A network engineer must configure an interface with IP address 10.10.10.145 and a subnet mask equivalent to 11111111.11111111.11111111.11111000. Which
subnet mask must the engineer use?
A. /29
B. /30
C. /27
D. /28
A. /29
Refer to the exhibit. The switches are connected via a Cat5 Ethernet cable that is tested successfully. The interfaces are configured as access ports and are both
in a down status. What is the cause of the issue?
A. The speed settings on the switches are mismatched
B. The distance between the two switches is not supported by Cat5
C. The switches are configured with incompatible duplex settings
D. The portfast command is missing from the configuration
A. The speed settings on the switches are mismatched
Which two IP addressing schemes provide internet access to users on the network while preserving the public IPv4 address space? (Choose two.)
A. IPv6 addressing
B. PAT with private internal addressing
C. single public Class A network
D. private networks only
E. custom addresses from ARIN
A. IPv6 addressing
B. PAT with private internal addressing
The address block 192.168.32.0/24 must be subnetted into smaller networks. The engineer must meet these requirements:
✑ Create 8 new subnets.
✑ Each subnet must accommodate 30 hosts.
✑ Interface VLAN 10 must use the last usable IP in the first new subnet.
✑ A Layer 3 interface is used.
Which configuration must be applied to the interface?
A. no switchport mode trunk ip address 192.168.32.97 255.255.255.224
B. switchport ip address 192.168.32.65 255.255.255.240
C. no switchport ip address 192.168.32.30 255.255.255.224
D. no switchport mode access ip address 192.168.32.62 255.255.255.240
C. no switchport ip address 192.168.32.30 255.255.255.224
Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.
Select and Place:
What are two reasons to deploy private addressing on a network? (Choose two.)
A. to subnet addresses in an organized hierarchy
B. to reduce network maintenance costs
C. to segment local IP addresses from the global routing table
D. to hide sensitive data from access users within an enterprise
E. to route protected data securely via an Internet service provider
B. to reduce network maintenance costs
C. to segment local IP addresses from the global routing table
Drag and drop the IPv6 DNS record types from the left onto the description on the right.
Select and Place:
Which property is shared by 10GBase-SR and 10GBase-LR interfaces?
A. Both use the single-mode fiber type.
B. Both require UTP cable media for transmission.
C. Both require fiber cable media for transmission.
D. Both use the multimode fiber type.
C. Both require fiber cable media for transmission
Drag and drop the IPv6 addresses from the left onto the corresponding address types on the right.
Select and Place:
Which device permits or denies network traffic based on a set of rules?
A. switch
B. firewall
C. wireless controller
D. access point
B. firewall
What is the role of a firewall in an enterprise network?
A. determines which packets are allowed to cross from unsecured to secured networks
B. processes unauthorized packets and allows passage to less secure segments of the network
C. forwards packets based on stateless packet inspection
D. explicitly denies all packets from entering an administrative domain
A. determines which packets are allowed to cross from unsecured to secured networks
An engineer is tasked with verifying network configuration parameters on a client workstation to report back to the team lead. Drag and drop the node identifiers
from the left onto the network parameters on the right.
Drag and drop the DNS lookup components from the left onto the functions on the right.
Select and Place:
Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.
Select and Place:
Which action is taken by a switch port enabled for PoE power classification override?
A. As power usage on a PoE switch port is checked data flow to the connected device is temporarily paused
B. When a powered device begins drawing power from a PoE switch port, a syslog message is generated
C. If a switch determines that a device is using less than the minimum configured power, it assumes the device has failed and disconnects it
D. Should a monitored port exceed the maximum administrative value for power, the port is shut down and err-disabled
D. Should a monitored port exceed the maximum administrative value for power, the port is shut down and err-disabled
What is a function spine-and-leaf architecture?
A. Offers predictable latency of the traffic path between end devices.
B. Exclusively sends multicast traffic between servers that are directly connected to the spine.
C. Mitigates oversubscription by adding a layer of leaf switches.
D. Limits payload size of traffic within the leaf layer.
A. Offers predictable latency of the traffic path between end devices.
Which action is taken by the data plane within a network device?
A. Constructs a routing table based on a routing protocol.
B. Forwards traffic to the next hop.
C. Looks up an egress interface in the forwarding information base.
D. Provides CLI access to the network device.
B. Forwards traffic to the next hop.
What is the function of the control plane?
A. It exchanges routing table information.
B. It provides CLI access to the network device.
C. It looks up an egress interface in the forwarding information base.
D. It forwards traffic to the next hop.
A. It exchanges routing table information
Which two cable types must be used to connect an access point to the WLC when 2.5-Gbps and 5-Gbps upload speeds are required? (Choose two.)
A. 10GBASE-T
B. 1000BASE-LX/LH
C. Cat 5e
D. Cat 5
E. Cat 3
A. 10GBASE-T
C. Cat 5e
What is a benefit for external users who consume public cloud resources?
A. Implemented over a dedicated WAN
B. All hosted on physical servers
C. Accessed over the Internet
D. Located in the same data center as the users
C. Accessed over the Internet
An engineer must update the configuration on two PCs in two different subnets to communicate locally with each other. One PC is configured with IP address
192.168.25.128/25 and the other with 192.168.25.100/25. Which network mask must the engineer configure on both PCs to enable the communication?
A. 255.255.255.248
B. 255.255.255.224
C. 255.255.255.0
D. 255.255.255.252
C. 255.255.255.0
Which key function is provided by the data plane?
A. Originating packets
B. Exchanging routing table data
C. Making routing decisions
D. Forwarding traffic to the next hop
D. Forwarding traffic to the next hop
When should an engineer implement a collapsed-core architecture?
A. Only when using VSS technology
B. For small networks with minimal need for growth
C. For large networks that are connected to multiple remote sites
D. The access and distribution layers must be on the same device
B. For small networks with minimal need for growth
Refer to the exhibit. An engineer assigns IP addressing to the current VLAN with three PCs. The configuration must also account for the expansion of 30 additional
VLANS using the same Class C subnet for subnetting and host count. Which command set fulfills the request while reserving address space for the expected
growth?
A. Switch(config)#interface vlan 10 Switch(config-if)#ip address 192.168.0.1 265 255.255.252
B. Switch(config)#interface vlan 10 Switch(config-if)#ip address 192.168.0.1 255 255.255.248
C. Switch(config)#interface vlan 10 Switch(config-if)#ip address 192.168.0.1 255 255.255.0
D. Switch(config)#interface vlan 10 Switch(config-if)#ip address 192.168.0.1 255.255.255.128
B. Switch(config)#interface vlan 10 Switch(config-if)#ip address 192.168.0.1 255 255.255.248