350-701 January 2023 Updates
350-701 January 2023 Updates
350-701 January 2023 Updates
Answer: D
Explanation
Now, in turn, the networking administrators and SDN applications want to control the controller!
So the controller need a northbound interface (NBI) to communicate with us. The NBI
applications included various network services, including network virtualization, dynamic virtual
network provisioning, firewall monitoring, user identity management and access policy control.
Question 2
Drag and drop the wireless architecture benefits from the left onto the architecture types on the
right.
Answer:
Split-MAC:
+ Work is divided between the access point and the controller
+ The access points transmit beacon frames
+ Uses the CAPWAP tunneling protocol
Autonomous:
+ Appropriate for a small-business environment
+ Supports per device configuration and management
Explanation
An autonomous AP is a self-contained device with both wired and wireless hardware so that it
can bridge to the wired VLAN infrastructure wireless clients that belong to SSIDs. Each
autonomous AP must be configured with a management IP address so that it can be remotely
accessed using Telnet, SSH, or a web interface. Each AP must be individually managed and
maintained unless you use a management platform such as Cisco DNA Center.
The division of labor between the WLC and LAPs is known as split-MAC architecture. The LAP
must interact with wireless clients on some low level, known as the Media Access Control (MAC)
layer. These functions must stay with the LAP hardware, closest to the clients. The management
functions are not integral to handling frames but are things that should be centrally administered.
Therefore, those functions can be moved to a centrally located platform away from the AP.
Reference: https://www.ciscopress.com/articles/article.asp?p=2999384&seqNum=5
Question 3
Drag and drop the Ansible terms from the left onto the right.
Answer:
Explanation
+ Playbooks: These files provide actions and logic about what Ansible should do. Ansible
playbooks are files that contain tasks to configure hosts. Ansible playbooks are written in YAML
format.
+ Inventory: a file contains a list of the hosts (usually their IP addresses, ports) which you want
to configure or manage. Hosts in an inventory can be divided into smaller groups for easier
management and configuration. Each group can run different tasks. An example of a task is to
ping all hosts in group [routers].
…
Modules (also referred to as “task plugins” or “library plugins”) are discrete units of code that can
be used from the command line or in a playbook task. Ansible executes each module, usually on
the remote managed node, and collects return values.
The control node is a computer that runs Ansible. A managed node is any device being managed
by the control node.
Reference: https://opensource.com/resources/what-ansible
Question 4
Answer: D
Explanation
+ Shaping: retains excess packets in a queue and then schedules the excess for later
transmission over increments of time. When traffic reaches the maximum configured rate,
additional packets are queued instead of being dropped to proceed later. Traffic shaping is
applicable only on outbound interfaces as buffering and queuing happens only on outbound
interfaces. Shaping is configured in bits per second.
Best Effort Service means a service on a shared network in which the network does not provide
any guarantee that data is delivered or that delivery meets any quality of service, meaning that
the services obtain unspecified variable bit rate, latency and packet loss, depending on the current
traffic load -> Traffic shaping does not drop packets so it does not offer best effort service ->
Answer C is not correct.
The primary reasons you would use traffic shaping are to control access to available
bandwidth, to ensure that traffic conforms to the policies established for it, and to regulate the
flow of traffic in order to avoid congestion that can occur when the sent traffic exceeds the access
speed of its remote, target interface -> Answer D is correct.
Question 5
Drag and drop the characteristics of device-management technologies from the left onto the
corresponding deployment types on the right.
Answer:
Traditional
+ relies on per-device management
+ provides greater flexibility for custom and non-standard configurations
+ uses individual software management
Question 6
Which type of port is used to connect to the wired network when an autonomous AP maps two
VLANs to its WLANs?
A. LAG
B. EtherChannel
C. trunk
D. access
Answer: C
Explanation
In this example, we will configure the switch in our Autonomous AP deployment. First, we need to
create Vlan 21, which is assigned to Corporate users, and Vlan 22, which is assigned to Guess
users. Then we will configure the trunk interface between the AP and the switch to allow multiple
Vlans to traverse the link.
Reference: https://study-ccna.com/autonomous-ap-access-point-configuration/
Question 7
The network engineer is configuring router R2 as a replacement router on the network. After the
initial configuration is applied it is determined that R2 failed to show R1 as a neighbor. Which
configuration must be applied to R2 to complete the OSPF configuration and enable it to establish
the neighbor relationship with R1?
Option A Option B
Option C Option D
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
Explanation
In order to become OSPF neighbor, the following values must be matched on both routers:
+ Area ID
+ Authentication
+ Hello and Dead Intervals
+ Stub area Flag
+ MTU Size
Question 8
A. It allows the core and distribution layers to run as a single combined layer.
B. It enables the core and access layers to connect to one logical distribution device over an
EtherChannel.
C. It enables all workstations in a SOHO environment to connect on a single switch with internet
access.
D. It allows wireless devices to connect directly to the core layer, which enables faster data
transmission.
Answer: A
Explanation
The three-tier hierarchical design maximizes performance, network availability, and the ability to
scale the network design. Most small enterprise campus’ do not grow significantly larger over time,
and most small enterprise campus are small enough to be well served by a two-tier hierarchical
design, where the core and distribution layers are collapsed into one layer. The primary motivation
for the collapsed core design is reducing network cost, while maintaining most of the benefits of
the three-tier hierarchical model.
Reference: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Small_Enterprise_Design_
Profile/SEDP/chap2.html
Question 9
What is the purpose of configuring different levels of syslog for different devices on the network?
Answer: A
Question 10
Which interface enables communication between a program on the controller and a program on
the networking devices?
