Topic 1: Exam Pool A
desc about topic
Drag and drop the WLAN components from the left onto the correct descriptions on the right.
Refer to the exhibit.
An extended ACL has been configured and applied to router R2 The configuration
failed to work as intended Which two
changes stop outbound traffic on TCP ports 25 and 80 to 10.0.20 0 26 from the
10.0.10 0/26 subnet while still allowing all other traffic? (Choose
two )
A.
Add a "permit ip any any" statement to the begining of ACL 101 for allowed traffic.
B.
Add a "permit ip any any" statement at the end of ACL 101 for allowed traffic
C.
The source and destination IPs must be swapped in ACL 101
D.
The ACL must be configured the Gi0/2 interface inbound on R1
E.
The ACL must be moved to the Gi0/1 interface outbound on R2
Add a "permit ip any any" statement at the end of ACL 101 for allowed traffic
The source and destination IPs must be swapped in ACL 101
How does HSRP provide first hop redundancy?
A.
It load-balances traffic by assigning the same metric value to more than one route to the
same destination m the IP routing table.
B.
It load-balances Layer 2 traffic along the path by flooding traffic out all interfaces
configured with the same VLAN.
C.
It forwards multiple packets to the same destination over different routed links n the data
path
D.
It uses a shared virtual MAC and a virtual IP address to a group of routers that serve as
the default gateway for hosts on a LAN
It uses a shared virtual MAC and a virtual IP address to a group of routers that serve as
the default gateway for hosts on a LAN
What is a function of a remote access VPN?
A.
used cryptographic tunneling to protect the privacy of data for multiple users
simultaneously
B.
used exclusively when a user is connected to a company's internal network
C.
establishes a secure tunnel between two branch sites
D.
allows the users to access company internal network resources through a secure tunnel
allows the users to access company internal network resources through a secure tunnel
An engineer is asked to protect unused ports that are configured in the default VLAN on a
switch.
Which two steps will fulfill the request? (Choose two)
A.
Configure the ports in an EtherChannel.
B.
Administratively shut down the ports
C.
Configure the port type as access and place in VLAN 99
D.
Configure the ports as trunk ports
E.
Enable the Cisco Discovery Protocol
Administratively shut down the ports
Configure the port type as access and place in VLAN 99
Page 19 out of 173 Pages |
Previous |