Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

In Cisco SD-Access. virtual networks create segmentation that allows for separation of users and resources. How is this type of segmentation described?

A.

macro

B.

inter-VN

C.

micro

D.

stretctied

Full Access
Question # 5

Refer to the exhibit. An engineer is designing an OSPF solution for a customer. The design must take into consideration:

    Application load balancers D. E. and F are in different geographical locations and are OSPF-enabled.

    Hosts A, B. and C connect to an application through the load balancers using IP address 10.1.1.1/32.

    In the event of a failure of one of the load balancers, hosts must still have access to the application.

Which solution must the engineer choose?

A.

All load balancers to be co-located in area 0.

B.

X, Y, and Z to be configured as different areas

C.

At least one load balancer to be in area 0.

D.

X, Y and Z to be configured as the same area

Full Access
Question # 6

A company is planning to open two new branches and allocate the 2a01:c30:16:7009::3800/118 IPv6 network for the region. Each branch should have the capacity to accommodate maximum of 200 hosts. Which two networks should the company use? (Choose two.)

A.

2a01:0c30:0016:7009::3a00/120

B.

2a01:0c30:0016:7009::3b00/121

C.

2a01:0c30:0016:7009::3a80/121

D.

2a01:0c30:0016:7009::3b00/120

E.

2a01:0c30:0016:7009::3c00/120

Full Access
Question # 7

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 8

Refer to the exhibit. An engineer is designing a BGP solution for a client that peers with ISP1 for full Internet connectivity and with ISP2 for direct exchange of routes for several third parties. Which action, when implemented on the edge routers, enables the client network to reach the Internet through ISP1?

A.

Run an eBGP session within different VRFs for each ISP.

B.

Advertise a default route for downstream routers within the client network.

C.

Apply the AS-path prepend feature for ISP2.

D.

Apply route filtering such that the client advertises only routes originated from its own AS.

Full Access
Question # 9

A company wants to switch from static routing to a dynamic routing protocol to ease the administrative and operational overhead. The network topology is hub and spoke, and the branches use DM VPN back to the hub with two 10-Mbps internet connections. The branch routers are multivendor and have limited memory and CPU resources. Which routing protocol and design solution meets the requirements?

A.

eBGP with the hub routers set up as route reflectors

B.

ISIS with the hub and spoke routers configured in two different areas

C.

EIGRP with branch routers as stub routers and variance enabled

D.

OSPF with the hub in area 0 and branch routers in stub areas with ECMP

Full Access
Question # 10

What is the function of the multicast Reverse Path Forwarding check?

A.

It allows for a loop-free distribution tree from the source to receivers.

B.

It serves as an Auto RP Mapping agent.

C.

It prevents bootstrap messages from reaching all routers.

D.

It is used to discover and announce RP-set information.

Full Access
Question # 11

An engineer is working for a large cable TV provider that requires multiple sources streaming video on different channels using multicast with no rendezvous point. Which multicast protocol meets these requirements?

A.

PIM-SM

B.

PIM-SSM

C.

any-source multicast

D.

BIDIR-PIM

Full Access
Question # 12

Refer to the exhibit. A customer has two eBGP peerings from a single CE router toward two service providers. The customer has hired an architect to design a solution to ensure certain traffic enters the customer's network through interface g¡g0/0. Which solution must the architect include in the design?

A.

Advertise a lower MED value toward the less preferred service provider.

B.

Prepend additional AS on the AS path toward the preferred service provider.

C.

Break aggregated routes into longer prefixes and advertise to the preferred service provider.

D.

Set a higher local preference to the preferred service provider path.

Full Access
Question # 13

How is internet access provided to a WAN edge router that is connected to a MPLS transport link?

A.

OMP advertises a default route from a WAN Edge router that is connected to the MPLS and internet transport networks

B.

Internet access must be provided at the WAN Edge router through either a 4G/5G link or local Internet circuit

C.

An extranet must be provided in the MPLS transport network to allow private traffic to reach the public internet

D.

TLOC extensions are used to route traffic to a WAN Edge router that is connected to the Internet transport network

Full Access
Question # 14

Refer to the exhibit.

An architect is designing a routing solution for a company. The new design will add a circuit routers C and D to protect against loss of connectivity to 10.0.4.0/24 during a link failure between routers B and D. Which solution must the architect choose?

A.

Stub connected

B.

Stub redistributed

C.

Stub receive-only

D.

Stub leak-map

Full Access
Question # 15

A customer is undergoing a WAN re-architecture and wants to design QoS policies for remote sites that have low bandwidth. What must be considered to have CBWFQ configured in the parent and child policies in an end-to-end QoS design?

A.

CBWFQ is only supported in the child policy.

B.

CBWFQ is only supported in the parent policy.

C.

Traffic shaping is required in the parent policy.

D.

Traffic policing is required in the child policy.

Full Access
Question # 16

An engineer is designing a BGP network for a large customer. To permit efficient scaling, the BGP domain is split into clusters. Which peering solution should be used between the route reflectors in different clusters for the BGP routes to be propagated appropriately?

A.