A. northbound interface
B. software virtual interface
C. southbound interface
D. tunnel interface
Answer: C
Explanation
We use Southbound API to communicate between the Controllers and Network Elements.
Question 11
Drag and drop the REST API call method for HTTP from the left onto the action they perform on
the right.
Answer:
Explanation
PUT is similar to POST in that it can create resources, but it does so when there is a defined URL
wherein PUT replaces the entire resource if it exists or creates new if it does not exist.
Unlike PUT Request, PATCH does partial update. Fields that need to be updated by the client, only
that field is updated without modifying the other field.
Question 12
Answer: A
Question 13
What is a reason to configure a trunk port that connects to a WLC distribution port?
Answer: B
Question 14
Traffic from R1 to the 10.10.2.0/24 subnet uses 192.168.1.2 as its next hop. An network engineer
wants to update the R1 configuration so that traffic with destination 10.10.2.1 passes through
router R3, and all other traffic to the 10.10.2.0/24 subnet passes through r2. Which command
must be used?
Answer: D
Question 15
Which cipher is supported for wireless encryption only with the WPA2 standard?
A. AES256
B. AES
C. RC4
D. SHA
Answer: B
Explanation
Unlike WEP and WPA, WPA2 uses the AES standard instead of the Rivest Cipher 4 (RC4) stream
cipher.
SHA stands for Secure Hash Algorithm while AES stands for Advanced Encryption Standard. So
SHA is a suite of hashing algorithms. It is not a cipher which is used to encrypt.
Question 16
Entry #
1 192.168.10.0 255.255.254.0
2 192.168.10.0 255.255.255.192
3 192.168.10.0 255.255.0.0
4 192.168.10.0 255.255.224.0
Which entry is the longest prefix match for host IP address 192.168.10.5?
A. 1
B. 2
C. 3
D. 4
Answer: B
Question 17
Which two features introduced in SNMPv2 provides the ability to retrieve large amounts of data in
one request? (Choose two)
A. Get
B. GetNext
C. Set
D. GetBulk
E. Inform
Answer: D E
Explanation
GetBulkRequest The GetBulkRequest message enables an SNMP manager to access large chunks
of data. GetBulkRequest allows an agent to respond with as much information as will fit in the
response PDU. Agents that cannot provide values for all variables in a list will send partial
information.
InformRequest The InformRequest message allows NMS stations to share trap information.
(Traps are issued by SNMP agents when a device change occurs.) InformRequest messages are
generally used between NMS stations, not between NMS stations and agents.
Question 18
A packet sourced from 172.18.33.2 is destined for 172.18.32.38. Where does the router forward
the packet?
A. GigabitEthernet0/0
B. Loopback0
C. 10.1.1.1
D. 10.1.1.3
Answer: A
Explanation
Question 19
The Router1 routing table has multiple methods to reach 10.10.10.0/24 as shown. The default
Administrative Distance is used. Drag and drop the network conditions from the left onto the
routing methods that Router1 uses on the right.
Answer:
eBGP:
+ The static route and EIGRP are down
+ The static route and OSPF are down
EIGRP:
+ The static route and eBGP are down
Static:
+ All protocols are up
+ OSPF and eBGP are down
Explanation
The Administrative Distance (AD) of popular routing protocols is shown below. You should learn
them by heart:
The smaller the AD is, the better it is. The router will choose the routing protocol with smallest AD.
In this case the router will choose in this order: Static (1) -> eBGP (20) -> EIGRP (90) -> OSPF
(110) -> iBGP (200).
Question 20
A. Subnet Mask
B. DNS Servers
C. Default Gateway
D. DHCP Server
Answer: A
Explanation
We see this PC has been assigned an IP address 10.2.2.2, Default Gateway 10.2.2.1, DNS Server
8.8.8.8 but its subnet mask is 255.255.255.192 (or /26) which is different from the subnet mask
of its default gateway so this is the issue.
Question 21
What does a switch do when it receives a frame whose destination MAC address is missing from
the MAC address table?
A. It floods the frame unchanged across all remaining ports in the incoming VLAN.
B. It appends the table with a static entry for the MAC and shuts down the port.
C. It updates the CAM table with the destination MAC address of the frame.
D. It changes the checksum of the frame to a value that indicates an invalid frame.
Answer: A
Question 22
Answer: D
Explanation
Another security enhancement that has been made in WP3 reduces potential for password cracking
attacks such as the WPA2 KRACK Attack. WPA2 is vulnerable to brute force and dictionary-based
attacks. That is because security relies on the AP provider setting a secure password and many
establishments don’t. With WPA3, the Pre-Shared Key (PSK) exchange protocol is replaced with
Simultaneous Authentication of Equals (SAE) or the Dragonfly Key Exchange, which improves
security of the initial key exchange and offers better protection against offline dictionary-based
attacks.
Reference: https://www.webtitan.com/blog/wpa3-wifi-security-enhancements-will-not-block-all-
threats/
Question 23
Which type of address is shared by routers in a HSRP implementation and used by hosts on the
subnet as their default gateway address?
A. multicast address
B. loopback IP address
C. virtual IP address
D. broadcast address
Answer: C
Question 24
What are two reasons a switch experiences frame flooding? (Choose two)
Answer: B E
Explanation
However, other events in the network might cause the switch MAC address table to be flushed
more frequently than the configured aging time. One such event is due to spanning-tree topology
changes in the network.
Topology changes reduce the MAC address table aging time from the default time of 300 seconds
to 15 seconds in the case of 802.1D Spanning Tree Protocol (STP) to freshen stale MAC address
table entries -> Answer B is correct.
