Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Which QoS feature responds to network congestion by dropping lower priority packets?

A.

CBWFQ

B.

tail drop

C.

WRED

D.

strict priority

Full Access
Question # 5

A client is moving to Model-Driven Telemetry and requires periodic updates. What must the network architect consider with this design?

A.

Updates that contain changes within the data are sent only when changes occur.

B.

Empty data subscriptions do not generate empty update notifications.

C.

Periodic updates include a full copy of the data that is subscribed to.

D.

The primary push update is sent immediately and cannot be delayed.

Full Access
Question # 6

Refer to the exhibit. A customer needs to apply QoS to the network management traffic passing through the GigabitEthernet0/2 interface. All eight queuing classes are in use, so the new requirement must be integrated into the existing policy. Which solution must the customer choose?

A.

Mark traffic to DSCP CS5 and assign it to the SIGNALLING class. Then, baseline existing queue sizes to determine if additional bandwidth can be provisioned to the SIGNALLING class.

B.

Mark the traffic to DSCP CS4 and assign it to the SIGNALLING class. Then, prioritize traffic within the class.

C.

Mark the traffic to DSCP CS6 and assign it to the ROUTING class Then, prioritize traffic within the class.

D.

Mark the traffic to DSCP CS2 and assign it to the ROUTING class Then, baseline existing queue sizes to determine if additional bandwidth can be provisioned to the ROUTING class

Full Access
Question # 7

An engineer must design an in-band management solution for a customer with branch sites. The solution must allow remote management of the branch sites using management protocols over an MPLS WAN. Queueing is implemented at the remote sites using these classes:

How must the solution prioritize the management traffic over the WAN?

A.

Mark the traffic with DSCP CS1 and map into Class2 with a minimum bandwidth assigned by reducing the bandwidth available to CIass3.

B.

Mark the traffic with DSCP CS6 and map into Class1 with a minimum bandwidth assigned by reducing the bandwidth available to Class2

C.

Mark the traffic with DSCP EF and map into Class1 with a minimum bandwidth assigned by reducing the bandwidth available to Class2.

D.

Mark the traffic with DSCP CS2 and map into Class2 with a minimum bandwidth assigned by reducing the bandwidth available to Class3

Full Access
Question # 8

How are wireless endpoints registered in the HTDB in a Cisco SD-Access architecture?

A.

Fabric edge nodes update the HTDB based on CAPPWAP messaging from the AP

B.

Fabric WLCs update the HTDB as new clients connect to the wireless network

C.

Border nodes first register endpoints and then update the HTDB

D.

Fabric APs update the HTDB with the clients' ElD and RLOC

Full Access
Question # 9

Company A recently acquired another company. Users of the newly acquired company must be able to access a server that exists on Company A’s network, both companies use overlapping IP address ranges. Which action conserves IP address space and provides access to the server?

A.

Use a single IP address to create overload NAT

B.

Use a single IP address to create a static NAT entry

C.

Build one-to-one NAT translation for every user that needs access

D.

Re-IP overlapping address space in the acquired company

Full Access
Question # 10

An engineer is creating a design to enable IPv6 to run on an existing IPv4 IS-IS network. The IPv4 and IPv6 topologies will match exactly, and the engineer plans to use the same router levels for each protocol per interface. Which IS-IS design is required?

A.

single topology without enabling transition feature

B.

single topology with transition feature enabled

C.

multi topology with transition feature enabled

D.

multi topology without enabling transition feature

Full Access
Question # 11

Refer to the exhibit. Customers report low video quality and delays when having point-to-point telepresence video calls between the two locations. An architect must optimize a design so that traffic follows the same path for egress and ingress traffic flows. Which technique optimizes the design?

A.

Configure route leaking on the router in area 2.

B.

Configure route leaking on the router in area 1.

C.

Configure the high metric on the router in area 4.

D.

Configure route filter on the router in area 4.

Full Access
Question # 12

Refer to the exhibit.