The route reflectors should be made dents of each other.

B.

The route reflectors should be nonclients with regards to each other.

C.

The route reflectors should not have any kind of BGP peering.

D.

The route reflectors should have peering through another nonclient router.

Full Access
Question # 17

Refer to the exhibit.

An engineer must design a WAN solution so that ISP-1 is always preferred over ISP-2. The path via ISP-2 is

considered as a backup and must be used only when the path to ISP-1 is down. Which

solution must the engineer choose?

A.

R1:

- Routes advertised to ISP-1: 0x AS-path prepend

- Routes received from ISP-1: HIGH local-preference

- Routes advertised to R2: no action

- Routes received from R2: community NO-EXPORT

R2:

- Routes advertised to ISP-2:5x AS-path prepend

- Routes received from ISP-2: LOW local-preference

- Routes advertised to R1: community NO-ADVERTISE

- Routes received from R1: no action

B.

R1:

- Routes advertised to ISP-1: 0x AS-path prepend

- Routes received from ISP-1: HIGH local-preference

- Routes advertised to R2: community NO-EXPORT

- Routes received from R2: no action

R2:

- Routes advertised to ISP-2: 5x AS-path prepend

- Routes received from ISP-2: LOW local-preference

- Routes advertised to R1: no action

- Routes received from R1: no action

C.

R1:

- Routes advertised to ISP-1: 0x AS-path prepend

- Routes received from ISP-1: LOW local-preference

- Routes advertised to R2: community NO-ADVERTISE

- Routes received from R2: no action

R2:

- Routes advertised to ISP-2: 5x AS-path prepend

- Routes received from ISP-2: HIGH local-preference

- Routes advertised to R1: no action

- Routes received from R1: community NO-ADVERTISE

D.

R1:

- Routes advertised to ISP-1: 5x AS-path prepend

- Routes received from ISP-1: LOW local-preference

- Routes advertised to R2: community NO-ADVERTISE

- Routes received from R2: no action

R2:

- Routes advertised to ISP-2: 0x AS-path prepend

- Routes received from ISP-2: HIGH local-preference

- Routes advertised to R1: community NO-EXPORT

- Routes received from R1: no action

Full Access
Question # 18

Which consideration must be made when designing a Cisco SD-Access fabric underlay?

A.

Subnets must be reduced to decrease latency.

B.

Up to six control planes are supported.

C.

The default MTU should be increased.

D.

A unified policy must be used.

Full Access
Question # 19

Refer to the exhibit An engineer with an employee ID: 1234 56:789 must design a WoL deployment for a client, and the design must ensure that the Windows PCs are responsive to the WoL magic packets with no delays when the server-side initiates the instruction Which action must the engineer choose?

A.

Spanning-tree PortFast must be enabled on all interfaces where clients reside.

B.

WoL must be enabled on the networking card and disabled in the Windows PCs BIOS.

C.

IP-directed broadcast must be disabled on all interfaces where clients reside.

D.

IP forward protocol must be disabled on all interfaces where clients reside

Full Access
Question # 20

Which design consideration must be made when dual WAN Edge routers are deployed at a branch site?

A.

Use BGP AS-path prepending to influence egress traffic and use MED to influence ingress traffic from the branch.

B.

HSRP priorities must match the OMP routing policy to prefer one WAN Edge over the other.

C.

Traffic must be symmetrical as it egresses the WAN Edges and returns from remote sites for DPI to function properly.

D.

Configure BFD between WAN Edge routers to detect sub-second link failures.

Full Access
Question # 21

Refer to the exhibit.

An architect must design an IPv6 migration solution for an enterprise customer to support these requirements:

* Clients will transition to the new IPv6 network, which provides NAT64 and IPv6 DNS resolution services, using the same DNS name that points to the IPv4 address.

* The service provider will create a client-facing IPv6 interface with a new IPv6 virtual address that points to the same IPv4 DNS server.

* The service provider will support clients that use global IPv6 addresses and encapsulate IPv4 packets into IPv6 tunnels.

Which two migration solutions must the architect choose? (Choose two.)

A.

Use dual-stack lite from the MPLS network to the IGR.

B.

Use IPv6 tunneling from the devices to the core MPLS network.

C.

Use dual-stack lite from the devices to the core MPLS network.

D.

Use NAT44/64 from the MPLS network to the IGR.

E.

Use NAT44/64 from the devices to the core MPLS network.

Full Access
Question # 22

An architect must design a QoS model for a business-critical application that Is delay-sensitive and requires high bandwidth. The company's head office hosts the application, and DMVPN tunnels protected with IPsec provide connectivity between the head office and branches. Which solution must the architect choose?

A.

RSVP

B.

IntServ

C.

WRED

D.

DiffServ

Full Access
Question # 23

Drag and drop the characteristics from the left onto the YANG models they describe on the right. Not all options are used.

Full Access
Question # 24

Which two best practices must be followed when designing an out-of-band management network? (Choose two.)

A.

    Enforce access control

B.

    Facilitate network integration

C.

    Back up data using the management network

D.

