Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which Python code snippet must be added to the script to save the returned configuration as a JSON-formatted file?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 5

Refer to the exhibit.

What is the effect of these commands on the BR and HQ tunnel interfaces?

A.

The tunnel line protocol goes down when the keepalive counter reaches 6

B.

The keepalives are sent every 5 seconds and 3 retries

C.

The keepalives are sent every 3 seconds and 5 retries

D.

The tunnel line protocol goes down when the keepalive counter reaches 5

Full Access
Question # 6

In a Cisco SD-WAN solution, which two functions are performed by OMP? (Choose two.)

A.

advertisement of network prefixes and their attributes

B.

configuration of control and data policies

C.

gathering of underlay infrastructure data

D.

delivery of crypto keys

E.

segmentation and differentiation of traffic

Full Access
Question # 7

Refer to the exhibit. An engineer attempts to configure a router on a stick to route packets between Clients, Servers, and Printers; however, initial tests show that this configuration is not working. Which command set resolves this issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 8

Refer to the exhibit.

An engineer attempts to bundle interface Gi0/0 into the port channel, but it does not function as expected. Which action resolves the issue?

A.

Configure channel-group 1 mode active on interface Gi0/0.

B.

Configure no shutdown on interface Gi0/0

C.

Enable fast LACP PDUs on interface Gi0/0.

D.

Set LACP max-bundle to 2 on interface Port-channeM

Full Access
Question # 9

A network engineer configures a WLAN controller with increased security for web access. There is IP connectivity with the WLAN controller, but the engineer cannot start a management session from a web browser. Which action resolves the issued

A.

Disable JavaScript on the web browser

B.

Disable Adobe Flash Player

C.

Use a browser that supports 128-bit or larger ciphers.

D.

Use a private or incognito session.

Full Access
Question # 10

Refer to the exhibit. A network engineer must load balance traffic that comes from the NAT Router and is destined to 10.10.110.10, to several FTP servers. Which two commands sets should be applied? (Choose two).

A)

B)

C)

D)

E)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 11

Which protocol is responsible for data plane forwarding in a Cisco SD-Access deployment?

A.

VXLAN

B.

IS-IS

C.

OSPF

D.

LISP

Full Access
Question # 12

A company requires a wireless solution to support its mam office and multiple branch locations. All sites have local Internet connections and a link to the main office lor corporate connectivity. The branch offices are managed centrally. Which solution should the company choose?

A.

Cisco United Wireless Network

B.

Cisco DNA Spaces

C.

Cisco Catalyst switch with embedded controller

D.

Cisco Mobility Express

Full Access
Question # 13

Drag and drop the characteristics from the left to the table types on the right.

Full Access
Question # 14

Refer to the exhibit.

Which configuration must be applied to the HQ router to set up a GRE tunnel between the HQ and BR routers?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 15

Refer to the exhibit.

Cisco DNA Center has obtained the username of the client and the multiple devices that the client is using on the network. How is Cisco DNA Center getting these context details?

A.

The administrator had to assign the username to the IP address manually in the user database tool on Cisco DNA Center.

B.

Those details are provided to Cisco DNA Center by the Identity Services Engine

C.

Cisco DNA Center pulled those details directly from the edge node where the user connected.

D.

User entered those details in the Assurance app available on iOS and Android devices

Full Access
Question # 16

Refer to the exhibit. An engineer has configured an IP SLA for UDP echo’s. Which command is needed to start the IP SLA to test every 30 seconds and continue until stopped?

A.

ip sla schedule 100 start-time now life forever

B.

ip sla schedule 30 start-time now life forever

C.

ip sla schedule 100 start-time now life 30

D.

ip sla schedule 100 life forever

Full Access
Question # 17

Refer to the exhibit.

An engineer must allow all users in the 10.2.2.0/24 subnet to access the Internet. To conserve address space the public Interface address of 209 165 201.1 must be used for all external communication. Which command set accomplishes these requirements?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 18

Refer to the exhibit.

After configuring the BGP network, an engineer verifies that the path between Servers and Server2 Is functional. Why did RouterSF choose the route from RouterDAL instead of the route from RouterCHI?

A.

The Router-ID Tor Router DAL is lower than the Roter-ID for RouterCHI.

B.

The route from RouterOAL has a lower MED.

C.

BGP is not running on RouterCHI.

D.

There is a static route in RouterSF for 10.0.0.0/24.

Full Access
Question # 19

Which feature Is used to propagate ARP broadcast, and link-local frames across a Cisco SD-Access fabric to address connectivity needs for silent hosts that require reception of traffic to start communicating?

A.

Native Fabric Multicast

B.

Layer 2 Flooding

C.

SOA Transit

D.

Multisite Fabric

Full Access
Question # 20

What is YANG used for?

A.

scraping data via CLI

B.

processing SNMP read-only polls

C.

describing data models

D.

providing a transport for network configuration data between client and server

Full Access
Question # 21

Refer to the exhibit.

An engineer is designing a guest portal on Cisco ISE using the default configuration. During the testing phase, the engineer receives a warning when displaying the guest portal. Which issue is occurring?

A.

The server that is providing the portal has an expired certificate

B.

The server that is providing the portal has a self-signed certificate

C.

The connection is using an unsupported protocol

D.

The connection is using an unsupported browser

Full Access
Question # 22

Refer to the exhibit. A network operator is attempting to configure an IS-IS adjacency between two routers, but the adjacency cannot be established. To troubleshoot the problem, the operator collects this debugging output. Which interfaces are misconfigured on these routers?

A.

The peer router interface is configured as Level 1 only, and the R2 interface is configured as Level 2 only

B.

The R2 interface is configured as Level 1 only, and the Peer router interface is configured as Level 2 only

C.

The R2 interface is configured as point-to-point, and the peer router interface is configured as multipoint.

D.

The peer router interface is configured as point-as-point, and the R2 interface is configured as multipoint.

Full Access
Question # 23

What is an emulated machine that has dedicated compute memory, and storage resources and a fully installed operating system?

A.

Container

B.

Mainframe

C.

Host

D.

virtual machine

Full Access
Question # 24

Which two features does the Cisco SD-Access architecture add to a traditional campus network? (Choose two.)

A.

software-defined segmentation

B.

private VLANs

C.

SD-WAN

D.

modular QoS

E.

identity services

Full Access
Question # 25

Refer to the exhibit.

An engineer configures routing between all routers and must build a configuration to connect R1 to R3 via a GRE tunnel Which configuration must be applied?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 26

Refer to the exhibit.

Which command set must be applied on R1 to establish a BGP neighborship with R2 and to allow communication from R1 to reach the networks?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 27

What is the purpose of an RP in PIM?

A.

send join messages toward a multicast source SPT

B.

ensure the shortest path from the multicast source to the receiver

C.

receive IGMP joins from multicast receivers

D.

secure the communication channel between the multicast sender and receiver

Full Access
Question # 28

Refer to the exhibit. What is generated by the script?

A.

the cdp neighbors

B.

the routing table

C.

the router processes

D.

the running configuration

Full Access
Question # 29

Drag and drop the Cisco SD-Access solution areas from the left onto the protocols they use on the right.

Full Access
Question # 30

Which protocol is implemented to establish secure control plane adjacencies between Cisco SD-WAN nodes?

A.

IKF

B.

TLS

C.

IPsec

D.

ESP

Full Access
Question # 31

Drag and drop the automation characteristics from the left onto the appropriate tools on the right.

Full Access
Question # 32

Which option must be used to support a WLC with an IPv6 management address and 100 Cisco Aironet 2800 Series access points that will use DHCP to register?

A.

43

B.

52

C.

60

D.

82

Full Access
Question # 33

Which option works with a DHCP server to return at least one WLAN management interface IP address during the discovery phase and is dependent upon the VCI of the AP?

A.

Option 42

B.

Option 15

C.

Option 125

D.

Option 43

Full Access
Question # 34

How do EIGRP metrics compare to OSPF metrics?

A.

EIGRP metrics are based on a combination of bandwidth and packet loss, and OSPF metrics are based on interface bandwidth.

B.

EIGRP uses the Dijkstra algorithm, and OSPF uses The DUAL algorithm

C.

The EIGRP administrative distance for external routes is 170. and the OSPF administrative distance for external routes is undefined

D.

The EIGRP administrative distance for external routes is 170. and the OSPF administrative distance for external routes is 110

Full Access
Question # 35

Which method displays text directly into the active console with a synchronous EEM applet policy?