C0FD9F48C9ACDC725EA850EC2476EE1E

A network engineer is designing a network for AS100. The design should ensure that all traffic enters AS100

via link 1 unless there is a network failure. In the event of a failure, link 2 should function as the path for

incoming traffic. Which solution should the design include?

A.

Modify the next-hop attribute on R3.

B.

Use AS-Path prepending on R3.

C.

Modify the next-hop attribute on R4.

D.

Use AS-Path prepending on R4.

Full Access
Question # 13

Drag and drop the model-driven telemetry considerations from the left onto the modes they apply to on the right.

Full Access
Question # 14

An architect is designing a network that will utilize the spanning tree protocol to ensure a loop-free topology. The network will support an engineering environment where it is necessary for end users to connect their own network switches for testing purposes. Which feature should the architect include in the design to ensure the spanning tree topology is not affected by these rogue switches?

A.

BPDU Skew Detection

B.

BPDU guard

C.

loop guard

D.

root guard

Full Access
Question # 15

Which function are fabric intermediate nodes responsible for in an SD-Access Architecture?

A.

mapping EIDs to RLOCs

B.

encapsulating user traffic in a VXLAN header including the SGT

C.

registering new endpoints in the HTDB

D.

transporting IP packets between edge nodes and border nodes

Full Access
Question # 16

At which layer does Cisco Express Forwarding use adjacency tables to populate addressing information?

A.

    Layer4

B.

    Layer 2

C.

    Layer 1

D.

    Layer 3

Full Access
Question # 17

Refer to the exhibit.

An architect must design an IPv6 migration solution for an enterprise customer to support these requirements:

* Clients will transition to the new IPv6 network, which provides NAT64 and IPv6 DNS resolution services, using the same DNS name that points to the IPv4 address.

* The service provider will create a client-facing IPv6 interface with a new IPv6 virtual address that points to the same IPv4 DNS server.

* The service provider will support clients that use global IPv6 addresses and encapsulate IPv4 packets into IPv6 tunnels.

Which two migration solutions must the architect choose? (Choose two.)

A.

Use dual-stack lite from the MPLS network to the IGR.

B.

Use IPv6 tunneling from the devices to the core MPLS network.

C.

Use dual-stack lite from the devices to the core MPLS network.

D.

Use NAT44/64 from the MPLS network to the IGR.

E.

Use NAT44/64 from the devices to the core MPLS network.

Full Access
Question # 18

An architect is working on a design to connect a company's main site to several small to medium-sized remote branches. The solution must include redundant WAN links, but the customer has a limited budget and wants the ability to increase the link speed easily in the future. QoS will not on the branch routers so there is no need for consistent end-to-end QoS. Which solution does the architect propose?

A.

dual-homed WAN MPLS with single edge router

B.

dual-homed Internet with a single edge router running a site-to-site VPN topology

C.

dual-homed WAN MPLS and Internet links via dual edge routers

D.

dual-homed Internet with dual edge routers running a hub-and-spoke VPN topology

Full Access
Question # 19

How is internet access provided to a WAN edge router that is connected to a MPLS transport link?

A.

OMP advertises a default route from a WAN Edge router that is connected to the MPLS and internet transport networks

B.

Internet access must be provided at the WAN Edge router through either a 4G/5G link or local Internet circuit

C.

An extranet must be provided in the MPLS transport network to allow private traffic to reach the public internet

D.

TLOC extensions are used to route traffic to a WAN Edge router that is connected to the Internet transport network

Full Access
Question # 20

A customer plans to adopt distributed QoS in their enterprise WAN. The policy must allow for individual packet marking according to the type of treatment required and for forwarding based on hop-by-hop treatment locally defined on each device. Which technology must the customer select?

A.

CBWFQ

B.

LLQ

C.

Diffserv

D.

IntServ

Full Access
Question # 21

What is the role of a control-plane node in a Cisco SD-Access architecture?

