-
Refer to the exhibit. Which three options are available when the Cisco Wireless Control System (WCS) discovers rogue access points on the LAN?()https://assets.asklib.com/images/image2/2018072416180978608.jpg
A . The WCS sends new rouge access point notifications.
B . The WCS locates and monitors rouge access points until they are eliminated or acknowledged.
C . The WCS reconfigures the rouge access point with proper authentication credentials.
D . The WCS sends deauthenticate and disassociate messages to the rouge access point.
E . The WCS contains rouge access points by sending their clients deauthenticate and disassociate messages
F . The WCS sends deauthenticate and disassociate messages to all wireless clients on the network.
-
Refer to the exhibit. Based upon the debug output that is shown,
which three statements about HSRP are true?()
https://assets.asklib.com/images/image2/201807301534389957.jpg
A . The router with IP address 172.16.11.111 haspreempt configured.
B . The final active router is the router with IP address 172.16.11.111.
C . The router with IP address 172.16.11.112 has nonpreempt configured.
D . The priority of the router with IP address 172.16.11.112 is preferred over the router with IP address 172.16.11.111.
E . The router with IP address 172.16.11.112 is using default HSRP priority.
F . The IP address 172.16.11.115 is the virtual HSRP IP address.
-
Refer to the exhibit. Which three statements accurately describe the result of applying the exhibited route map?()https://assets.asklib.com/images/image2/2018073015105040094.jpg
A . The map prohibits th e redistribution of all type 2 external OSPF routes.
B . All routes that do no match clauses 10 and 20 of the route map are redistributed with their tags set to 8.
C . The map prohibits the redistribution of all external OSPF routes with tag 6 set.
D . Th e map permits the redistribution of all type 1 external OSPF routes.
E . The map redistributes into EIGRP all routes that match the pfx prefix list and the five metric values?0000, 1000, 255, 1, and 1500.
F . The map prohibits the redistribution of all ty pe 2 external OSPF routes with tag 6 set.
-
Refer to the exhibit. Which three statements accurately describe the result of applying the exhibited route map?()https://assets.asklib.com/images/image2/201807260953573115.jpg
A . The map prohibits the redistribution of all type 2 external OSPF routes with tag 6 set
B . The map prohibits the redistribution of all type 2 external OSPF routes
C . The map redistributes into EIGRP all routes that match the pfx prefix list and the five metric values40000, 1000, 255, 1, and 1500
D . The map prohibits the redistribution of all external OSPF routes with tag 6 set
E . All routes that do no match clauses 10 and 20 of the route map are redistributed with their tags set to 8
F . The map permits the redistribution of all type 1 external OSPF route
-
Refer to the exhibit. The output that is shown is generated at a switch. Which three of these statements are true? ()
A . All ports will be in a state of discarding, learning, or forwarding.
B . Thirty VLANs have been configured on this switch.
C . The bridge priority is lower than the default value for spanning tree.
D . All interfaces that are shown are on shared media.
E . All designated ports are in a forwarding state.
F . The switch must be the root bridge for all VLANs on this switch.
-
Refer to the exhibit. Based upon the debug output that is shown, which three statements aboutHSRP are true?()https://assets.asklib.com/images/image2/2018072614385062672.jpg
A . The router with IP address 172.16.11.112 is using default HSRP priority
B . The IP address 172.16.11.115 is the virtual HSRP IP address
C . The priority of the router with IP address 172.16.11.112 is preferred over the router with IPaddress 172.16.11.111
D . The router with IP address 172.16.11.111 haspreempt configured
E . The final active router is the router with IP address 172.16.11.111
F . The router with IP address 172.16.11.112 has nonpreempt configured
-
Refer to the exhibit.
https://assets.asklib.com/images/image2/2018073016070377463.png
Which three statements describe the steps that are required to configure an IPsec site-to-site VPN using a GRE tunnel?()
A . The command access-list 110 permit gre must be configured to specify which traffic will be encrypted.
