Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Full Access
Question # 5

Full Access
Question # 6

Full Access
Question # 7

Full Access
Question # 8

Full Access
Question # 9

Full Access
Question # 10

Full Access
Question # 11

Full Access
Question # 12

Full Access
Question # 13

Full Access
Question # 14

Full Access
Question # 15

What is used by vManage to interact withCiscoSD-WAN devices in the fabric?

A.

northbound API

B.

RESTCONF

C.

Southbound API

D.

IPsec

Full Access
Question # 16

Which two southbound interfaces originate from Cisco Catalyst Center (formerly DNA Center) and terminate at fabric underlay switches'? (Choose two.)

A.

ICMP Discovery

B.

UDP67 DHCP

C.

TCP 23 Telnet

D.

UDP6007 NetFlow

E.

UDP 162 SNMP

Full Access
Question # 17

What is a characteristic of VXLAN?

A.

It extends Layers 2 and Layer 3 overlay network over a Layer 2 underly.

B.

It has a 12-byte packet header.

C.

Its frame encapsulation is performed by MAC-in-UDP.

D.

It uses TCP for transport

Full Access
Question # 18

What does the statement print(format(0.8, \0%')) display?

A.

80%

B.

8.8%

C.

.08%

D.

8%

Full Access
Question # 19

Which new security enhancement is introduced by deploying a next-generation firewall at the data center in addition to the Internet edge?

A.

virtual private network for remote access

B.

DDoS protection

C.

firewall protection of the east-west traffic at the data center

D.

firewall protection of the south-north traffic at the data center

Full Access
Question # 20

What are two characteristics of a directional antenna? (Choose two.)

A.

high gain

B.

receive signals equally from all directions

C.

commonly used to cover large areas

D.

provides the most focused and narrow beam width

E.

low gain

Full Access
Question # 21

Refer to the exhibit. What is achieved by this Python script?

A.

It configures access list statements

B.

It reads access list statements into a dictionary list

C.

It displays access list statements on a terminal screen.

D.

It converts access list statements to a human-readable format.

Full Access
Question # 22

Which type of roaming event occurs when a client roams across multiple mobility groups?

A.

Layer 3

B.

Layer 7

C.

Layer 1

D.

Layer 2

Full Access
Question # 23

A customer requests a design that includes GLBP as the FHRP. The network architect discovers that the members of the GLBP group have different throughput capabilities. Which GLBP load balancing method supports this environment?  

A.

host dependent  

B.

weighted

C.

least connection

D.

round robin

Full Access
Question # 24

Which two functions is an edge node responsible for? (Choose two.)

A.

provides multiple entry and exit points for fabric traffic

B.

provides the default exit point for fabric traffic

C.

provides the default entry point for fabric traffic

D.

provides a host database that maps endpoint IDs to a current location

E.

authenticates endpoints

Full Access
Question # 25

What is the function of the statement "import actions" in this script?

A.

It imports the functions that are not available natively in Python

B.

It imports the functions of a third-party module

C.

It imports a Python module

D.

It imports an external reference

Full Access
Question # 26

Refer to the exhibit. Authentication for users must first use RADIUS, and fall back to the local database on the router if the RADIUS server is unavailable Which two configuration sets are needed to achieve this result? (Choose two.)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 27

Which definition describes JWT in regard to REST API security?

A.

an encrypted JSON token that is used for authentication

B.

an encrypted JSON token that is used for authorization

C.

an encoded JSON token that is used to securely exchange information

D.

an encoded JSON token that is used for authentication

Full Access
Question # 28

Which action controls the maximum cell size in a high-density wireless environment?

A.

Statically set TX power on access points to max.

B.

Disable low data rates.

C.

Set mandatory data rates.

D.

Decrease TX power on access points.

Full Access
Question # 29

How is Layer 3 roaming accomplished in a unified wireless deployment?

A.

An EoIP tunnel is created between the client and the anchor controller to provide seamless connectively as the client is associated with the new AP.

B.

The client entry on the original controller is passed to the database on the new controller.

C.

The new controller assign an IP address from the new subnet to the client.

D.

The client database on the original controller is updated with the anchor entry, and the new controller database is updated with the foreign entry.

Full Access
Question # 30

Which two conditions occur when the primary route processor fails on a switch thatisusing dual route processors with stateful switchover? (Choose two.)

A.

Data forwarding is stopped until the routing protocols reconverge after the switchover.

B.

The standby route processor initialization is started when the primary router processor fails.

C.

The standby route processor is fully initialed and state information is maintained.

D.

User sessions are immediately recreated on the new active route processor.

E.

Data forwarding can continue along known paths until routing protocol information is restored.

Full Access
Question # 31

What occurs during a Layer 2 inter-controller roam?

A.

A new security context is applied for each controller to which the client is associated, but the IP address remains the same.

B.

The client must be associated to a new controller where a new IP address and security context are applied.

C.

The client retains the same IP address and security context.

D.

The client is marked as foreign in the database of each new controller to which it is connected.

Full Access
Question # 32

At which plane does vBond operate in Cisco SD-WAN solutions?

A.

control plane

B.

data plane

C.

orchestration plane

D.

management plane

Full Access
Question # 33

Which two nodes comprise a collapsed core in a two-tier Cisco SD-Access design? (Choose two.)