    Ensure that the management network is a backup to the data network

E.

    Ensure network isolation

Full Access
Question # 25

Refer to the exhibit. Which two solutions maximize the use of the links between the core and distribution layers? (Choose two.)

A.

use multiple equal-cost links

B.

use an IGP

C.

use HSRP

D.

use R-PVSTP+

E.

use multiple unequal-cost links

Full Access
Question # 26

Refer to the exhibit. Which method must an architect use to provide connectivity between the mail servers?

A.

ISATAP

B.

6to4

C.

IPv4 compaliDie

D.

6rd

Full Access
Question # 27

Drag and drop the Cisco SD-WAN components from the left onto their definitions on the right.

Full Access
Question # 28

Refer to the exhibit. The connection between SW2 and SW3 is fiber and occasionally experiences unidirectional link failure. An architect must optimize the network to reduce the change of layer2 forwarding loops when the link fails. Which solution should the architect include?

A.

Utilize 8PDU filter on SW3.

B.

Utilize loop guard on SW2

C.

Utilize BPDU guard on SW1

D.

Utilize root guard on SW1.

Full Access
Question # 29

An architect is designing a network that will utilize the spanning tree protocol to ensure a loop-free topology. The network will support an engineering environment where it is necessary for end users to connect their own network switches for testing purposes. Which feature should the architect include in the design to ensure the spanning tree topology is not affected by these rogue switches?

A.

BPDU Skew Detection

B.

BPDU guard

C.

loop guard

D.

root guard

Full Access
Question # 30

Refer to the exhibit. An engineer proposed this solution for a company that requires a loop-free. Layer 2 network design. The network will run 802.1W, and all links will be 1 Gbps. If all interfaces are up as point- to-point adjacencies, what are the expected port end states based on the design?

A.

Eth1/2 on SW2 and SW3 will be in a Desg FWD state

B.

Eth1/3 on SW2 and SW3 will be m an Attn BLK state

C.

Eth1/2 on SW3 and SW4 will be m an Attn BLKbtate.

D.

Eth1/1 on SW1 and SW2 will be in a Root FWD state.

Full Access
Question # 31

Refer to the exhibit. An architect is developing a solution to consolidate networks while retaining device redundancy. The routing protocol for the WAN routers must be open standard, ensure high availability, and provide the fastest convergence time. Which solution must the design include?

A.

both routers running EIGRP

B.

one router running OSPFv2 and other OSPF v3

C.

one router running ISIS and other OSPF v3

D.

both routers running OSPFv2

Full Access
Question # 32

Which two statements about VRRP advertisements are true? (Choose two.)

A.

    They are sent from the master router and standby routers.

B.

    They include VRRP timer information.

C.

    They are sent only from the master router.

D.

    They include priority information.

E.

    They are sent every three seconds by default.

Full Access
Question # 33

A customer is discussing QoS requirements with a network consultant. The customer has specified that end-to-end path verification is a requirement. Which QoS solution meets this requirement?

A.

IntServ model with RSVP to support the traffic flows

B.

DiffServ model with PHB to support the traffic flows

C.

marking traffic at the access layer with DSCP to support the traffic flows

D.

marking traffic at the access layer with CoS to support the traffic flows

Full Access
Question # 34

A company's security policy requires that all connections between sites be encrypted in a manner that does not

require maintenance of permanent tunnels. The sites are connected through a private MPLS-based service that

uses a dynamically changing key and spoke-to-spoke communication. Which type of transport encryption must

be used in this environment?

A.

GETVPN

B.

DMVPN

C.

GRE VPN

D.

standard IPsec VPN

Full Access
Question # 35

What are two benefits of designing an SD-WAN network fabric with direct Internet access implemented at

every site? (Choose two.)

A.

It decreases latency to applications hosted by public cloud service provider.

B.

It decreases latency on Internet circuits.

C.

It increases the speed of delivery of site deployments through zero-touch provisioning.

D.

It increases the total available bandwidth on Internet circuits.

E.

It alleviates network traffic on MPLS circuits.

Full Access
Question # 36

Company A recently acquired another company. Users of the newly acquired company must be able to access a server that exists on Company A’s network, both companies use overlapping IP address ranges. Which action conserves IP address space and provides access to the server?

A.

Use a single IP address to create overload NAT

B.

Use a single IP address to create a static NAT entry

C.

Build one-to-one NAT translation for every user that needs access

D.

Re-IP overlapping address space in the acquired company

Full Access
Question # 37

Refer to the exhibit An engineer working for a telecommunication company with an employee ID 4449:30 959 Is calculating STP scalability for switches to ensure that the numbers are below the maximum supported value for STP logical ports How many logical interfaces are active for switch A?

A.

4

B.

307

C.

202

D.

100

Full Access
Question # 38

An engineer must peer with an ISP for internet connectivity using BGP, initially, the engineer wants to receive only specific prefixes from the ISP and a default route. However, the solution must provide the flexibility to add prefixes in the future at short notice. The ISP has a two-week change process in place. Which route filtering solution must the engineer employ?

A.