B . The command access-list 110 permit ip must be configured to specify which hosts can use the tunnel.
C . The tunnel destination 172.17.63.18 command must be configured on the Tunnel0 interface.
D . The tunnel mode gre command must be configured on the Tunnel0 interface.
E . The tunnel source Ethernet1 command must be configured on the Tunnel0 interface.
F . The tunnel source Tunnel0 command must be configured on the Tunnel0 interface.
-
Refer to the exibit .An attempt to deny web access to a subnet blocks all traffic from the subnet.Which interface command immedicately removes the effect of ACL 102?()https://assets.asklib.com/images/image2/2018072409460628004.jpg
A . no ip access-group 102 in
B . no ip access-group 102 out
C . no ip access-list 102 in
D . no ip access-class 102 out
E . no ip access-class 102 i
-
Refer to the exhibit.
Which three statements are true about the voice VLAN configuration of the Catalyst switch? ()
https://assets.asklib.com/images/image2/2018073014461894379.jpg
A . The packet priority received from a device that is connected to the phone will be unmodified.
B . The packet priority received from a device that is connected to the phone will be overridden.
C . Incoming CoS values in packets from the connected phone will be left unmodified.
D . Packets without aCoS value that is set by the phone will be set to a value of 5.
E . Incoming CoS values in packets from the connected phone will be reset to a value of 5.
F . Packets without aCoS value that is set by the phone will be set to the default CoS value.
-
Refer to the exhibit. What three statements are true about the IS - IS configuration?()https://assets.asklib.com/images/image2/2018073015191336049.jpg
A . The router is in area 49.0001.0002
B . The router acts as a Level 1 - 2 router
C . CLNS routing is enable d for the router
D . The router has a system ID of 0003.0004
E . The interfaces have a functional IS - IS configuration
F . The network service access point selector (NSEL) byte has a value of 0
-
Refer to the exhibit. Routing updates for the 192.168.1.0 network are being received from all three neighbors. Which statement is correct regarding the result of the con figuration shown? ()https://assets.asklib.com/images/image2/201807301539013573.jpg
A . The router will prefer the next hop of 172.16.1.1 for packets destined for the 192.168.1.0 network.
B . The router will prefer the next hop of 172.26.1.1 for packets destined for the 192.168.1.0 network.
C . The router will adve rtise the 192.168.1.0 network only to 172.30.1.1.
D . The router will advertise the 192.168.1.0 network only to 172.26.1.1.
E . The router will prefer the next hop of 172.26.1.1 for packets except those destined for the 192.168.1.0 network.
-
Refer to the exhibit. The wireless user is moving from right to left towards AP2.
What are three reasons that the wireless client would initiate roaming?()
https://assets.asklib.com/images/image2/2018073011464176099.jpg
A . The minimum data retry count from AP1 is exceeded.
B . The maximum data retry count from AP1 is exceeded.
C . The client has missed too many beacons from AP1.
D . The client data rate from AP1 has been reduced.
E . The client has received too many beacons from AP2.
F . The client data rate from AP2 has been increased.
-
Refer to the exhibit. Which three statements are true about trust boundaries in the campus network? (Choose three.)()https://assets.asklib.com/images/image2/2018072411062788011.jpg
A . A device is trusted if it correctly classifies packets.
B . A device is trusted if it correctly declassifies packets.
C . The outermost trusted devices represent the trust boundary.
D . Classification and marking occur using 802.1ab QoS bits before reaching the trust boundary.
E . Network trust boundaries are automatically configured in IOS version 12.3 and later.
F . For scalability, classification should be done as close to the edge as possible.