A.

edge nodes

B.

distribution nodes

C.

extended nodes

D.

core nodes

E.

border nodes

Full Access
Question # 34

Which RF value represents the decline of the RF signal amplitude over a given distance"?

A.

signal-to-noise ratio

B.

received signal strength indicator

C.

free space path loss

D.

effective isotropic radiated power

Full Access
Question # 35

In a virtual environment, what is a VMDK file?

A.

A file containing information about snapshots of a virtual machine.

B.

A zip file connecting a virtual machine configuration file and a virtual disk.

C.

A configuration file containing settings for a virtual machine such as a guest OS.

D.

A file containing a virtual machine disk drive.

Full Access
Question # 36

What is used to measure the total output energy of a Wi-Fi device?

A.

dBi

B.

EIRP

C.

mW

D.

dBm

Full Access
Question # 37

What is one characteristic of Cisco SD-Access networks?

A.

Devices are assigned to virtual networks based on their VLAN membership.

B.

Scalable group tags are used for macrosegmentatlon.

C.

Virtual networks are used for microsegmentation.

D.

All traffic is Layer 3 within the fabric.

Full Access
Question # 38

Drag and drop the automation characteristics from the left to the corresponding tools on the right.

Full Access
Question # 39

What is a characteristic of the Cisco Catalyst Center (formerly DNA Center) Template Editor feature?

A.

It facilitates software upgrades to network devices from a central point.

B.

It facilitates a vulnerability assessment of the network devices.

C.

It uses a predefined configuration through parameterized elements or variables.

D.

It provides a high-level overview of the health of every network device.

Full Access
Question # 40

Refer to the exhibit. Which HTTP request produced the REST API response that was returned by the Cisco Catalyst Center (formerly DNA Center) platform?

A.

POST /auth/token

B.

GET /network-device

C.

GET /template-programmer/template/version/42a3df73-3ef4-49e2-b4f0-6927bbd4bf52

D.

POST /discovery

Full Access
Question # 41

Which data is properly formatted with JSON?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 42

What is a client who is using 802.1x for authentication referred to as?

A.

authenticator

B.

policy enforcement point

C.

NAC device

D.

supplicant

Full Access
Question # 43

What is a characteristic of Layer 3 roaming?

A.

Clients must obtain a new IP address when they roam between APs.

B.

It provides seamless roaming between APs that are connected to different Layer 3 networks and different mobility groups.

C.

It is only supported on controllers that run SSO.

D.

It provides seamless client roaming between APs in different Layer 3 networks but within the same mobility group.

Full Access
Question # 44

Drag and drop the code snippets from the bottom onto the blanks in the script to convert a Python object into a JSON string. Not all options are used

Full Access
Question # 45

How can an engineer prevent basic replay attacks from people who try to brute force a system via REST API?

A.

Add a timestamp to the request in the API header.

B.

Use a password hash.

C.

Add OAuth to the request in the API header.

D.

Use HTTPS.

Full Access
Question # 46

What is the structure of a JSON web token?

A.

header and payload

B.

three parts separated by dots: version, header, and signature

C.

payload and signature

D.

three parts separated by dots: header, payload. and signature

Full Access
Question # 47

Which feature is needed to maintain the IP address of a client when an inter-controller Layer 3 roam is performed between two WLCs that are using different mobility groups?

A.

interface groups

B.

RF groups

C.

AAA override

D.

auto anchor

Full Access
Question # 48

What is the calculation that is used to measure the radiated power of a signal after it has gone through the radio, antenna cable, and antenna?

A.

EIRP

B.

mW

C.

dBm

D.

dBi

Full Access
Question # 49

A response code of 404 is received while using the REST API on Cisco UNA Center to POST to this URI.

/dna/intent/api/v1 /template-programmer/project

What does the code mean?

A.

The client made a request a resource that does not exist.

B.

The server has not implemented the functionality that is needed to fulfill the request.

C.

The request accepted for processing, but the processing was not completed.

D.

The POST/PUT request was fulfilled and a new resource was created, Information about the resource is in the response body.

Full Access
Question # 50

How does NETCONF YANG represent data structures?

A.

as strict data structures defined by RFC 6020

B.

in an XML tree format

C.

In an HTML format

D.

as modules within a tree

Full Access
Question # 51

What is used to validate the authenticity of the client and is sent in HTTP requests as a JSON object?

A.

SSH

B.

TLS

C.

HTTPS

D.

JWT

Full Access
Question # 52

A customer has several small branches and wants to deploy a Wi-Fi solution with local management using CAPWAP. Which deployment model meets this requirement?

A.

local mode

B.

SD-Access wireless

C.

autonomous

D.

Mobility Express

Full Access
Question # 53

What is a Type 1 hypervisor?

A.

runs directly on a physical server and depends on a previously installed operating system

B.

runs directly on a physical server and includes its own operating system

C.

runs on a virtual server and depends on an already installed operating system

D.

run on a virtual server and includes its own operating system.

Full Access
Question # 54

Full Access
Question # 55

Full Access
Question # 56

Full Access
Question # 57

Full Access
Question # 58

Full Access
Question # 59

Full Access
Question # 60

Full Access
Question # 61

Full Access
Question # 62

Full Access
Question # 63

Full Access
Question # 64

Full Access
Question # 65

Full Access
Question # 66

Full Access
Question # 67

Full Access
Question # 68

OR

Full Access