Topic 2, Exam B
Refer to Exhibit.
How does SW2 interact with other switches in this VTP domain?
A. It processes VTP updates from any VTP clients on the network on its access ports.
B.
It receives updates from all VTP servers and forwards all locally configured VLANs out all trunk ports
C. It forwards only the VTP advertisements that it receives on its trunk ports.
D. It transmits and processes VTP updates from any VTP Clients on the network on its trunk ports
Reference:
A corporate office uses four floors in a building • Floor 1 has 24 users • Floor 2 has 29 users • Floor 3 has 28 users •Floor 4 has 22 users Which subnet summarizes and gives the most efficient distribution of IP addresses for the router configuration?
A. 192.168.0.0/26 as summary and 192.168.0.0/29 for each floor
B. 192.168.0.0.24 as summary and 192.168.0.0/28 for each floor
C. 192.168.0.0/23 as summary and 192.168.0.0/25 for each floor
D. l92.168.0.0/25 as summary and 192.168.0.0/27 for each floor
What is a role of access points in an enterprise network?
A. connect wireless devices to a wired network
B. support secure user logins to devices or the network
C. integrate with SNMP in preventing DDoS attacks
D. serve as a first line of defense in an enterprise network
Which command must be entered to configure a DHCP relay?
A. ip helper-address
B. ip address dhcp
C. ip dhcp pool
D. ip dhcp relay
Which configuration is needed to generate an RSA key for SSH on a router?
A. Configure the version of SSH
B. Configure VTY access.
C.
Create a user with a password.
D. Assign a DNS domain name
Which type of organization should use a collapsed-core architecture?
A. large and requires a flexible, scalable network design
B. large and must minimize downtime when hardware fails
C. small and needs to reduce networking costs currently
D. small but is expected to grow dramatically in the near futu
Explanation:
A collapsed-core architecture is a limited investment for a small company,
and may be efficient and productive for a limited time.
An engineer must configure a WLAN using the strongest encryption type for WPA2- PSK. Which cipher fulfills the configuration requirement?
A. WEP
B. RC4
C. AES
D. TKIP
Explanation:
Many routers provide WPA2-PSK (TKIP), WPA2-PSK (AES), and WPA2- PSK (TKIP/AES) as options. TKIP is actually an older encryption protocol introduced with WPA to replace the very-insecure WEP encryption at the time. TKIP is actually quite similar to WEP encryption. TKIP is no longer considered secure, and is now deprecated. In other words, you shouldn’t be using it. AES is a more secure encryption protocol introduced with WPA2 and it is currently the strongest encryption type for WPA2-PSK.
An engineer must establish a trunk link between two switches. The neighboring switch is set to trunk or desirable mode. What action should be taken?
A. configure switchport nonegotiate
B. configure switchport mode dynamic desirable
C. configure switchport mode dynamic auto
D. configure switchport trunk dynamic desirable
Which condition must be met before an NMS handles an SNMP trap from an agent?
A. The NMS software must be loaded with the MIB associated with the trap.
B. The NMS must be configured on the same router as the SNMP agent
C. The NMS must receive a trap and an inform message from the SNMP agent within a configured interval
D. The NMS must receive the same trap from two different SNMP agents to verify that it is reliable.
A user configured OSPF and advertised the Gigabit Ethernet interface in OSPF By default, which type of OSPF network does this interface belong to?
A. point-to-multipoint
B. point-to-point
C. broadcast
D. nonbroadcast
Explanation:
https://www.oreilly.com/library/view/cisco-ioscookbook/ 0596527225/ch08s15.html The Broadcast network type is the default for an OSPF enabled ethernet interface (while Point-toPoint is the default OSPF network type for Serial interface with HDLC and PPP encapsulation).
Which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?
A. TKiP encryption
B. AES encryption
C. scrambled encryption key
D. SAE encryption
Which port type supports the spanning-tree portfast command without additional
configuration?
A. access ports
B. Layer 3 main Interfaces
C. Layer 3 suninterfaces
D. trunk ports
| Page 26 out of 72 Pages |
| Previous |