Black Friday Goodies - 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: av54zq84

Exact2Pass Menu

Question # 4

Which exhibit displays a valid JSON file?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 5

Drag and drop the solutions that comprise Cisco Cyber Threat Defense from the left onto the objectives they accomplish on the right.

Full Access
Question # 6

What is the function of the LISP map resolver?

A.

to send traffic to non-LISP sites when connected to a service provider that does not accept nonroutable ElDs as packet sources

B.

to connect a site to the LISP-capable part of a core network publish the EID-to-RLOC mappings for the site, and respond to map-request messages

C.

to decapsulate map-request messages from ITRs and forward the messages to the MS.

D.

to advertise routable non-LISP traffic from one address family to LISP sites in a different address family

Full Access
Question # 7

Which HTTP code must be returned to prevent the script form exiting?

A.

200

B.

201

C.

300

D.

301

Full Access
Question # 8

Which command set configures RSPAN to capture outgoing traffic from VLAN 3 on interface GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 9

Which OSPF networks types are compatible and allow communication through the two peering devices?

A.

broadcast to nonbroadcast

B.

point-to-multipoint to nonbroadcast

C.

broadcast to point-to-point

D.

point-to-multipoint to broadcast

Full Access
Question # 10

Refer to the exhibit. External users require HTTP connectivity to an internal company web server that is listening on TCP port 8080. Which command set accomplishes this requirement?

A)

B)

C)

D)

E)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 11

In an SD-Access solution what is the role of a fabric edge node?

A.

to connect external Layer 3- network to the SD-Access fabric

B.

to connect wired endpoint to the SD-Access fabric

C.

to advertise fabric IP address space to external network

D.

to connect the fusion router to the SD-Access fabric

Full Access
Question # 12

Refer to the exhibit

Communication between London and New York is down Which command set must be applied to resolve this issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 13

Refer to the exhibit.

An engineer troubleshoots connectivity issues with an application. Testing is performed from the server gateway, and traffic with the DF bit set is dropped along the path after increasing packet size. Removing the DF bit setting at the gateway prevents the packets from being dropped. What is the cause of this issue?

A.

PMTUD does not work due to ICMP Packet Too Big messages being dropped by an ACL

B.

The remote router drops the traffic due to high CPU load

C.

The server should not set the DF bit in any type of traffic that is sent toward the network

D.

There is a CoPP policy in place protecting the WAN router CPU from this type of traffic

Full Access
Question # 14

Refer to the exhibit.

After implementing the configuration 172.20.20.2 stops replaying to ICMP echoes, but the default route fails to be removed. What is the reason for this behavior?

A.

The source-interface is configured incorrectly.

B.

The destination must be 172.30.30.2 for icmp-echo

C.

The default route is missing the track feature

D.

The threshold value is wrong.

Full Access
Question # 15

Which measurement is used from a post wireless survey to depict the cell edge of the access points?

A.

SNR

B.

Noise

C.

RSSI

D.

CCI

Full Access
Question # 16

Which two operational models enable an AP to scan one or more wireless channels for rouge access points and at the same time provide wireless services to clients? (Choose two.)

A.

Rouge detector

B.

Sniffer

C.

FlexConnect

D.

Local

E.

Monitor

Full Access
Question # 17

What is the function of cisco DNA center in a cisco SD-access deployment?

A.

It is responsible for routing decisions inside the fabric

B.

It is responsible for the design, management, deployment, provisioning and assurance of the fabric network devices.

C.

It possesses information about all endpoints, nodes and external networks related to the fabric

D.

It provides integration and automation for all nonfabric nodes and their fabric counterparts.

Full Access
Question # 18

Which two mechanisms are available to secure NTP? (Choose two.)

A.

IP prefix list-based

B.

IPsec

C.

TACACS-based authentication

D.

IP access list-based

E.

Encrypted authentication

Full Access
Question # 19

Refer to the exhibit.

What step resolves the authentication issue?

A.

use basic authentication

B.

change the port to 12446

C.

target 192 168 100 82 in the URI

D.

restart the vsmart host

Full Access
Question # 20

Refer to the exhibit.

What is required to configure a second export destination for IP address 192.168.10.1?

A.

Specify a VRF.

B.

Specify a different UDP port.

C.

Specify a different flow ID

D.

Configure a version 5 flow-export to the same destination.

E.

Specify a different TCP port.

Full Access
Question # 21

When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required?

A.

NTP server

B.

PKI server

C.

RADIUS server

D.

TACACS server

Full Access
Question # 22

What are two benefits of YANG? (Choose two.)

A.

It enforces the use of a specific encoding format for NETCONF.

B.

It collects statistical constraint analysis information.

C.

It enables multiple leaf statements to exist within a leaf list.

D.

It enforces configuration semantics.

E.

It enforces configuration constraints.

Full Access
Question # 23

Refer to the exhibit Drag and drop the snippets into the RESTCONF request to form the request that returns this response Not all options are used

Full Access
Question # 24

Which two GRE features are configured to prevent fragmentation? (Choose two.)

A.

TCP MSS

B.

PMTUD

C.

DF bit Clear

D.

MTU ignore

E.

IP MTU

F.

TCP window size

Full Access
Question # 25

Which technology does VXLAN use to provide segmentation for Layer 2 and Layer 3 traffic?

A.

bridge domain

B.

VLAN

C.

VRF

D.

VNI

Full Access
Question # 26

An engineer must provide wireless converge in a square office. The engineer has only one AP and believes that it should be placed it in the middle of the room. Which antenna type should the engineer use?

A.

directional

B.

polarized

C.

