Which Python code snippet must be added to the script to save the returned configuration as a JSON-formatted file?
A)
B)
C)
D)
Refer to the exhibit.
What is the effect of these commands on the BR and HQ tunnel interfaces?
In a Cisco SD-WAN solution, which two functions are performed by OMP? (Choose two.)
Refer to the exhibit. An engineer attempts to configure a router on a stick to route packets between Clients, Servers, and Printers; however, initial tests show that this configuration is not working. Which command set resolves this issue?
A)
B)
C)
D)
Refer to the exhibit.
An engineer attempts to bundle interface Gi0/0 into the port channel, but it does not function as expected. Which action resolves the issue?
A network engineer configures a WLAN controller with increased security for web access. There is IP connectivity with the WLAN controller, but the engineer cannot start a management session from a web browser. Which action resolves the issued
Refer to the exhibit. A network engineer must load balance traffic that comes from the NAT Router and is destined to 10.10.110.10, to several FTP servers. Which two commands sets should be applied? (Choose two).
A)
B)
C)
D)
E)
Which protocol is responsible for data plane forwarding in a Cisco SD-Access deployment?
A company requires a wireless solution to support its mam office and multiple branch locations. All sites have local Internet connections and a link to the main office lor corporate connectivity. The branch offices are managed centrally. Which solution should the company choose?
Drag and drop the characteristics from the left to the table types on the right.
Refer to the exhibit.
Which configuration must be applied to the HQ router to set up a GRE tunnel between the HQ and BR routers?
A)
B)
C)
D)
Refer to the exhibit.
Cisco DNA Center has obtained the username of the client and the multiple devices that the client is using on the network. How is Cisco DNA Center getting these context details?
Refer to the exhibit. An engineer has configured an IP SLA for UDP echo’s. Which command is needed to start the IP SLA to test every 30 seconds and continue until stopped?
Refer to the exhibit.
An engineer must allow all users in the 10.2.2.0/24 subnet to access the Internet. To conserve address space the public Interface address of 209 165 201.1 must be used for all external communication. Which command set accomplishes these requirements?
A)
B)
C)
D)
Refer to the exhibit.
After configuring the BGP network, an engineer verifies that the path between Servers and Server2 Is functional. Why did RouterSF choose the route from RouterDAL instead of the route from RouterCHI?
Which feature Is used to propagate ARP broadcast, and link-local frames across a Cisco SD-Access fabric to address connectivity needs for silent hosts that require reception of traffic to start communicating?
Refer to the exhibit.
An engineer is designing a guest portal on Cisco ISE using the default configuration. During the testing phase, the engineer receives a warning when displaying the guest portal. Which issue is occurring?
Refer to the exhibit. A network operator is attempting to configure an IS-IS adjacency between two routers, but the adjacency cannot be established. To troubleshoot the problem, the operator collects this debugging output. Which interfaces are misconfigured on these routers?
What is an emulated machine that has dedicated compute memory, and storage resources and a fully installed operating system?
Which two features does the Cisco SD-Access architecture add to a traditional campus network? (Choose two.)
Refer to the exhibit.
An engineer configures routing between all routers and must build a configuration to connect R1 to R3 via a GRE tunnel Which configuration must be applied?
A)
B)
C)
D)
Refer to the exhibit.
Which command set must be applied on R1 to establish a BGP neighborship with R2 and to allow communication from R1 to reach the networks?
A)
B)
C)
D)
Drag and drop the Cisco SD-Access solution areas from the left onto the protocols they use on the right.
Which protocol is implemented to establish secure control plane adjacencies between Cisco SD-WAN nodes?
Drag and drop the automation characteristics from the left onto the appropriate tools on the right.
Which option must be used to support a WLC with an IPv6 management address and 100 Cisco Aironet 2800 Series access points that will use DHCP to register?
Which option works with a DHCP server to return at least one WLAN management interface IP address during the discovery phase and is dependent upon the VCI of the AP?
Which method displays text directly into the active console with a synchronous EEM applet policy?
Refer to the exhibit.
How should the script be completed so that each device configuration is saved into a JSON-formatted file under the device name?