Request a limited internet routing table and a default route from the ISP and configure the BGP max-limit to 1 with an access list that permits only the specific internet prefixes and blocked networks

B.

Request only the required prefixes and default route be advertised from the ISO with whitelisted networks

C.

Request a full internet routing table and a default route from the ISP and configure inbound route filtering with a prefix list that permits the default route and required prefixes

D.

Configure outbound route filtering on the enterprise and ISP so that the enterprise tell the ISP which prefixes are required

Full Access
Question # 39

Which function does the Cisco SD-Access intermediate node perform?

A.

Act as LISP proxy tunnel router.

B.

Route and transport IP traffic.

C.

Act as an anycast Layer 3 gateway.

D.

Map users to a virtual network.

Full Access
Question # 40

A company plans to transition to IPv6. They will link their IPv4 addresses to the lowest significant bits of the new Ipv6 addresses. A network administrator with an employee id: 4264:42:116 is preparing a mapping schema for the new IPv6 addresses. Which address does the 172.16.10.0/24 network translate to?

A.

2001:db8:abcd::ac10:a00/120

B.

2001:db8:abcd:172:16:10::/96

C.

2001:db8:abcd:11d8:a00/120

D.

2001:db8:ac10:0a00::/64

Full Access
Question # 41

In PIM sparse mode, if an RPF check is successful on a multicast-enabled device, what happens to the multicast packet?

A.

It is forwarded to all interfaces within the OIL.

B.

It is forwarded to all interfaces except for the receiving interface.

C.

Forwarded packets are dropped to prevent looping.

D.

It is forwarded to all PIM-enabled interfaces.

Full Access
Question # 42

Which common issue causes intermittent DMVPN tunnel flaps?

A.

    a routing neighbor reachability issue

B.

    a suboptimal routing table

C.

    interface bandwidth congestion

D.

    that the GRE tunnel to hub router is not encrypted

Full Access
Question # 43

An architect is designing a multicast solution for a network that contains over 100 routers. The architect plans to create several multicast domains and balance the PIM-SM traffic within the network. Which technology should the architect include in the design?

A.

DVMRP

B.

IGMP

C.

MOSPF

D.

MSDP

Full Access
Question # 44

Which feature is required for graceful restart to recover from a processor failure?

A.

Cisco Express Forwarding

B.

Virtual Switch System

C.

Stateful Switchover

D.

Bidirectional Forwarding Detection

Full Access
Question # 45

Refer to the exhibit. An architect must design a solution to connect bank site A with bank site B and support:

    network operation center monitoring end-to-end L3VPN and L2VPN traffic

    company adding thousands of routes in the next two years

Which two BGP solutions must the design include? (Choose two.)

A.

Establish full mesh IBGP peering with ail routers in different IGP domains.

B.

Redistribute different IGP domain routes in a BGP IPv4 routing instance.

C.

Transport site routes using a BGP VPNv4 address family on the PE routers.

D.

Apply BGP policies on all routers to filter out ABR and PE loopback IP addresses.

E.

Connect multiple IGP'LDP domains using a BGP IPv4 unicast family on the ABR.

Full Access
Question # 46

When is it advisable to provide dedicated control plane nodes within a Cisco SD-Access design?

A.

in a small deployment where border nodes are not required

B.

in a design where fabric edge nodes are unable to provide control plane functionality

C.

in designs without Cisco DNA Center

D.

when there is a requirement for frequent roaming of endpoints across fabric edge nodes

Full Access
Question # 47

Exhibit:

Refer to the exhibit. An engineer is designing a Layer 2 campus network. The design must support fast convergence and leverage as much bandwidth as possible between layers. Distribution switches do support VSS; unfortunately, not all routing protocols are available for use due to license limitations. Which solution must the engineer choose?

A.

EtherChannel

B.

MEC

C.

RSTP

D.

ECMP

Full Access
Question # 48

Refer to the exhibit. An architect is designing a BGP solution to connect a remote branch to a service provider. There are several prefixes within the branch that the company does not want to be advertised to the internet. Which solution should the architect use to accomplish this?

A.

Set the BGP Internet community for all prefixes.

B.

Implement the NOPEER community.

C.

Use the BGP No-Advertise community for the prefixes to exclude.

D.

Attach the No-Export community with the prefixes to exclude

Full Access
Question # 49

A global organization with several branches hired a network architect to design an overlay VPN solution. The branches communicate with each other frequently. The customer expects to add more branches in the future. To meet the customer's security requirements, the architect plans to provide traffic protection using dynamic IPsec tunnels. Which solution should the architect choose?

A.

DMVPN

B.

EasyVPN

C.

GETVPN

D.

L2TP

Full Access
Question # 50

An engineer is designing a WAN solution for a customer with teams in different branch locations that need to communicate The teams also need to access enterprise applications hosted in the data center and the cloud The customer also must provide guests with connectivity to the internet only, and the internet gateway is located in the data center Which solution must the engineer choose?

A.

WAN connectivity from a different service provider for guests

B.

firewall placed in data center that fitters any traffic from guests

C.

MPLS Layer 3 VPN with one VRF for corporate access and a separate VRF for guests

D.

