-
Refer to the exhibit. Which three options are available when the Cisco Wireless Control System (WCS) discovers rogue access points on the LAN?()https://assets.asklib.com/images/image2/2018072416180978608.jpg
A . The WCS sends new rouge access point notifications.
B . The WCS locates and monitors rouge access points until they are eliminated or acknowledged.
C . The WCS reconfigures the rouge access point with proper authentication credentials.
D . The WCS sends deauthenticate and disassociate messages to the rouge access point.
E . The WCS contains rouge access points by sending their clients deauthenticate and disassociate messages
F . The WCS sends deauthenticate and disassociate messages to all wireless clients on the network.
-
Refer to the exhibit. Which three statements accurately describe the result of applying the exhibited route map?()https://assets.asklib.com/images/image2/2018073015105040094.jpg
A . The map prohibits th e redistribution of all type 2 external OSPF routes.
B . All routes that do no match clauses 10 and 20 of the route map are redistributed with their tags set to 8.
C . The map prohibits the redistribution of all external OSPF routes with tag 6 set.
D . Th e map permits the redistribution of all type 1 external OSPF routes.
E . The map redistributes into EIGRP all routes that match the pfx prefix list and the five metric values?0000, 1000, 255, 1, and 1500.
F . The map prohibits the redistribution of all ty pe 2 external OSPF routes with tag 6 set.
-
Which three Layer 2 encapsulation types would be used on a WAN rather than a LAN (Choose three.)()。
A . HDLC
B . Ethernet
C . Token Ring
D . PPP
E . FDDI
F . Frame Relay
-
Refer to the exhibit. Which three statements accurately describe the result of applying the exhibited route map?()https://assets.asklib.com/images/image2/201807260953573115.jpg
A . The map prohibits the redistribution of all type 2 external OSPF routes with tag 6 set
B . The map prohibits the redistribution of all type 2 external OSPF routes
C . The map redistributes into EIGRP all routes that match the pfx prefix list and the five metric values40000, 1000, 255, 1, and 1500
D . The map prohibits the redistribution of all external OSPF routes with tag 6 set
E . All routes that do no match clauses 10 and 20 of the route map are redistributed with their tags set to 8
F . The map permits the redistribution of all type 1 external OSPF route
-
Which three statements describe the configuration change management feature in DCNM LAN? ()
A . Switch profiles allow configurations to be synchronized between switches and are supported with any Cisco NX-OS Software managed device.
B . DCNM LAN can archive configurations from devices even if they are not managed by the DCNM server, and the administrator can supply the device management IP address and credentials.
C . You can archive a maximum of 50 configuration versions per managed device.
D . Managed devices must be licensed in DCNM LAN before they can be used with configuration change management.
E . Device-running configuration will be archived only if it differs from the last archived version.
-
Which three statements regarding Cisco ASAmulticast routing support are correct? ()
A . ASA supports both stubmulticast routing and PIMmulticast routing. However, you cannot configure bothconcurrently on a single security appliance
B . When configured for stubmulticast routing, the ASA can act as the Rendezvous Point (RP)
C . If the ASAdetects IGMPversion1 routers, the ASAwill automatically switch to IGMP version 1 operations.
D . The ASA supports both PIM-SM and bi-directional PIM
E . Enabling multicast routing globally on the ASA automatically enables PIM and IGMP on all interfaces
F . The ASA can be configured for IGMP snooping toconstrain theflooding of multicast traffic by dynamically configuring themulticast traffic to be forwarded only those interfaces associated with hosts requesting themulticast grou
-
You need to design router redundancy on the Company network. Which three protocols could be chosen for IP routing redundancy to protect against first-hop router failure?()
A . GLBP
B . ICMP
C . MSTP
D . HSRP
E . VRRP
F . NHRP
-
Which three statements about BGP confederation and route reflectors are true? ()
A . Clusters are used in confederation schemes to avoid loops.
B . BGP network can have a confederation within a route reflector area.
C . An internal BGP network cannot have a route reflector within a confederation.
D . An internal BGP network can have a route reflector within a confederation.
E . Clusters are used in route reflector schemes to avoid loops.
F . BGP network cannot have a confederation within a route reflector area.
-
Which series of commands will configure router R1 for LAN-to-LAN communication with router R2? The enterprise network address is 192.1.1.0/24 and the routing protocol in use is RIP.()https://assets.asklib.com/images/image2/2018072315342863428.jpg
A . R1(config)# interface ethernet 0;R1(config-if)# ip address 192.1.1.129 255.255.255.192;R1(config-if)# no shutdown
B . R1(config)# interface ethernet 0;R1(config-if)# ip address 192.1.1.97 255.255.255.192;R1(config-if)# no shutdown
C . R1(config)# interface serial 0;R1(config-if)# ip address 192.1.1.4 255.255.255.252;R1(config-if)# clock rate 56000
D . R1(config)# interface serial 0;R1(config-if)# ip address 192.1.1.6 255.255.255.252;R1(config-if)# no shutdown
E . R1(config)# router rip;R1(config-router)# network 192.1.1.4;R1(config-router)# network 192.1.1.128
F . R1(config)# router rip;R1(config-router)# version 2;R1(config-router)# network 192.1.1.0
-
Cisco IOS XR Software Multicast Routing Implementation, which three features are supported in IPv6 onCisco CRS router?()
A . PIM-SSM
B . Aggregation multicast
C . PIM-Bidirectional
D . OOR handling
E . integrated multicast
F . Multicast NSF
-
The Company network utilizes the Multiple-instance Spanning Tree protocol in its switched LAN. Which three statements about the MST protocol (IEEE 802.1S) are true? ()
A . To verify the MST configuration, the show pending command can be used in MST configuration mode.
