Part 12 Flashcards

1
Q

What mechanism does PIM use to forward multicast traffic?

A. PIM sparse mode uses a pull model to deliver multicast traffic.

B. PIM dense mode uses a pull model to deliver multicast traffic.

C. PIM sparse mode uses receivers to register with the RP.

D. PIM sparse mode uses a flood and prune model to deliver multicast traffic.

A

A. PIM sparse mode uses a pull model to deliver multicast traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An engineer is configuring GigabitEthernet1/0/0 for VRRP. When the router has the highest priority in group 5, it must assume the master role. Which command set should the engineer add to the configuration to accomplish this task? interface GigabitEthernet1/0/0 description To IDF A 38-70-774-10 ip address 172.16.13.2 255.255.255.0

A. standby 5 ip 172.16.13.254 standby 5 priority 100 standby 5 track 1 decrement 10

B. standby 5 ip 172.16.13.254 standby 5 priority 100 standby 5 preempt

C. vrrp 5 ip 172.16.13.254 vrrp 5 priority 100

D. vrrp 5 ip 172.16.13.254 255.255.255.0 vrrp 5 track 1 decrement 10 vrrp 5 preempt

A

C. vrrp 5 ip 172.16.13.254 vrrp 5 priority 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which two security features are available when implementing NTP? (Choose two.)

A. encrypted authentication mechanism

B. symmetric server passwords

C. clock offset authentication

D. broadcast association mode

E. access list-based restriction scheme

A

A. encrypted authentication mechanism

E. access list-based restriction scheme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does the EIGRP metric differ from the OSPF metric?

A. The EIGRP metric is calculated based on bandwidth only. The OSPF metric is calculated on delay only.

B. The EIGRP metric is calculated based on delay only. The OSPF metric is calculated on bandwidth and delay.

C. The EIGRP metric is calculated based on bandwidth and delay. The OSPF metric is calculated on bandwidth only.

D. The EIGRP metric is calculated based on hop count and bandwidth. The OSPF metric is calculated on bandwidth and delay.

A

C. The EIGRP metric is calculated based on bandwidth and delay. The OSPF metric is calculated on bandwidth only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which encryption hashing algorithm does NTP use for authentication?

A. SSL

B. MD5

C. AES128

D. AES256

A

B. MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A company has an existing Cisco 5520 HA cluster using SSO. An engineer deploys a new single Cisco Catalyst 9800 WLC to test new features. The engineer successfully configures a mobility tunnel between the 5520 cluster and 9800 WLC. Clients connected to the corporate WLAN roam seamlessly between access points on the 5520 and 9800 WLC. After a failure on the primary 5520 WLC, all WLAN services remain functional; however, clients cannot roam between the 5520 and 9800 controllers without dropping their connection. Which feature must be configured to remedy the issue?

A. mobility MAC on the 5520 cluster

B. mobility MAC on the 9800 WLC

C. new mobility on the 5520 cluster

D. new mobility on the 9800 WLC

A

B. mobility MAC on the 9800 WLC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A customer has completed the installation of a Wi-Fi 6 greenfield deployment at their new campus. They want to leverage Wi-Fi 6 enhanced speeds on the trusted employee WLAN. To configure the employee WLAN, which two Layer 2 security policies should be used? (Choose two.)

A. WPA2 (AES)

B. 802.1X

C. OPEN

D. WEP

E. WPA (AES)

A

A. WPA2 (AES)

B. 802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which two actions, when applied in the LAN network segment, will facilitate Layer 3 CAPWAP discovery for lightweight AP? (Choose two.)

A. Utilize DHCP option 43.

B. Utilize DHCP option 17.

C. Configure an ip helper-address on the router interface.

D. Enable port security on the switch port.

E. Configure WLC IP address on LAN switch

A

A. Utilize DHCP option 43.

C. Configure an ip helper-address on the router interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which two methods are used by an AP that is trying to discover a wireless LAN controller? (Choose two.)

A. Cisco Discovery Protocol neighbor

B. querying other APs

C. DHCP Option 43

D. broadcasting on the local subnet

E. DNS lookup CISCO-DNA-PRIMARY.localdomain

A

C. DHCP Option 43

D. broadcasting on the local subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which access point mode allows a supported AP to function like a WLAN client would, associating and identifying client connectivity issues?