If the Layer 2 forwarding table or the MAC address table is full and it can not save any more MAC
address, its enters into a fail-open mode and start behaving like a network Hub. Frames are
flooded to all ports, similar to broadcast type of communication. The MAC flooding attack uses this
feature of the switch to steal information -> Answer E is correct.
Question 25
Why is TCP desired over UDP for application that require extensive error checking, such as HTTPS?
A. UDP operates without acknowledgments, and TCP sends an acknowledgment for every packet
received.
B. UDP reliably guarantees delivery of all packets, and TCP drops packets under heavy load.
C. UDP uses flow control mechanisms for the delivery of packets, and TCP uses congestion control
for efficient packet delivery.
D. UDP uses sequencing data for packets to arrive in order, and TCP offers the capability to receive
packets in random order.
Answer: A
Explanation
Note: The flow control mechanism tells the sender the maximum speed at which the data can be
sent to the receiver device. One of the popular flow control mechanisms in TCP is the sliding
window protocol -> Answer C is not correct.
Reference: https://www.baeldung.com/cs/tcp-flow-control-vs-congestion-control
Question 26
A. user training
B. user awareness
C. vulnerability verification
D. physical access control
Answer: D
Explanation
Physical access control: Infrastructure locations, such as network closets and data centers, should
remain securely locked. Badge access to sensitive locations is a scalable solution, offering an audit
trail of identities and timestamps when access is granted. Administrators can control access on a
granular basis and quickly remove access when an employee is dismissed.
Question 27
Drag and drop the statement about AAA services from the left to the corresponding AAA services
on the right.
Answer:
Accounting
+ It records the duration of each connection
+ It supports User Access Reporting
Authorization
+ It restricts the CLI commands that a user is able to perform
+ It performs user validation via TACACS+
Question 28
The address block 192.168.32.0/24 must be subnetted into smaller networks. The engineer must
meet these requirements:
* Create 8 new subnets
* Each subnet must accommodate 30 hosts
* Interface VLAN 10 must use the last usable IP in the first new subnet
* A Layer 3 interface is used
B. switchport
ip address 192.168.32.65 255.255.255.240
D. no switchport
ip address 192.168.32.30 255.255.255.224
Answer: D
Explanation
8 new subnets -> 8 = 23. Therefore the subnet mask is 255.255.255.224 (224 in decimal = 1110
0000 in binary) and each new subnet consists of 25 – 2 = 30 hosts.
“Interface VLAN 10 must use the last usable IP in the first new subnet” -> The first new subnet is
192.168.32.0/27 ( increment: 32) so it ranges from 192.168.32.0 to 192.168.32.31) so the last
usable IP is 192.168.32.20. Therefore we must assign IP address 192.168.32.20/27 to interface
VLAN 10.
Question 29
A. 1
B. 2
C. 3
D. 4
Answer: A
Explanation
A JSON object contains zero, one, or more key-value pairs, also called properties. The object is
surrounded by curly braces {} so there is only one object in this question.
Question 30
A. SW2#configure terminal
SW2(config)# interface port-channel 1
SW2(config-if)#lacp port-priority 32000
B. SW2#configure terminal
SW2(config)#interface port-channel 1
SW2(config-if)#lacp max-bundle 2
C. SW2#configure terminal
SW2(config)#lacp system-priority 32000
D. SW2#configure terminal
SW2(config)#interface port-channel 1
SW2(config-if)#port-channel min-links 2
Answer: D
Explanation
The port-channel min-links command specifies the minimum number of interfaces that the
configuration mode LAG requires to be active. If there are fewer ports than specified by this
command, the port channel interface does not become active.
Question 31
Which IPv6 address range is suitable for anycast addresses for distributed services such DHCP or
DNS?
A. FF00:1/12
B. 2001:db8:0234:ca3e::1/128
C. 2002:db84:3f37:ca98:be05:8/64
D. FE80::1/10
Answer: B
Explanation
FF00::/8 range is used for IPv6 multicast -> The first octet is FF (1111 1111) -> Answer A is not
correct.
The 2002::/16 prefix is used for 6to4, which requires the next 32 bits (after the 16 bit prefix) to
be a global unicast IPv4 address -> Answer C is not correct.
Note: Anycast addresses are syntactically indistinguishable from unicast addresses, because
anycast addresses are allocated from the unicast address space. Assigning a unicast address to
more than one interface makes a unicast address an anycast address. Nodes to which the anycast
address is assigned must be explicitly configured to recognize that the address is an anycast
address.
Reference: https://www.cisco.com/c/en/us/td/docs/ios-
xml/ios/ipv6_basic/configuration/xe-3se/5700/ip6-anycast-add-xe.html
Question 32
A. excessive collisions
B. speed and duplex mismatch
C. port oversubscription
D. excessive CRC errors
Answer: C
Explanation
Typically, the output drops can occur if QoS is configured and does not provide enough
bandwidth to certain class of packets. It also occurs when the hardware hits an oversubscription.
Reference: https://www.cisco.com/c/en/us/support/docs/switches/catalyst-6500-series-
switches/12027-53.html#anc75
Note: Total output drops: The number of packets dropped because the output queue is full. A
common cause of this might be traffic from a high bandwidth link being switched to a lower
bandwidth link or traffic from multiple inbound links being switched to a single outbound link.
Question 33
An engineer is configuring a switch port that is connected to a VoIP handset. Which command
must the engineer configure to enable port security with a manually assigned MAC address of
abcd.abcd.abcd on voice VLAN 4?
Answer: D
Explanation
We tested the port-security configuration under Web-IOU with IOSv15.2 but there is no “vlan
voice” keyword:
Question 34
Drag and drop the DNS commands from the left onto their effects on the right.