MPLS Layer 3 VPN with a separate VRF for each branch location

Full Access
Question # 51

Which two functions is the Cisco SD-Access Edge Node responsible for? (Choose two.)

A.

Act as anycast layer 3 gateway

B.

Advertise EID subnets

C.

Map users to virtual network

D.

Act as LISP proxy tunnel router

E.

Route and transport IP traffic

Full Access
Question # 52

An engineer must design a large Layer 2 domain that contains hundreds of switches and VLANs. The engineer's primary goals are to:

•Efficiently utilize the bandwidth of all links

•Avoid Layer 2 loops

•Cause minimal impact on switch CPU and memory

Which technology should the engineer include in the design?

A.

PVST+

B.

Rapid PVST+

C.

MST

D.

RSTP

Full Access
Question # 53

Which PIM mode uses a shared tree only?

A.

bidirectional

B.

sparse

C.

dense

D.

source-specific

Full Access
Question # 54

What is the role of a control-plane node in a Cisco SD-Access architecture?

A.

fabric device that connects wired endpoints to the SD-Access fabric

B.

map system that manages endpoint to device relationships

C.

fabric device that connects APs and wireless endpoints to the SD-Access fabric

D.

map system that manages External Layer 3 networks

Full Access
Question # 55

An engineer is designing a multicast network for a financial application Most of the multicast sources also receive multicast traffic (many-to-many deployment model). To better routing tables, the design must not use source trees. Which multicast protocol satisfies these requirements?

A.

BIRDIR-PIM

B.

PIM-SM

C.

MSDP

D.

PIM-SSM

Full Access
Question # 56

How is end-to-end microsegmentation enforced in a Cisco SD-Access architecture?

A.

VLANs are used to segment traffic at Layer 2.

B.

5-tuples and ACLs are used to permit or deny traffic.

C.

SGTs and SGTACLs are used to control access to various resources.

D.

VRFs are used to segment traffic at Layer 3.

Full Access
Question # 57

What does the fabric data plane leverage in SD-Access Architecture?

A.

LISP protocol to resolve endpoint-to-location mapping

B.

IS-IS protocol to exchange link-state routing information

C.

MAC-in-IP encapsulation method to transport of the Layer 2 frame

D.

BGP protocol to advertise endpoint prefixes outside of the fabric

Full Access
Question # 58

An engineer working for a service provider with an employee ID: 4863:43:939 must design a solution to provide remote connectivity over the public internet. The design must:

    securely connect multiple remote sites to the central site

    provide redundant paths to the central site

    allow auto path selection based on failure and connection quality

    support IP multicast

    minimal configuration at remote sites

Which solution must the engineer choose?

A.

MPLS provided service with BGP

B.

dual DMVPN with EIGRP routing

C.

full mesh OSPF with IPsec tunnels

D.

full mesh ISIS with GRE tunnels and IPsec

Full Access
Question # 59

Refer to the exhibit. An architect with an employee ID: 4542:60:170 is designing a campus Layer 2 infrastructure. The design requires a PoE power budget that varies from 30-60 W. In addition, power must be provided continuously to some endpoints and must be supported even during the reloading of edge switches. Which solution must the architect select?

A.

PoE Plus

B.

Fast PoE

C.

Universal PoE

D.

Perpetual PoE

Full Access
Question # 60

A company uses cloud-based applications for voice and video calls, file sharing, content sharing, and messaging. During business hours, these applications randomly become slow and unresponsive. However, other applications work smoothly with the current applied QoS polices. Which solution must the company choose to resolve the issue?

A.

Identify the applications with NBAR2 and allocate the required bandwidth accordingly.

B.

Identify the port used by each application and apply a minimum bandwidth guarantee.

C.

Identify the applications and reserve the required bandwidth on the perimeter routers.

D.

Identify the application ports, create groupings, and rate-limit the required bandwidth.

Full Access
Question # 61

In a Cisco SD-Access fabric, which node facilities connectivity between the fabric and networks external to the fabric?

A.

intermediate

B.

edge

C.

control plane

D.

border

Full Access
Question # 62

An engineer is designing a network for a customer running a wireless network with a common VLAN for all APs. The customer is experiencing unicast flooding in the Layer 2 network between the aggregation and access layers. The customer wants to reduce the flooding and improve convergence time. Which solution meets these requirements?

A.

Migrate all APs to a common Layer 2 access layer switch and run Layer 3 from the aggregation layer to all remaining access layer switches.

B.

Align HSRP primary and STP root bridges and reduce ARP timers to match CAM timers on the aggregation layer switches.

C.

Migrate to a Layer 3 access campus design if the APs can run on separate VLANs.

D.

Align HSRP primary and STP root bridges if the APs cannot run on separate VLANs.

Full Access
Question # 63

Which two BGP features will result in successful route exchanges between eBGP neighbors sharing the same

AS number? (Choose two.)

