<< Prev Question Next Question >>

Question 57/122

Which type of security program is violated when a group of employees enters a building using the ID badge of only one person?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (122q)
Question 1: What are two fundamentals of virtualization? (choose two)...
Question 2: An engineer must establish a trunk link between two switches...
Question 3: Refer to the exhibit. (Exhibit) An engineer must configure G...
Question 4: Which security program element involves installing badge rea...
Question 5: Which function does the range of private IPv4 addresses perf...
Question 6: An engineer must configure a/30 subnet between two routers. ...
Question 7: An organization secures its network with multi-factor authen...
Question 8: Refer to the exhibit. (Exhibit) With which metric was the ro...
Question 9: When a floating static route is configured, which action ens...
Question 10: Which networking function occurs on the data plane?...
Question 11: Refer to the exhibit. (Exhibit) Which route does R1 select f...
Question 12: Refer to exhibit. (Exhibit) Which statement explains the con...
Question 13: Several new coverage cells are required to improve the Wi-Fi...
Question 14: Refer to the exhibit. (Exhibit) How does the router manage t...
Question 15: Refer to the exhibit. (Exhibit) The entire contents of the M...
Question 16: Which unified access point mode continues to serve wireless ...
Question 17: How is the native VLAN secured in a network?...
Question 18: What is the primary effect of the spanning-tree portfast com...
Question 19: By default, how Does EIGRP determine the metric of a route f...
Question 20: Which two encoding methods are supported by REST APIs? (Choo...
Question 21: Refer to the exhibit. (Exhibit) Drag and drop the networking...
Question 22: Refer to the exhibit. (Exhibit) A network administrator assu...
Question 23: Refer to the exhibit. (Exhibit) What action establishes the ...
Question 24: Which technology is used to improve web traffic performance ...
Question 25: Which configuration ensures that the switch is always the ro...
Question 26: Drag and drop the TCP/IP protocols from the left onto the tr...
Question 27: An office has 8 floors with approximately 30-40 users per fl...
Question 28: Refer to the exhibit. (Exhibit) What is the effect of this c...
Question 29: A network engineer must back up 20 network router configurat...
Question 30: which purpose does a northbound API serve in a controller-ba...
Question 31: What is a function of a remote access VPN?...
Question 32: Refer to the exhibit. (Exhibit) which path is used by the ro...
Question 33: Which statement correctly compares traditional networks and ...
Question 34: How does CAPWAP communicate between an access point in local...
Question 35: What is a similarity between OM3 and OM4 fiber optic cable?...
Question 36: Refer to the exhibit. (Exhibit) The network administrator wa...
Question 37: Refer to the exhibit. (Exhibit) Which two commands were used...
Question 38: What does a router do when configured with the default DNS l...
Question 39: When a WLAN with WPA2 PSK is configured in the Wireless LAN ...
Question 40: How do traditional campus device management and Cisco DNA Ce...
Question 41: What protocol allows an engineer to back up 20 network route...
Question 42: What is an advantage of Cisco DNA Center versus traditional ...
Question 43: in Which way does a spine and-leaf architecture allow for sc...
Question 44: What are two improvements provided by automation for network...
Question 45: What is a practice that protects a network from VLAN hopping...
Question 46: Which mode must be used to configure EtherChannel between tw...
Question 47: Refer to the exhibit. (Exhibit) An engineer is tasked with v...
Question 48: Drag and drop the network protocols from the left onto the c...
Question 49: A user configured OSPF in a single area between two routers ...
Question 50: Which two minimum parameters must be configured on an active...
Question 51: Refer to the exhibit. (Exhibit) An extended ACL has been con...
Question 52: What facilitates a Telnet connection between devices by ente...
Question 53: (Exhibit) Refer to the exhibit. After the configuration is a...
Question 54: What uses HTTP messages to transfer data to applications res...
Question 55: A user configured OSPF and advertised the Gigabit Ethernet i...
Question 56: Drag and drop the DHCP snooping terms from the left onto the...
Question 57: Which type of security program is violated when a group of e...
Question 58: Drag drop the descriptions from the left onto the correct co...
Question 59: What is the expected outcome when an EUI-64 address is gener...
Question 60: What software defined architecture plane assists network dev...
