Which type of wireless encryption is used for WPA2 in pre-shared key mode?
Which type of wireless encryption is used for WPA2 in pre-shared key mode?A . TKIP with RC4B . RC4C . AES-128D . AES-256View AnswerAnswer: D Explanation: We can see in this picture we have to type 64 hexadecimal characters (256 bit) for the WPA2 passphrase so we can deduce the...
What is the result of this configuration?
Two switches are connected and using Cisco Dynamic Trunking Protocol SW1 is set to Dynamic Desirable. What is the result of this configuration?A . The link is in a down state.B . The link is in an error disables stateC . The link is becomes an access port.D . The...
Which two capacities of Cisco DNA Center make it more extensible? (Choose two)
Which two capacities of Cisco DNA Center make it more extensible? (Choose two)A . adapters that support all families of Cisco IOS softwareB . SDKs that support interaction with third-party network equipmentC . customized versions for small, medium, and large enterprisesD . REST APIs that allow for external applications to...
Which command prevents passwords from being stored in the configuration as plaintext on a router or switch?
Which command prevents passwords from being stored in the configuration as plaintext on a router or switch?A . enable secretB . service password-encryptionC . username Cisco password encryptD . enable passwordView AnswerAnswer: B
Which type of address is the public IP address of a NAT device?
Which type of address is the public IP address of a NAT device?A . outside globalB . outsdwde localC . inside globalD . insride localE . outside publicF . inside publicView AnswerAnswer: C Explanation: NAT use four types of addresses: * Inside local address -. The IP address assigned to...
Which set of action satisfy the requirement for multi-factor authentication?
Which set of action satisfy the requirement for multi-factor authentication?A . The user swipes a key fob, then clicks through an email link.B . The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device.C . The user enters a...
When OSPF learns multiple paths to a network, how does it select a route?
When OSPF learns multiple paths to a network, how does it select a route?A . It multiple the active K value by 256 to calculate the route with the lowest metric.B . For each existing interface, it adds the metric from the source router to the destination to calculate the...
Which two tasks must be performed to configure NTP to a trusted server in client mode on a single network device? (Choose two)
Which two tasks must be performed to configure NTP to a trusted server in client mode on a single network device? (Choose two)A . Enable NTP authentication.B . Verify the time zone.C . Disable NTP broadcasts.D . Specify the IP address of the NTP server.E . Set the NTP server...
What are two benefits of network automation? (Choose two)
What are two benefits of network automation? (Choose two)A . reduced operational costsB . reduced hardware footprintC . faster changes with more reliable resultsD . fewer network failuresE . increased network securityView AnswerAnswer: AC
Which prefix does Router 1 use for traffic to Host A?
Refer to the exhibit. Which prefix does Router 1 use for traffic to Host A?A . 10.10.10.0/28B . 10.10.13.0/25C . 10.10.13.144/28D . 10.10.13.208/29View AnswerAnswer: D Explanation: Host A address fall within the address range. However, if more than one route to the same subnet exist (router will use the longest...