A.

event manager applet boom

event syslog pattern 'UP'

action 1.0 gets 'logging directly to console'

B.

event manager applet boom

event syslog pattern 'UP'

action 1.0 syslog priority direct msg 'log directly to console'

C.

event manager applet boom

event syslog pattern 'UP'

action 1.0 puts 'logging directly to console'

D.

event manager applet boom

event syslog pattern 'UP'

action 1.0 string 'logging directly to console'

Full Access
Question # 36

Which definition describes JWT in regard to REST API security?

A.

an encrypted JSON token that is used for authentication

B.

an encrypted JSON token that is used for authorization

C.

an encoded JSON token that is used to securely exchange information

D.

an encoded JSON token that is used for authentication

Full Access
Question # 37

Which IPv4 packet field carries the QoS IP classification marking?

A.

ID

B.

TTL

C.

FCS

D.

ToS

Full Access
Question # 38

What is one characteristic of the Cisco SD-Access control plane?

A.

It is based on VXLAN technology.

B.

Each router processes every possible destination and route

C.

It allows host mobility only in the wireless network.

D.

It stores remote routes in a centralized database server

Full Access
Question # 39

Refer to the exhibit.

How should the script be completed so that each device configuration is saved into a JSON-formatted file under the device name?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 40

What is a characteristic of the overlay network in the Cisco SD-Access architecture?

A.

It uses a traditional routed access design to provide performance and high availability to the network.

B.

It consists of a group of physical routers and switches that are used to maintain the network.

C.

It provides isolation among the virtual networks and independence from the physical network.

D.

It provides multicast support to enable Layer 2 Hooding capability in the underlay network.

Full Access
Question # 41

Which two solutions are used for backing up a Cisco DNA Center Assurance database? (Choose two)

A.

NFS share

B.

non-linux server

C.

local server

D.

remote server

E.

bare metal server

Full Access
Question # 42

Drag and drop the snippets onto the blanks within the code to construct a script that adds a prefix list to a route map and sets the local preference. Not all options are used

Full Access
Question # 43

Which two characteristics apply to the endpoint security aspect of the Cisco Threat Defense architecture? (Choose two.)

A.

detect and black ransomware in email attachments

B.

outbound URL analysis and data transfer controls

C.

user context analysis

D.

blocking of fileless malware in real time

E.

cloud-based analysis of threats

Full Access
Question # 44

Drag and drop the characteristics from the left onto the technology types on the right.

Full Access
Question # 45

Which two Cisco SD-WAN components exchange OMP information?

A.

vAnaiytlcs

B.

vSmart

C.

WAN Edge

D.

vBond

E.

vManage

Full Access
Question # 46

A network engineer is configuring OSPF on a router. The engineer wants to prevent having a route to 177.16.0.0/16 learned via OSPF. In the routing table and configures a prefix list using the command ip prefix-list OFFICE seq S deny 172.16.0.0/16. Winch two identical configuration commands must be applied to accomplish the goal? (Choose two.)

A.

distribute-list prefix OFFICE in under the OSPF process

B.

Ip prefix-list OFFICE seq 10 permit 0.0.0.0/0 Ie 32

C.

ip prefix-list OFFICE seq 10 permit 0.0.0.0/0 ge 32

D.

distribute-list OFFICE out under the OSPF process

E.

distribute-list OFFICE in under the OSPF process

Full Access
Question # 47

Refer to the exhibit. Which configuration must be added to enable GigabitEthemet 0/1 to participate in OSPF?

A.

SF_router (config-router)# network 10.10.1.0 0.0.0.255 area 0

B.

SF_rouier (conng)# network 10.10.1.0 0.0.0.255 area 1

C.

SF_router (conflg-routerp) network 10.10.1.0 0.0.0.255 area 1

D.

SF_rouler (contlg-rouler)# network 10.10.1.0 255.255.255.0 area 0

Full Access
Question # 48

Refer to the exhibit. A network engineer must be notified when a user switches to configuration mode. Which script should be applied to receive an SNMP trap and a critical-level log message?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 49

Which benefit is provided by the Cisco DNA Center telemetry feature?

A.

provides improved network security

B.

inventories network devices

C.

aids In the deployment network configurations

D.

improves the user experience

Full Access
Question # 50

Refer to The exhibit.

Assuming that R1 is a CE router, which VRF is assigned to Gi0/0 on R1?

A.

VRF VFN_A

B.

VRF VPN_B

C.

management VRF

D.

default VRF

Full Access
Question # 51

An engineer must configure a new loopback Interface on a router and advertise the interface as a fa4 in OSPF. Which command set accomplishes this task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 52

Refer to the exhibit.

An engineer must send the 172.16.2.0 /24 user traffic to a packet capture tool to troubleshoot an issue. Which action completes the configuration?

A.

Encrypt the traffic between the users and the monitoring servers.

B.

Disable the spanning tree protocol on the monitoring server VLAN.

C.

Enable the Cisco Discovery Protocol on the server interfaces.

D.

Define the remote span VLAN on SW1 and SW2.

Full Access
Question # 53

Refer to the exhibit Users cannot reach the web server at 192.168 100 1. What is the root cause for the failure?

A.

The server is attempting to load balance between links 10.100 100.1 and 10 100.200.1.

B.

The server is out of service.

C.

There is a loop in the path to the server.

D.

The gateway cannot translate the server domain name.

Full Access
Question # 54

Drag and drop the descriptions of the VSS technology from the left to the right. Not all options are used.

Full Access
Question # 55

Refer to the exhibit.

All switches are configured with the default port priority value. Which two commands ensure that traffic from PC1 is forwarded over Gi1/3 trunk port between DWS1 and DSW2? (Choose two)

A.

DSW2(config-if)#spanning-tree port-priority 16

B.

DSW2(config)#interface gi1/3

C.

DSW1(config-if)#spanning-tree port-priority 0

D.

DSW1(config) #interface gi1/3

E.

DSW2(config-if)#spanning-tree port-priority 128

Full Access
Question # 56

Refer to the Exhibit.

An engineer is installing a new pair of routers in a redundant configuration. When checking on the standby status of each router the engineer notices that the routers are not functioning as expected. Which action will resolve the configuration error?

A.

configure matching hold and delay timers

B.

configure matching key-strings

C.

configure matching priority values

D.

configure unique virtual IP addresses

Full Access
Question # 57

Based on the router's API output in JSON format below, which Python code will display the value of the "hostname" key?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 58

What does the LAP send when multiple WLCs respond to the CISCO_CAPWAP-CONTROLLER.localdomain hostname during the CAPWAP discovery and join process?

A.

broadcast discover request

B.

join request to all the WLCs

C.

unicast discovery request to each WLC

D.

Unicast discovery request to the first WLS that resolves the domain name

Full Access
Question # 59

Why would a small or mid-size business choose a cloud solution over an on-premises solution?

A.

Cloud provides higher data security than on-premises.

B.

Cloud provides more control over the implementation process than on-premises.

C.

Cloud provides greater ability for customization than on-premises.

D.

Cloud provides lower upfront cost than on-premises.

Full Access
Question # 60

By default, which virtual MAC address does HSRP group 15 use?

A.

05:5e:ac:07:0c:0f

B.

c0:42:34:03:73:0f

C.

00:00:0c:07:ac:0f

D.

05:af:1c:0f:ac:15

Full Access
Question # 61

Why would a log file contain a * next to the date?

A.

The network device was receiving NTP time when the log messages were recorded.

B.

The network device was unable to reach The NTP server when the log messages were recorded

C.

The network device is not configured to use NTP.

D.

The network device is nor configured to use NTP time stamps for logging

Full Access
Question # 62

Why is an AP joining a different WLC than the one specified through option 43?

A.

The WLC is running a different software version.

B.

The API is joining a primed WLC

C.

The AP multicast traffic unable to reach the WLC through Layer 3.

D.

The APs broadcast traffic is unable to reach the WLC through Layer 2.

Full Access
Question # 63

Refer to the exhibit.

A GRE tunnel has been created between HO and BR routers. What is the tunnel IP on the HQ router?

A.

10.111.111.1

B.

10.111.111.2

C.

209.165.202.130

D.

209.165.202.134

Full Access
Question # 64

Refer to the exhibit. Router BRDR-1 is configured to receive the 0.0.0.0/0 and 172.17.1.0/24 network via BGP and advertise them into OSPF are 0. An engineer has noticed that the OSPF domain is receiving only the 172.17.1.0/24 route and default route 0.0.0.0/0 is still missing. Which configurating must engineer apply to resolve the problem?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 65

Which action is performed by Link Management Protocol in a Cisco StackWise Virtual domain?

A.

It rejects any unidirectional link traffic forwarding

B.