Answer:
Question 35
Answer: C
Question 36
Which device segregates a network into separate zones that have their own security policies?
A. IPS
B. firewall
C. access point
D. switch
Answer: B
Question 37
Answer: D
Explanation
The SSID is limited to a maximum length of 32 bytes. When represented in ASCII form, the
characters of the SSID are case-sensitive. This means that “9tut” is a different network than
“9TUT”.
Question 38
An engineer is configuring a new Cisco switch NewSW, to replace SW2. The details have been
provided:
* Switches SW1 and SW2 are third-party devices without support for trunk ports
* The existing connections must be maintained between PC1 PC2 and PC3
* Allow the switch to pass traffic from future VLAN 10. Which configuration must be applied?
Option A Option B
Option C Option D
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
Explanation
We can configure trunking on the NewSW and set the native VLAN to the access VLAN 2 of SW1 so
that untagged frames received from SW1 will be placed into VLAN 2.
Question 39
Answer: A
Question 40
Answer: D
Explanation
FTP communicates using two TCP connections. Control traffic is exchanged over TCP/21, and data
transmission is performed over TCP/20.
Question 41
Which two protocols are used by an administrator for authentication and configuration on access
points? (Choose two)
A. Kerberos
B. 802.1Q
C. 802.1x
D. TACACS+
E. RADIUS
Answer: C E
Explanation
You can configure 802.1X authentication between a lightweight access point and a Cisco switch.
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-6/configuration-
guide/b_cg76/b_cg76_chapter_01101000.pdf
Question 42
Total doors: 0
Appl doors: 0
Normal doors: 0
Queued Packets: 0
What is the next step to complete the implementation for the partial NAT configuration shown?
A. Reconfigure the static NAT entries that overlap the NAT pool
B. Configure the NAT outside interface
C. Modify the access list for the internal network on e0/1
D. Apply the ACL to the pool configuration
Answer: B
Explanation
We see the line “Outside interfaces: ” is still empty which means we have not configured an
outside interface yet.
Question 43
Which type of IPv4 address type helps to conserve the globally unique address classes?
A. multicast
B. private
C. loopback
D. public
Answer: B
Question 44
Drag and drop the IPv6 address types from the left onto their description on the right.
Answer:
Explanation
FF00::/8 range is used for IPv6 multicast -> The first octet is FF which indicates a multicast
address.
Address that is automatically created on a link when IPv6 is enabled on an interface -> Link-local
address in the range of FE80::/10
Address that is prohibited from routing to the Internet -> Site-local address (or Unique local
address). They are analogous to IPv4’s private address classes. They start with FC00::/7 (for used
in private networks) -> The first octet can be FC or FD. However when you implement this you
have to set the L-bit (the right-most bit of the first octet) to 1 which means that the first two digits
will be FD.
Question 45
Drag and drop the wireless standards from the left onto the number of nonoverlapping channels
they support on the right.
Answer:
3 Non-Overlapping Channels:
+ 802.11b
+ 802.11g
+ 802.11n 2.4 GHz
23 Non-Overlapping Channels:
+ 802.11a
+ 802.11n 5 GHz
Explanation
For 802.11n, in the 2.4 GHz band, there are three non-overlapping 20 MHz channels or one 40
MHz channel. In the 5 GHz band, twenty four non-overlapping 20 MHz or up to twelve 40 MHz
channels exist.
Also in the table “Comparison of 802.11 LAN Standards” of the reference below, we can see the
“Maximum Non-Overlapping Channels (Americas)” of 802.11b & 802.11g are 3.
Reference: https://www.air802.com/ieee-802.11-standards-facts-amp-channels.html
=============================
Question 46
Drag and drop the statements about AAA from the left onto the corresponding AAA services on the
right. Not all options are used.
Answer:
Authentication
+ It permits and denies login attempts
+ It supports local, PPP, RADIUS, and TACACS+ options
Authorization
+ It assigns per-user attributes
+ It restricts the CLI commands that a user is able to perform
Question 47
Drag and drop the cloud-computing components from the left onto the correct descriptions on the
right.
Answer:
+ The resource pool can expand quickly to meet demand: rapid elasticity
+ The consumer can choose when to start or stop using the service: on-demand self-service
+ The provider allocates CPU, memory, and disk from its shared compute resources to multiple
customers: resource pooling
+ The provider can bill the consumer in accordance with the level of usage: measured service
+ The service is available from many types of devices and networks: broad network access
Explanation
Broad network access: Capabilities are available over the network and accessed through
standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g.,
mobile phones, tablets, laptops, and workstations).
Resource pooling: The provider’s computing resources are pooled to serve multiple consumers
using a multi-tenant model, with different physical and virtual resources dynamically assigned and
reassigned according to consumer demand. There is a sense of location independence in that the
customer generally has no control or knowledge over the exact location of the provided resources
but may be able to specify location at a higher level of abstraction (e.g., country, state, or
datacenter). Examples of resources include storage, processing, memory, and network bandwidth.
Rapid elasticity: Capabilities can be elastically provisioned and released, in some cases
automatically, to scale rapidly outward and inward commensurate with demand. To the consumer,
the capabilities available for provisioning often appear to be unlimited and can be appropriated in
any quantity at any time.
Measured service: Cloud systems automatically control and optimize resource use by leveraging
a metering capability at some level of abstraction appropriate to the type of service (e.g., storage,
processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled,
and reported, providing transparency for both the provider and consumer of the utilized service.