A.

fabric device that connects wired endpoints to the SD-Access fabric

B.

map system that manages endpoint to device relationships

C.

fabric device that connects APs and wireless endpoints to the SD-Access fabric

D.

map system that manages External Layer 3 networks

Full Access
Question # 22

An engineer is designing an EIGRP network for a small branch site where there is only one Layer 3 router. The engineer wants the router to advertise the local LAN network to remote EIGRP neighbors without sending any unnecessary multicast messages on the local LAN. Which action should the engineer take?

A.

Use a static default route for this site instead of EIGRP

B.

Advertise the local LAN using the network command and the passive-interface feature

C.

Redistribute the local LAN network using the redistribute connected command

D.

Advertise the local LAN subnet as a stub network

Full Access
Question # 23

How is end-to-end microsegmentation enforced in a Cisco SD-Access architecture?

A.

VLANs are used to segment traffic at Layer 2.

B.

5-tuples and ACLs are used to permit or deny traffic.

C.

SGTs and SGTACLs are used to control access to various resources.

D.

VRFs are used to segment traffic at Layer 3.

Full Access
Question # 24

An ISP provides Layer 3 VPN service over MPLS to a customer with four branches and multiple CE routers at

each branch. To exchange the routes that are learned from the CE routers, which BGP address family should

the ISP activate among the PE routers?

A.

address-family multicast

B.

L2VPN EVPN

C.

VPNv4 unicast

D.

IPv4 unicast

Full Access
Question # 25

An architect is creating a migration strategy for a large organization in which the choice made by the application between IPv6 and IPv4 is based on the DNS request. Which migration strategy does the architect choose?

A.

AFT for public web presence

B.

host-initiated tunnels

C.

dual stack

D.

site-to-site IPv6 over IPv4 tunnels

Full Access
Question # 26

An engineer must design a VPN solution for a company that has multiple branches connecting to a main office. What are two advantages of using DMVPN instead of IPsec tunnels to accomplish this task? (Choose

two.)

A.

support for AES 256-bit encryption

B.

greater scalability

C.

support for anycast gateway

D.

lower traffic overhead

E.

dynamic spoke-to-spoke tunnels

Full Access
Question # 27

Which two statements describe source trees in a multicast environment? (Choose two.)

A.

Source trees guarantee the minimum amount of network latency for forwarding multicast traffic

B.

Source trees create an optimal path between the source and the receivers

C.

Source trees use a single common root placed at some chosen point in the network

D.

Source trees can introduce latency in packet delivery

E.

Source trees can create suboptimal paths between the source and the receivers

Full Access
Question # 28

Which design consideration must be made when using IPv6 overlay tunnels?

A.

Overlay tunnels that connect isolated IPv6 networks can be considered a final IPv6 network architecture.

B.

Overlay tunnels should only be considered as a transition technique toward a permanent solution.

C.

Overlay tunnels can be configured only between border devices and require only the IPv6 protocol stack.

D.

Overlay tunneling encapsulates IPv4 packets in IPv6 packets for delivery across an IPv6 infrastructure.

Full Access
Question # 29

Refer to the exhibit A customer wants to adopt a dynamic site-to-site VPN solution to secure communication for VoIP, video, and FTP traffic between the remote branches and the headquarters. The customer also wants the branches to communicate directly, thereby reducing traffic at the headquarters location. The solution must consider that the branch routers are limited in available memory. Which VPN solution meets these requirements?

A.

DMVPN Phase 2 Hub and Spoke design

B.

DMVPN Phase 3 Hub and Spoke design

C.

DMVPN Phase 1 Hub and Spoke design

D.

DMVPN Phase 3 Hierarchical design

Full Access
Question # 30

Drag and drop the elements from the left onto the protocols where they are used on the right.

Full Access
Question # 31

Drag and drop the properties from the left onto the Cisco SD-WAN components that perform them on the right.

Full Access
Question # 32

Drag and drop the characteristics from the left onto the YANG modules they describe on the right. Not all options are used.

Full Access
Question # 33

Drag and drop the elements from the left onto the functions they perform in the Cisco SD-WAN architecture on the right.

Full Access