<< Prev Question Next Question >>

Question 49/233

All physical cabling between the two switches is installed. Configure the network connectivity between the switches using the designated VLANs and interfaces.
1. Configure VLAN 100 named Compute and VLAN 200 named Telephony where required for each task.
2. Configure Ethernet0/1 on SW2 to use the existing VLAN named Available.
3. Configure the connection between the switches using access ports.
4. Configure Ethernet0/1 on SW1 using data and voice VLANs.
5. Configure Ethemet0/1 on SW2 so that the Cisco proprietary neighbor discovery protocol is turned off for the designated interface only.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (233q)
1 commentQuestion 1: Which interface mode must be configured to connect the light...
Question 2: What uses HTTP messages to transfer data to applications res...
Question 3: Refer to the exhibit. (Exhibit) What two conclusions should ...
1 commentQuestion 4: An organization has decided to start using cloud-provided se...
Question 5: A network engineer must configure two new subnets using the ...
Question 6: If a notice-level messaging is sent to a syslog server, whic...
Question 7: Which network action occurs within the data plane?...
Question 8: Refer to the exhibit. (Exhibit) An engineer must configure G...
Question 9: Drag and drop the attack-mitigation techniques from the left...
Question 10: Refer to the exhibit. (Exhibit) Refer to the exhibit. An eng...
Question 11: What is a feature of WPA?
Question 12: Which state does the switch port move to when PortFast is en...
Question 13: How do TCP and UDP differ in the way that they establish a c...
Question 14: What is the effect when loopback interfaces and the configur...
Question 15: Which HTTP status code is returned after a successful REST A...
Question 16: Refer to the exhibit. (Exhibit) Which command must be issued...
Question 17: (Exhibit)
Question 18: Drag and drop the Rapid PVST+ forwarding state actions from ...
Question 19: An engineer is configuring remote access to a router from IP...
Question 20: What must be considered when using 802:11 ta?...
Question 21: What is the primary different between AAA authentication and...
Question 22: Refer to the exhibit. (Exhibit) An engineer is configuring a...
Question 23: Drag and drop the Cisco Wireless LAN Controller security set...
Question 24: Which condition must be met before an NMS handles an SNMP tr...
Question 25: Refer to Exhibit. (Exhibit) Which action do the switches tak...
Question 26: An engineer is configuring an encrypted password for the ena...
Question 27: What is the default behavior of a Layer 2 switch when a fram...
Question 28: In software defined architectures, which plane is distribute...
Question 29: What facilitates a Telnet connection between devices by ente...
Question 30: What is the function of "off-the-shell" switches in a contro...
Question 31: Refer to the exhibit. (Exhibit) What action establishes the ...
Question 32: Drag and chop the TCP/IP protocols from the left onto their ...
Question 33: Refer to the exhibit. (Exhibit) Shortly after SiteA was conn...
Question 34: Drag and drop the HTTP methods used with REST-Based APIs fro...
Question 35: Refer to the exhibit. (Exhibit) Load-balanced traffic is com...
Question 36: Drag and drop the lightweight access point operation modes f...
Question 37: An engineer must configure the IPv6 address 2001:0db8:0000:0...
Question 38: Which protocol prompts the Wireless LAN Controller to genera...
Question 39: Which output displays a JSON data representation? (Exhibit)...
Question 40: What is the maximum bandwidth of a T1 point-to-point connect...
Question 41: Which network allows devices to communicate without the need...
Question 42: What is the function of the controller in a software-defined...
Question 43: A corporate office uses four floors in a building * Floor 1 ...
Question 44: Where does a switch maintain DHCP snooping information?...
Question 45: When a WLAN with WPA2 PSK is configured in the Wireless LAN ...
Question 46: After a recent security breach and a RADIUS failure, an engi...
Question 47: A network engineer must create a diagram of a multivendor ne...
Question 48: Which two wireless security stewards use Counter Mode Cipher...
Question 49: All physical cabling between the two switches is installed. ...
Question 50: Which protocol uses the SSL?
Question 51: An engineer must configure traffic for a VLAN that is untagg...
Question 52: Drag and drop the IPv4 network subnets from the left onto th...
