최신 200-301 무료덤프 - Cisco Certified Network Associate

What is a function of Wireless LAN Controller?

정답: C
설명: (DumpTOP 회원만 볼 수 있음)
The service password-encryption command is entered on a router. What is the effect of this configuration?

정답: C
Which configuration is needed to generate an RSA key for SSH on a router?

정답: D
Which action is taken by a switch port enabled for PoE power classification override?

정답: D
설명: (DumpTOP 회원만 볼 수 있음)
All physical cabling is in place. A company plans to deploy 32 new sites.
The sites will utilize both IPv4 and IPv6 networks.
1 . Subnet 172.25.0.0/16 to meet the subnet requirements and maximize
the number of hosts
Using the second subnet
* Assign the first usable IP address to e0/0 on Sw1O1
* Assign the last usable IP address to e0/0 on Sw102
2. Subnet to meet the subnet requirements and maximize
the number of hosts
c Using the second subnet
* Assign an IPv6 GUA using a unique 64-Bit interface identifier
on e0/0 on Sw101
* Assign an IPv6 GUA using a unique 64-Bit interface identifier
on eO/O on swi02
Guidelines
This is a lab item in which tasks will be performed on virtual devices.
* Refer to the Tasks tab to view the tasks for this lab item.
* Refer to the Topology tab to access the device console(s) and perform the tasks.
* Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.
* All necessary preconfigurations have been applied.
* Do not change the enable password or hostname for any device.
* Save your configurations to NVRAM before moving to the next item.
* Click Next at the bottom of the screen to submit this lab and move to the next question.
* When Next is clicked, the lab closes and cannot be reopened.
정답:
See the Explanation for the solution.
Explanation:
* To subnet 172.25.0.0/16 to meet the subnet requirements and maximize the number of hosts, you need to determine how many bits you need to borrow from the host portion of the address to create enough subnets for 32 sites. Since 32 is 2^5, you need to borrow 5 bits, which means your new subnet mask will be /21 or 255.255.248.0. To find the second subnet, you need to add the value of the fifth bit (32) to the third octet of the network address (0), which gives you 172.25.32.0/21 as the second subnet. The first usable IP address in this subnet is 172.25.32.1, and the last usable IP address is 172.25.39.254.
* To assign the first usable IP address to e0/0 on Sw101, you need to enter the following commands on the device console:
Sw101#configure terminal Sw101(config)#interface e0/0 Sw101(config-if)#ip address 172.25.32.1
255.255.248.0 Sw101(config-if)#no shutdown Sw101(config-if)#end
* To assign the last usable IP address to e0/0 on Sw102, you need to enter the following commands on the device console:
Sw102#configure terminal Sw102(config)#interface e0/0 Sw102(config-if)#ip address 172.25.39.254
255.255.248.0 Sw102(config-if)#no shutdown Sw102(config-if)#end
* To subnet an IPv6 GUA to meet the subnet requirements and maximize the number of hosts, you need to determine how many bits you need to borrow from the interface identifier portion of the address to create enough subnets for 32 sites. Since 32 is 2^5, you need to borrow 5 bits, which means your new prefix length will be /69 or ffff:ffff:ffff:fff8::/69 (assuming that your IPv6 GUA has a /64 prefix by default). To find the second subnet, you need to add the value of the fifth bit (32) to the fourth hextet of the network address (0000), which gives you xxxx:xxxx:xxxx:0020::/69 as the second subnet (where xxxx:xxxx:xxxx is your IPv6 GUA prefix). The first and last IPv6 addresses in this subnet are xxxx:
xxxx:xxxx:0020::1 and xxxx:xxxx:xxxx:0027:ffff:ffff:ffff:fffe respectively.
* To assign an IPv6 GUA using a unique 64-bit interface identifier on e0/0 on Sw101, you need to enter the following commands on the device console (assuming that your IPv6 GUA prefix is 2001:db8::/64):
Sw101#configure terminal Sw101(config)#interface e0/0 Sw101(config-if)#ipv6 address 2001:db8::20::1/69 Sw101(config-if)#no shutdown Sw101(config-if)#end
* To assign an IPv6 GUA using a unique 64-bit interface identifier on e0/0 on Sw102, you need to enter the following commands on the device console (assuming that your IPv6 GUA prefix is 2001:db8::/64):
Sw102#configure terminal Sw102(config)#interface e0/0 Sw102(config-if)#ipv6 address 2001:db8::27::fffe
/69 Sw102(config-if)#no shutdown Sw102(config-if)#end
Refer to the exhibit.

Which two prefixes are included in this routing table entry? (Choose two.)

정답: B,D
Refer to the exhibit.

An administrator received a call from a branch office regarding poor application performance hosted at the headquarters. Ethernet 1 is connected between Router1 and the LAN switch. What identifies the issue?

정답: A
Refer to the exhibit.

The given Windows PC is requesting the IP address of the host at www.cisco.com. To which IP address is the request sent?

정답: C
Drag and drop the IPv6 address type characteristics from the left to the right.
정답:

Explanation:
Refer to the exhibit.

R1 has just received a packet from host A that is destined to host B. Which route in the routing table is used by R1 to reac B?

정답: C
What is the purpose of a southbound API in a control based networking architecture?

정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Refer to Itie exhibit

A network engineer started to configure port security on a new switch. These requirements must be met:
* MAC addresses must be learned dynamically
* Log messages must be generated without disabling the interface when unwanted traffic is seen Which two commands must be configured to complete this task"? (Choose two)

정답: C
Refer to the exhibit.

All VLANs are present in the VLAN database. Which command sequence must be applied to complete the configuration?

정답: C
Refer to the exhibit.

Routers R1 and R2 are configured with RIP as the dynamic routing protocol. A network engineer must configure R1 with a floating static route to serve as a backup route to network 192.168.23. Which command must the engineer configure on R1?

정답: A
Drag and drop the characteristics of northbound APIs from the left onto any position on the right. Not all characteristics are used.
정답:

Explanation:
In a cloud-computing environment what is rapid elasticity?

정답: C
Which field within the access-request packet is encrypted by RADIUS?

정답: A
Drag and drop the descriptions from the left onto the configuration-management technologies on the right.
정답:

Explanation:

Ansible:- uses SSH for remote device communication- uses YAML for fundamental configuration elements Chef:- uses TCP port 10002 for configuration push jobs- uses Ruby for fundamental configuration elements Puppet:- fundamental configuration elements are stored in a manifest- uses TCP 8140 for communication The focus of Ansible is to be streamlined and fast, and to require no node agent installation.Thus, Ansible performs all functions over SSH. Ansible is built on Python, in contrast to the Ruby foundation of Puppet and Chef.TCP port 10002 is the command port. It may be configured in the Chef Push Jobs configuration file .
This port allows Chef Push Jobs clients to communicate with the Chef Push Jobs server.Puppet is an open- source configuration management solution, which is built with Ruby and offers custom Domain Specific Language (DSL) and Embedded Ruby (ERB) templates to create custom Puppet language files, offering a declarative-paradigm programming approach.A Puppet piece of code is called a manifest, and is a file with .
pp extension.

우리와 연락하기

문의할 점이 있으시면 메일을 보내오세요. 12시간이내에 답장드리도록 하고 있습니다.

근무시간: ( UTC+9 ) 9:00-24:00
월요일~토요일

서포트: 바로 연락하기