A)
B)
C)
D)
What is a characteristic of the overlay network in the Cisco SD-Access architecture?
Which two solutions are used for backing up a Cisco DNA Center Assurance database? (Choose two)
Drag and drop the snippets onto the blanks within the code to construct a script that adds a prefix list to a route map and sets the local preference. Not all options are used
Which two characteristics apply to the endpoint security aspect of the Cisco Threat Defense architecture? (Choose two.)
Drag and drop the characteristics from the left onto the technology types on the right.
A network engineer is configuring OSPF on a router. The engineer wants to prevent having a route to 177.16.0.0/16 learned via OSPF. In the routing table and configures a prefix list using the command ip prefix-list OFFICE seq S deny 172.16.0.0/16. Winch two identical configuration commands must be applied to accomplish the goal? (Choose two.)
Refer to the exhibit. Which configuration must be added to enable GigabitEthemet 0/1 to participate in OSPF?
Refer to the exhibit. A network engineer must be notified when a user switches to configuration mode. Which script should be applied to receive an SNMP trap and a critical-level log message?
A)
B)
C)
D)
Refer to The exhibit.
Assuming that R1 is a CE router, which VRF is assigned to Gi0/0 on R1?
An engineer must configure a new loopback Interface on a router and advertise the interface as a fa4 in OSPF. Which command set accomplishes this task?
A)
B)
C)
D)
Refer to the exhibit.
An engineer must send the 172.16.2.0 /24 user traffic to a packet capture tool to troubleshoot an issue. Which action completes the configuration?
Refer to the exhibit Users cannot reach the web server at 192.168 100 1. What is the root cause for the failure?
Drag and drop the descriptions of the VSS technology from the left to the right. Not all options are used.
Refer to the exhibit.
All switches are configured with the default port priority value. Which two commands ensure that traffic from PC1 is forwarded over Gi1/3 trunk port between DWS1 and DSW2? (Choose two)
Refer to the Exhibit.
An engineer is installing a new pair of routers in a redundant configuration. When checking on the standby status of each router the engineer notices that the routers are not functioning as expected. Which action will resolve the configuration error?
Based on the router's API output in JSON format below, which Python code will display the value of the "hostname" key?
A)
B)
C)
D)
What does the LAP send when multiple WLCs respond to the CISCO_CAPWAP-CONTROLLER.localdomain hostname during the CAPWAP discovery and join process?
Why would a small or mid-size business choose a cloud solution over an on-premises solution?
Why is an AP joining a different WLC than the one specified through option 43?
Refer to the exhibit.
A GRE tunnel has been created between HO and BR routers. What is the tunnel IP on the HQ router?
Refer to the exhibit. Router BRDR-1 is configured to receive the 0.0.0.0/0 and 172.17.1.0/24 network via BGP and advertise them into OSPF are 0. An engineer has noticed that the OSPF domain is receiving only the 172.17.1.0/24 route and default route 0.0.0.0/0 is still missing. Which configurating must engineer apply to resolve the problem?
Which action is performed by Link Management Protocol in a Cisco StackWise Virtual domain?
Refer to the exhibit.
An engineer must create a configuration that prevents R3from receiving the LSA about 172.16.1.4/32.Which configuration set achieves this goal?
What is provided by the Stealthwatch component of the Cisco Cyber Threat Defense solution?
In a Cisco SD-Access solution, which protocol is used by an extended node to connect to a single edge node?
Refer to the exhibit.
An engineer must configure HSRP for VLAN 1000 on SW2. The secondary switch must immediately take over the role of active router If the interlink with the primary switch fails. Which command set completes this task?
A)
B)
C)
D)
Refer to the exhibit.
The traceroute fails from R1 to R3. What is the cause of the failure?
An engineer must configure GigabitEthernet 0/0 for VRRP group 65. The rouler must assume the primary rote when it has the highest priority in the group. Which command set must be applied?
A)
B)
C)
D)
A customer wants to provide wireless access to contractors using a guest portal on Cisco ISE. The portal Is also used by employees A solution is implemented, but contractors receive a certificate error when they attempt to access the portal Employees can access the portal without any errors. Which change must be implemented to allow the contractors and employees to access the portal?
