Question 121
            
                    
                    
What is the role of disaggregation in controller-based networking?
                        
                        
                        
                            
                                A. It divides the control-plane and data-plane functions. 
                            
                            
                        
                        
                        
                            
                                B. It streamlines traffic handling by assigning individual devices to perform either Layer 2 or Layer 3 functions 
                            
                            
                        
                        
                        
                            
                                C. It summarizes the routes between the core and distribution layers of the network topology 
                            
                            
                        
                        
                        
                            
                                D. It enables a network topology to quickly adjust from a ring network to a star network 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 122
            
                    
                    
What is a function performed by a web server?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. send and retrieve email from client devices 
                            
                            
                        
                        
                        
                            
                                B. securely store files for FTP access 
                            
                            
                        
                        
                        
                            
                                C. authenticate and authorize a users identity 
                            
                            
                        
                        
                        
                            
                                D. provide an application that is transmitted over HTTP 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 123
            
                    
                    Refer to the exhibit. Site A was recently connected to site B over a new single-mode fiber path. Users at site A report intermittent connectivity issues with applications hosted at site B. What is the reason for the problem?
                        
                         
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. Physical network errors are being transmitted between the two sites. 
                            
                            
                        
                        
                        
                            
                                B. Heavy usage is causing high latency. 
                            
                            
                        
                        
                        
                            
                                C. The wrong cable type was used to make the connection. 
                            
                            
                        
                        
                        
                            
                                D. An incorrect type of transceiver has been inserted into a device on the link 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                 
             
     
     
     
     
     
            
            Question 124
            
                    
                    
Which protocol uses the SSL?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. SSH 
                            
                            
                        
                        
                        
                            
                                B. HTTPS 
                            
                            
                        
                        
                        
                            
                                C. HTTP 
                            
                            
                        
                        
                        
                            
                                D. Telnet 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 125
            
                    
                    
Why is UDP more suitable than TCP for applications that require low latency such as VoIP?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. UDP reliably guarantees delivery of all packets: TCP drops packets under heavy load 
                            
                            
                        
                        
                        
                            
                                B. UDP uses sequencing data for packets to arrive in order TCP offers the capability to receive packets in random order 
                            
                            
                        
                        
                        
                            
                                C. TCP uses congestion control for efficient packet delivery: UDP uses flow control mechanisms for the delivery of packets 
                            
                            
                        
                        
                        
                            
                                D. TCP sends an acknowledgement for every packet received: UDP operates without acknowledgments 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
	
     
     
            
            Question 126
            
                    
                    
What are the two functions of SSIDs? (Choose two.)
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. uses the maximum of 32 alphanumeric characters 
                            
                            
                        
                        
                        
                            
                                B. controls the speed of the Wi-Fi network 
                            
                            
                        
                        
                        
                            
                                C. used exclusively with controller-based Wi-Fi networks 
                            
                            
                        
                        
                        
                            
                                D. supports a single access point 
                            
                            
                        
                        
                        
                            
                                E. broadcasts by default 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 127
            
                    
                    
Which two characteristics describe the access layer in a three-tier network architecture? (Choose two.)
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. serves as the network aggregation point 
                            
                            
                        
                        
                        
                            
                                B. physical connection point for a LAN printer 
                            
                            
                        
                        
                        
                            
                                C. designed to meet continuous redundant uptime requirements 
                            
                            
                        
                        
                        
                            
                                D. layer at which a wireless access point connects to the wired network 
                            
                            
                        
                        
                        
                            
                                E. provides a boundary between Layer 2 and Layer 3 communications 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 128
            
                    
                    
Which PoE mode enables powered-devices detection and guarantees power when the device detected?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. auto 
                            
                            
                        
                        
                        
                            
                                B. static 
                            
                            
                        
                        
                        
                            
                                C. dynamic 
                            
                            
                        
                        
                        
                            
                                D. active 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 129
            
                    
                    Refer to the exhibit. The router has been configured with a super net to accommodate the requirements for 380 users on a Subnet. The requirement already considers 30% future growth. Which configuration verifies the IP subnet on router R4?
                        
                         
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. Subnet: 10.7.54.0, Subnet mask: 255.255 254.0, Broadcast address: 10.7.54.255, Usable IP address range: 10.7.54.1 – 10.7.55.254 
                            
                            
                        
                        
                        
                            
                                B. Subnet: 10.7.54.0, Subnet mask: 255.255.254.0, Broadcast address: 10.7.55.255, Usable IP address range: 10.7.54.1 – 10.7.55.254 
                            
                            
                        
                        
                        
                            
                                C. Subnet: 10.7.54.0, Subnet mask: 255.255.128.0, Broadcast address: 10.7.55.255, Usable IP address range: 10.7.54.1 – 10.7.55.254 
                            
                            
                        
                        
                        
                            
                                D. Subnet: 10.7.54.0, Subnet mask: 255.255.255.0, Broadcast address: 10.7.54.255, Usable IP address range: 10.7.54.1 – 10.7.55.254 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                 
             
     
     
     
     
     
            
            Question 130
            
                    
                    Refer to the exhibit. Configurations for the switch and PCs are complete. Which configuration must be applied so that VLANs 2 and 3 communicate back and forth?
                        
                         
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. interface GigabitEthernet0/0 ip address 10.10.2.10 255.255.252.0 
                            
                            
                        
                        
                        
                            
                                B. interface GigabitEthernet0/0.10 encapsulation dot1Q 3 ip address 10.10.2.10 255.255.254.0 
                            
                            
                        
                        
                        
                            
                                C. interface GigabitEthernet0/0.3 encapsulation dot1Q 3 native ip address 10.10.2.10 255.255.252.0 
                            
                            
                        
                        
                        
                            
                                D. interface GigabitEthernet0/0.3 encapsulation dot1Q 10 ip address 10.10.2.10 255.255.255.252