Which command must be entered when a device is configured as an NTP server?
Drag and drop to the characteristics of networking from the left onto the correct networking types on the right.

Drag the descriptions of device management from the left onto the types of device management on the right.

In software-defined architecture, which place handles switching for traffic through a Cisco router?
Refer to the exhibit.

An administrator must configure interfaces Gi1/1 and Gi1/3 on switch SW1. PC-1 and PC-2 must be placed in the Data VLAN and Phone-1 must be placed in the Voice VLAN Which configuration meets these requirements?

Which PoE mode enables powered-device detection and guarantees power when the device is detected?
A network engineer is configuring a switch so that it is remotely reachable via SSH. The engineer has already configured the host name on the router. Which additional command must the engineer configure before entering the command to generate the RSA key?
What provides centralized control of authentication and roaming In an enterprise network?
Refer to the exhibit.

Which switch becomes the root of a spanning tree for VLAN 20 if all links are of equal speed?

An engineer must configure traffic for a VLAN that is untagged by the switch as it crosses a trunk link. Which command should be used?
R1 as an NTP server must have:
• NTP authentication enabled
• NTP packets sourced from Interface loopback 0
• NTP stratum 2
• NTP packets only permitted to client IP 209.165.200.225
How should R1 be configured?
A)

B)

C)

D)

Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right.

Refer to the exhibit.

The New York router is configured with static routes pointing to the Atlanta and Washington sites. Which two tasks must be performed so that the Serial0/0/0 interfaces on the Atlanta and Washington routers can reach one another?
(Choose two.)
What is the difference between 1000BASE-LX/LH and 1000BASE-ZX interfaces?
When should an engineer implement a collapsed-core architecture?
What is a function of a Layer 3 switch?
Refer to the exhibit.

Which minimum configuration items are needed to enable Secure Shell version 2 access to R15?
A)

B)

C)

D)

Refer to the exhibit.

Web traffic is coming in from the WAN interface. Which route takes precedence when the router is processing traffic destined for the LAN network at 10 0.10.0/24?
Refer to the exhibit.

What is a reason for poor performance on the network interface?
Which WLC management connection type is vulnerable to man-in-the-middle attacks?
|
PDF + Testing Engine
|
|---|
|
$52.5 |
|
Testing Engine
|
|---|
|
$40.5 |
|
PDF (Q&A)
|
|---|
|
$34.5 |
Cisco Free Exams |
|---|
|