Tag Archives: configure

An administrator must secure the WLC from receiving spoofed association requests. Which steps must be taken to configure the WLC to restrict the requests and force the user to wait 10 ms to retry an association request?

A. Enable MAC filtering and set the SA Query timeout to 10. B. Enable 802.1x Layer 2 security and set the Comeback timer to 10. C. Enable Security Association Teardown Protection and set the SA Query timeout to 10. D. Enable the Protected Management Frame service and set the Comeback timer to 10. Answer: Option C. Explanation:  No… Read More »

A network engineer must configure communication between PC A and the File Server. To prevent interruption for any other communications, which command must be configured?

Refer to the exhibit. A network engineer must configure communication between PC A and the File Server. To prevent interruption for any other communications, which command must be configured? A. switchport truck allowed vlan 12 B. switchport truck allowed vlan none C. switchport truck allowed vlan add 13 D. switchport truck allowed vlan remove 10-11 Answer: Option C.… Read More »

An engineer must configure GigabitEthernet1/1 to accommodate voice and data traffic. Which configuration accomplishes this task?

Refer to the exhibit. An engineer must configure GigabitEthernet1/1 to accommodate voice and data traffic. Which configuration accomplishes this task? A. interface gigabitethernet1/1 switchport mode access switchport access vlan 300 switchport voice vlan 400 B. interface gigabitethernet1/1 switchport mode trunk switchport trunk vlan 300 switchport trunk vlan 400 C. interface gigabitethernet1/1 switchport mode access switchport voice vlan 300… Read More »

An engineer must configure traffic for a VLAN that is untagged by the switch as it crosses a trunk link. Which command should be used?

A. switchport trunk encapsulation dot1q B. switchport trunk allowed vlan 10 C. switchport mode trunk D. switchport trunk native vlan 10 Answer: Option D. Explanation:  No answer description available for this question. Show AnswerDiscussion The post An engineer must configure traffic for a VLAN that is untagged by the switch as it crosses a trunk link. Which command… Read More »

What are two reasons for an engineer to configure a floating static route? (Choose two.)

A. to enable fallback static routing when the dynamic routing protocol fails B. to route traffic differently based on the source IP of the packet C. to automatically route traffic on a secondary path when the primary path goes down D. to support load balancing via static routing E. to control the return path of traffic that is… Read More »

Which two tasks must be performed to configure NTP to a trusted server in client mode on a single network device? (Choose two.)

A. Enable NTP authentication. B. Verify the time zone. C. Specify the IP address of the NTP server. D. Set the NTP server private key. E. Disable NTP broadcasts. Answer: Option A, C. Explanation:  To configure authentication, perform this task in privileged mode: Step 1: Configure an authentication key pair for NTP and specify whether the key will… Read More »

What will happen if you configure the logging trap debug command on a router?

A. It causes the router to send messages with lower severity levels to the syslog server B. It causes the router to send all messages with the severity levels Warning, Error, Critical, and Emergency to the syslog server C. It causes the router to send all messages to the syslog server D. It causes the router to stop… Read More »

An engineer must configure a WLAN using the strongest encryption type for WPA2-PSK. Which cipher fulfills the configuration requirement?

A. WEP B. AES C. RC4 D. TKIP Answer: Option B. Explanation:  Section: Security Fundamentals Many routers provide WPA2-PSK (TKIP), WPA2-PSK (AES), and WPA2-PSK (TKIP/AES) as options. TKIP is actually an older encryption protocol introduced with WPA to replace the very-insecure WEP encryption at the time. TKIP is actually quite similar to WEP encryption. TKIP is no longer… Read More »

A network administrator must configure SSH for remote access to router R1. The requirement is to use a public and private key pair to encrypt management traffic to and from the connecting client. Which configuration, when applied, meets the requirements?

A. R1#enable R1#configure terminal R1(config)#ip domain-name cisco.com R1(config)#crypto key generate ec keysize 1024 B. R1#enable R1#configure terminal R1(config)#ip domain-name cisco.com R1(config)#crypto key generate ec keysize 2048 C. R1#enable R1#configure terminal R1(config)#ip domain-name cisco.com R1(config)#crypto key encrypt rsa name myKey D. R1#enable R1#configure terminal R1(config)#ip domain-name cisco.com R1(config)#crypto key generate rsa modulus 1024 Answer: Option D. Explanation:  No answer… Read More »