Question 61: Refer to the exhibit. (Exhibit) A network administrator has ...
Question 62: The SW1 interface g0/1 is in the down/down state. Which two ...
Question 63: Refer to the exhibit. (Exhibit) Only four switches are parti...
Question 64: What are two roles of the Dynamic Host Configuration Protoco...
Question 65: Which mode allows access points to be managed by Cisco Wirel...
Question 66: Which action is taken by a switch port enabled for PoE power...
Question 67: Which output displays a JSON data representation? (Exhibit)...
Question 68: Refer to the exhibit. (Exhibit) An access list is required t...
Question 69: Drag and drop the threat-mitigation techniques from the left...
Question 70: A network engineer must configure the router R1 GigabitEther...
Question 71: Drag the IPv6 DNS record types from the left onto the descri...
Question 72: Aside from discarding, which two states does the switch port...
Question 73: What is an appropriate use for private IPv4 addressing?...
Question 74: Which CRUD operation corresponds to the HTTP GET method?...
Question 75: In software defined architectures, which plane is distribute...
Question 76: If a switch port receives a new frame while it is actively t...
Question 77: Refer to the exhibit. (Exhibit) Router R1 is running three d...
Question 78: What role does a hypervisor provide for each virtual machine...
Question 79: Which configuration is needed to generate an RSA key for SSH...
Question 80: Refer to the exhibit. (Exhibit) The default-information orig...
Question 81: Refer to the exhibit. (Exhibit) Which type of configuration ...
Question 82: Refer to the exhibit. (Exhibit) Which route type does the ro...
Question 83: Refer to the exhibit. (Exhibit) Which route type is configur...
Question 84: What is a DHCP client?
Question 85: How does Cisco DNA Center gather data from the network?...
Question 86: Router A learns the same route from two different neighbors,...
Question 87: What is a benefit of VRRP?
Question 88: Why does a switch flood a frame to all ports?...
Question 89: Which two actions are performed by the Weighted Random Early...
Question 90: Which command must be entered to configure a DHCP relay?...
Question 91: Which design element is a best practice when deploying an 80...
Question 92: With REST API, which standard HTTP header tells a server whi...
Question 93: If a notice-level messaging is sent to a syslog server, whic...
Question 94: Refer to the exhibit. (Exhibit) A router reserved these five...
Question 95: Which two functions are performed by the core layer in a thr...
Question 96: What occurs when overlapping Wi-Fi channels are implemented?...
Question 97: Refer to the exhibit. (Exhibit) Which password must an engin...
Question 98: Refer to the exhibit. (Exhibit) Router R2 is configured with...
Question 99: What is a role of wireless controllers in an enterprise netw...
Question 100: What are two benefits of network automation? (Choose two)...
Question 101: How does a switch process a frame received on Fa0/1 with the...
Question 102: Which command enables a router to become a DHCP client?...
Question 103: Refer to the exhibit. (Exhibit) To which device does Router1...
Question 104: Refer to the exhibit. (Exhibit) Which type of route does R1 ...
Question 105: Which IPv6 address block sends packets to a group address ra...
Question 106: A router running EIGRP has learned the same route from two d...
Question 107: What is the same for both copper and fiber interfaces when u...
Question 108: A device detects two stations transmitting frames at the sam...
Question 109: Which two outcomes are predictable behaviors for HSRP? (Choo...
Question 110: Which switch technology establishes a network connection imm...
Question 111: Which command automatically generates an IPv6 address from a...
Question 112: Refer to the exhibit. (Exhibit) Based on the LACP neighbor s...
Question 113: When DHCP is configured on a router, which command must be e...
Question 114: Which protocol does an IPv4 host use to obtain a dynamically...
Question 115: What is a network appliance that checks the state of a packe...
Question 116: Refer to the exhibit. (Exhibit) Which switch becomes the roo...
Question 117: When implementing a router as a DHCP server, which two featu...
Question 118: A network engineer must create a diagram of a multivendor ne...
Question 119: Drag and drop the attack-mitigation techniques from the left...
Question 120: Which command is used to specify the delay time in seconds f...
Question 121: When deploying syslog, which severity level logs information...
Question 122: What is a difference between RADIUS and TACACS+?...