Question 121
What is the role of disaggregation in controller-based networking?
A. It divides the control-plane and data-plane functions.
B. It streamlines traffic handling by assigning individual devices to perform either Layer 2 or Layer 3 functions
C. It summarizes the routes between the core and distribution layers of the network topology
D. It enables a network topology to quickly adjust from a ring network to a star network
Question 122
What is a function performed by a web server?
A. send and retrieve email from client devices
B. securely store files for FTP access
C. authenticate and authorize a users identity
D. provide an application that is transmitted over HTTP
Question 123
Refer to the exhibit. Site A was recently connected to site B over a new single-mode fiber path. Users at site A report intermittent connectivity issues with applications hosted at site B. What is the reason for the problem?
A. Physical network errors are being transmitted between the two sites.
B. Heavy usage is causing high latency.
C. The wrong cable type was used to make the connection.
D. An incorrect type of transceiver has been inserted into a device on the link
Question 124
Which protocol uses the SSL?
A. SSH
B. HTTPS
C. HTTP
D. Telnet
Question 125
Why is UDP more suitable than TCP for applications that require low latency such as VoIP?
A. UDP reliably guarantees delivery of all packets: TCP drops packets under heavy load
B. UDP uses sequencing data for packets to arrive in order TCP offers the capability to receive packets in random order
C. TCP uses congestion control for efficient packet delivery: UDP uses flow control mechanisms for the delivery of packets
D. TCP sends an acknowledgement for every packet received: UDP operates without acknowledgments
Question 126
What are the two functions of SSIDs? (Choose two.)
A. uses the maximum of 32 alphanumeric characters
B. controls the speed of the Wi-Fi network
C. used exclusively with controller-based Wi-Fi networks
D. supports a single access point
E. broadcasts by default
Question 127
Which two characteristics describe the access layer in a three-tier network architecture? (Choose two.)
A. serves as the network aggregation point
B. physical connection point for a LAN printer
C. designed to meet continuous redundant uptime requirements
D. layer at which a wireless access point connects to the wired network
E. provides a boundary between Layer 2 and Layer 3 communications
Question 128
Which PoE mode enables powered-devices detection and guarantees power when the device detected?
A. auto
B. static
C. dynamic
D. active
Question 129
Refer to the exhibit. The router has been configured with a super net to accommodate the requirements for 380 users on a Subnet. The requirement already considers 30% future growth. Which configuration verifies the IP subnet on router R4?
A. Subnet: 10.7.54.0, Subnet mask: 255.255 254.0, Broadcast address: 10.7.54.255, Usable IP address range: 10.7.54.1 – 10.7.55.254
B. Subnet: 10.7.54.0, Subnet mask: 255.255.254.0, Broadcast address: 10.7.55.255, Usable IP address range: 10.7.54.1 – 10.7.55.254
C. Subnet: 10.7.54.0, Subnet mask: 255.255.128.0, Broadcast address: 10.7.55.255, Usable IP address range: 10.7.54.1 – 10.7.55.254
D. Subnet: 10.7.54.0, Subnet mask: 255.255.255.0, Broadcast address: 10.7.54.255, Usable IP address range: 10.7.54.1 – 10.7.55.254
Question 130
Refer to the exhibit. Configurations for the switch and PCs are complete. Which configuration must be applied so that VLANs 2 and 3 communicate back and forth?
A. interface GigabitEthernet0/0 ip address 10.10.2.10 255.255.252.0
B. interface GigabitEthernet0/0.10 encapsulation dot1Q 3 ip address 10.10.2.10 255.255.254.0
C. interface GigabitEthernet0/0.3 encapsulation dot1Q 3 native ip address 10.10.2.10 255.255.252.0
D. interface GigabitEthernet0/0.3 encapsulation dot1Q 10 ip address 10.10.2.10 255.255.255.252