Reference: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf
Question 48
A. It selects the RIP route because it has the longest prefix inclusive of the destination address.
B. It load-balances traffic between all three routes.
C. It chooses the OSPF route because it has the longest prefix inclusive of the destination address.
D. It chooses the EIGRP route because it has the lowest administrative distance.
Answer: A
Question 49
Drag and drop the VLAN port modes from the left onto the descriptions on the right.
Answer:
+ allows the port to belong to one VLAN when manually configured: static access
+ allows the port to be assigned automatically to one VLAN: dynamic access
+ allows the port to belong to one or more VLANs: trunk
+ allows the port to support a single VLAN across a service-provider network: tunnel
+ allows the port to communicate with others within the same community VLAN: private
Question 50
The administrator must configure a floating static default route that points to 2001:db8:1234:2::1
and replaces the current default route only if it fails. Which command must the engineer configure
on the CPE?
Answer: B
Explanation
From the output line “ND ::/0 [2/0]” we learn that the current static default route has the AD of 2
so we have to configure the floating static default route with AD of 3 or greater so that it acts as a
backup route.
Question 51
Answer: C
Question 52
Which QoS feature drops traffic that exceeds the committed access rate?
Answer: D
Explanation
Policing: is used to control the rate of traffic flowing across an interface. During a bandwidth
exceed (crossed the maximum configured rate), the excess traffic is generally dropped or
remarked.
Question 53
Two switches have been implemented and all interfaces are at the default configuration level. A
trunk link must be implemented between two switches with these requirements:
+ using an industry-standard trunking protocol
+ permitting VLANs 1-10 and denying other VLANs
Answer: B
Explanation
Question 54
A network engineer is configuring a WLAN to connect with the 172.16.10.0/24 network on VLAN
20. The engineer wants to limit the number of devices that connect to the WLAN on the USERWL
SSID to 125. Which configuration must the engineer perform on the WLC?
A. In the WLAN configuration, set the Maximum Allowed Clients value to 125.
B. In the Advanced configuration, set the DTIM value to 125.
C. In the Controller IPv6 configuration, set the Throttle value to 125.
D. In the Management Software activation configuration, set the Clients value to 125.
Answer: A
Explanation
In the example below, we can limit the number of clients that can access in a WLAN to 50 with the
“Maximum Allowed Clients” field:
Reference: https://www.cisco.com/c/en/us/support/docs/wireless/4400-series-wireless-lan-
controllers/113303-restrict-wlan-clients-00.html
Note: DTIM stands for Delivery traffic indication map or message. It is basically an additional
message added after the normal beacon broadcast by your router or access point.
Question 55
Answer: B
Question 56
When deploying a new network that includes both Cisco and third-party network devices, which
redundancy protocol avoids the interruption of network traffic if the default gateway router fails?
A. FHRP
B. VRRP
C. HSRP
D. GLBP
Answer: B
Explanation
Question 57
A network administrator configures the CPE to provide internet access to the company
headquarters. Traffic must be load-balanced via ISP1 and ISP2 to ensure redundancy. Which two
command sets must be configured on the CPE router? (Choose two)
Answer: B E
Explanation
Answer A is not correct as it uses floating static route with an AD of 2 for the second static route
so traffic cannot be load-balancing.
Now let’s explain more detail about the command “ip route 128.0.0.0 128.0.0.0 …”. It is same as
“ip route 0.0.0.0 128.0.0.0 …” command or we can call it “0.0.0.0/1” route. Because of the
“longest-prefix match” rule, it is preferred to the default static “0.0.0.0/0” route. So 0.0.0.0/0
route would not be used.
Now we can why answer C is not correct as the route “ip route 128.0.0.0 128.0.0.0 203.0.113.1”
is always preferred to “ip route 0.0.0.0 128.0.0.0 198.51.100.1”.
Answer B is correct as we have two “0.0.0.0/1” routes (“0.0.0.0 128.0.0.0” and “128.0.0.0
128.0.0.0” are totally the same)
Question 58
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R1
R1(config)#ip domain-name CC-Net.com
R1(config)#enable secret Passfornewuser
R1(config)#line vty 0 15
R1(config-line)#transport input ssh
R1(config-line)#login local
A network administrator is configuring a router for user access via SSH. The service-password
encryption command has been issued. The configuration must meet these requirements:
Answer: C
Explanation
In fact all other answers look good too, but answer C is the best choice as the password of the
username is encrypted with highest security level.
Question 59
An engineer must configure a static network route between two networks so that host A
communicates with host B. Drag and drop the commands from the left onto the routers where
they must be configured on the right. Not all commands are used.
Answer:
R1:
ip route 10.10.13.0 255.255.255.128 10.10.10.1
R2:
ip route 10.10.13.0 255.255.255.128 10.10.10.5
ip route 10.10.14.0 255.255.255.0 10.10.10.2
R3:
ip route 10.10.14.0 255.255.255.0 10.10.10.6
Question 60
A. 255.255.255.192
B. 255.255.248.0
C. 255.255.254.0
D. 255.255.240.0
Answer: B
Question 61
Which interface or port on the WLC is the default for in-band device administration and
communications between the controller and access points?
A. virtual interface
B. management interface
C. console port
D. service port
Answer: B
Explanation
The management interface is the default interface for in-band management of the controller and
connectivity to enterprise services such as AAA servers. It is also used for communications
between the controller and access points, for all CAPWAP or intercontroller mobility messaging and
tunneling traffic.
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-
4/configuration/guides/consolidated/b_cg74_CONSOLIDATED/b_cg74_CONSOLIDATED_chapter_0
10011011.html
Question 62
The IPv6 address for the LAN segment on router R2 must be configured using the EUI-64 format.
Which address must be used?
