What provides centralized control of authentication and roaming In an enterprise network?
An engineer is tasked to configure a switch with port security to ensure devices that forward unicasts multicasts and broadcasts are unable to flood the port The port must be configured to permit only two random MAC addresses at a time Drag and drop the required configuration commands from the left onto the sequence on the right Not all commands are used.
Which two spanning-tree states are bypassed on an interface running PortFast? (Choose two.)
Refer to the exhibit.
Which two commands when used together create port channel 10? (Choose two.)
An engineer is configuring remote access to a router from IP subnet 10.139.58.0/28. The domain name, crypto keys, and SSH have been configured. Which configuration enables the traffic on the destination router?
A)
B)
C)
D)
Refer to the exhibit.
Switch A is newly configured. All VLANs are present in the VLAN database. The IP phone and PC A on Gi0/1 must be configured for the appropriate VLANs to establish connectivity between the PCs. Which command set fulfills the requirement?
A)
B)
C)
D)
Drag and drop the descriptions of AAA services from the left onto the corresponding services on the right.
R1 as an NTP server must have:
• NTP authentication enabled
• NTP packets sourced from Interface loopback 0
• NTP stratum 2
• NTP packets only permitted to client IP 209.165 200 225
How should R1 be configured?
A)
B)
C)
D)
Refer to the exhibit.
Which command configures OSPF on the point-to-point link between routers R1 and R2?
Refer to the exhibit.
The router has been configured with a supernet to accommodate the requirement for 380 users on a subnet The requirement already considers 30% future growth. Which configuration verifies the IP subnet on router R4?
A)
B)
C)
D)
Refer to the exhibit.
An engineer is asked to insert the new VLAN into the existing trunk without modifying anything previously configured Which command accomplishes this task?
Refer to the exhibit.
Which two configurations must the engineer apply on this network so that R1 becomes the DR? (Choose two.)
A)
B)
C)
D)
E)
Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.
Drag and drop the characteristics of networking from the left onto the networking types on the right.
Refer to the exhibit.
Router R1 resides in OSPF Area 0. After updating the R1 configuration to influence the paths that it will use to direct traffic, an engineer verified that each of the four Gigabit interfaces has the same route to 10.10.0.0/16. Which interface will R1 choose to send traffic to reach the route?
Refer to the exhibit.
Users need to connect to the wireless network with IEEE 802. 11r-compatible devices. The connection must be maintained as users travel between floors or to other areas in the building What must be the configuration of the connection?
Refer to the exhibit.
Which next-hop IP address does Routed use for packets destined to host 10 10.13.158?
Which action implements physical access control as part of the security program of an organization?
Refer to the exhibit.
Which plan must be Implemented to ensure optimal QoS marking practices on this network?
Refer to the exhibit.
Which minimum configuration items are needed to enable Secure Shell version 2 access to R15?
A)
B)
C)
D)
A network administrator is setting up a new IPv6 network using the 64-bit address 2001 0EB8 00C1 2200:0001 0000 0000 0331/64 To simplify the configuration the administrator has decided to compress the address Which IP address must the administrator configure?
OSPF must be configured between routers R1 and R2. Which OSPF configuration must be applied to router R1 to avoid a DR/BDR election?
Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right.
Refer to the exhibit.
Routers R1 and R3 have the default configuration The router R2 priority is set to 99 Which commands on R3 configure it as the DR in the 10.0 4.0/24 network?
Refer to the exhibit.
Packets received by the router from BGP enter via a serial interface at 209 165 201 1 Each route is present within the routing table Which interface is used to forward traffic with a destination IP of 10.1.1.19?
Drag and drop the Rapid PVST+ forwarding slate actions from the loft to the right. Not all actions are used.
Refer to the exhibit.
Web traffic is coming in from the WAN interface. Which route takes precedence when the router is processing traffic destined for the LAN network at 10 0.10.0/24?
Which IPv6 address block sends packets to a group address rather than a single address?
What is the purpose of a southbound API in a control based networking architecture?
Refer to Exhibit.
The loopback1 interface of the Atlanta router must reach the loopback3 interface of the Washington router. Which two static host routes must be configured on the NEW York router? (Choose two)
Refer to the exhibit.
An engineer is configuring the router to provide static NAT for the webserver Drag and drop the configuration commands from the left onto the letters that correspond to its position in the configuration on the right.
Refer to the exhibit.
Which password must an engineer use to enter the enable mode?
Which device tracks the state of active connections in order to make a decision to forward a packet through?
What mechanism carries multicast traffic between remote sites and supports encryption?
Which command automatically generates an IPv6 address from a specified IPv6 prefix and MAC address of an interface?
In which two ways does a password manager reduce the chance of a hacker stealing a users password? (Choose two.)
What are two benefits of controller-based networking compared to traditional networking?
Which two components are needed to create an Ansible script that configures a VLAN on a switch? (Choose two.)