Yagi

D.

omnidirectional

Full Access
Question # 27

How is Layer 3 roaming accomplished in a unified wireless deployment?

A.

An EoIP tunnel is created between the client and the anchor controller to provide seamless connectivity as the client is associated with the new AP.

B.

The client entry on the original controller is passed to the database on the new controller.

C.

The new controller assigns an IP address from the new subnet to the client

D.

The client database on the original controller is updated the anchor entry, and the new controller database is updated with the foreign entry.

Full Access
Question # 28

Which two items are found in YANG data models? (Choose two.)

A.

HTTP return codes

B.

rpc statements

C.

JSON schema

D.

container statements

E.

XML schema

Full Access
Question # 29

Which access point mode allows a supported AP to function like a WLAN client would, associating and identifying client connectivity issues?

A.

client mode

B.

SE-connect mode

C.

sensor mode

D.

sniffer mode

Full Access
Question # 30

Which technology uses network traffic telemetry, contextual information, and file reputation to provide insight into cyber threats?

A.

threat defense

B.

security services

C.

security intelligence

D.

segmentation

Full Access
Question # 31

Refer to the exhibit. A network engineer must configure NETCONF. After creating the configuration, the engineer gets output from the command show line, but not from show running-config. Which command completes the configuration?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 32

Refer to the exhibit.

Based on the configuration in this WLAN security setting, Which method can a client use to authenticate to the network?

A.

text string

B.

username and password

C.

certificate

D.

RADIUS token

Full Access
Question # 33

Drag and drop the descriptions from the left onto the routing protocol they describe on the right.

Full Access
Question # 34

How is 802.11 traffic handled in a fabric-enabled SSID?

A.

centrally switched back to WLC where the user traffic is mapped to a VXLAN on the WLC

B.

converted by the AP into 802.3 and encapsulated into VXLAN

C.

centrally switched back to WLC where the user traffic is mapped to a VLAN on the WLC

D.

converted by the AP into 802.3 and encapsulated into a VLAN

Full Access
Question # 35

Drag and drop the threat defense solutions from the left onto their descriptions on the right.

Full Access
Question # 36

An engineer is concerned with the deployment of new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements?

A.

Router(config)# ip sla responder udp-connect 172.29.139.134 5000

B.

Router(config)# ip sla responder tcp-connect 172.29.139.134 5000

C.

Router(config)# ip sla responder udp-echo 172.29.139.134 5000

D.

Router(config)# ip sla responder tcp-echo 172.29.139.134 5000

Full Access
Question # 37

Refer to the exhibit. The connecting between SW1 and SW2 is not operational. Which two actions resolve the issue? (Choose two)

A.

configure switchport mode access on SW2

B.

configure switchport nonegotiate on SW2

C.

configure switchport mode trunk on SW2

D.

configure switchport nonegotiate on SW1

E.

configure switchport mode dynamic desirable on SW2

Full Access
Question # 38

Drag and drop the characteristics from the left onto the routing protocols they describe on the right.

Full Access
Question # 39

AN engineer is implementing a route map to support redistribution within BGP. The route map must configured to permit all unmatched routes. Which action must the engineer perform to complete this task?

A.

Include a permit statement as the first entry

B.

Include at least one explicit deny statement

C.

Remove the implicit deny entry

D.

Include a permit statement as the last entry

Full Access
Question # 40

How does EIGRP differ from OSPF?

A.

EIGRP is more prone to routing loops than OSPF

B.

EIGRP supports equal or unequal path cost, and OSPF supports only equal path cost.

C.

EIGRP has a full map of the topology, and OSPF only knows directly connected neighbors

D.

EIGRP uses more CPU and memory than OSPF

Full Access
Question # 41

After a redundant route processor failure occurs on a Layer 3 device, which mechanism allows for packets to be forwarded from a neighboring router based on the most recent tables?

A.

BFD

B.

RPVST+

C.

RP failover

D.

NSF

Full Access
Question # 42

Which encryption hashing algorithm does NTP use for authentication?

A.

SSL

B.

MD5

C.

AES128

D.

AES256

Full Access
Question # 43

Refer to the exhibit.

An engineer must configure a SPAN session. What is the effect of the configuration?

A.

Traffic sent on VLANs 10, 11, and 12 is copied and sent to interface g0/1.

B.

Traffic sent on VLANs 10 and 12 only is copied and sent to interface g0/1.

C.

Traffic received on VLANs 10, 11, and 12 is copied and sent to Interface g0/1.

D.

Traffic received on VLANs 10 and 12 only is copied and sent to interface g0/1.

Full Access
Question # 44

which entity is a Type 1 hypervisor?

A.

Oracle VM VirtualBox

B.

VMware server

C.

Citrix XenServer

D.

Microsoft Virtual PC

Full Access
Question # 45

AN engineer is implementing MPLS OAM to monitor traffic within the MPLS domain. Which action must the engineer perform to prevent from being forwarded beyond the service provider domain when the LSP is down?

A.

Disable IP redirects only on outbound interfaces

B.

Implement the destination address for the LSP echo request packet in the 127.x.y.z/8 network

C.

Disable IP redirects on all ingress interfaces

D.

Configure a private IP address as the destination address of the headend router of Cisco MPLS TE.

Full Access
Question # 46

Refer to Exhibit.

MTU has been configured on the underlying physical topology, and no MTU command has been configured on the tunnel interfaces. What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared?

A.

The packet arrives on router C without fragmentation.

B.

The packet is discarded on router A

C.

The packet is discarded on router B

D.

The packet arrives on router C fragmented.

Full Access