A network engineer is adding an additional 10Gps link to an exiting 2x10Gps LACP-based LAG to augment its capacity. Network standards require a bundle interface to be taken out of service if one of its member links goes down, and the new link must be added with minimal impact to the production network. Drag and drop the tasks that the engineer must perform from the left into the sequence on the right. Not all options are used.
Simulation 02
Configure HSRP between DISTRO-SW1 and DISTRO-SW2 on VLAN 100 for hosts connected to ACCESS-SW1 to achieve these goals:
1. Configure group number 1 using the virtual IP address of 192.168.1.1/24.
2. Configure DlSTRO-SW1 as the active router using a priority value of 110 and DISTRO-SW2 as the standby router.
3. Ensure that DISTRO-SW2 will take over the active role when DISTRO-SW1 goes down, and when DISTRO-SW1 recovers, it automatically resumes the active role.
DISTRO-SW2
Which free application has the ability to make REST calls against Cisco DNA Center?
Refer to the exhibit.
What does the response "204 No Content mean for the REST API request?
Which hypervisor requires a host OS to run and is not allowed to directly access the hosts hardware and resources?
Which of the following attacks becomes more effective because of global leakages of users' passwords?
A wireless network engineer must configure a WPA2+WPA3 policy with the Personal security type. Which action meets this requirement?
Which tool is used in Cisco DNA Center to build generic configurations that are able to be applied on device with similar network settings?
Refer to the exhibit. What is the cause of the communication failure between R1 and R4?
An engineer must configure a new WLAN that allows a user to enter a passphrase and provides forward secrecy as a security measure. Which Layer 2 WLAN configuration is required on the Cisco WLC?
Which collection contains the resources to obtain a list of fabric nodes through the vManage API?
An engineer must contigure a rou'.er to allow users to run specHic configuration commands by validating the user against the router database. Which configuration must be applied?
Which OSPF networks types are compatible and allow communication through the two peering devices?
A customer requests a design that includes GLBP as the FHRP The network architect discovers that the members of the GLBP group have different throughput capabilities Which GLBP load balancing method supports this environment?
Refer to the exhibit. Which command is required to verify NETCONF capability reply messages?
A client device roams between wireless LAN controllers that are mobility peers, Both controllers have dynamic interface on the same client VLAN which type of roam is described?
Refer to the exhibit.
An engineer must configure and validate a CoPP policy that allows the network management server to monitor router R1 via SNMP while protecting the control plane. Which two commands or command sets must be used? (Choose two.)
Refer to the exhibit.
Which action must be taken to configure a WLAN for WPA2-AES with PSK and allow only 802.l1r-capable clients to connect?
Refer to the exhibit.
Which statement is needed to complete the EEM applet and use the Tel script to store the backup file?
A company hires a network architect to design a new OTT wireless solution within a Cisco SD-Access Fabric wired network. The architect wants to register access points to the WLC to centrally switch the traffic. Which AP mode must the design include?
Refer to the exhibit.
These commands have been added to the configuration of a switch Which command flags an error if it is added to this configuration?
Refer to Ihe exhibit. An engineer must update the existing configuation to achieve these resu ts:
• Only administrators from the 192.168 1.0.'?4 subnet can access the vty lines.
* Access to the vty lines using clear-text protocols is prohibited.
Which command set should be appled?
A)
B)
C)
D)
Refer to the exhibit. Which configuration is required to summarize the Area 2 networks that are advertised to Area 0?
Where in Cisco DNA Center is documentation of each API call, organized by its functional area?
A switch is attached to router R1 on its gig 0/0 interface. Fort security reasons, you want to prevent R1 from sending OSPF hellos to the switch. Which command should be enabled to accomplish this?
Drag and drop the characteristics from the left onto the deployment model on the right.
Refer to the exhibit. Which configuration set implements Control plane Policing for SSH and Telnet?
Drag and drop the code snippets from the bottom onto the blanks in the script to convert a Python object into a JSON string. Not all options are used.
