Which type of wireless encryption is used for WPA2 in pre-shared key mode?

Which type of wireless encryption is used for WPA2 in pre-shared key mode?A . TKIP with RC4B . RC4C . AES-128D . AES-256View AnswerAnswer: D Explanation: We can see in this picture we have to type 64 hexadecimal characters (256 bit) for the WPA2 passphrase so we can deduce the...

February 26, 2022 No Comments READ MORE +

What is the result of this configuration?

Two switches are connected and using Cisco Dynamic Trunking Protocol SW1 is set to Dynamic Desirable. What is the result of this configuration?A . The link is in a down state.B . The link is in an error disables stateC . The link is becomes an access port.D . The...

February 26, 2022 No Comments READ MORE +

Which two capacities of Cisco DNA Center make it more extensible? (Choose two)

Which two capacities of Cisco DNA Center make it more extensible? (Choose two)A . adapters that support all families of Cisco IOS softwareB . SDKs that support interaction with third-party network equipmentC . customized versions for small, medium, and large enterprisesD . REST APIs that allow for external applications to...

February 26, 2022 No Comments READ MORE +

Which command prevents passwords from being stored in the configuration as plaintext on a router or switch?

Which command prevents passwords from being stored in the configuration as plaintext on a router or switch?A . enable secretB . service password-encryptionC . username Cisco password encryptD . enable passwordView AnswerAnswer: B

February 26, 2022 No Comments READ MORE +

Which type of address is the public IP address of a NAT device?

Which type of address is the public IP address of a NAT device?A . outside globalB . outsdwde localC . inside globalD . insride localE . outside publicF . inside publicView AnswerAnswer: C Explanation: NAT use four types of addresses: * Inside local address -. The IP address assigned to...

February 26, 2022 No Comments READ MORE +

Which set of action satisfy the requirement for multi-factor authentication?

Which set of action satisfy the requirement for multi-factor authentication?A . The user swipes a key fob, then clicks through an email link.B . The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device.C . The user enters a...

February 25, 2022 No Comments READ MORE +

When OSPF learns multiple paths to a network, how does it select a route?

When OSPF learns multiple paths to a network, how does it select a route?A . It multiple the active K value by 256 to calculate the route with the lowest metric.B . For each existing interface, it adds the metric from the source router to the destination to calculate the...

February 25, 2022 No Comments READ MORE +

Which two tasks must be performed to configure NTP to a trusted server in client mode on a single network device? (Choose two)

Which two tasks must be performed to configure NTP to a trusted server in client mode on a single network device? (Choose two)A . Enable NTP authentication.B . Verify the time zone.C . Disable NTP broadcasts.D . Specify the IP address of the NTP server.E . Set the NTP server...

February 25, 2022 No Comments READ MORE +

What are two benefits of network automation? (Choose two)

What are two benefits of network automation? (Choose two)A . reduced operational costsB . reduced hardware footprintC . faster changes with more reliable resultsD . fewer network failuresE . increased network securityView AnswerAnswer: AC

February 25, 2022 No Comments READ MORE +

Which prefix does Router 1 use for traffic to Host A?

Refer to the exhibit. Which prefix does Router 1 use for traffic to Host A?A . 10.10.10.0/28B . 10.10.13.0/25C . 10.10.13.144/28D . 10.10.13.208/29View AnswerAnswer: D Explanation: Host A address fall within the address range. However, if more than one route to the same subnet exist (router will use the longest...

February 25, 2022 No Comments READ MORE +