A.

advertise-best-external

B.

bestpath as-path ignore

C.

client-to-client reflection

D.

as-override

E.

allow-as-in

Full Access
Question # 64

An architect is working on a design to connect a company's main site to several small to medium-sized remote branches. The solution must include redundant WAN links, but the customer has a limited budget and wants the ability to increase the link speed easily in the future. QoS will not on the branch routers so there is no need for consistent end-to-end QoS. Which solution does the architect propose?

A.

dual-homed WAN MPLS with single edge router

B.

dual-homed Internet with a single edge router running a site-to-site VPN topology

C.

dual-homed WAN MPLS and Internet links via dual edge routers

D.

dual-homed Internet with dual edge routers running a hub-and-spoke VPN topology

Full Access
Question # 65

An engineer is designing a QoS solution for a customer The customer's internet connection has a bandwidth of 10 Mbps. The design must ensure that traffic bursts of data do not exceed the bandwidth of the connection and that received traffic does not starve out business-critical traffic Which solution must the engineer choose?

A.

Configure the queuing default queue for shaping inbound and policing outbound.

B.

Configure the queuing default queue for shaping inbound and policing inbound.

C.

Configure the queuing default queue for shaping outbound and policing inbound.

D.

Configure the queuing default queue for shaping outbound and policing outbound.

Full Access
Question # 66

Refer to the exhibit. An architect is designing a Layer 2 network for a customer. The network will use the spanning-tree protocol. During a link failure between SW1 and SW2, the fastest possible convergence time is desired. Which solution must the architect select?

A.

Loop Guard

B.

UplinkFast

C.

PortFast

D.

BackboneFast

Full Access
Question # 67

Drag and drop the steps WAN Edge performs when on-boarded into the Cisco SD-WAN overlay from the left into the order they are completed on the right.

Full Access
Question # 68

Refer to the exhibit. All routers currently reside in OSPF area 0. The network manager recently used R1 and R2 as aggregation routers for remote branch locations and R3 and R4 for aggregation routers for remote office locations. The network has since been suffering from outages, which are causing frequent SPF runs. To enhance stability and introduce areas to the OSPF network with the minimal number of ABRs possible, which two solutions should the network manager recommend? (Choose two.)

A.

a new OSPF area for R1 and R2 connections,with R1 and R2as ABRs

B.

a new OSPF area for R3 and R4 connections,with R5 and R6as ABRs

C.

a new OSPF area for R3 and R4 connections,with R3 and R4as ABRs

D.

a new OSPF area for R1, R2, R3, and R4 connections, with R1, R2, R3, and R4 as

ABRs

E.

a new OSPF area for R1 and R2 connections, with R5 and R6 as ABRs

Full Access
Question # 69

Which security functionality does gRPC provide?

A.

implementing secure server-client tunnels with RSA 20*8 cipher encryption

B.

mandatory encryption of data at rest using the AES and RSA protocols

C.

enabling RC6 data-level encryption with CRC check

D.

supporting secure communication between network devices and control systems using TLS

Full Access
Question # 70

An engineer uses Postman and YANG to configure a router with:

Which get-config replay verifies that the model set was designed correctly?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 71

Refer to the exhibit A customer requires a Layer 2 network designed to support:

    500 active logical ports

    trunking of 30 VLANs

    convergence of less than 1 second

Which Spanning Tree Protocol must be selected?

A.

RPVST+

B.

MSTP

C.

CST

D.

PVST+

Full Access
Question # 72

An architect is designing a network for an enterprise site. The design must use an active/backup design for the WAN. It must guarantee the SLA for several applications regardless of which connection is used. Which deployment model should the architect choose?

A.

MPLS WAN from two separate ISPs

B.

hybrid WAN using MPLS VPN and internet VPN from a single ISP

C.

hybrid WAN using MPLS VPN and internet VPN from two separate ISPs

D.

internet WAN from two separate ISPs

Full Access
Question # 73

Refer to the exhibit. An architect is designing an IPv4 plan using the 172.16.0.0/16. The design must maximize the number of subnets while meeting these requirements:

    500 hosts within the server room

    100 hosts at the remote site

    25 hosts at the access site

Which plan must the architect choose?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 74

Which NETCONF operation creates filtering that is specific to the session notifications?

A.

B.

C.

D.

Full Access
Question # 75

Drag and drop the characteristics from the left onto the correct telemetry mode on the right.

Full Access
Question # 76

Which solution allows overlay VNs to communicate with each other in an SD-WAN Architecture?

A.

External fusion routers can be used to map VNs to VRFs and selectively route traffic between VRFs.

B.

GRE tunneling can be configured between fabric edges to connect one VN to another.

C.

SGTs can be used to permit traffic from one VN to another.

D.

Route leaking can be used on the fabric border nodes to inject routes from one VN to another.

Full Access
Question # 77

An engineer is designing a multicast network for a company specializing in VoD content. Receivers are across the Internet, and for performance reasons, the multicast framework close to the receivers within each AS. For high availability, if the sources in one AS are no longer available, the receivers of that AS must be able to receive the VoD content from sources in another AS. Which feature must the design include?

A.

Bidirectional PIM

B.

SSM

C.

Anycast RP

D.