Question 53: Which Layer 2 switch function encapsulates packets for diffe...
Question 54: What does a switch use to build its MAC address table?...
Question 55: How does QoS optimize voice traffic?...
Question 56: What is the function of a controller in controller-based net...
Question 57: What is the primary effect of the spanning-tree portfast com...
Question 58: What are two functions of a server on a network? (Choose two...
Question 59: What Is the path for traffic sent from one user workstation ...
Question 60: Refer to the exhibit. (Exhibit) What are two conclusions abo...
Question 61: Connectivity between four routers has been established. IP c...
Question 62: Which technology is used to improve web traffic performance ...
Question 63: Refer to the exhibit. (Exhibit) If configuring a static defa...
Question 64: A Cisco engineer must configure a single switch interface to...
Question 65: Refer to the exhibit. (Exhibit) A packet is being sent acros...
Question 66: What are two reasons that cause late collisions to increment...
Question 67: Which configuration management mechanism uses TCP port 22 by...
Question 68: Which 802.11 frame type is association response?...
Question 69: Refer to the exhibit. (Exhibit) Which prefix does Router 1 u...
Question 70: Refer to the exhibit. (Exhibit) A network engineer configure...
Question 71: Which option about JSON is true?...
Question 72: Refer to the exhibit. (Exhibit) Site A was recently connecte...
Question 73: What are network endpoints?
Question 74: Refer to the exhibit. (Exhibit) What are the two steps an en...
Question 75: Which switch technology establishes a network connection imm...
Question 76: The service password-encryption command is entered on a rout...
Question 77: Which action is taken by the data plane within a network dev...
Question 78: What is a role of wireless controllers in an enterprise netw...
Question 79: Drag and drop the WLAN components from the left onto the cor...
Question 80: Which command do you enter so that a switch configured with ...
Question 81: What is a function of Opportunistic Wireless Encryption in a...
Question 82: A wireless administrator has configured a WLAN; however, the...
Question 83: What Is a syslog facility?
Question 84: Which mode must be used to configure EtherChannel between tw...
Question 85: What is the purpose of using First Hop Redundancy Protocol i...
Question 86: A network administrator is asked to configure VLANS 2, 3 and...
Question 87: What is the difference between IPv6 unicast and anycast addr...
Question 88: Drag and drop the IPv6 addresses from the left onto the corr...
Question 89: Refer to Exhibit. (Exhibit) Rotor to the exhibit. The IP add...
Question 90: A network administrator needs to aggregate 4 ports into a si...
Question 91: Which two tasks must be performed to configure NTP to a trus...
Question 92: A user configured OSPF in a single area between two routers ...
Question 93: Refer to the exhibit. (Exhibit) An administrator must config...
Question 94: Refer to the exhibit. (Exhibit) Which route must be configur...
Question 95: When a switch receives a frame for a known destination MAC a...
Question 96: Refer to the exhibit. (Exhibit) Which action is expected fro...
Question 97: Which resource is able to be shared among virtual machines d...
Question 98: Which action must be taken to assign a global unicast IPv6 a...
Question 99: What are two benefits of FHRPs? (Choose two.)...
Question 100: Refer to the exhibit. (Exhibit) Which two commands must be a...
Question 101: An office has 8 floors with approximately 30-40 users per fl...
Question 102: Which 802.11 management frame type is sent when a client roa...
Question 103: What criteria is used first during me root port selection pr...
Question 104: What are two examples of multifactor authentication? (Choose...
Question 105: What are two similarities between UTP Cat 5e and Cat 6a cabl...
Question 106: Which two values or settings must be entered when configurin...
Question 107: What are two characteristics of an SSID? (Choose Two)...
Question 108: Which type of network attack overwhelms the target server by...
Question 109: Refer to the exhibit. (Exhibit) An engineer booted a new swi...
Question 110: Refer to the exhibit. (Exhibit) Which outcome is expected wh...
Question 111: Using direct sequence spread spectrum, which three 2.4-GHz c...
Question 112: How are VLAN hopping attacks mitigated?...
Question 113: Which unified access point mode continues to serve wireless ...
Question 114: Refer to the exhibit. (Exhibit) To which device does Router1...
Question 115: Drag and drop the descriptions of file-transfer protocols fr...
Question 116: Refer to the exhibit. (Exhibit) How must router A be configu...
Question 117: How will Link Aggregation be Implemented on a Cisco Wireless...
Question 118: Which protocol is used for secure remote CLI access?...
Question 119: Which QoS tool is used to optimize voice traffic on a networ...
Question 120: Refer to the exhibit. (Exhibit) Users on existing VLAN 100 c...
Question 121: Drag the IPv6 DNS record types from the left onto the descri...
Question 122: What is a difference between RADIUS and TACACS+?...
Question 123: Which two outcomes are predictable behaviors for HSRP? (Choo...
Question 124: What are two roles of the Dynamic Host Configuration Protoco...
Question 125: Refer to the exhibit. (Exhibit) An engineer is configuring a...
Question 126: Drag and drop the REST API call methods for HTTP from the le...
Question 127: Which technology can prevent client devices from arbitrarily...
Question 128: Refer to the exhibit. (Exhibit) All VLANs are present in the...
Question 129: Drag and drop the functions of DHCP from the left onto any o...
Question 130: Which QoS traffic handling technique retains excess packets ...
Question 131: Refer to the exhibit. (Exhibit) What is the subnet mask of t...
Question 132: What event has occurred if a router sends a notice level mes...
Question 133: Refer to the exhibit. (Exhibit) If the network environment i...
Question 134: Which function does an SNMP agent perform?...
Question 135: Refer to the exhibit. (Exhibit) Drag and drop the prefix len...
Question 136: What are two differences between optical-fiber cabling and c...
Question 137: which purpose does a northbound API serve in a controller-ba...
Question 138: Refer to the exhibit. (Exhibit) How does the router manage t...
Question 139: Which QoS Profile is selected in the GUI when configuring a ...
Question 140: Which function is performed by the collapsed core layer in a...
Question 141: A device detects two stations transmitting frames at the sam...
Question 142: Refer to the exhibit. (Exhibit) Router R1 is running three d...
Question 143: Refer to the exhibit. (Exhibit) An engineer deploys a topolo...
Question 144: R1 has learned route 192.168.12.0/24 via IS-IS. OSPF, RIP. a...
Question 145: Which WAN topology provides a combination of simplicity qual...
Question 146: Which set of 2.4 GHz nonoverlapping wireless channels is sta...
Question 147: Drag and drop the statements about networking from the left ...
Question 148: Refer to the exhibit. (Exhibit) Which configuration issue is...
Question 149: Which command enables a router to become a DHCP client?...
Question 150: A network analyst is tasked with configured the date and tim...
Question 151: Refer to the exhibit. (Exhibit) IP connectivity between the ...
Question 152: Which CRUD operation corresponds to the HTTP GET method?...
Question 153: What is the purpose of the Cisco DNA Center controller?...
Question 154: Refer to the exhibit. (Exhibit) How does router R1 handle tr...
Question 155: What are two characteristics of a public cloud Implementatio...
Question 156: Refer to me exhibit. (Exhibit) Which action is taken by the ...
Question 157: In which two ways does a password manager reduce the chance ...
Question 158: Refer to the exhibit. (Exhibit) Which two commands were used...
Question 159: Router A learns the same route from two different neighbors,...
Question 160: Refer to the exhibit. (Exhibit) An engineer is configuring t...
Question 161: A Cisco engineer is configuring a factory-default router wit...
Question 162: Drag and drop the TCP or UDP details from the left onto thei...
Question 163: What is the collapsed layer in collapsed core architectures?...
Question 164: Which two capacities of Cisco DNA Center make it more extens...
Question 165: Refer to the exhibit. (Exhibit) An engineer configured NAT t...
Question 166: Which action is taken by a switch port enabled for PoE power...
Question 167: Refer to the exhibit. (Exhibit) Which two commands when used...
Question 168: Which QoS queuing method discards or marks packets that exce...
Question 169: What is the benefit of using FHRP?...
Question 170: What is a function performed by a web server?...
Question 171: Which network plane is centralized and manages routing decis...
Question 172: Connectivity between three routers has been established, and...