It determines if the hardware is compatible to form the StackWise Virtual domain

C.

discovers the StackWise domain and brings up SVL interfaces.

D.

It determines which switch becomes active or standby

Full Access
Question # 66

Refer to the exhibit.

An engineer must create a configuration that prevents R3from receiving the LSA about 172.16.1.4/32.Which configuration set achieves this goal?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 67

What is provided by the Stealthwatch component of the Cisco Cyber Threat Defense solution?

A.

real-time threat management to stop DDoS attacks to the core and access networks

B.

real-time awareness of users, devices and traffic on the network

C.

malware control

D.

dynamic threat control for web traffic

Full Access
Question # 68

In a Cisco SD-Access solution, which protocol is used by an extended node to connect to a single edge node?

A.

VXLAN

B.

IS-IS

C.

802 1Q

D.

CTS

Full Access
Question # 69

Refer to the exhibit.

An engineer must configure HSRP for VLAN 1000 on SW2. The secondary switch must immediately take over the role of active router If the interlink with the primary switch fails. Which command set completes this task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 70

In which two ways does TCAM differ from CAM? (Choose two.)

A.

CAM is used to make Layer 2 forwarding decisions, and TCAM is used for Layer 3 address lookups.

B.

The MAC address table is contained in CAM, and ACL and QoS Information Is stored in TCAM.

C.

CAM Is used by routers for IP address lookups, and TCAM is used to make Layer 2 forwarding decisions.

D.

CAM is used for software switching mechanisms, and TCAM is used for hardware switching mechanisms.

E.

The MAC address table Is contained in TCAM, and ACL and QoS information is stored in CAM.

Full Access
Question # 71

How does CEF switching differ from process switching on Cisco devices?

A.

CEF switching saves memory by sorting adjacency tables in dedicate memory on the line cards, and process switching stores all tables in the main memory

B.

CEF switching uses adjacency tables built by the CDP protocol, and process switching uses the routing table

C.

CEF switching uses dedicated hardware processors, and process switching uses the main processor

D.

CEF switching uses proprietary protocol based on IS-IS for MAC address lookup, and process switching uses in MAC address table

Full Access
Question # 72

Refer to the exhibit.

The traceroute fails from R1 to R3. What is the cause of the failure?

A.

The loopback on R3 Is in a shutdown stale.

B.

An ACL applied Inbound on loopback0 of R2 Is dropping the traffic.

C.

An ACL applied Inbound on fa0/1 of R3 is dropping the traffic.

D.

Redistribution of connected routes into OSPF is not configured.

Full Access
Question # 73

An engineer must configure GigabitEthernet 0/0 for VRRP group 65. The rouler must assume the primary rote when it has the highest priority in the group. Which command set must be applied?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 74

A customer wants to provide wireless access to contractors using a guest portal on Cisco ISE. The portal Is also used by employees A solution is implemented, but contractors receive a certificate error when they attempt to access the portal Employees can access the portal without any errors. Which change must be implemented to allow the contractors and employees to access the portal?

A.

Install a trusted third-party certificate on the Cisco ISE.

B.

Install an Internal CA signed certificate on the contractor devices

C.

Install an internal CA signed certificate on the Cisco ISE

D.

install a trusted third-party certificate on the contractor devices.

Full Access
Question # 75

A network engineer is adding an additional 10Gps link to an exiting 2x10Gps LACP-based LAG to augment its capacity. Network standards require a bundle interface to be taken out of service if one of its member links goes down, and the new link must be added with minimal impact to the production network. Drag and drop the tasks that the engineer must perform from the left into the sequence on the right. Not all options are used.

Full Access
Question # 76

Simulation 02

Configure HSRP between DISTRO-SW1 and DISTRO-SW2 on VLAN 100 for hosts connected to ACCESS-SW1 to achieve these goals:

1. Configure group number 1 using the virtual IP address of 192.168.1.1/24.

2. Configure DlSTRO-SW1 as the active router using a priority value of 110 and DISTRO-SW2 as the standby router.

3. Ensure that DISTRO-SW2 will take over the active role when DISTRO-SW1 goes down, and when DISTRO-SW1 recovers, it automatically resumes the active role.

DISTRO-SW2

Full Access
Question # 77

What is one characteristic of VXLAN?

A.

It supports a maximum of 4096 VLANs.

B.

It supports multitenant segments.

C.

It uses STP to prevent loops in the underlay network.

D.

It uses the Layer 2 header to transfer packets through the network underlay.

Full Access
Question # 78

Which free application has the ability to make REST calls against Cisco DNA Center?

A.

API Explorer

B.

REST Explorer

C.

Postman

D.

Mozilla

Full Access
Question # 79

Refer to the exhibit.

What does the response "204 No Content mean for the REST API request?

A.

Interface toopback 100 is not removed from the configuration.

B.

Interface toopback 100 is not found in the configuration.

C.

Interface toopback 100 is removed from the configuration.

D.

The DELETE method is not supported.

Full Access
Question # 80

Which hypervisor requires a host OS to run and is not allowed to directly access the hosts hardware and resources?

A.

native

B.

bare metal

C.

type 1

D.

type 2

Full Access
Question # 81

Which of the following attacks becomes more effective because of global leakages of users' passwords?

A.

Dictionary

B.

Brute-force

C.

Phishing

D.

Deauthentication

Full Access
Question # 82

A wireless network engineer must configure a WPA2+WPA3 policy with the Personal security type. Which action meets this requirement?

A.

Configure the GCMP256 encryption cipher.

B.

Configure the CCMP256 encryption cipher.

C.

Configure the CCMP128 encryption cipher.

D.

Configure the GCMP128 encryption cipher.

Full Access
Question # 83

Which tool is used in Cisco DNA Center to build generic configurations that are able to be applied on device with similar network settings?

A.

Command Runner

B.

Template Editor

C.

Application Policies

D.

Authentication Template

Full Access
Question # 84

Which function does a Cisco SD-Access extended node perform?

A.

provides fabric extension to nonfabric devices through remote registration and configuration

B.

performs tunneling between fabric and nonfabric devices to route traffic over unknown networks

C.

used to extend the fabric connecting to downstream nonfabric enabled Layer 2 switches

D.

in charge of establishing Layer 3 adjacencies with nonfabric unmanaged node

Full Access
Question # 85

Refer to the exhibit. What is the cause of the communication failure between R1 and R4?

A.

R1 is configured with the no ip unreachables command.

B.

R2 is denying ICMP

C.

R4 is denying ICMP.

D.

R3 is denying ICMP.

Full Access
Question # 86

What is a characteristic of the Cisco DMA Center Template Editor feature?

A.

It facilitates software upgrades lo network devices from a central point.

B.

It facilitates a vulnerability assessment of the network devices.

C.

It provides a high-level overview of the health of every network device.

D.

It uses a predefined configuration through parameterized elements or variables.

Full Access
Question # 87

What is one being of implementing a data modetag language?

A.

accuracy of the operations performed

B.

uses XML style of data formatting

C.

machine-oriented logic and language-facilitated processing.

D.

conceptual representation to simplify interpretation.

Full Access
Question # 88

An engineer must configure a new WLAN that allows a user to enter a passphrase and provides forward secrecy as a security measure. Which Layer 2 WLAN configuration is required on the Cisco WLC?

A.

WPA2 Personal

B.

WPA3 Enterprise

C.

WPA3 Personal

D.

WPA2 Enterprise

Full Access
Question # 89

Which collection contains the resources to obtain a list of fabric nodes through the vManage API?

A.

device management

B.

administration

C.

device inventory

D.

monitoring

Full Access
Question # 90

An engineer must contigure a rou'.er to allow users to run specHic configuration commands by validating the user against the router database. Which configuration must be applied?

A.

aaa authentication network default local

B.

aaa authentication exec default local

C.

aaa authorization exec default local

D.

aaa authorization network default local

Full Access
Question # 91

Which OSPF networks types are compatible and allow communication through the two peering devices?

A.

broadcast to nonbroadcast

B.

point-to-multipoint to nonbroadcast

C.

broadcast to point-to-point

D.

point-to-multipoint to broadcast

Full Access
Question # 92

A customer requests a design that includes GLBP as the FHRP The network architect discovers that the members of the GLBP group have different throughput capabilities Which GLBP load balancing method supports this environment?

A.

host dependent

B.

least connection

C.

round robin

D.

weighted

Full Access
Question # 93

Refer to the exhibit. Which command is required to verify NETCONF capability reply messages?

A.

show netconf | section rpc-reply

B.

show netconf rpc-reply

C.

show netconf xml rpc-reply

D.

show netconf schema | section rpc-reply

Full Access
Question # 94

A client device roams between wireless LAN controllers that are mobility peers, Both controllers have dynamic interface on the same client VLAN which type of roam is described?

