit. When running OSPF, What would cause router A not to form an adjacency with router B?()https://assets.asklib.com/images/image2/2018072410262779147.jpg
A . The loopback addresses are on different subnets
B . The value of the dead timers on the router are different
C . Route summarization is enabled on both routers
D . The process indentifier on router A is different than the process identifier on router B
-
Refer to the exhibit. When deploying an MSFC and an FWSM, which statement is correct?()https://assets.asklib.com/images/image2/2018072609055419681.jpg
A . Proper placement depends on the VLAN assignment.
B . Place it outside the firewall.
C . Place it inside the firewall to make design and management easier.
D . Place it inside the firewall with multiple context modes connecting to all configured contexts.
-
Refer to the exhibit.
https://assets.asklib.com/images/image2/2018073016070377463.png
Which three statements describe the steps that are required to configure an IPsec site-to-site VPN using a GRE tunnel?()
A . The command access-list 110 permit gre must be configured to specify which traffic will be encrypted.
B . The command access-list 110 permit ip must be configured to specify which hosts can use the tunnel.
C . The tunnel destination 172.17.63.18 command must be configured on the Tunnel0 interface.
D . The tunnel mode gre command must be configured on the Tunnel0 interface.
E . The tunnel source Ethernet1 command must be configured on the Tunnel0 interface.
F . The tunnel source Tunnel0 command must be configured on the Tunnel0 interface.
-
Refer to the exhibit. Which configuration would correctly enable Host A to acquire an IP address from the DHCP server that is located at 10.1.2.10/24? ()https://assets.asklib.com/images/image2/201807301525026565.jpg
A . ASw1(config)# interface range FastEthernet 0/1 - 24 ASw1(config - if - range)# ip forward - protocol udp 67 ASw1(config - if - range)# ip forward - protocol udp 68
B . ASw1(config)# interface range FastEthernet 0/1 - 24 ASw1(config - if - range)# ip helper - address 10.1.2.10
C . RTA(config)# interface fastethernet0/0 RTA(config -if)# ip forward- protocol udp 67 RTA(config - if)# ip forwar d- protocol udp 68
D . RTA(config)# interface fastethernet0/1 RTA(config -if)# ip forward- protocol udp 67 RTA(config -if)# ip forward- protocol udp 68
E . RTA(config)# interface fastethernet0/0 RTA(config - if)# ip helper - address 10.1.2.10
F . RTA(config)# in terface fastethernet0/1 RTA(config - if)# ip helper - address 10.1.2.10
-
Refer to the exhibit. Which statement is true about a voice VLAN?()https://assets.asklib.com/images/image2/2018072610051691343.jpg
A . Physically the voice network and the data network are separate
B . The voice traffic will normally be on a different IP subnet than will the data traffic
C . End user intervention is necessary to place the phone into the proper VLAN
D . The same security policy should be implemented for both voice and data traffic
E . The data VLAN must be configured as the native VLAN
-
Refer to the exhibit.
Which protocol establishes an optimal path to the root in a wireless mesh network? ()
https://assets.asklib.com/images/image2/2018073011454335678.jpg
A . Adaptive Wireless Path (AWP)
B . WLAN Quality of Service (WQoS)
C . Lightweight Access Point Protocol (LWAPP)
D . 802.1Q WLAN trunking protocol
E . Layer 2 Roaming (IAPP)
-
Refer to the exhibit.
https://assets.asklib.com/images/image2/2018072608430379107.jpg
Which of the following is an advantage of device clustering utilizing Virtual Port Channels (vPC)?()
A . A logical star topology provides a loop free environment so that all links will be used forwardtraffic
B . Enhanced EtherChannel hashing load balancing using the vPC peer link internal to the VPC
C . The control plane functions of the Nexus switches are merged to hide the use of virtualization
D . Neighboring devices connect on a Layer 3 MEC for improved packet forwarding
-
Refer to the exhibit.Which three statements correctly describe Network Device A?()https://assets.asklib.com/images/image2/2018072315413323788.jpg
A . With a network wide mask of 255.255.255.128, each interface does not require an IP address.
B . With a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet.
C . With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate with each other.
D . With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other.
E . With a network wide mask of 255.255.254.0, each interface does not require an IP address.
-
Refer to the exhibit.
How will interface FastEthernnet0/1 respond when an 802.1x-enabled client connects to the port? ()
https://assets.asklib.com/images/image2/2018073011005317862.jpg
A . The switch will uniquely authorize the client by using the client MAC address.
B . The switch will cause the port to remain in the unauthorized state, ignoring all attempts by the client to authenticate.
C . The switch port will disable 802.1x port-based authentication and cause the port to transition to the authorized state without any further authentication exchange.
D . The switch port will enable 802.1x port-based authentication and begin relaying authentication messages between the client and the authentication server.