MSDP

Full Access
Question # 78

A network engineer must design an MSDP multicast solution to provide RP resilience in a network with two separate domains. Also, multicast sources and receivers must register with the local RP. Which solution must the engineer choose?

A.

Configure the RP has value to 0, and traffic will route to the closest RP

B.

Configure the RP loopback interface with the same IP address/32, and traffic will route to the closest RP

C.

Configure the RP group ranges to split the multicast traffic, and traffic will route to the longest match

D.

Configure the RP priority with the same value, and traffic will route to the closest RP

Full Access
Question # 79

Refer to the exhibit. A network architect is preparing a network design based on the EIGRR Routers are connected using a cat6a cable type and the inter-router connection speed is limited to 10 Mbps due to distance. During the pilot phase, a DUAL-3-SIA error message is visible. Which action must the engineer take to create a stable design?

A.

Enable poison reverse on R4.

B.

Configure STUB area on R4.

C.

Create a summary route on R2.

D.

Disable split horizon on R1.

Full Access
Question # 80

An architect must design an IPv6 migration solution for a corporation with remote offices to support:

* The customer has IPv4 peering with their service provider.

* IPv6 users need access to IPv4 and IPv6 resources.

* Existing content providers will migrate to IPv6 in the next two years.

* Users will be migrated in a phase-by-phase approach.

Which migration solution must the architect choose?

A.

NAT46

B.

tunneling

C.

NAT64

D.

dual-stack

Full Access
Question # 81

Refer to the exhibit.

EIGRP has been configured on all links. The spoke nodes have been configured as EIGRP stubs, and the WAN links to R3 have higher bandwidth and lower delay than the links to R4. When a link failure occurs at the R1-R2 link, what happens to traffic on R1 that is destined for a subnet attached to R2?

A.

R1 has no route to R2 and drops the traffic

B.

R1 load-balances across the paths through R3 and R4 to reach R2

C.

R1 forwards the traffic to R3, but R3 drops the traffic

D.

R1 forwards the traffic to R3 in order to reach R2

Full Access
Question # 82

What are two characteristics of a migration from an IP-VPN service to a Cisco SD-WAN architecture? (Choose two.)

A.

increased solution complexity

B.

increased security

C.

increased scalability

D.

centralized application policies

E.

distributed control plane

Full Access
Question # 83

Refer to the exhibit. The full EIGRP routing table is advertised throughout the network. Currently, users experience data loss when any one link in the network fails. An architect optimizes the network to reduce the impact when a link fails. Which solution should the architect include in the design?

A.

Run BFD on the inter links between EIGRP neighbors.

B.

Summarize the access layer networks from each access layer switch toward the aggregation layer.

C.

Reduce the default EIGRP hello interval and hold time.

D.

Summarize the access layer networks from the aggregation layer toward the core layer.

Full Access
Question # 84

Which feature minimizes HOC connections and reduces strain on the vSmart controller m an SO-WAN architecture?

A.

control-connections

B.

corrtroWirection

C.

color

D.

affinity

Full Access
Question # 85

An engineer is looking for a standards-driven YANG model to manage a multivendor network environment. Which model must the engineer choose?

A.

Native

B.

OpenConfig

C.

IETF

D.

IEEE NETCONF

Full Access
Question # 86

Which WAN connectivity technology is optimal for edge computing compared to others and why?

A.

Due to low latency, high bandwidth, and closest proximity to the user. 4G/5G connectivity is the optimal WAN technology for edge computing compared to L3 VPN MPLS connectivity, which offers native separation and security with close proximity to the data center.

B.

Due to high bandwidth, separation and security, and proximity to the data center network. DWDM Is the optimal WAN technology lor edge computing compared to 4G/5G connectivity, which offers native separation and security with close proximity to the data center.

C.

Due to low latency, high bandwidth, and closest proximity to the user, L3 VPN MPLS connectivity is the optimal WAN technology for edge computing compared to 4G/5G connectivity, which offers native separation and security with close proximity to the data center.

D.

Due to low cost, high bandwidth, low latency, and closest proximity to the edge of the network, Mero Ethernet is the optimal WAN technology for edge computing compared to MPLS, which offers native separation and security with close proximity to the data center.

Full Access
Question # 87

How do endpoints inside an SD-Access network reach resources outside the fabric?

A.

a VRF fusion router is used to map resources in one VN to another VN

B.

Fabric borders use VRFs to map VNs to VRFs

C.

SD-Access transit links are used to transport encapsulated traffic from one fabric to another

D.

A fabric edge is used to de-encapsulate VXLAN traffic to normal IP traffic then transported over the outside network

Full Access
Question # 88

An engineer must design a solution to connect a customer to the Internet. The solution will include a Layer 3 circuit with a CIR of 50 Mbps from the service provider. The hand-off from the provider's switch to the customer's router is 1Gbps. Which solution should the engineer include to prevent potential issues with choppy voice traffic?

A.

Reduce the bandwidth of the connection to the router.

B.

Implement hierarchical QoS with a parent policing policy.

C.

Implement hierarchical QoS with a parent shaping policy.

