16.1.2 Lab – Implement a GRE Tunnel (Answers) Topology Addressing Table Device Interface IPv4 Address IPv6 Address IPv6 Link-Local R1 G0/0/0 10.1.2.1/24 2001:db8:acad:12::1/64 fe80::1:1 Loopback 0 192.168.1.1/24 2001:db8:acad:1::1/64 fe80::1:2 Loopback 1 172.16.1.1/24 2001:db8:acad:1721::1/64 fe80::1:3 R2 G0/0/0 10.1.2.2/24 2001:db8:acad:12::2/64 fe80::2:1 G0/0/1 10.2.3.2/24 2001:db8:acad:23::2/64 fe80::2:1 R3 G0/0/0 10.2.3.3/24 2001:db8:acad:23::3/64 fe80::3:1 …
15.1.6 Lab – Implement NAT (Answers) Topology Addressing Table Device Interface IP Address Default Gateway R1 G0/0/0 209.165.200.1/24 N/A G0/0/1 10.0.0.1/24 R2 G0/0/0 209.165.200.2/24 N/A G0/0/1 209.165.224.2/24 Loopback0 209.165.240.1/24 R3 G0/0/0 209.165.224.3/24 N/A G0/0/1 10.1.0.1/24 D1 VLAN 1 10.0.0.2/24 N/A D2 VLAN 1 10.2.0.2/24 N/A PC1 NIC 10.0.0.50/24 …
15.1.5 Lab – Implement GLBP (Answers) Topology Addressing Table Device Interface IP Address Default Gateway D1 VLAN 99 192.168.99.1/24 N/A VLAN 99 2001:db8:99::1/64 Loopback 0 172.16.1.1/24 Loopback 0 2001:db8:172::1/64 D2 VLAN 99 192.168.99.2/24 N/A VLAN 99 2001:db8:99::2/64 Loopback 0 172.16.1.1/24 Loopback 0 2001:db8:172::1/64 PC1 NIC 192.168.99.75/24 192.168.99.1 SLAAC …
15.1.4 Lab – Implement VRRP (Answers) Topology Addressing Table Device Interface IP Address Default Gateway D1 Lo 0 192.168.1.1/24 N/A 2001:db8:acad:1000::1/64 VLAN 11 10.11.0.1/24 2001:db8:acad:11::1/64 VLAN 21 10.21.0.1/24 2001:db8:acad:21::1/64 D2 Lo 0 192.168.1.1/24 N/A 2001:db8:acad:1000::1/64 VLAN 11 10.11.0.2/24 2001:db8:acad:11::1/64 VLAN 21 10.21.0.2/24 2001:db8:acad:21::2/64 PC1 NIC 10.11.0.50/24 10.11.0.254 IPv6 …
15.1.3 Lab – Implement HSRP (Answers) Topology Addressing Table Device Interface IP Address Default Gateway D1 Lo 0 192.168.1.1/24 N/A Lo 0 2001:db8:acad:1000::1/64 N/A VLAN 11 10.11.0.1/24 N/A VLAN 11 2001:db8:acad:11::1/64 N/A VLAN 21 10.21.0.1/24 N/A VLAN 21 2001:db8:acad:21::1/64 N/A D2 Lo 0 192.168.1.1/24 N/A Lo 0 2001:db8:acad:1000::1/64 …
30. Which two configuration management tools are developed using Python? (Choose two.) Chef Ansible Puppet SaltStack NETCONF 31. Which term is used to describe a set of instructions for execution by the configuration management tool SaltStack? Pillar Manifest Playbook Cookbook 32. What is the maximum number of nodes …
1. What is the function of a hypervisor? to create VMs and provide hardware abstraction to support them to create an isolated environment where containerized applications run to perform FCAPS functions for VNFs to centralize management of vSwitch configuration 2. What are three characteristics of containers on a …
14. A network administrator configures an ACL with the command R1(config)# access-list 1 permit 172.16.0.0 0.0.15.255. Which two IP addresses will match this ACL statement? (Choose two.) 172.16.0.255 172.16.15.36 172.16.16.12 172.16.31.24 172.16.65.21 15. Which service can be disabled to help mitigate man-in-the-middle intrusion attacks that exploit spoofed MAC …
1. Which Cisco security architectural framework helps design secure solutions for the various places in the network (PINs)? Cisco SAFE Cisco DNA Cisco ENFV Cisco NGFW 2. Which Cisco SAFE secure domain is concerned with the technologies involving access control, VPNs, and encryption? secure services security intelligence threat …
25. Which network service allows administrators to monitor and manage network devices? NTP SNMP syslog NetFlow 26. By default, where do Cisco routers send syslog messages? to a syslog server to the VTY lines to the console line to an SNMP server 27. What network monitoring tool copies …