R1 has learned route 192.168.12.0/24 via IS-IS. OSPF, RIP. and Internal EIGRP Under normal operating conditions, which routing protocol is installed in the routing table?
With the same route (prefix), the router will choose the routing protocol with lowest Administrative Distance (AD) to install into the routing table. The AD of Internal EIGRP (90) is lowest so it would be chosen. The table below lists the ADs of popular routing protocols.
CCNA 200-301 Dumps Full Questions - Exam Study Guide & Free 203
Note: The AD of IS-IS is 115. The “EIGRP” in the table above is “Internal EIGRP”. The AD of “External EIGRP” is 170. An EIGRP external route is a route that was redistributed into EIGRP.
Refer to the exhibit. An extended ACL has been configured and applied to router R2. The configuration failed to work as intended. Which two changes stop outbound traffic on TCP ports 25 and 80 to 10.0.20.0/26 from the 10.0.10.0/26 subnet while still allowing all other traffic? (Choose two.)
What is the primary different between AAA authentication and authorization?
AAA stands for Authentication, Authorization and Accounting.+ Authentication: Specify who you are (usually via login username & password)+ Authorization: Specify what actions you can do, what resource you can access+ Accounting: Monitor what you do, how long you do it (can be used for billing and auditing)An example of AAA is shown below:+ Authentication: “I am a normal user. My username/password is user_tom/learnforever”+ Authorization: “user_tom can access LearnCCNA server via HTTP and FTP”+ Accounting: “user_tom accessed LearnCCNA server for 2 hours”. This user only uses “show” commands.
What is a function of a remote access VPN?
An engineer must configure a WLAN using the strongest encryption type for WPA2- PSK. Which cipher fulfills the configuration requirement?
Many routers provide WPA2-PSK (TKIP), WPA2-PSK (AES), and WPA2-PSK (TKIP/AES) as options. TKIP is actually an older encryption protocol introduced with WPA to replace the very-insecure WEP encryption at the time. TKIP is actually quite similar to WEP encryption. TKIP is no longer considered secure, and is now deprecated. In other words, you shouldn’t be using it.
AES is a more secure encryption protocol introduced with WPA2 and it is currently the strongest encryption type for WPA2-PSK.
Refer to the exhibit.
A network administrator assumes a task to complete the connectivity between PC A and the File Server. Switch A and Switch B have been partially configured with VLAN 10, 11, 12, and 13. What is the next step in the configuration?
While examining excessive traffic on the network, it is noted that all incoming packets on an interface appear to be allowed even though an IPv4 ACL is applied to the interface.
Which two misconfigurations cause this behavior? (Choose two)
A user configured OSPF and advertised the Gigabit Ethernet interface in OSPF By default, which type of OSPF network does this interface belong to?
How does QoS optimize voice traffic?
What is the effect when loopback interfaces and the configured router ID are absent during the OSPF Process configuration?
Which IPv6 address block sends packets to a group address rather than a single address?
FF00::/8 is used for IPv6 multicast and this is the IPv6 type of address the question wants to ask.FE80::/10 range is used for link-local addresses. Link-local addresses only used for communications within the local subnetwork (automatic address configuration, neighbor discovery, router discovery, and by many routing protocols). It is only valid on the current subnet.It is usually created dynamically using a link-local prefix of FE80::/10 and a 64-bit interface identifier (based on 48-bit MAC address).
Refer to the exhibit.
Drag and drop the networking parameters from the left onto the correct values on the right.
When a site-to-site VPN is used, which protocol is responsible for the transport of user data?
A site-to-site VPN allows offices in multiple fixed locations to establish secure connections with each other over a public network such as the Internet. A site-to-site VPN means that two sites create a VPN tunnel by encrypting and sending data between two devices. One set of rules for creating a siteto-site VPN is defined by IPsec.
Refer to the exhibit. After the configuration is applied, the two routers fail to establish an OSPF neighbor relationship. What is the reason for the problem?
What is the primary function of a Layer 3 device?
Which 802.11 frame type is indicated by a probe response after a client sends a probe request?
Refer to Exhibit.
How does SW2 interact with other switches in this VTP domain?
Refer to the exhibit.
An engineer booted a new switch and applied this configuration via the console port. Which additional configuration must be applied to allow administrators to authenticate directly to enable privilege mode via Telnet using a local username and password?
Refer to the exhibit The loopback1 interface of the Atlanta router must reach the loopback3 interface of the Washington router Which two static host routes must be configured on the New York router’ (Choose two)
What is a design element when deploying an 802.11b wireless infrastructure?
Why does a switch flood a frame to all ports?
Which two components are needed to create an Ansible script that configures a VLAN on a switch (Choose two)?
Refer to the exhibit. The entire MAC address table for SW1 is shown here:
Mac Address Table
Vlan Mac Address Type Ports
000c.8590.bb7d DYNAMIC Fa0/1
010a.7a17.45bc DYNAMIC FaO/3
7aa7.4037.8935 DYNAMIC FaO/4
What does SW1 do when Br-4 sends a frame to Br-2?
Refer to the exhibit.
An administrator is tasked with configuring a voice VLAN. What is the expected outcome when a Cisco phone is connected to the GigabitEfriemet3/1/4 port on a switch?
Which two events occur automatically when a device Is added to Cisco DNA Center? (Choose two. )
An organization secures its network with multi-factor authentication using an authenticator app on employee smartphone. How is the application secured in the case of a user’s smartphone being lost or stolen?
An engineer needs to configure LLDP to send the port description time length value (TLV). What command sequence must be implemented?
Refer to the exhibit An engineer must configure GigabitEthemet1/1 to accommodate voice and data traffic. Which configuration accomplishes this task?
In which situation is private IPv4 addressing appropriate for a new subnet on the network of an organization?