D.

Add a bandwidth statement to the router interface.

Full Access
Question # 89

Drag and drop the characteristics from the left onto the configuration protocols they describe on the right.

Full Access
Question # 90

Refer to the exhibit. A network engineer with an employee ID: 4384:99:754 must design a BGP solution based on these conditions:

    Traffic sessions occur between the branches and the data center.

    Branch B has limited resources to process routing updates.

    HQ must filter out all prefixes from branch A to R4.

Which outbound route filtering (ORF) solution must the engineer choose?

A.

Use a prefix list with the 192.168.10.0/24 subnet for ORF on R4.

B.

Use a prefix list with the 10.10.10.0/24 subnet for ORF on R2

C.

Use a prefix list with the 10.10.10.0/24 subnet for ORF on R5.

D.

Use a prefix list with the 192.168.10.0/24 subnet for ORF on R2.

Full Access
Question # 91

A branch office has a primary L3VPN MPLS connection back to the main office and an IPSEC VPN tunnel that serves as backup. Which design ensures that data is sent over the backup connection only if the primary MPLS circuit is down?

A.

Use EIGRP to establish a neighbor relationship with the main office via

B.

L3VPN MPLS and the IPSEC VPN tunnel.

C.

Use BGP with the multipath feature enabled to force traffic via the primary path when available.

D.

Use static routes tied to an IP SLA to prefer the primary path while a floating static route points to the backup connection.

E.

Use OSPF with a passive-interface command on the backup connection.

Full Access
Question # 92

Which two functions are provided by the Cisco SD-WAN orchestration plane? (Choose two.)

A.

centralized provisioning

B.

primary authentication point

C.

NAT traversal facilitation

D.

Zero Touch Provisioning

E.

troubleshooting and monitoring

Full Access
Question # 93

What is the purpose of a TLOC extension in a Cisco SD-WAN network fabric?

A.

to facilitate WAN Edge router redundancy within a site

B.

to identify the physical interface where a WAN Edge router connects to the WAN transport network

C.

to expand the number of colors that are potentially applied to a network transport interface

D.

to aggregate multiple physical interfaces into a single logical Interface

Full Access
Question # 94

Refer to the exhibit.

An architect is designing an EIGRP solution based on these requirements:

* Traffic forwarding should use the best two paths while all links are available

* Single path failure must not impact traffic between branch and HQ

Which solution must the architect select?

A.

Maximum-paths 2

B.

Add-paths 2

C.

Metric weights 010100

D.

Variance 2

Full Access
Question # 95

A company with multiple service providers wants to speed up BGP convergence time in the event a failure occurs with their primary link. Which approach achieves this goal and does not impact router CPU utilization?

A.

Utilize BFD and tune the multiplier to 50

B.

Lower the BGP hello interval

C.

Decrease the BGP keepalive timer

D.

Utilize BFD and keep the default BGP timers

Full Access
Question # 96

Refer to the exhibit. A network engineer must design a BGP solution based on:

    The route reflector must have one or more direct physical connections to the core routers (R3 and R4).

    The route reflector must have full redundancy and avoid a single point of failure.

    R2 to R1 link utilization is 90%. and the remaining links are less than 50% utilized.

Which two solutions must the design Include? (Choose two.)

A.

Configure R1 to be a client of R2 and R4.

B.

Configure R2 to be a client of R1 and R4.

C.

Configure R3 to be a client of R2 and R4.

D.

Configure R4 to be a client of R1 and R3.

E.

Configure R5 to be a client of R3 and R4.

Full Access
Question # 97

Which protocol is deployed through LAN automation to build node-to-node underlay adjacencies in SDA?

A.

IS-IS

B.

OLISP

C.

OSPF

D.

VXLAN

Full Access
Question # 98

Drag and drop the model driven telemetry characteristics from the left onto the mode they belong to on the right.

Full Access
Question # 99

A customer reports that each time a networking component fails, OSPF recalculates the backup path, with causes a short outage. Which solution must the customer implement to improve this situation?

A.

Aggressive OSPF timers

B.

LFA FRR

C.

Incremental SPF

D.

BFD

Full Access
Question # 100

Refer to the exhibit. A network engineer must design a highly available OSPF solution based on these requirements:

    Traffic disruptions caused by link or node failures in Area-1 must be resolved in milliseconds.

    In the event of a failure, traffic must switch to another path without waiting for the OSPF dead interval.

Which fault detection solution must the engineer choose?

A.

Utilize BFD and tune the BFD timers to 100 ms.

B.

Tune the SPF delay and the OSPF LSA interval timers to 100 ms.

C.

Enable IP SLA tracking for each OSPF peer.

D.

Decrease SPF timers to 100 ms.

Full Access
Question # 101

Refer to the exhibit. An architect working for a service provider with an employee ID: 4763:44:876 must design a Layer 2 VPN solution that supports:

    transparency of service provider devices

    direct communication between CE routers attached to the same VLAN

Which solution must the design include?

A.

multiple VPWS

B.

single VPLS

C.

single VPWS

D.

multiple VPLS

Full Access