An engineer must use flexible NetFlow on a group of switches. To prevent overloading of the flow collector, if the flow is idle for 20 seconds, the flow sample should be exported. Which command set should be applied?
A)
B)
C)
D)
Refer to the exhibit.
A network engineer issues the debug command while troubleshooting a network issue. What does the output confirm?
An engineer plans to use Python to convert text files that contain device information lo JSON. Drag and drop the code snippets from the bottom onto the blanks in the code to construct the request. Not all options are used.
Which two actions, when applied in the LAN network segment, will facilitate Layer 3 CAPWAP discovery for lightweight AP? Choose two.)
Drag and drop the characteristics from the left onto the orchestration tool classifications on the right.
Which configuration protects the password for the VTY lines against over-the-shoulder attacks?
Which QoS feature uses the IP Precedence bits in the ToS field of the IP packet header to partition traffic into different priority levels?
Which router is elected the IGMP Querier when more than one router is in the same LAN segment?
Which configuration enables a device to be configured via NETCONF over SSHv2?
A)
B)
C)
D)
Which security measure mitigates a man-in-the-middle attack of a REST API?
Refer to the exhibit.
An engineer configures a trunk between SW1 and SW2 but tagged packets are not passing. Which action fixes the issue?
In a wireless network environment, what is calculated using the numerical values of the transmitter power level, cable loss, and antenna gain?
An engineer receives a report that an application exhibits poor performance. On the switch where the server is connected, this syslog message is visible:
SW_MATM4-MACFLAP_N0HF: Host 0054.3831.8253 in vlan 14 is flapping between port GUAM and port Gi1/0/2.
What is causing the problem?
If AP power level is increased from 25 mW to 100 mW. what is the power difference in dBm?
Based on the router's API output In JSON format below, which Python code will display the value of the 'role' key?
Refer to the exhibit.
Assuming all links are functional, which path does PC1 take to reach DSW1?
Drag the drop the description from the left onto the routing protocol they describe on the right.
Which of the following fiber connector types is the most likely to be used on a network interface card?
Which outbound access list, applied to the WAN interface of a router, permits all traffic except for http traffic sourced from the workstation with IP address 10.10.10.1?
A)
B)
C)
D)
Refer to the exhibit. A network engineer must configure a password expiry mechanism on the gateway router for all local passwords to expire after 60 days. What is required to complete this task?
Which measurement is used from a post wireless survey to depict the cell edge of the access points?
Drag and drop the Qos mechanisms from the left to the correct descriptions on the right
Refer to the exhibit. A network engineer troubleshoots an issue with the port channel between SW1 and SW2. which command resolves the issue?
A)
B)
C)
D)
After a redundant route processor failure occurs on a Layer 3 device, which mechanism allows for packets to be forwarded from a neighboring router based on the most recent tables?
Which command set configures RSPAN to capture outgoing traffic from VLAN 3 on interface GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface?
A)
B)
C)
D)
Refer to the exhibit Which single security feature is recommended to provide Network Access Control in the enterprise?
Refer to the exhibit.
An engineer configures monitoring on SW1 and enters the show command to verify operation. What does the output confirm?
How does an on-premises infrastructure compare to a cloud infrastructure?
In a Cisco SD-Access solution, what is the role of the Identity Services Engine?
A company has an existing Cisco 5520 HA cluster using SSO. An engineer deploys a new single Cisco Catalyst 9800 WLC to test new features. The engineer successfully configures a mobility tunnel between the 5520 cluster and 9800 WLC. Client connected to the corporate WLAN roam seamlessly between access points on the 5520 and 9800 WLC. After a failure on the primary 5520 WLC, all WLAN services remain functional; however, Client roam between the 5520 and 9800 controllers without dropping their connection. Which feature must be configured to remedy the issue?
Refer to the exhibit.
What are two effects of this configuration? (Choose two.)
Which AP mode allows an engineer to scan configured channels for rogue access points?
Drag and drop the virtual components from the left onto their deceptions on the right.
Drag and drop the LISP components from the left onto the function they perform on the right. Not all options are used.
Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial?
Refer to the exhibit.
