New Questions - Part 11 Flashcards

1
Q

Router R1 must be configured as a UDP responder on port 6336. Which configuration accomplishes this task?

A. (config)#ip sla responder udp-echo ipaddress 10.10.10.1 port 6336

B. (config-if)#ip sla responder udp-port ipaddress 10.10.10.1 port 6336

C. (config)#ip sla responder ipaddress 10.10.10.1 port 6336

D. (config)#ip sla responder udp-echo ipv4 10.10.10.1 port 6336

A

A. (config)#ip sla responder udp-echo ipaddress 10.10.10.1 port 6336

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network engineer wants to configure console access to a router without using AAA so that the privileged exec mode is entered directly after a user provide the correct login credentials. Which action achieves this goal?

A. Configure login authentication privileged on line con 0
B. Configure a local username with privilege level 15
C. Configure privilege level 15 on line con 0
D. Configure a RADIUS or TACACS+ server and use it to send the privilege level

A

C. Configure privilege level 15 on line con 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Refer to the exhibit.

*Sep 16 09:13:40:974: %SPANTREE-7-RECV_1Q_NON_TRUNK: Received 802.1Q BPDU on non trunk GigabitEthernet0/0 VLAN0001.
*Sep 16 09:13:40:977: %SPANTREE-7-BLOCK_PORT_TYPE: Blocking GigabitEthernet0/0 on VLAN0001. Inconsistent port type.

Two switches are interconnected using interface GigabitEthernet0/0 on both sides. While configuring one of the switches, a network engineer receives the logging message. Which action resolves this issue?

A. Shutdown interface GigabitEthernet0/0 and bring it back up
B. Configure interface GigabitEthernet0/0 as a trunk port
C. Block VLAN1 on the trunk interface GigaEthernet0/0
D. Configure interface GigabitEthernet0/0 as an access port

A

B. Configure interface GigabitEthernet0/0 as a trunk port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Refer to the exhibit.

exhibit

An engineer must configure router R1 to allow only NETCONF connections from the management VLAN. Which command completes this configuration?

A.

R1(config)# netconf-yang ssh ipv4 access-list name netconfacl

B.

R1(config)# ip http secure-server
R1(config)# ip http accounting commands 12 default

C.

R1(config-if)# ip access-group netconfacl out

D.

R1(config-if)# ip access-group netconfacl in
A
R1(config)# netconf-yang ssh ipv4 access-list name netconfacl
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Refer to the exhibit.

WLANs_Aironet.jpg

An engineer is troubleshooting an issue with client devices triggering excessive power changes on APs in the 2.4 GHz band. Which action resolves this issue?

A. Disable Coverage Hole Detection
B. Disable Aironet IE
C. Set the 802.11 b/g/n DTIM interval to 0
D. Enable MFP Client Protection

A

B. Disable Aironet IE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which virtual mac address does HSRP group 12 use?

A. 00:5e:0c:07:ac:12
B. 00:00:0c:07:ac:0c
C. 00:05:5e:00:0c:12
D. 05:43:97:80:88:1c

A

B. 00:00:0c:07:ac:0c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is OAuth framework used in REST API?

A. by providing the external application a token that authorizes access to the account
B. by providing the user credentials to the external application
C. as a framework to hide the security information in the REST URL
D. as a framework to hash the security information in the REST URL

A

A. by providing the external application a token that authorizes access to the account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Refer to the exhibit.

exhibit

The administrator must extend the configuration of the switch to perform remote logging using syslog according to these requirements:
+ syslog server: 203.0.113.11 reachable through Gi0/0
+ initial message severity: notifications
+ message transport: reliable

Which two commands must be added to the configuration to accomplish this goal? (Choose two)

A. logging source-interface GigabitEthernet0/0 vrf Mgmt-vrf
B. logging host 203.0.113.11 vrf Mgmt-vrf
C. logging trap notifications
D. logging host 203.0.113.11 vrf Mgmt-vrf transport tcp
E. logging monitor notifications

A

C. logging trap notifications
D. logging host 203.0.113.11 vrf Mgmt-vrf transport tcp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A wireless administrator must create a new web authentication corporate SSID that will be using ISE as the external RADIUS server. The guest VLAN must be specified after the authentication completes. Which action must be performed to allow the ISE server to specify the guest VLAN?

A. enable NAC state
B. set AAA Policy name
C. enable AAA Override
D. set RADIUS Profiling

A

A. enable NAC state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Refer to the exhibit.

exhibit

What is the output of this code?

A.

1st_item####### : 8791871446
at_must_display: jlugyydt

B.

1st_item#######: 645298791871446
2nd_item_that_must_display: jlugyydt##

C.

1st_item#######: 6452987918
2nd_item_that_m: jlugyydt##

D.

645298791871446
##jlugyydt
A

B.

1st_item#######: 645298791871446
2nd_item_that_must_display: jlugyydt##
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Refer to the exhibit.

exhibit

What is achieved when this Python script is executed?

A. All devices that are looped through in the devices.txt file are put into a single dictionary that is appended to the parent list

B. Each device that is looped through in the devices.txt file is put into its own dictionary that is appended to the parent list.

C. Each device that is looped through in the devices.txt file is put into its own list that is appended to the parent dictionary.

D. All devices that are looped through in the devices.txt file are put into a list that is appended to the parent dictionary.

A

B. Each device that is looped through in the devices.txt file is put into its own dictionary that is appended to the parent list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which feature is available to clients using Layer 2 roaming in a wireless infrastructure?

A. Roam to a different wireless controller that is on a different subnet and maintain the same IP address.

B. Associate to a new access point on a different wireless controller and change the IP address without connectivity interruption.

C. Associate to a new access point on the same wireless controller and change the IP address without connectivity interruption.

D. Roam to a different wireless controller that shares the same subnet and maintain the same IP address.

A

D. Roam to a different wireless controller that shares the same subnet and maintain the same IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is one difference between the RIB and the FIB?

A. The RIB works at the data plane, and the FIB works at the control plane.

B. The RIB is known as the CEF table, and the FIB is known as the routing table.

C. The FIB contains routing prefixes, and the RIB contains the Layer 2 and Layer 3 information necessary to make a forwarding decision.

D. The RIB keeps all routing information received from peers, and the FIB keeps the minimum information necessary to make a forwarding

A

D. The RIB keeps all routing information received from peers, and the FIB keeps the minimum information necessary to make a forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly