Vous êtes sur la page 1sur 5

Question1

Refer to the exhibit. Which additional configuration statement is required on R3 in order to


allow multicast traffic sourced from 192.168.13.3 to flow along the shared-tree?
A. ip route 192.168.14.0 255.255.255.0 Tunnel 0
B. ip route 10.4.4.4 255.255255.255 Tunnel 0
C. ip mroute 10.4.4.4 255.255.255.255 Tunnel 0
D. ip mroute 192.168.14.0 255.255.255.0 Tunnel 0

Question2
Which two statements about DMVPN are true? (Choose two.)
A. It flows both the hub and the spokes to use dynamic IP addresses.
B. It supports mufticast and QoS within tunnels.
C. It provides a routable interface for terminating IPSec tunnels.
D. It is a tunnel-less VPN technology.
E. It is an open standard.
F. It uses automatic IPSec triggering to build IPSec tunnels.

Question3
Drag each NTP command on the left to its effect on the right.

1
Question4:
Which description of Infrastructure as a Service is true?
A. a cloud service that delivers on-demand Internet connection between sites
B. a cloud service that delivers on-demand intranet connection between sites
C. a cloud service that delivers on-demand software services on a subscription basis
D. a cloud service that delivers on-demand resources like networking and storage

Question5:
Which two statements about VSS are true? (Choose two.)
A. It requires physical switches to be collocated.
B. It is dependent on spanning-tree.
C. It requires three IP addresses per ULAN.
D. Each VSS has a single management IP address
E. It can eliminate the need for HSRP.

Question6:

2
Refer to the exhibit. If router R1 sends traffic marked with IP precedence 3 to R2's
Loopback 0 address, which class would the traffic match on R2's Gi1/0 interface?
A. CM-CLASS-3
B. class-default
C. CM-CLASS-2
D. CM-CLASS-1

Question7:
Drag each statement about EIGRP neighbor peering on the left to the matching peering
type on the right

Question8:
Which IPv4 feature prevents multicast joins on a per-port basis?
A. MLD filtering
B. IGMP filtering
C. IGMP snooping
D. PIM snooping

Question9:

Refer to the exhibit. What is the PHB class on this flow?


A. none
B. CS4
C. EF
D. AF21

Question10:

3
Refer to the exhibit. Which statement describes what the authoritative flag indicates?
A. The registration request had the same flag set.
B. Authentication was used for the mapping.
C. R1 learned about the NHRP mapping from a registration request.
D. Duplicate mapping in the NHRP cache is prevented.

Question11:
Which statement is true when using a VLAN ID from the extended ULAN range (1006-
4094)?
A. STP is disabled by default on extended-range VLANs.
B. VLANs in the extended VLAN range can only be used as private VLANs.
C. VLANs in the extended VLAN range cannot be pruned.
D. VLANs in the extended VLAN range can be used with VTPV2 in either client or server
mode.

Question12:
Which trunking configuration between two Cisco switches can cause a security risk?
A. configuring incorrect channel-groups on the switches
B. configuring different trunk modes on the switches
C. disabling DTP on the trunk ports
D. configuring different native VLANs on the switches
E. configuring mismatched VLANs on the trunk

Question13:

Refer to the exhibit. With BGP always-compare-med enabled, which BGP entry is installed
in the RIB?
A. Entry 1 because it was installed first (oldest) in the BGP table.
B. Entry 1 because it has the best MED of the external routes.
C. Entry 2 because it has the lowest router ID.
D. Entry 3 because it has the lowest MED.

Question14:

4
Refer to the exhibit. What type of IS-IS is configured on R1?
A. VRF-aware IS-IS
B. ISIS version 2
C. single-topology IS-IS
D. mufti-process IS-IS

Vous aimerez peut-être aussi