A.

intra-VLAN

B.

inter-controller

C.

intra-controller

D.

inter-subnet

Full Access
Question # 95

Refer to the exhibit.

An engineer must configure and validate a CoPP policy that allows the network management server to monitor router R1 via SNMP while protecting the control plane. Which two commands or command sets must be used? (Choose two.)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

F.

Option F

Full Access
Question # 96

Refer to the exhibit.

Which action must be taken to configure a WLAN for WPA2-AES with PSK and allow only 802.l1r-capable clients to connect?

A.

Change Fast Transition to Adaptive Enabled and enable FT * PSK

B.

Enable Fast Transition and FT + PSK.

C.

Enable Fast Transition and PSK

D.

Enable PSK and FT + PSK.

Full Access
Question # 97

Refer to the exhibit.

Which statement is needed to complete the EEM applet and use the Tel script to store the backup file?

A.

action 2.0 cli command "write_backup.tcl tcl"

B.

action 2.0 cli command "flash:write_backup.tcl"

C.

action 2.0 cli command "write_backup.tcl"

D.

action 2.0 cli command "telsh flash:write_backup.tcl"

Full Access
Question # 98

A company hires a network architect to design a new OTT wireless solution within a Cisco SD-Access Fabric wired network. The architect wants to register access points to the WLC to centrally switch the traffic. Which AP mode must the design include?

A.

Bridge

B.

Fabric

C.

FlexConnect

D.

local

Full Access
Question # 99

Simulation 10

Full Access
Question # 100

Refer to the exhibit.

These commands have been added to the configuration of a switch Which command flags an error if it is added to this configuration?

A.

monitor session 1 source interface port-channel 6

B.

monitor session 1 source vlan 10

C.

monitor session 1 source interface FatEtheret0/1 x

D.

monitor session 1 source interface port-channel 7,port-channel8

Full Access
Question # 101

Which unit of measure is used to measure wireless RF SNR?

A.

mW

B.

bBm

C.

dB

D.

dBi

Full Access
Question # 102

Refer to Ihe exhibit. An engineer must update the existing configuation to achieve these resu ts:

• Only administrators from the 192.168 1.0.'?4 subnet can access the vty lines.

* Access to the vty lines using clear-text protocols is prohibited.

Which command set should be appled?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 103

What does a YANG model provide?

A.

standardized data structure independent of the transport protocols

B.

creation of transport protocols and their interaction with the OS

C.

user access to interact directly with the CLI of the device to receive or modify network configurations

D.

standardized data structure that can be used only with NETCONF or RESTCONF transport protocols

Full Access
Question # 104

What is a characteristics of Cisco SD-WAN?

A.

operates over DTLS/TLS authenticated and secured tunnels

B.

requires manual secure tunnel configuration

C.

uses unique per-device feature templates

D.

uses control connections between routers

Full Access
Question # 105

Refer to the exhibit. Which configuration is required to summarize the Area 2 networks that are advertised to Area 0?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 106

Which JSON script is properly formatted?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 107

Where in Cisco DNA Center is documentation of each API call, organized by its functional area?

A.

Developer Toolkit

B.

platform management

C.

platform bundles

D.

Runtime Dashboard

Full Access
Question # 108

What does the Cisco DNA Center Authentication API provide?

A.

list of global issues that are logged in Cisco DNA Center

B.

access token to make calls to Cisco DNA Center

C.

list of VLAN names

D.

dent health status

Full Access
Question # 109

A switch is attached to router R1 on its gig 0/0 interface. Fort security reasons, you want to prevent R1 from sending OSPF hellos to the switch. Which command should be enabled to accomplish this?

A.

R1(config-router)#ip ospf hello disable

B.

R1(config-router)#ip ospf hello-interval 0

C.

R1(config)#passive-interface Gig 0/0

D.

R1(config-router)#passive-interface Gig 0/0

Full Access
Question # 110

Drag and drop the characteristics from the left onto the deployment model on the right.

Full Access
Question # 111

Refer to the exhibit. Which configuration set implements Control plane Policing for SSH and Telnet?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 112

Drag and drop the code snippets from the bottom onto the blanks in the script to convert a Python object into a JSON string. Not all options are used.

Full Access
Question # 113

What is a benefit of using segmentation with TrustSec?

A.

Packets sent between endpoints on a LAN are encrypted using symmetric key cryptography.

B.

Firewall rules are streamlined by using business-level profiles.

C.

Integrity checks prevent data from being modified in transit.

D.

Security group tags enable network segmentation.

Full Access
Question # 114

An engineer must use flexible NetFlow on a group of switches. To prevent overloading of the flow collector, if the flow is idle for 20 seconds, the flow sample should be exported. Which command set should be applied?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 115

Refer to the exhibit.

A network engineer issues the debug command while troubleshooting a network issue. What does the output confirm?

A.

ACL100 is tracking ICMP traffic from 1.1.1.1 destined for 10.1.1.1.

B.

ACL100 is tracking all traffic from 10.1.1.1 destined far 1.1.

C.

ACL100 is tracking ICMP traffic from 10.1.1.1 destined for 11.1.1

D.

ACL100 is tracking ICMP traffic from Serial 1/0 destined for Serial3/0.

Full Access
Question # 116

What is the rose of the vSmart controller in a Cisco SD-WN environment?

A.

it performs authentication and authorization

B.

it manages the control plane.

C.

it is the centralized network management system

D.

it manages the data plane

Full Access
Question # 117

What is a characteristic of a Type 2 hypervisor?

A.

It eliminates the need for an underlying operating system.

B.

Its main task is to manage hardware resources between different operating systems

C.

Problems in the base operating system can affect the entire system.

D.

It is completely independent of the operating system

Full Access
Question # 118

An engineer plans to use Python to convert text files that contain device information lo JSON. Drag and drop the code snippets from the bottom onto the blanks in the code to construct the request. Not all options are used.

Full Access
Question # 119

Which function does a virtual switch provide?

A.

CPU context switching (or multitasking between virtual machines

B.

RAID storage for virtual machines

C.

emulation of power for virtual machines.

D.

connectivity between virtual machines

Full Access
Question # 120

Which two actions, when applied in the LAN network segment, will facilitate Layer 3 CAPWAP discovery for lightweight AP? Choose two.)

A.

Enable port security on the switch port.

B.

Configure an IP helper-address on the router interface.

C.

Utilize DHCP option 17.

D.

Configure WLC IP address LAN switch.

E.

Utilize DHCP option 43.

Full Access
Question # 121

Drag and drop the characteristics from the left onto the orchestration tool classifications on the right.

Full Access
Question # 122

Refer lo the exhibit.

Which address type is 10.10.10.10 configured for?

A.

inside global

B.

outside local

C.

outside global

D.

inside local

Full Access
Question # 123

Which configuration protects the password for the VTY lines against over-the-shoulder attacks?

A.

username admin secret 7 6j809j23kpp43883500N7%e$

B.

service password-encryption

C.

line vty 04 password $25$FpM7182!

D.

line vty 0 15

password $25$FpM71f82!

Full Access
Question # 124

Which QoS feature uses the IP Precedence bits in the ToS field of the IP packet header to partition traffic into different priority levels?

A.

marking

B.

shaping

C.

policing

D.

classification

Full Access
Question # 125

Which router is elected the IGMP Querier when more than one router is in the same LAN segment?

A.

The router with the shortest uptime

B.

The router with the lowest IP address

C.

The router with the highest IP address

D.

The router with the longest uptime

Full Access
Question # 126

Which configuration enables a device to be configured via NETCONF over SSHv2?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 127

Which security measure mitigates a man-in-the-middle attack of a REST API?

A.

SSL certificates

B.

biometric authentication

C.

password hash

D.

non repudiotion feature

Full Access
Question # 128

Refer to the exhibit. What is the result of this Python code?

A.

1

B.

0

C.

7

D.

7.5

Full Access
Question # 129

Refer to the exhibit.

An engineer configures a trunk between SW1 and SW2 but tagged packets are not passing. Which action fixes the issue?

A.

Configure SW1 with dynamic auto mode on interface FastEthernet0/1.

B.

Configure the native VLAN to be the same VLAN on both switches on interface FastEthernet0/1.

C.

Configure SW2 with encapsulation dot1q on interface FastEthernet0/1.

D.

Configure FastEthernet0/1 on both switches for static trunking.

Full Access
Question # 130

In a wireless network environment, what is calculated using the numerical values of the transmitter power level, cable loss, and antenna gain?