Answer: A
Explanation
On R2 LAN interface we use the command “ipv6 address 2001:db8:d8d2:1009::/64 eui-64” to tell
the router to assign an IPv6 address for this interface automatically. R2 takes the MAC address of
LAN interface 12A0.ABDD.0002 and insert FFFE between these two halves to form a 64-bit
address 2001:DB8:D8D2:1009:12A0.ABFF:FEdd:0002 by insert .
We have to invert the universal/local (U/L) flag (bit 7) in the OUI portion of the address so 12 (in
hex) = 0001 0010 (in binary) so after flipping the 7th bit we have 0001 0000 = 10 (in hex).
Therefore the EUI-64 IPv6 would be 2001:DB8:D8D2:1009:10A0:ABFF:FECC:1.
Note: There are some document saying that we have to flip bit 7th while some others say we have
to change the 7th bit to 1. So we tested with IOSv15.4:
We see the MAC address of E0/0 is “aabb……..” (“a” in hex = “1010″) so the 7th bit is 1. When we
enable IPv6 on this interface the link-local address changed to “FE80::A8BB……..”. So “a” changed
to 8 (“8” in hex = 1000″) and we are sure bit 1 changed to 0. But this is just the link-local address
so we will try to assign a global unique address:
Question 63
A company has each office using wireless access with multiple SSIDs while limiting roaming
capabilities, covering different locations on the internal office LAN, guest networks, and BYOD
access for employees. Which change must be enabled to improve the customer experience during
SSID changes?
Explanation
“When you enable Fast SSID Change, the controller allows clients to move between SSIDs. When
the client sends a new association request for a different SSID, the client entry in the controller
connection table is cleared before the client is added to the new SSID.
Question 64
The EtherChannel is configured with a speed of 1000 and duplex as full on both ends of channel
group 1. What is the next step to configure the channel on switch A to respond to but not initiate
LACP communication?
C. interface port-channel 1
channel-group 1 mode auto
D. interface port-channel 1
channel-group 1 mode passive
Answer: D
Question 65
Which two VPN technologies are recommended by Cisco for multiple branch offices and large-scale
deployments? (Choose two)
Answer: D E
Explanation
Cisco DMVPN can be deployed in conjunction with Cisco IOS Firewall and Cisco IOS IPS, as well as
quality of service (QoS), IP Multicast, split tunneling, and routing-based failover
mechanisms. Large-scale, highly available Cisco DMVPN deployments are made possible by load
balancing multiple Cisco DMVPN hubs.
Reference: https://www.cisco.com/c/en/us/products/collateral/security/dynamic-multipoint-vpn-
dmvpn/data_sheet_c78-468520.html
Get VPNs provide large scale, connectionless, tunnel free transmission protection taking advantage
of existing routing infrastructure and can be used with MPLS, IP, Frame relay and ATM networks.
Reference: https://ipwithease.com/flexvpn-vs-getvpn/
Note:
Site-to-Site VPN is a simple VPN that connects a central site and a remote site, or a hub and
spoke VPN that connects a central site with multiple remote sites -> It is not suitable for large-
scale deployments.
With clientless VPN, a tunnel is established from a web browser on the remote user’s device to
the outside interface of the VPN gateway’s SSL component -> It is not suitable for large-scale
deployments.
IPSec remote access is used to connect remote-access clients, such as a PC or small office,
home office (SOHO) device.
Question 66
{
"Test_Questions" : [
"Automation",
"Configuration",
],
"Test_Exam_Level" : [
"CCNA",
"CCNP",
],
"Test_Response" : [
"Correct",
"Incorrect",
]
}
A. one
B. three
C. six
D. nine
Answer: B
Explanation
The JSON array is surrounded by square brackets [ ]. In this question there are three square
brackets in total.
Question 67
An administrator received a call from a branch office regarding poor application performance
hosted at the headquarters. Ethernet 1 is connected between Router1 and the LAN switch. What
identifies the issue?
Answer: A
Explanation
This interface gets high collision (15000 collisions) so one end may be set to “Half-duplex”.
Question 68
SW1#show etherchannel
Channel-group listing:
----------------------
Group: 2
--------
Group state = L2
Ports: 1 Maxports = 8
Port-channels: 1 Max Portchannels = 1
Protocol: PAGP
A network engineer updates the existing configuration on interface fastethernet1/1 switch SW1. It
must establish an EtherChannel by using the same group designation with another vendor switch.
Which configuration must be performed to complete the process?
A. interface port-channel 2
channel-group 2 mode desirable
C. interface port-channel 2
channel-group 2 mode auto
Answer: D
Question 69
Local access for R4 must be established and these requirements must be met:
– Only Telnet access is allowed.
– The enable password must be stored securely.
– The enable password must be applied in plain text
– Full access to R4 must be permitted upon successful login
Option A Option B
! conf t
conf t !
! username test1 password
username test1 password testpass1
testpass1 enable secret level 15 0 Test123
enable password level 1 7 !
Test123 line vty 0 15
! login local
line vty 0 15 transport input telnet
accounting exec default
transport input all
Option C Option D
! !
config t config t
! !
username test1 password username test1 password
testpass1 testpass1
enable secret level 1 0 Test123 enable password level 15 0
! Test123
line vty 0 15 !
login authentication line vty 0 15
password Test123 password Test123
transport input telnet transport input all
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
Explanation
“Only Telnet access is allowed” -> Only Option B and Option C are correct.
In fact the “login authentication” command in Option C can only be used when AAA is enabled
(with the command “aaa new-model”). And we cannot use the “login authentication” without
specifying an authentication list:
Therefore only option B is left. But in fact option B is not totally correct as “Full access to R4 must
be permitted upon successful login” but in option B we have to type the secret password to have
full access to R4 after logging in (with username “test1” and password “testpass1”).