B . When RSTP and MSTP are configured; UplinkFast and BackboneFast must also be enabled.
C . All switches in the same MST region must have the same VLAN-to-instance mapping, but different configuration revision numbers.
D . All switches in an MST region, except distribution layer switches, should have their priority lowered from the default value 32768.
E . An MST region is a group of MST switches that appear as a single virtual bridge to adjacent CST and MST regions.
F . Enabling MST with the "spanning-tree modemst" global configuration command also enables RSTP.
-
Which three statements are true about EIGRP route summarization?()
A . When manual summarization is configured, the router immediately creates a route that points to null0 interface
B . Manual route summarization is configured in router configuration mode when the router is configured for EIGRP routing
C . Manual route summarization is configured on the interface
D . The ip summary - address eigrp command generates a default route with an administrative distance of 5
E . When manual summarization is configured, the summary route will use the metric of the largest specific metric of the summary routes
F . The ip summary - address eigrp command generates a default route with an administrative distance of 90
-
Which three statements describe user authentication in Cisco DCNM-LAN? ()
A . Cisco DCNM-LAN server users are local to the Cisco DCNM-LAN server. Creating, changing, and removing Cisco DCNM-LAN server users has no effect on user accounts on managed devices.
B . A Cisco DCNM-LAN server user that has Administrator privileges can push out changes to managed devices even if the Cisco NX-OS role that is used on the discovered device has the network operator role.
C . Cisco DCNM-LAN user roles restrict the ability of users to make changes to Cisco DCNM-LAN server settings. Cisco NX-OS user roles enforce read/write privileges on the discovered devices.
D . Cisco DCNM-LAN allows you to configure unique credentials for each discovered device or use default credentials when you do not configure unique credentials for a device.
E . Cisco DCNM-LAN can use AAA servers to authenticate users. Only TACACS servers are supported.
-
Which three Layer 2 encapsulation types would be used on a WAN rather than a LAN?()
A . HDLC
B . Ethernet
C . Token Ring
D . PPP
E . FDDI
F . Frame Relay
-
Which three benefits are realized by implementing Wireless LAN Solution Engine (WLSE)?()
A . improved WLAN security
B . simplified AP deployment
C . dynamic RF management
D . on-demand location of rogue APs
E . system-wide control of status and alarm monitoring
F . automatic channel and power level adjustment
-
You need to determine the correct wireless LAN topology for use in the Company network. Which three statements are true about the various WLAN topologies?()
A . In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.
B . In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single access point for connecting to each other or to wired network resources.
C . In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS).
D . In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.
E . In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single AP for connecting to each other or to wired network resources.
F . In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS)
-
What are three functions of the Cisco wireless LAN controller, which is being used in the Company Centralized WLAN solution network? ()
A . Authentication
B . Mobility
C . Security management
D . Transmission of beacon frames
E . Real-time portions of MAC management
F . Real-time aspects of the 802.11 prtocol management
G . SNMP collectio
-
Which three LAN routing protocols would be appropriate for a small retail organization with a multi-vendor LAN infrastructure? ()
A . IGRP
B . RIP
C . RIPv2
D . OSPF
-
Which three statements about the EIGRP routing protocol are true?()
A . EIGRP supports five generic packet types, including hello, database description (DBD), link state request (LSR), link - state update (LSU), and LSAck.
B . EIGRP sends periodic hello packets to the multicast IP address 224.0.0.10.
C . EIGRP will not form a neighbor relationship with another peer when their K values are mismatched.
D . EIGRP sends periodic hello packets to the multicast IP address 224.0.0.9.
E . E IGRP will form a neighbor relationship with another peer even when their K values are mismatched.
F . EIGRP supports five generic packet types, including hello, update, query, reply, and ACK packets.
-
Which three options are valid ways to filter routes from a BGP peer?()
A . filter-list
B . inbound ACL
C . route-map
D . outbound ACL
E . prefix-list
F . neighbor 10.0.0.1 deny-map my-map command
-
Which three of the statements below correctly describe the characteristics of Autonomous Systems in routed networks?()
A . Within an AS, all routers must run either BGP or IBGP.
B . An AS uses exterior gatew ay protocols (EGPs) to exchange information with other autonomous systems.
C . An AS is a group of routers under the same technical administration.
D . Within an AS, routes learned through BGP can be redistributed using interior gateway protocols.
E . Wi thin an AS, routes learned through an interior protocol cannot be redistributed using BGP to other autonomous systems.
-
When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()
A . all interfaces in the path toward the destination
B . all networks in the path toward the destination
C . adjacent next hop router in the path toward the destination
D . all routers in the path toward the destination
E . all interfaces through which the packets can be routed
F . type of service and precedence in the IP packet
-
Which three Layer 2 encapsulation types would be used on a WAN rather than a LAN? (Choose three.)()
A . HDLC
B . Ethernet
C . Token Ring
D . PPP
E . FDDI
F . Frame Relay
-
The DAI feature has been implemented in the Company switched LAN. Which three statements are true about the dynamic ARP inspection (DAI) feature? ()
A . DAI can be performed on ingress ports only.
B . DAI can be performed on both ingress and egress ports.
C . DAI is supported on access ports, trunk ports, EtherChannel ports, and private VLAN ports.
D . DAI should be enabled on the root switch for particular VLANs only in order to secure the ARP caches of hosts in the domain.
E . DAI should be configured on all access switch ports as untrusted and on all switch ports connected to other switches as trusted.
F . DAI is supported on access and trunk ports only.