A.

RSSI

B.

dBI

C.

SNR

D.

EIRP

Full Access
Question # 131

An engineer receives a report that an application exhibits poor performance. On the switch where the server is connected, this syslog message is visible:

SW_MATM4-MACFLAP_N0HF: Host 0054.3831.8253 in vlan 14 is flapping between port GUAM and port Gi1/0/2.

What is causing the problem?

A.

wrong SFP+ and cable connected between the server and the switch

B.

undesirable load-balancing configuration on the switch

C.

failed NIC on the server

D.

invalid port channel configuration on the switch

Full Access
Question # 132

If AP power level is increased from 25 mW to 100 mW. what is the power difference in dBm?

A.

6 dBm

B.

14 dBm

C.

17 dBm

D.

20 dBm

Full Access
Question # 133

Based on the router's API output In JSON format below, which Python code will display the value of the 'role' key?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 134

Refer to the exhibit.

Assuming all links are functional, which path does PC1 take to reach DSW1?

A.

PC1 goes from ALSW1 to DSW2 to CORE to DSW1.

B.

PC1 goes from ALSW1 to DSW2 to DSW1.

C.

PC1 goes from ALSW1 to DSW1.

D.

PC1 goes from ALSW1 to DSW2 to ALSW2 to DSW1.

Full Access
Question # 135

Drag the drop the description from the left onto the routing protocol they describe on the right.

Full Access
Question # 136

What is a command-line tool for consuming REST APIs?

A.

Postman

B.

CURL

C.

Firefox

D.

Python requests

Full Access
Question # 137

Which of the following fiber connector types is the most likely to be used on a network interface card?

A.

LC

B.

SC

C.

ST

D.

MPO

Full Access
Question # 138

Which outbound access list, applied to the WAN interface of a router, permits all traffic except for http traffic sourced from the workstation with IP address 10.10.10.1?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 139

What is a characteristic of YANG?

A.

It is a Cisco proprietary language that models NETCONF data

B.

It allows model developers to create custom data types

C.

It structures data in an object-oriented fashion to promote model reuse

D.

It provides loops and conditionals to control now within models

Full Access
Question # 140

Refer to the exhibit. A network engineer must configure a password expiry mechanism on the gateway router for all local passwords to expire after 60 days. What is required to complete this task?

A.

The password expiry mechanism is on the AAA server and must be configured there.

B.

Add the aaa authentication enable default Administrators command.

C.

Add the username admin privilege 15 common-criteria*policy Administrators password 0 Cisco13579! command.

D.

No further action Is required. The configuration is complete.

Full Access
Question # 141

Which measurement is used from a post wireless survey to depict the cell edge of the access points?

A.

SNR

B.

Noise

C.

RSSI

D.

CCI

Full Access
Question # 142

Drag and drop the Qos mechanisms from the left to the correct descriptions on the right

Full Access
Question # 143

In cisco SD_WAN, which protocol is used to measure link quality?

A.

OMP

B.

BFD

C.

RSVP

D.

IPsec

Full Access
Question # 144

Refer to the exhibit. A network engineer troubleshoots an issue with the port channel between SW1 and SW2. which command resolves the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 145

After a redundant route processor failure occurs on a Layer 3 device, which mechanism allows for packets to be forwarded from a neighboring router based on the most recent tables?

A.

BFD

B.

RPVST+

C.

RP failover

D.

NSF

Full Access
Question # 146

Which command set configures RSPAN to capture outgoing traffic from VLAN 3 on interface GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 147

What is the differences between TCAM and the MAC address table?

A.

The MAC address table is contained in TCAM ACL and QoS information is stored in TCAM

B.

The MAC address table supports partial matches. TCAM requires an exact match

C.

Router prefix lookups happens in CAM. MAC address table lookups happen in TCAM.

D.

TCAM is used to make Layer 2 forwarding decisions CAM is used to build routing tables

Full Access
Question # 148

Refer to the exhibit Which single security feature is recommended to provide Network Access Control in the enterprise?

A.

MAB

B.

802.1X

C.

WebAuth

D.

port security sticky MAC

Full Access
Question # 149

Refer to the exhibit.

An engineer configures monitoring on SW1 and enters the show command to verify operation. What does the output confirm?

A.

SPAN session 1 monitors activity on VLAN 50 of a remote switch

B.

SPAN session 2 only monitors egress traffic exiting port FastEthernet 0/14.

C.

SPAN session 2 monitors all traffic entering and exiting port FastEthernet 0/15.

D.

RSPAN session 1 is incompletely configured for monitoring

Full Access
Question # 150

How does an on-premises infrastructure compare to a cloud infrastructure?

A.

On-premises can increase compute power faster than cloud

B.

On-premises requires less power and cooling resources than cloud

C.

On-premises offers faster deployment than cloud

D.

On-premises offers lower latency for physically adjacent systems than cloud.

Full Access
Question # 151

What are two benefits of YANG? (Choose two.)

A.

It enforces the use of a specific encoding format for NETCONF.

B.

It collects statistical constraint analysis information.

C.

It enables multiple leaf statements to exist within a leaf list.

D.

It enforces configuration semantics.

E.

It enforces configuration constraints.

Full Access
Question # 152

Refer to me exhibit. What is the cause of the log messages?

A.

hello packet mismatch

B.

OSPF area change

C.

MTU mismatch

D.

IP address mismatch

Full Access
Question # 153

In a Cisco SD-Access solution, what is the role of the Identity Services Engine?

A.

It is leveraged for dynamic endpoint to group mapping and policy definition.

B.

It provides GUI management and abstraction via apps that share context.

C.

it is used to analyze endpoint to app flows and monitor fabric status.

D.

It manages the LISP EID database.

Full Access
Question # 154

What is one difference between saltstack and ansible?

A.

SaltStack uses an API proxy agent to program Cisco boxes on agent mode, whereas Ansible uses a Telnet connection

B.

SaltStack uses the Ansible agent on the box, whereas Ansible uses a Telnet server on the box

C.

SaltStack is constructed with minion, whereas Ansible is constructed with YAML

D.

SaltStack uses SSH to interact with Cisco devices, whereas Ansible uses an event bus

Full Access
Question # 155

A company has an existing Cisco 5520 HA cluster using SSO. An engineer deploys a new single Cisco Catalyst 9800 WLC to test new features. The engineer successfully configures a mobility tunnel between the 5520 cluster and 9800 WLC. Client connected to the corporate WLAN roam seamlessly between access points on the 5520 and 9800 WLC. After a failure on the primary 5520 WLC, all WLAN services remain functional; however, Client roam between the 5520 and 9800 controllers without dropping their connection. Which feature must be configured to remedy the issue?

A.

mobility MAC on the 5520 cluster

B.

mobility MAC on the 9800 WLC

C.

new mobility on the 5520 cluster

D.

new mobility on the 9800 WLC

Full Access
Question # 156

Refer to the exhibit.

What are two effects of this configuration? (Choose two.)

A.

R1 becomes the active router.

B.

R1 becomes the standby router.

C.

If R2 goes down, R1 becomes active but reverts to standby when R2 comes back online.

D.

If R1 goes down. R2 becomes active and remains the active device when R1 comes back online.

E.

If R1 goes down, R2 becomes active but reverts to standby when R1 comes back online.

Full Access
Question # 157

What is the recommended MTU size for a Cisco SD-Access Fabric?

A.

1500

B.

9100

C.

4464

D.

17914

Full Access
Question # 158

Which AP mode allows an engineer to scan configured channels for rogue access points?

A.

sniffer

B.

monitor

C.

bridge

D.

local

Full Access
Question # 159

What is the data policy in a Cisco SD-WAN deployment?

A.

list of ordered statements that define node configurations and authentication used within the SD-WAN overlay

B.

Set of statements that defines how data is forwarded based on IP packet information and specific VPNs

C.

detailed database mapping several kinds of addresses with their corresponding location

D.

group of services tested to guarantee devices and links liveliness within the SD-WAN overlay

Full Access
Question # 160

Refer to the exhibit How was spanning-tree configured on this interface?

A.

By entering the command spanning-tree portfast trunk in the interface configuration mode.

B.

By entering the command spanning-tree portfast in the interface configuration mode

C.

By entering the command spanning-tree mst1 vlan 10,20,30,40 in the global configuration mode

D.

By entering the command spanning-tree vlan 10,20,30,40 root primary in the interface configuration mode

Full Access
Question # 161

Drag and drop the virtual components from the left onto their deceptions on the right.

Full Access
Question # 162

What is the difference between CEF and process switching?

A.