Question 70
A packet from a company’s branch office is destined to host 172.31.0.1 at headquarters. The
sending router has three possible matches in its routing table for the packet: prefixes
172.31.0.0/16, 172.31.0.0/24, and 172.31.0.0/25. How does the router handle the packet?
Answer: C
Question 71
Answer: C
Question 72
When an access point is seeking to join a wireless LAN controller, which message is sent to the AP-
Manager interface?
A. DHCP request
B. DHCP discover
C. discovery response
D. discovery request
Answer: D
Explanation
The LAPs always connect to the management interface address of the controller first with
a discovery request. The controller then tells the LAP the Layer 3 AP-manager interface (which
can also be the management by default) IP address so the LAP can send a join request to the AP-
manager interface next.
Reference: https://www.cisco.com/c/en/us/support/docs/wireless/5500-series-wireless-
controllers/119286-lap-notjoin-wlc-tshoot.html
Question 73
Answer: A
Question 74
A. access point
B. firewall
C. intrusion protection system
D. wireless controller
Answer: B
Question 75
Which two characteristics are representative of virtual machines (VMs)? (Choose two)
Answer: D E
Question 76
R7#
172.22.0.0/24 is subnetted, 1 subnets
D 172.22.49.0 [90/284160] via 10.81.22.2, 04:55:53, FastEthernet0/0
10.0.0.0/8 is variably subnetted, 26 subnets, 5 masks
D EX 10.10.10.10/32 [170/35840] via 10.3.5.1, 04:55:55, FastEthernet0/1
D 10.9.1.0/30 [90/33280] via 10.3.5.1, 04:55:56, FastEthernet0/1
B 10.111.99.0/24 [20/0] via 10.6.25.2, 03:58:52
D 10.14.3.0/30 [90/30720] via 10.3.5.1, 04:55:58, FastEthernet0/1
C 10.9.4.0/30 is directly connected, FastEthernet1/0
B 10.100.100.0/24 [20/0] via 10.6.25.2, 03:58:53
D 10.0.1.0/30 [90/30720] via 10.3.5.1, 04:55:58, FastEthernet0/1
D EX 10.10.10.70/32 [170/1612801 via 10.3.5.1, 04:55:57, FastEthernet0/1
B 10.90.0.0/16 [200/0] via 0.0.0.0, 03:57:59, Null0
D EX 10.90.1.0/24 [170/158720] via 10.3.5.1, 04:55:57, FastEthernet0/1
D EX 10.90.2.0/24 [170/158720] via 10.3.5.1, 04:55:57, FastEthernet0/1
D 10.90.3.0/29 [90/161280] via 10.3.5.1, 02:46:03, FastEthernet0/1
D EX 10.90.3.0/24 [170/158720] via 10.3.5.1, 02:46:04, FastEthernet0/1
D EX 10.90.4.0/24 [170/158720] via 10.3.5.1, 04:55:59, FastEthernet0/1
D EX 10.90.5.0/24 [170/158720] via 10.3.5.1, 04:55:59, FastEthernet0/1
B* 0.0.0.0/0 [20/0] via 10.6.25.2, 02:22:38
According to the output, which parameter set is validated using the routing table of R7?
Answer: D
Explanation
Traffic destined to 10.90.8.0/24 matches the output line “10.90.0.0/16 [200/0] via 0.0.0.0,
03:57:59, Null0” so it will be forwarded to Null0 interface, which means it will be dropped.
From “D EX” letter, we learn that R7 is receiving routes that were redistributed in EIGRP (another
routing protocol was redistributed into EIGRP).
Question 77
A packet sourced from 10.10.10.1 is destined for 172.16.3.254. What is the subnet mask of the
destination route?
A. 0.0.0.0
B. 255.255.254.0
C. 255.255.255.0
D. 255.255.255.255
Answer: B
Explanation
The packet destined for 172.16.3.254 will be routed via the entry “C 172.16.2.0/23 …” as this
subnet ranges from 172.16.2.0 to 172.16.3.255.
Question 78
What is the operating mode and role of a backup port on a shared LAN segment in Rapid PVST+?
A. blocking mode and provides an alternate path toward the designated bridge
B. listening mode and provides an alternate path toward the root bridge
C. forwarding mode and provides the lowest-cost path to the root bridge for each VLAN
D. learning mode and provides the shortest path toward the root bridge handling traffic away from
the LAN
Answer: A
Explanation
An alternate port and a backup port are in a blocking state (or discarding state) to prevent loops.
Reference: https://www.ciscopress.com/articles/article.asp?p=2832407&seqNum=4
Question 79
Which DSCP per-hop forwarding behavior is divided into subclasses based on drop probability?
A. class-selector
B. assured
C. expedited
D. default
Answer: B
Explanation
The term Per-Hop Behaviour (PHB) refers to how a node will treat traffic having the same
Differentiated Services Code Point (DSCP) values.
Assured Forwarding has four standard classes from AF1 to AF4. It is important to note that the
class number does not determine priority. Each class is treated independently and placed into
different queues.
Each AF class has its own IP Precedence with three drop probabilities, low, medium, and high.
Reference: https://www.routeprotocol.com/dscp-per-hop-behaviour-assured-forwarding/
Question 80
What occurs when a switch receives a frame that has a destination that is an unknown MAC
address?
A. The frame is flooded to all interfaces in the VLAN to which the frame belongs.
B. The frame is flooded to all interfaces in the switch.
C. The frame is discarded
D. The MAC address table of the switch is flushed
Answer: A
Question 81
Drag and drop the facts about wireless architectures from the left onto the types of access point
on the right. Not all options are used.
