Which two statements describe characteristics of IPv6 unicast addressing? (Choose two.)

Which two statements describe characteristics of IPv6 unicast addressing? (Choose two.)A . Global addresses start with 2000::/3.B . Link-local addresses start with FE00:/12.C . Link-local addresses start with FF00::/10.D . There is only one loopback address and it is ::1.E . If a global address is assigned to an interface,...

May 18, 2018 No Comments READ MORE +

Which IOS command is used to define the authentication key for NTP?

Which IOS command is used to define the authentication key for NTP?A . Switch(config)#ntp authentication-key 1 md5 C1sc0B . Switch(config)#ntp trusted-key 1C . Switch(config)#ntp source 192.168.0.1D . Switch(config)#ntp authenticateView AnswerAnswer: A

May 18, 2018 No Comments READ MORE +

A network engineer must configure a 5 GHz network to allow for the greatest density of radios possible with the least amount of co-channel interference. Which configuration best fulfills this requirement?

A network engineer must configure a 5 GHz network to allow for the greatest density of radios possible with the least amount of co-channel interference. Which configuration best fulfills this requirement?A . Set 802.11 h Local Power constraint to 25 dBm.B . Set DCA to 20 MHz channels and enable...

May 18, 2018 No Comments READ MORE +

When querying a DNS server for an AAAA record, which of the following is an appropriate response?

When querying a DNS server for an AAAA record, which of the following is an appropriate response?A . 192.168.2.1B . 00:f3:82:99:a2:b8C . 61.23.168.192.in-addr.arpaD . 3ffe:1900:4545:3:200:f8ff:fe21:67cfView AnswerAnswer: D

May 18, 2018 No Comments READ MORE +

Which of the following is the MOST likely explanation for this?

A system administrator recently deployed and verified the installation of a critical patch issued by the company’s primary OS vendor. This patch was supposed to remedy a vulnerability that would allow an adversary to remotely execute code from over the network. However, the administrator just ran a vulnerability assessment of...

May 18, 2018 No Comments READ MORE +

What happens to Copp after you perform an ISSU?

What happens to Copp after you perform an ISSU?A . The default Copp policy is applied.B . packets that need special handling by the supervisor module cannot be matched.C . The statistical counters are reset.D . All traffic is put into the default class of the Copp policyView AnswerAnswer: C

May 18, 2018 No Comments READ MORE +

Make an IP address 10.0.0.1 host access to the Internet, which is the necessary technology?

Make an IP address 10.0.0.1 host access to the Internet, which is the necessary technology?A . Static RoutingB . Dynamic RoutingC . route redistributionD . NATView AnswerAnswer: D

May 18, 2018 No Comments READ MORE +

What should you recommend?

A company hosts a website and exposes web services on the company intranet. The intranet is secured by using a firewall. Company policies prohibit changes to firewall rules. Devices outside the firewall must be able to access the web services. You need to recommend an approach to enable inbound communication....

May 18, 2018 No Comments READ MORE +

When troubleshooting client DNS issues, which two task must you perform? (Choose two)

When troubleshooting client DNS issues, which two task must you perform? (Choose two)A . Ping a public website IP address.B . Ping the DNS Server.C . Determine whether a DHCP address has been assigned.D . Determine whether the hardware address is correct.E . Determine whether the name servers have been...

May 18, 2018 No Comments READ MORE +

Which command must you enter to enable OSPFV2 in an IPV4 network?

Which command must you enter to enable OSPFV2 in an IPV4 network?A . ip ospf hello-interval secondsB . router ospfv2 process-idC . router ospf valueD . router ospf process-idView AnswerAnswer: D

May 18, 2018 No Comments READ MORE +