CEF processes packets that are too complex for process switching to manage.

B.

CEF is more CPU-intensive than process switching.

C.

CEF uses the FIB and the adjacency table to make forwarding decisions, whereas process switching punts each packet.

D.

Process switching is faster than CEF.

Full Access
Question # 163

How are the different versions of IGMP compatible?

A.

IGMPv2 is compatible only with IGMPv1.

B.

IGMPv2 is compatible only with IGMPv2.

C.

IGMPv3 is compatible only with IGMPv3.

D.

IGMPv3 is compatible only with IGMPv1

Full Access
Question # 164

Drag and drop the LISP components from the left onto the function they perform on the right. Not all options are used.

Full Access
Question # 165

What is a fact about Cisco EAP-FAST?

A.

It does not require a RADIUS server certificate.

B.

It requires a client certificate.

C.

It is an IETF standard.

D.

It operates in transparent mode.

Full Access
Question # 166

Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial?

A.

under interface saturation condition

B.

under network convergence condition

C.

under all network condition

D.

under traffic classification and marking conditions.

Full Access
Question # 167

What is the function of a VTEP in VXLAN?

A.

provide the routing underlay and overlay for VXLAN headers

B.

dynamically discover the location of end hosts in a VXLAN fabric

C.

encapsulate and de-encapsulate traffic into and out of the VXLAN fabric

D.

statically point to end host locations of the VXLAN fabric

Full Access
Question # 168

Refer to the exhibit.

The EtherChannel between SW2 and SW3 is not operational which action resolves this issue?

A.

Configure the channel-group mode on SW2 Gi0/1 and Gi0/1 to on.

B.

Configure the channel-group mode on SW3 Gi0/1 to active

C.

Configure the mode on SW2 Gi0/0 to trunk

D.

Configure the mode on SW2 Gi0/1 to access.

Full Access
Question # 169

Which component of the Cisco Cyber Threat Defense solution provides user and flow context analysis?

A.

Cisco Firepower and FireSIGHT

B.

Cisco Stealth watch system

C.

Advanced Malware Protection

D.

Cisco Web Security Appliance

Full Access
Question # 170

Wireless users report frequent disconnections from the wireless network. While troubleshooting a network engineer finds that after the user a disconnect, the connection re-establishes automatically without any input required. The engineer also notices these message logs .

Which action reduces the user impact?

A.

increase the AP heartbeat timeout

B.

increase BandSelect

C.

enable coverage hole detection

D.

increase the dynamic channel assignment interval

Full Access
Question # 171

Refer to the exhibit.

Which action resolves the EtherChannel issue between SW2 and SW3?

A.

Configure switchport mode trunk on SW2.

B.

Configure switchport nonegotiate on SW3

C.

Configure channel-group 1 mode desirable on both interfaces.

D.

Configure channel-group 1 mode active on both interfaces.

Full Access
Question # 172

What is the function of a fabric border node in a Cisco SD-Access environment?

A.

To collect traffic flow information toward external networks

B.

To connect the Cisco SD-Access fabric to another fabric or external Layer 3 networks

C.

To attach and register clients to the fabric

D.

To handle an ordered list of IP addresses and locations for endpoints in the fabric.

Full Access
Question # 173

“HTTP/1.1 204 content” is returned when cur –I –x delete command is issued. Which situation has occurred?

A.

The object could not be located at the URI path.

B.

The command succeeded in deleting the object

C.

The object was located at the URI, but it could not be deleted.

D.

The URI was invalid

Full Access
Question # 174

An engineer has deployed a single Cisco 5520 WLC with a management IP address of 172.16.50.5/24. The engineer must register 50 new Cisco AIR-CAP2802I-E-K9 access points to the WLC using DHCP option 43. The access points are connected to a switch in VLAN 100 that uses the 172.16.100.0/24 subnet. The engineer has configured the DHCP scope on the switch as follows:

The access points are failing to join the wireless LAN controller. Which action resolves the issue?

A.

configure option 43 Hex F104.AC10.3205

B.

configure option 43 Hex F104.CA10.3205

C.

configure dns-server 172.16.50.5

D.

configure dns-server 172.16.100.1

Full Access
Question # 175

What are two benefits of virtual switching when compared to hardware switching? (Choose two.)

A.

increased MTU size

B.

hardware independence

C.

VM-level isolation

D.

increased flexibility

E.

extended 802.1Q VLAN range

Full Access
Question # 176

What are two characteristics of VXLAN? (Choose two)

A.

It uses VTEPs to encapsulate and decapsulate frames.

B.

It has a 12-bit network identifier

C.

It allows for up to 16 million VXLAN segments

D.

It lacks support for host mobility

E.

It extends Layer 2 and Layer 3 overlay networks over a Layer 2 underlay.

Full Access
Question # 177

Refer to the exhibit.

Security policy requires all idle-exec sessions to be terminated in 600 seconds. Which configuration achieves this goal?

A.

line vty 0 15

absolute-timeout 600

B.

line vty 0 15

exec-timeout

C.

line vty 01 5

exec-timeout 10 0

D.

line vty 0 4

exec-timeout 600

Full Access
Question # 178

An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:

Which two statements does the engineer use to explain these values to the customer? (Choose two)

A.

The signal strength at location C is too weak to support web surfing

B.

Location D has the strongest RF signal strength

C.

The RF signal strength at location B is 50% weaker than location A

D.

The signal strength at location B is 10 dB better than location C

E.

The RF signal strength at location C is 10 times stronger than location B

 

Full Access
Question # 179

Which two operational models enable an AP to scan one or more wireless channels for rouge access points and at the same time provide wireless services to clients? (Choose two.)

A.

Rouge detector

B.

Sniffer

C.

FlexConnect

D.

Local

E.

Monitor

Full Access
Question # 180

Refer to the exhibit. Which configuration change will force BR2 to reach 209 165 201 0/27 via BR1?

A.

Set the weight attribute to 65.535 on BR1 toward PE1.

B.

Set the local preference to 150 on PE1 toward BR1 outbound

C.

Set the MED to 1 on PE2 toward BR2 outbound.

D.

Set the origin to igp on BR2 toward PE2 inbound.

Full Access
Question # 181

When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?

A.

logging host 10.2.3.4 vrf mgmt transport tcp port 6514

B.

logging host 10.2.3.4 vrf mgmt transport udp port 6514

C.

logging host 10.2.3.4 vrf mgmt transport tcp port 514

D.

logging host 10.2.3.4 vrf mgmt transport udp port 514

Full Access
Question # 182

Refer to the exhibit.

The IP SLA is configured in a router. An engineer must configure an EEM applet to shut down the interface and bring it back up when there is a problem with the IP SLA. Which configuration should the engineer use?

A.

event manager applet EEM_IP_SLA

event track 10 state down

B.

event manager applet EEM_IP_SLA

event track 10 state unreachable

C.

event manager applet EEM_IP_SLA

event sla 10 state unreachable

D.

event manager applet EEM_IP_SLA

event sla 10 state down

Full Access
Question # 183

Which exhibit displays a valid JSON file?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 184

Drag and drop the characteristics from the left onto the protocols they apply to on the right?

Full Access
Question # 185

Running the script causes the output in the exhibit. Which change to the first line of the script resolves the error?

A.

from ncclient import

B.

import manager

C.

from ncclient import*

D.

import ncclient manager

Full Access
Question # 186

In an SD-Access solution what is the role of a fabric edge node?

A.

to connect external Layer 3- network to the SD-Access fabric

B.

to connect wired endpoint to the SD-Access fabric

C.

to advertise fabric IP address space to external network

D.

to connect the fusion router to the SD-Access fabric

Full Access
Question # 187

Which two components are supported by LISP? (Choose two.)

A.

Proxy ETR

B.

egress tunnel router

C.

route reflector

D.

HMAC algorithm

E.

spoke

Full Access
Question # 188

An engineer is concerned with the deployment of new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements?

A.

Router(config)# ip sla responder udp-connect 172.29.139.134 5000

B.

Router(config)# ip sla responder tcp-connect 172.29.139.134 5000

C.

Router(config)# ip sla responder udp-echo 172.29.139.134 5000

D.

Router(config)# ip sla responder tcp-echo 172.29.139.134 5000

Full Access
Question # 189

Refer to the exhibit Drag and drop the snippets into the RESTCONF request to form the request that returns this response Not all options are used

Full Access
Question # 190

Which design principle slates that a user has no access by default to any resource, and unless a resource is explicitly granted, it should be denied?

A.

least privilege

B.

fail-safe defaults

C.

economy of mechanism

D.

complete mediation

Full Access
Question # 191

While configuring an IOS router for HSRP with a virtual IP of 10 1.1.1. an engineer sees this log message.