Question 173: What is the difference in data transmission delivery and rel...
Question 174: Which two WAN architecture options help a business scalabili...
Question 175: What are two characteristics of the distribution layer in a ...
Question 176: Drag and drop the facts about wireless architectures from th...
Question 177: Drag and drop the functions of AAA supporting protocols from...
Question 178: What is a zero-day exploit?
Question 179: Refer to the exhibit. (Exhibit) Which two commands, when con...
Question 180: A network administrator enabled port security on a switch in...
Question 181: What prevents a workstation from receiving a DHCP address?...
Question 182: Refer to the exhibit. (Exhibit) Which command must be execut...
Question 183: Which action implements physical access control as part of t...
Question 184: An engineer is configuring switch SW1 to act an NTP server w...
Question 185: When a client and server are not on the same physical networ...
Question 186: Refer to the exhibit. (Exhibit) When PC-A sends traffic to P...
Question 187: How do AAA operations compare regarding user identification,...
Question 188: Refer to Exhibit. (Exhibit) An engineer is configuring the N...
Question 189: Which security program element involves installing badge rea...
Question 190: Which communication interaction takes place when a southboun...
Question 191: Which statement correctly compares traditional networks and ...
Question 192: Which protocol does an access point use to draw power from a...
Question 193: Refer to the exhibit. (Exhibit) Which switch becomes the roo...
Question 194: Which two functions are performed by the core layer in a thr...
Question 195: Refer to the exhibit. (Exhibit) An engineer is required to v...
Question 196: What are two characteristics of a controller-based network? ...
Question 197: Which networking function occurs on the data plane?...
Question 198: Refer to the exhibit. (Exhibit) Which network prefix was lea...
Question 199: Refer to the exhibit. (Exhibit) Which command provides this ...
Question 200: Configure IPv4 and IPv6 connectivity between two routers. Fo...
Question 201: What are two descriptions of three-tier network topologies? ...
Question 202: An engineer is configuring router R1 with an IPv6 static rou...
Question 203: Which configuration is needed to generate an RSA key for SSH...
Question 204: What is the expected outcome when an EUI-64 address is gener...
Question 205: Refer to the exhibit. (Exhibit) Refer to the exhibit. All ro...
Question 206: Which type of API allows SDN controllers to dynamically make...
Question 207: Refer to the exhibit. (Exhibit) Router R1 Fa0/0 is unable pi...
Question 208: A network engineer must implement an IPv6 configuration on t...
Question 209: Refer to the exhibit. (Exhibit) Which configuration on RTR-1...
Question 210: What is an appropriate use for private IPv4 addressing?...
Question 211: Which WPA3 enhancement protects against hackers viewing traf...
Question 212: Where is the interface between the control plane and data pl...
Question 213: What occurs when overlapping Wi-Fi channels are implemented?...
Question 214: An email user has been lured into clicking a link in an emai...
Question 215: Refer to the exhibit. (Exhibit) A network engineer must conf...
Question 216: Which plane is centralized by an SDN controller?...
Question 217: How does a switch process a frame received on Fa0/1 with the...
Question 218: An engineer is tasked to configure a switch with port securi...
Question 219: in Which way does a spine and-leaf architecture allow for sc...
Question 220: What is a role of access points in an enterprise network?...
Question 221: What is a benefit of VRRP?
Question 222: What are two roles of Domain Name Services (DNS)? (Choose Tw...
Question 223: What is a function of a Next-Generation IPS?...
Question 224: Which field within the access-request packet is encrypted by...
Question 225: Refer to the exhibit. (Exhibit) The default-information orig...
Question 226: What does an SDN controller use as a communication protocol ...
Question 227: An engineer configured an OSPF neighbor as a designated rout...
Question 228: Refer to the exhibit. (Exhibit) What does router R1 use as i...
Question 229: Drag and drop the SNMP components from the left onto the des...
Question 230: What is a similarity between OM3 and OM4 fiber optic cable?...
Question 231: Which type of IPv6 address is publicly routable in the same ...
Question 232: Which type of information resides on a DHCP server?...
Question 233: What protocol allows an engineer to back up 20 network route...