-
Refer to the exhibit. Which three statements accurately describe this GLBP topology?()https://assets.asklib.com/images/image2/2018072610142826513.jpg
A . Router A is responsible for answering ARP requests sent to the virtual IP address
B . If Router A becomes unavailable, Router B will forward packets sent to the virtual MAC address ofRouter A
C . If another router were added to this GLBP group, there would be two backup AVGs
D . Router B is in GLBP listen state
E . Router A alternately responds to ARP requests with different virtual MAC addresses
F . Router B will transition from blocking state to forwarding state when it becomes the AVG
-
Refer to the exhibit.Which three statements correctly describe Network Device A?()https://assets.asklib.com/images/image2/2018072315413323788.jpg
A . With a network wide mask of 255.255.255.128, each interface does not require an IP address.
B . With a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet.
C . With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate with each other.
D . With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other.
E . With a network wide mask of 255.255.254.0, each interface does not require an IP address.
-
Refer to the exhibit. Which three statements are true?()https://assets.asklib.com/images/image2/2018073010470298110.jpg
A . On the routing table of R4, the 10.1.1.0/24 route appears as an O E2 route
B . On R4, the 172.16.1.0/24 route has a metric of 20
C . The R3 S0/0 interface should not need the no ip split - horizon eigrp 1 configuration command for the 172.16.1.0/24 route to appear in the routing table of R2 as an D EX route
D . The administrative distance of the 172.16.1.0/24 route in the routing table of R3 is 170
E . On R5, the 4.0.0.0/8 route will have an administrative distance of 120 and a hop co unt of 6
-
Refer to the exhibit. Which three statements correctly describe Network Device A?()https://assets.asklib.com/images/image2/2018072316253185664.jpg
A . With a network wide mask of 255.255.255.128, each interface does not require an IP address.
B . With a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet.
C . With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate with each other.
D . With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other.
E . With a network wide mask of 255.255.254.0, each interface does not require an IP address.
-
Refer to the exhibit.
Which three statements are true about trust boundaries in the campus network?()
https://assets.asklib.com/images/image2/2018073014302987878.jpg
A . Classification and markingoccur using 802.1ab QoS bits before reaching the trust boundary.
B . A device is trusted if it correctly declassifies packets.
C . A device is trusted if it correctly classifies packets.
D . Network trust boundaries are automatically configured in IOS version 12.3 and later.
E . The outermost trusted devices represent the trust boundary.
F . For scalability, classification should be done as close to the edge as possible.
-
Refer to the exhibit. Which three statements accurately describe this GLBP topology? (Choose three.)()https://assets.asklib.com/images/image2/2018072410573476016.jpg
A . Router A is responsible for answering ARP requests sent to the virtual IP address.
B . If Router A becomes unavailable, Router B will forward packets sent to the virtual MAC address of Router A
C . If another router were added to this GLBP group, there would be two backup AVGs
D . Router B is in GLBP listen state.
E . Router A alternately responds to ARP requests with different virtual MAC addresses.
F . Router B will transition from blocking state to forwarding state when it becomes the AVG
-
What does the title --- The Icy Defender refer to?
-
What are the “Four Books” refer to ?
-
The next two questions refer to the following passage:
A pharmaceutical company tested a new painkiller on 1,000 lab rats that were fed large doses of the painkiller for a two-month period. By the end of the experiment, 39 of tile rats had died. The company concluded that the painkiller was sufficiently safe to test on humans.
Which of the following, if true, provides the most support for the pharmaceutical company's conclusion?
A.The amount of painkiller fed to the rats was substantially greater, in relation to body mass, than the dosage any human would take under normal circumstances.
B.Because of the different body chemistry of humans and rats, some compounds can be dangerous for rats but safe for humans, and vice versa.
C.Tests of this same painkiller on dogs showed that 3 out of 50 dogs developed lesions on their livers during the course of the experiment.
D.The researchers found that during the experiment, the rats showed a significantly lower sensitivity to pain than rats do under normal circumstances.
E.In an experiment of this length with this number of rats, it is not unusual for up to 50 rats to die during the experiment for reasons unrelated to the experiment itself.
-
Fires rely on , , and , the three components of what fire crews refer to as “the fire triangle.”
-
Who does "the listener" in the first paragraph refer to()
A.The writer
B.The child
C.The parent
D.The teacher