Which configuration change must the engineer make?

A.

Change the HSRP group configuration on the local router to 1.

B.

Change the HSRP virtual address on the local router to 10.1.1.1.

C.

Change the HSRP virtual address on the remote router to 10.1.1.1.

D.

Change the HSRP group configuration on the remote router to 1.

Full Access
Question # 192

Refer to the exhibit.

An engineer must deny Telnet traffic from the loopback interface of router R3 to the loopback interface of router R2 during the weekend hours. All other traffic between the loopback interfaces of routers R3 and R2 must be allowed at all times. Which command accomplish this task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 193

Refer to the exhibit. Which set of commands on router r R1 Allow deterministic translation of private hosts PC1, PC2, and PC3 to addresses in the public space?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 194

Refer to the exhibit.

Which HTTP JSON response does the python code output give?

A.

NameError: name 'json' is not defined

B.

KeyError 'kickstart_ver_str'

C.

7.61

D.

7.0(3)I7(4)

Full Access
Question # 195

Drag and drop the wireless elements on the left to their definitions on the right.

Full Access
Question # 196

Which data is properly formatted with JSON?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 197

Refer to the exhibit. The connecting between SW1 and SW2 is not operational. Which two actions resolve the issue? (Choose two)

A.

configure switchport mode access on SW2

B.

configure switchport nonegotiate on SW2

C.

configure switchport mode trunk on SW2

D.

configure switchport nonegotiate on SW1

E.

configure switchport mode dynamic desirable on SW2

Full Access
Question # 198

Refer to the exhibit.

An engineer must create a configuration that executes the show run command and then terminates the session when user CCNP legs in. Which configuration change is required?

A.

Add the access-class keyword to the username command

B.

Add the access-class keyword to the aaa authentication command

C.

Add the autocommand keyword to the username command

D.

Add the autocommand keyword to the aaa authentication command

Full Access
Question # 199

Which two mechanisms are available to secure NTP? (Choose two.)

A.

IP prefix list-based

B.

IPsec

C.

TACACS-based authentication

D.

IP access list-based

E.

Encrypted authentication

Full Access
Question # 200

In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC?

A.

Layer 3

B.

inter-xTR

C.

auto anchor

D.

fast roam

Full Access
Question # 201

Which deployment option of Cisco NGFW provides scalability?

A.

tap

B.

clustering

C.

inline tap

D.

high availability

Full Access
Question # 202

Refer to the exhibit.

Which configuration change ensures that R1 is the active gateway whenever it is in a functional state for the 172.30.110.0724 network?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 203

Refer to the exhibit.

On which interfaces should VRRP commands be applied to provide first hop redundancy to PC-01 and PC-02?

A.

G0/0 and G0/1 on Core

B.

G0/0 on Edge-01 and G0/0 on Edge-02

C.

G0/1on Edge-01 and G0/1 on Edge-02

D.

G0/0 and G0/1 on ASW-01

Full Access
Question # 204

An engineer must configure the strongest password authentication to locally authenticate on a router. Which configuration must be used?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 205

What is one primary REST security design principle?

A.

fail-safe defaults

B.

password hash

C.

adding a timestamp in requests

D.

OAuth

Full Access
Question # 206

An engineer must create an EEM script to enable OSPF debugging in the event the OSPF neighborship goes down. Which script must the engineer apply?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 207

What occurs when a high bandwidth multicast stream is sent over an MVPN using Cisco hardware?

A.

The traffic uses the default MDT to transmit the data only if it isa (S,G) multicast route entry

B.

A data MDT is created to if it is a (*, G) multicast route entries

C.

A data and default MDT are created to flood the multicast stream out of all PIM-SM neighbors.

D.

A data MDT is created to allow for the best transmission through the core for (S, G) multicast route entries.

Full Access
Question # 208

Refer to the exhibit:

An engineer configures VRRP and issues the show commands to verify operation. What does the engineer confirm about VRRP group 1 from the output?

A.

There is no route to 10.10.1.1/32 in R2’s routing table

B.

If R1 reboots, R2 becomes the master virtual router until R2 reboots

C.

Communication between VRRP members is encrypted using MD5

D.

R1 is primary if 10.10.1.1/32 is in its routing table

Full Access
Question # 209

Drag and drop the descriptions from the left onto the routing protocol they describe on the right.

Full Access
Question # 210

An engineer is configuring a new SSID to present users with a splash page for authentication. Which WLAN Layer 3 setting must be configured to provide this functionally?

A.

CCKM

B.

WPA2 Policy

C.

Local Policy

D.

Web Policy

Full Access
Question # 211

In a Cisco SD-WAN solution, how Is the health of a data plane tunnel monitored?

A.

with IP SLA

B.

ARP probing

C.

using BFD

D.

with OMP

Full Access
Question # 212

A network administrator is implementing a routing configuration change and enables routing debugs to track routing behavior during the change. The logging output on the terminal is interrupting the command typing process. Which two actions can the network administrator take to minimize the possibility of typing commands incorrectly? (Choose two.)

A.

Configure the logging synchronous global configuration command

B.

Configure the logging delimiter feature

C.

Configure the logging synchronous command under the vty

D.

Press the TAB key to reprint the command in a new line

E.

increase the number of lines on the screen using the terminal length command

Full Access
Question # 213

What is a characteristic of Cisco DNA Northbound APIs?

A.

They simplify the management of network infrastructure devices.

B.

They enable automation of network infrastructure based on intent.

C.

They utilize RESTCONF.

D.

They utilize multivendor support APIs.

Full Access
Question # 214

Refer to the exhibit.

An engineer configures OSPF and wants to verify the configuration Which configuration is applied to this device?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 215

A vulnerability assessment highlighted that remote access to the switches is permitted using unsecure and unencrypted protocols Which configuration must be applied to allow only secure and reliable remote access for device administration?

A.

line vty 0 15

login local

transport input none

B.

line vty 0 15

login local

transport input telnet ssh

C.

line vty 0 15

login local

transport input ssh

D.

line vty 0 15

login local

transport input all

Full Access
Question # 216

Refer to the exhibit.

What does the output confirm about the switch's spanning tree configuration?

A.

The spanning-tree mode stp ieee command was entered on this switch

B.

The spanning-tree operation mode for this switch is IEEE.

C.

The spanning-tree operation mode for this switch is PVST+.

D.

The spanning-tree operation mode for this switch is PVST

Full Access
Question # 217

What is a benefit of Type 1 hypervisors?

A.

Administrators are able to load portable virtual machine packages in OVA or QCOW2 formats.

B.

Network engineers are able to create virtual networks o interconnect virtual machines in Layer 2 topologies

C.

Operators are able to leverage orchestrators to manage workloads that run on multiple Type 1 hypervisors

D.

Storage engineers are able to leverage VMDK files to provide storage to virtual machine.

Full Access
Question # 218

How are map-register messages sent in a LISP deployment?

A.

egress tunnel routers to map resolvers to determine the appropriate egress tunnel router

B.

ingress tunnel routers to map servers to determine the appropriate egress tunnel router

C.

egress tunnel routers to map servers to determine the appropriate egress tunnel router

D.

ingress tunnel routers to map resolvers to determine the appropnate egress tunnel router

Full Access
Question # 219

An administrator must enable Telnet access to Router X using the router username and password database for authentication. Which configuration should be applied?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 220

A network is being migrated from IPV4 to IPV6 using a dual-stack approach. Network management is already 100% IPV6 enabled. In a dual-stack network with two dual-stack NetFlow collections, how many flow exporters are needed per network device in the flexible NetFlow configuration?

A.

1

B.

2

C.

4

D.

8

Full Access
Question # 221

Which antenna type should be used for a site-to-site wireless connection?

A.

Omnidirectional

B.

dipole

C.

patch

D.

Yagi

Full Access
Question # 222

Refer to the exhibit.

Which privilege level is assigned to VTY users?

A.

1

B.

7

C.

13

D.

15

Full Access
Question # 223

How cloud deployments differ from on-prem deployments?

A.

Cloud deployments require longer implementation times than on-premises deployments

B.

Cloud deployments are more customizable than on-premises deployments.

C.

Cloud deployments require less frequent upgrades than on-premises deployments.

D.

Cloud deployments have lower upfront costs than on-premises deployments.

Full Access
Question # 224

AN engineer is implementing MPLS OAM to monitor traffic within the MPLS domain. Which action must the engineer perform to prevent from being forwarded beyond the service provider domain when the LSP is down?

A.

Disable IP redirects only on outbound interfaces

B.