The EtherChannel between SW2 and SW3 is not operational which action resolves this issue?
Which component of the Cisco Cyber Threat Defense solution provides user and flow context analysis?
Wireless users report frequent disconnections from the wireless network. While troubleshooting a network engineer finds that after the user a disconnect, the connection re-establishes automatically without any input required. The engineer also notices these message logs .
Which action reduces the user impact?
Refer to the exhibit.
Which action resolves the EtherChannel issue between SW2 and SW3?
What is the function of a fabric border node in a Cisco SD-Access environment?
“HTTP/1.1 204 content” is returned when cur –I –x delete command is issued. Which situation has occurred?
An engineer has deployed a single Cisco 5520 WLC with a management IP address of 172.16.50.5/24. The engineer must register 50 new Cisco AIR-CAP2802I-E-K9 access points to the WLC using DHCP option 43. The access points are connected to a switch in VLAN 100 that uses the 172.16.100.0/24 subnet. The engineer has configured the DHCP scope on the switch as follows:
The access points are failing to join the wireless LAN controller. Which action resolves the issue?
What are two benefits of virtual switching when compared to hardware switching? (Choose two.)
Refer to the exhibit.
Security policy requires all idle-exec sessions to be terminated in 600 seconds. Which configuration achieves this goal?
An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:
Which two statements does the engineer use to explain these values to the customer? (Choose two)
Which two operational models enable an AP to scan one or more wireless channels for rouge access points and at the same time provide wireless services to clients? (Choose two.)
Refer to the exhibit. Which configuration change will force BR2 to reach 209 165 201 0/27 via BR1?
When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?
Refer to the exhibit.
The IP SLA is configured in a router. An engineer must configure an EEM applet to shut down the interface and bring it back up when there is a problem with the IP SLA. Which configuration should the engineer use?
Drag and drop the characteristics from the left onto the protocols they apply to on the right?
Running the script causes the output in the exhibit. Which change to the first line of the script resolves the error?
An engineer is concerned with the deployment of new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements?
Refer to the exhibit Drag and drop the snippets into the RESTCONF request to form the request that returns this response Not all options are used
Which design principle slates that a user has no access by default to any resource, and unless a resource is explicitly granted, it should be denied?
While configuring an IOS router for HSRP with a virtual IP of 10 1.1.1. an engineer sees this log message.
Which configuration change must the engineer make?
Refer to the exhibit.
An engineer must deny Telnet traffic from the loopback interface of router R3 to the loopback interface of router R2 during the weekend hours. All other traffic between the loopback interfaces of routers R3 and R2 must be allowed at all times. Which command accomplish this task?
A)
B)
C)
D)
Refer to the exhibit. Which set of commands on router r R1 Allow deterministic translation of private hosts PC1, PC2, and PC3 to addresses in the public space?
A)
B)
C)
D)
Refer to the exhibit.
Which HTTP JSON response does the python code output give?
Drag and drop the wireless elements on the left to their definitions on the right.
Refer to the exhibit. The connecting between SW1 and SW2 is not operational. Which two actions resolve the issue? (Choose two)
Refer to the exhibit.
An engineer must create a configuration that executes the show run command and then terminates the session when user CCNP legs in. Which configuration change is required?
In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC?
Refer to the exhibit.
Which configuration change ensures that R1 is the active gateway whenever it is in a functional state for the 172.30.110.0724 network?
A)
B)
C)
D)
Refer to the exhibit.
On which interfaces should VRRP commands be applied to provide first hop redundancy to PC-01 and PC-02?
An engineer must configure the strongest password authentication to locally authenticate on a router. Which configuration must be used?
An engineer must create an EEM script to enable OSPF debugging in the event the OSPF neighborship goes down. Which script must the engineer apply?
What occurs when a high bandwidth multicast stream is sent over an MVPN using Cisco hardware?
Refer to the exhibit:
An engineer configures VRRP and issues the show commands to verify operation. What does the engineer confirm about VRRP group 1 from the output?
Drag and drop the descriptions from the left onto the routing protocol they describe on the right.