A. client mode

B. SE-connect mode

C. sensor mode

D. sniffer mode

A

D. sniffer mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A client device fails to see the enterprise SSID, but other client devices are connected to it. What is the cause of this issue?

A. The client has incorrect credentials stored for the configured broadcast SSID.

B. The hidden SSID was not manually configured on the client.

C. The broadcast SSID was not manually configured on the client.

D. The client has incorrect credentials stored for the configured hidden SSID.

A

B. The hidden SSID was not manually configured on the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which two descriptions of FlexConnect mode for Cisco APs are true? (Choose two.)

A. APs that operate in FlexConnect mode cannot detect rogue APs.

B. When connected to the controller, FlexConnect APs can tunnel traffic back to the controller.

C. FlexConnect mode is used when the APs are set up in a mesh environment and used to bridge between each other.

D. FlexConnect mode is a feature that is designed to allow specified CAPWAP-enabled APs to exclude themselves from managing data traffic between clients and infrastructure.

E. FlexConnect mode is a wireless solution for branch office and remote office deployments.

A

B. When connected to the controller, FlexConnect APs can tunnel traffic back to the controller.

E. FlexConnect mode is a wireless solution for branch office and remote office deployments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A network engineer configures BGP between R1 and R2. Both routers use BGP peer group CORP and are set up to use MD5 authentication. This message is logged to the console of router R1: ג€May 5 39:85:55.469: %TCP-6-BADAUTHג€ Invalid MD5 digest from 10.10.10.1 (29832) to 10.120.10.1 (179) tebleid -0 Which two configurations allow a peering session to form between R1 and R2? (Choose two.)

A. R1(config-router)#neighbor 10.10.10.1 peer-group CORP

R1(config-router)#neighbor CORP password Cisco

B. R2(config-router)#neighbor 10.120.10.1 peer-group CORP

R2(config-router)#neighbor CORP password Cisco

C. R2(config-router)#neighbor 10.10.10.1 peer-group CORP

R2(config-router)#neighbor PEER password Cisco

D. R1(config-router)#neighbor 10.120.10.1 peer-group CORP

R1(config-router)#neighbor CORP password Cisco

E. R2(config-router)#neighbor 10.10.10.1 peer-group CORP

R2(config-router)#neighbor CORP password Cisco

A

A. R1(config-router)#neighbor 10.10.10.1 peer-group CORP

R1(config-router)#neighbor CORP password Cisco

B. R2(config-router)#neighbor 10.120.10.1 peer-group CORP

R2(config-router)#neighbor CORP password Cisco

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How are the different versions of IGMP compatible?

A. IGMPv2 is compatible only with IGMPv2.

B. IGMPv3 is compatible only with IGMPv3.

C. IGMPv2 is compatible only with IGMPv1.

D. IGMPv3 is compatible only with IGMPv1

A

C. IGMPv2 is compatible only with IGMPv1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which measurement is used from a post wireless survey to depict the cell edge of the access points?

A. SNR

B. Noise

C. RSSI

D. CCI

A

A. SNR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If a clientג€™s radio device receives a signal strength of -67 dBm and the noise floor is -85 dBm, what is the SNR value?

A. 15 dB

B. 16 dB

C. 18 dB

D. 20 dB

A

C. 18 dB

17
Q

Which AP mode allows an engineer to scan configured channels for rogue access points?

A. monitor

B. bridge

C. local

D. sniffer

A

A. monitor

18
Q

What is the wireless Received Signal Strength Indicator?

A. the value given to the strength of the wireless signal received compared to the noise level

B. the value of how strong the wireless signal is leaving the antenna using transmit power, cable loss, and antenna gain

C. the value of how much wireless signal is lost over a defined amount of distance

D. the value of how strong a wireless signal is received, measured in dBm

A

D. the value of how strong a wireless signal is received, measured in dBm

19
Q

Which two operational modes enable an AP to scan one or more wireless channels for rogue access points and at the same time provide wireless services to clients? (Choose two.)

A. monitor

B. rogue detector

C. FlexConnect

D. sniffer

E. local

A

A. monitor

E. local

20
Q

An engineer is troubleshooting the AP join process using DNS. Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?

A. wlchostname.domain.com

B. cisco-capwap-controller.domain.com

C. ap-manager.domain.com

D. primary-wlc.domain.com

A

B. cisco-capwap-controller.domain.com