Implement the destination address for the LSP echo request packet in the 127.x.y.z/8 network

C.

Disable IP redirects on all ingress interfaces

D.

Configure a private IP address as the destination address of the headend router of Cisco MPLS TE.

Full Access
Question # 225

Drag and drop the LISP components on the left to their descriptions on the right. Not all options are used.

Full Access
Question # 226

Drag and drop the characteristics from the left onto the infrastructure deployment models on the right.

Full Access
Question # 227

Drag and drop the characteristics from the left onto the deployment models on the right.

Full Access
Question # 228

What does the number in an NTP stratum level represent?

A.

The number of hops it takes to reach the master time server.

B.

The number of hops it takes to reach the authoritative time source.

C.

The amount of offset between the device clock and true time.

D.

The amount of drift between the device clock and true time.

Full Access
Question # 229

Refer to the exhibit.

What is the result of the API request?

A.

The "params" variable sends data fields to the network appliance.

B.

The native interface information is read from the network appliance.

C.

The Information for all interfaces is read from the network appliance.

D.

The "params" variable reads data fields from the network appliance

Full Access
Question # 230

Refer to the exhibit. An attacker can advertise OSPF fake routes from 172.16.20.0 network to the OSPF domain and black hole traffic. Which action must be taken to avoid this attack and still be able to advertise this subnet into OSPF?

A.

Configure 172.16.20.0 as a stub network.

B.

Apply a policy to filter OSPF packets on R2.

C.

Configure a passive Interface on R2 toward 172.16.20.0.

D.

Configure graceful restart on the 172.16.20.0 interface.

Full Access
Question # 231

What is one benefit of adopting a data modeling language?

A.

augmenting management process using vendor centric actions around models

B.

refactoring vendor and platform specific configurations with widely compatible configurations

C.

augmenting the use of management protocols like SNMP for status subscriptions

D.

deploying machine-friendly codes to manage a high number of devices

Full Access
Question # 232

Refer to the exhibit.

An engineer must allow R1 to advertise the 192 168.1 0/24 network to R2 R1 must perform this action without sending OSPF packets to SW1 Which command set should be applied?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 233

In a Cisco SD-Access wireless architecture which device manages endpoint ID to edge node bindings?

A.

fabric control plane node

B.

fabric wireless controller

C.

fabric border node

D.

fabric edge node

Full Access
Question # 234

Refer to the exhibit. A network engineer checks connectivity between two routers. The engineer can ping the remote endpoint but cannot see an ARP entry. Why is there no ARP entry?

A.

The ping command must be executed in the global routing table.

B.

Interface FastEthernet0/0 Is configured in VRF CUST-A, so the ARP entry is also in that VRF.

C.

When VRFs are used. ARP protocol must be enabled In each VRF.

D.

When VRFs are used. ARP protocol is disabled in the global routing table.

Full Access
Question # 235

Which function does a fabric AP perform in a cisco SD-access deployment?

A.

It updates wireless clients' locations in the fabric

B.

It connects wireless clients to the fabric.

C.

It manages wireless clients' membership information in the fabric

D.

It configures security policies down to wireless clients in the fabric.

Full Access
Question # 236

By default, which virtual MAC address Goes HSRP group 25 use?

A.

05:5c:5e:ac:0c:25

B.

04:16:6S:96:1C:19

C.

00:00:0c:07:ac:19

D.

00:00:0c:07:ac:25

Full Access
Question # 237

Refer to the exhibit.

An engineer must configure an ERSPAN session with the remote end of the session 10.10.0.1. Which commands must be added to complete the configuration?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 238

what is a benefit of using a Type 2 hypervisor instead of a Type 1 hypervisor?

A.

better application performance

B.

Improved security because the underlying OS is eliminated

C.

Improved density and scalability

D.

ability to operate on hardware that is running other OSs

Full Access
Question # 239

Refer to the exhibit.

What is the effect of introducing the sampler feature into the Flexible NetFlow configuration on the router?

A.

NetFlow updates to the collector are sent 50% less frequently.

B.

Every second IPv4 packet is forwarded to the collector for inspection.

C.

CPU and memory utilization are reduced when compared with what is required for full NetFlow.

D.

The resolution of sampling data increases, but it requires more performance from the router.

Full Access
Question # 240

Which function does a fabric wireless LAN controller perform In a Cisco SD-Access deployment?

A.

manages fabric-enabled APs and forwards client registration and roaming information to the Control Plane Node

B.

coordinates configuration of autonomous nonfabric access points within the fabric

C.

performs the assurance engine role for both wired and wireless clients

D.

is dedicated to onboard clients in fabric-enabled and nonfabric-enabled APs within the fabric

Full Access
Question # 241

A large campus network has deployed two wireless LAN controllers to manage the wireless network. WLC1 and WLC2 have been configured as mobility peers. A client device roams from AP1 on WLC1 to AP2 on WLC2, but the controller's client interfaces are on different VLANs. How do the wireless LAN controllers handle the inter-subnet roaming?

A.

WLC1 marks me diem with an anchor entry In Its own database. The database entry is copied to the new controller and marked with a foreign entry on VVLC2.

B.

WLC2 marks the client with an anchor entry In Its own database. The database entry Is copied to the new controller and marked with a foreign entry on WLC1

C.

WLCl marks the client with a foreign entry in its own database. The database entry is copied to the new controller and marked with an anchor entry on WLC2.

D.

WLC2 marks the client with a foreign entry In its own database. The database entry Is copied to the new controller and marked with an anchor entry on WLC1.

Full Access
Question # 242

Refer to the exhibit.

An engineer entered the command no spanning-tree bpduguard enable on interface Fa 1/0/7. What is the effect of this command on Fa 1/0/7?

A.

It remains in err-disabled state until the shutdown/no shutdown command is entered in the interface configuration mode.

B.

It remains in err-disabled state until the errdisable recovery cause failed-port-state command is entered in the global configuration mode.

C.

It remains in err-disabled state until the no shutdown command is entered in the interface configuration mode.

D.

It remains in err-disabled state until the spanning-tree portfast bpduguard disable command is entered in the interface configuration mode.

Full Access
Question # 243

Refer to the exhibit. Which python code parses the response and prints “18:32:21.474 UTC sun Mar 10 2019?

A.

print(response['resut'][0||'simple_time']}

B.

print(response[result']['body']['simple_time']}

C.

print(response['body']['simple_time']}

D.

print(response[jresult']['body']['simple_time']}

Full Access
Question # 244

Refer to the exhibit .

Which command must be configured for RESTCONF to operate on port 8888?

A.

ip http port 8888

B.

restconf port 8888

C.

ip http restconf port 8888

D.

restconf http port 8888

Full Access
Question # 245

Refer to the exhibit. What is achieved by this code?

A.

It unshuts the loopback interface

B.

It renames the loopback interface

C.

It deletes the loopback interface

D.

It displays the loopback interface

Full Access
Question # 246

Which type of tunnel Is required between two WLCs to enable Intercontroller roaming?

A.

mobility

B.

LWAPP

C.

CAPWAP

D.

iPsec

Full Access
Question # 247

By default, which virtual MAC address does HSRP group 32 use?

A.

00:5e:0c:07:ac:20

B.

04:18:20:83:2e:32

C.

05:5e:5c:ac:0c:32

D.

00:00:0c:07:ac:20

Full Access
Question # 248

Refer to the exhibit.

An engineer must set up connectivity between a campus aggregation layer and a branch office access layer. The engineer uses dynamic trunking protocol to establish this connection, however, management traffic on VLAN1 is not passing. Which action resolves the issue and allow communication for all configured VLANs?

A.

Allow all VLANs on the trunk links

B.

Disable Spanning Tree for the native VLAN.

C.

Configure the correct native VLAN on the remote interface

D.

Change both interfaces to access ports.

Full Access
Question # 249

Refer the exhibit.

Which configuration elects SW4 as the root bridge for VLAN 1 and puts G0/2 on SW2 into a blocking state?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 250

How does NETCONF YANG represent data structures?

A.

as strict data structures denned by RFC 6020

B.

in an XML tree format

C.

in an HTML format

D.

as modules within a tree

Full Access
Question # 251

Refer to the exhibit.

Which commands are required to allow SSH connection to the router?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 252

What is the wireless received signal strength indicator?

A.

The value given to the strength of the wireless signal received compared to the noise level

B.

The value of how strong the wireless signal Is leaving the antenna using transmit power, cable loss, and antenna gain

C.

The value of how much wireless signal is lost over a defined amount of distance

D.

The value of how strong a tireless signal is receded, measured in dBm

Full Access