An engineer is configuring a new SSID to present users with a splash page for authentication. Which WLAN Layer 3 setting must be configured to provide this functionally?
In a Cisco SD-WAN solution, how Is the health of a data plane tunnel monitored?
A network administrator is implementing a routing configuration change and enables routing debugs to track routing behavior during the change. The logging output on the terminal is interrupting the command typing process. Which two actions can the network administrator take to minimize the possibility of typing commands incorrectly? (Choose two.)
Refer to the exhibit.
An engineer configures OSPF and wants to verify the configuration Which configuration is applied to this device?
A)
B)
C)
D)
A vulnerability assessment highlighted that remote access to the switches is permitted using unsecure and unencrypted protocols Which configuration must be applied to allow only secure and reliable remote access for device administration?
Refer to the exhibit.
What does the output confirm about the switch's spanning tree configuration?
An administrator must enable Telnet access to Router X using the router username and password database for authentication. Which configuration should be applied?
A)
B)
C)
D)
A network is being migrated from IPV4 to IPV6 using a dual-stack approach. Network management is already 100% IPV6 enabled. In a dual-stack network with two dual-stack NetFlow collections, how many flow exporters are needed per network device in the flexible NetFlow configuration?
Which antenna type should be used for a site-to-site wireless connection?
AN engineer is implementing MPLS OAM to monitor traffic within the MPLS domain. Which action must the engineer perform to prevent from being forwarded beyond the service provider domain when the LSP is down?
Drag and drop the LISP components on the left to their descriptions on the right. Not all options are used.
Drag and drop the characteristics from the left onto the infrastructure deployment models on the right.
Drag and drop the characteristics from the left onto the deployment models on the right.
Refer to the exhibit. An attacker can advertise OSPF fake routes from 172.16.20.0 network to the OSPF domain and black hole traffic. Which action must be taken to avoid this attack and still be able to advertise this subnet into OSPF?
Refer to the exhibit.
An engineer must allow R1 to advertise the 192 168.1 0/24 network to R2 R1 must perform this action without sending OSPF packets to SW1 Which command set should be applied?
A)
B)
C)
D)
In a Cisco SD-Access wireless architecture which device manages endpoint ID to edge node bindings?
Refer to the exhibit. A network engineer checks connectivity between two routers. The engineer can ping the remote endpoint but cannot see an ARP entry. Why is there no ARP entry?
Refer to the exhibit.
An engineer must configure an ERSPAN session with the remote end of the session 10.10.0.1. Which commands must be added to complete the configuration?
A)
B)
C)
D)
what is a benefit of using a Type 2 hypervisor instead of a Type 1 hypervisor?
Refer to the exhibit.
What is the effect of introducing the sampler feature into the Flexible NetFlow configuration on the router?
Which function does a fabric wireless LAN controller perform In a Cisco SD-Access deployment?
A large campus network has deployed two wireless LAN controllers to manage the wireless network. WLC1 and WLC2 have been configured as mobility peers. A client device roams from AP1 on WLC1 to AP2 on WLC2, but the controller's client interfaces are on different VLANs. How do the wireless LAN controllers handle the inter-subnet roaming?
Refer to the exhibit.
An engineer entered the command no spanning-tree bpduguard enable on interface Fa 1/0/7. What is the effect of this command on Fa 1/0/7?
Refer to the exhibit. Which python code parses the response and prints “18:32:21.474 UTC sun Mar 10 2019?
Refer to the exhibit .
Which command must be configured for RESTCONF to operate on port 8888?
Which type of tunnel Is required between two WLCs to enable Intercontroller roaming?
Refer to the exhibit.
An engineer must set up connectivity between a campus aggregation layer and a branch office access layer. The engineer uses dynamic trunking protocol to establish this connection, however, management traffic on VLAN1 is not passing. Which action resolves the issue and allow communication for all configured VLANs?
Refer the exhibit.
Which configuration elects SW4 as the root bridge for VLAN 1 and puts G0/2 on SW2 into a blocking state?
A)
B)
C)
D)
Refer to the exhibit.
Which commands are required to allow SSH connection to the router?
A)
B)
C)
D)