Answer:
Question 82
SIP-based Call Admission Control must be configured in the Cisco WLC GUI. SIP call-snooping
ports are configured. Which two actions must be completed next? (Choose two)
Answer: B D
Explanation
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-10/config-
guide/b_cg810/wireless_quality_of_service.html
Corrections:-
Question 1
What is the term for the concept of limiting communication between applications or containers on
the same node?
A. container orchestration
B. software-defined access
C. microservicing
D. microsegmentation
Answer: D microsegmentation
Question 2
What limits communication between applications or containers on the same node?
A. microservicing
B. container orchestration
C. microsegmentation
D. Software-Defined Access
Answer: C Microsegmentation
Question 3
An administrator is configuring NTP on Cisco ASA via ASDM and needs to ensure that rogue NTP
servers cannot insert themselves as the authoritative time source. Which two steps must be taken
to accomplish this task? (Choose two)
A. Set the NTP DNS host
B. Specify the NTP version
C. Configure the NTP stratum
D. Choose the interface for syncing to the NTP server
E. Set the authentication key
Correct Answers: Choose the interface for syncing to the NTP server and Set the authentication
key.
Question 4
An administrator needs to configure the Cisco ASA via ASDM such that the network management
system can actively monitor the host using SNMPv3. Which two tasks must be performed for this
configuration? (Choose two)
A. Specify the SNMP manager and UDP port.
B. Specify a community string.
C. Add an SNMP USM entry.
D. Add an SNMP host access entry.
E. Specify an SNMP user group.
Answer: D E
Question 5
Which two parameters are used for device compliance checks? (Choose two)
A. device operating system version
B. DHCP snooping checks
C. Windows registry values
D. endpoint protection software version
E. DNS integrity checks
Answer: C D
Question 6
What is a benefit of using Cisco Tetration?
A. It collects policy compliance data and process details.
B. It collects telemetry data from servers and then uses software sensors to analyze flow
information.
C. It collects near-real time data from servers and inventories the software packages that exist on
servers
D. It collects enforcement data from servers and collects interpacket variation.
Answer: A
Question 7
Why is it important for the organization to have an endpoint patching strategy?
A. so the organization can identify endpoint vulnerabilities
B. so the network administrator is notified when an existing bug is encountered
C. so the internal PSIRT organization is aware of the latest bugs
D. so the latest security fixes are installed on the endpoints
Answer: D
An engineer is configuring Cisco WSA and needs to enable a separated email transfer flow from the
Internet and from the LAN. Which deployment mode must be used to accomplish this goal?
A. two-interface
B. single interface
C. multi-context
D. transparent
Answer: D
Question 8
How does the Cisco WSA enforce bandwidth restrictions for web applications?
A. It implements a policy route to redirect application traffic to a lower-bandwidth link
B. It dynamically creates a scavenger class QoS policy and applies it to each client that connects
through the WSA
C. It sends commands to the uplink router to apply traffic policing to the application traffic
D. It simulates a slower link by introducing latency into application traffic
Answer: C
Question 9
What is a benefit of using Cisco Tetration?
A. It collects policy compliance data and process details.
B. It collects telemetry data from servers and then uses software sensors to analyze flow
information.
C. It collects near-real time data from servers and inventories the software packages that exist on
servers
D. It collects enforcement data from servers and collects interpacket variation.
Answer : B
Question 10
Which two actions does the Cisco Identity Services Engine posture module provide that ensures
endpoint security? (Choose two)
A. Assignments to endpoint groups are made dynamically, based on endpoint attributes.
B. Endpoint supplicant configuration is deployed.
C. A centralized management solution is deployed
D. The latest antivirus updates are applied before access is allowed
E. Patch management remediation is performed.
Correct Answers: The latest antivirus updates are applied before access is allowed and Patch
management remediation is performed.
Create Patch Management Conditions
Question 11
The DHCP snooping database resides on router R1, and dynamic ARP inspection is configured only
on switch SW2. Which ports must be configured as untrusted so that dynamic ARP inspection
operates normally?
A. P5, P6, and P7
B. P2 and P3 only
C. P1, P2, P3, and P4
D. P2, P3, and P6
Correct answer: P5, P6, and P7
Question 1
What is a functional difference between a Cisco ASA and a Cisco IOS router with Zone-based policy
firewall?
A. The Cisco ASA denies all traffic by default whereas the Cisco IOS router with Zone-Based Policy
Firewall starts out by allowing all traffic, even on untrusted interfaces.
B. The Cisco IOS router with Zone-Based Policy Firewall can be configured for high availability,
whereas the Cisco ASA cannot
C. The Cisco IOS router with Zone-Based Policy Firewall denies all traffic by default, whereas the
Cisco ASA starts out by allowing all traffic until rules are added
D. The Cisco ASA can be configured for high availability whereas the Cisco IOS router with Zone-
Based Policy Firewall cannot
Answer: D
An administrator is adding a new Cisco ISE node to an existing deployment. What must be done to
ensure that the addition of the node will be successful when inputting the FQDN?
A. Change the IP address of the new Cisco ISE node to the same network as the others
B. Make the new Cisco ISE node a secondary PAN before registering it with the primary
C. Open port 8905 on the firewall between the Cisco ISE nodes
D. Add the DNS entry for the new Cisco ISE node into the DNS server
Answer:D
An engineer needs to add protection for data in transit and have headers in the email message.
Which configuration is needed to accomplish this goal?
A. Provision the email appliance
B. Deploy an encryption appliance
C. Map sender IP addresses to a host interface
D. Enable flagged message handling
Answer : D