-
Refer to the exhibit.
https://assets.asklib.com/images/image2/201807301615135089.png
Which order correctly identifies the steps to provision a cable modem to connect to a headend as defined by the DOCSIS standard?()
A . A→D→C→G→E→F→B
B . A→D→E→G→C→F→B
C . C→D→F→G→E→A→B
D . C→D→F→G→A→E→B
E . F→D→C→G→A→E→B
-
Refer to the exhibit.Based on the exhibited routing table,how will packets from a host within the192.168.10.192/26 LAN be forwarded to 192.168.10.1?()https://assets.asklib.com/images/image2/2018072314090474779.jpg
A . The router will forward packets from R3 to R2 to R1
B . The router will forward packets from R3 to R1
C . The router will forward packets from R3 to R1 to R2
D . The router will forward packets from R3 to R2 to R1 AND from R3 to R1
-
Refer to the exhibit. What is the configuration an example of?()
A . enabling modular QoS over Frame Relay
B . enabling Real-Time Transport Protocol (RTP) header compression
C . enabling distributed compressed Transmission Control Protocol
D . enabling latency and jitter reduction for Transmission Control traffic
E . enabling TCP header compressio
-
Refer to the exhibit,a network administrator cannot establish a telnet session with the indicated router.What is the cause of this failure?()
A . A level 5 password is not set
B . The vty password is missing
C . The console password is missing
D . An ACL is blocking Telnet acce
-
Refer to the exhibit. Which three statements correctly describe Network Device A?()https://assets.asklib.com/images/image2/2018072316253185664.jpg
A . With a network wide mask of 255.255.255.128, each interface does not require an IP address.
B . With a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet.
C . With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate with each other.
D . With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other.
E . With a network wide mask of 255.255.254.0, each interface does not require an IP address.
-
Refer to the exhibit. At the end of an RSTP election process, which access layer switch port will assume the discarding role?()https://assets.asklib.com/images/image2/2018072317314615527.jpg
A . Switch3, port fa0/1
B . Switch3, port fa0/12
C . Switch4, port fa0/11
D . Switch4, port fa0/2
E . Switch3, port Gi0/1
F . Switch3, port Gi0/2
-
Refer to the exhibit. Host A has sent an ARP message to the default gateway IP address10.10.10.1. Which statement is true?()https://assets.asklib.com/images/image2/2018072614534380870.jpg
A . DSw1 will reply with the MAC address of the next AVF
B . DSw2 will reply with the MAC address of the next AVF
C . Because of the invalid timers that are configured, DSw1 will not reply
D . Because of the invalid timers that are configured, DSw2 will not reply
E . DSw1 will reply with the IP address of the next AVF
F . DSw2 will reply with the IP address of the next AVF
-
Refer to the exhibit.
What type of message will be used by the lightweight access point (LAP) in an attempt to locate the wireless LAN controller (WLC)? ()
https://assets.asklib.com/images/image2/2018073011534320826.jpg
A . The LAP will send out a DNS request. In return, the DNS server will provide the WLC domain name.
B . The LAP will send out a Layer 3 LWAPP discovery request to the WLC on the wireless network.
C . The LAP will send out a DHCP request. In return, the DHCP server will provide the IP addresses for the LAP and the WLC.
D . The LAP will send out a Layer 2 LWAPP discovery request to the WLC on the wireless network.
-
Refer to the exhibit. The DHCP configuration that is shown is configured on a Cisco router. Whichstatement is true?()
A . The router will distribute IP addresses from pool 1 until its addresses are exhausted. Then therouter will begin distributing addresses from pool 2
B . The configuration is invalid because the DHCP options are global configuration commands
C . The configuration is incomplete until the DHCP pools are bound to the appropriate interface orinterfaces
D . The router will choose which pool to use based upon the interface the DHCP request wasreceived o
-
Refer to the exhibit.Based on the exhibited routing table,how will packets from a host within the 192.168.10.192/26 LAN be forwarded to 192.168.10.1?()https://assets.asklib.com/images/image2/2018072408493768982.jpg
A . TherouterwillforwardpacketsfromR3toR2toR1
B . TherouterwillforwardpacketsfromR3toR1
C . TherouterwillforwardpacketsfromR3toR1toR2
D . TherouterwillforwardpacketsfromR3toR2toR1ANDfromR3toR1
-
Refer to the exhibit. According to the routing table, where will the router send a packet destined for 10.1.5.65?()https://assets.asklib.com/images/image2/2018072408541982136.jpg
A . 10.1.1.2
B . 10.1.2.2
C . 10.1.3.3
D . 10.1.4.4
-
Refer to the exhibit. What additional commands should be used to configure OSPF area 5 as a Totally Stubby area? ()
<img src='https://img2.soutiyun.com/shangxueba/ask/64290001-64293000/64291910/529008d927b67f31920b5858e5879e0b.png' />
A. area 0 stub o n routers R4 and R5
B. area 5 stub on routers R4 and R5
C. area 5 stub no - summary on routers R4 and R5
D. area 0 stub no - summary on router R4 and area 5 stub no - summary on router R5
E. area 5 stub no - summary on router R4 and area 5 stub on router R5
-
Refer to the exhibit. When running OSPF, What would cause router A not to form an adjacency with router B?()
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/67e52e69e1cc511a71a60a5d0c35c68a.jpg' />
A.The loopback addresses are on different subnets
B.The value of the dead timers on the router are different
C.Route summarization is enabled on both routers
D.The process indentifier on router A is different than the process identifier on router B