Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Refer to the exhibit An engineer is troubleshooting an issue with non-Wi-Fi interference on the 5-GHz band The engineer has enabled Cisco CleanAir and set the appropriate traps, but the AP does not change the channel when it detects significant interference Which action will resolve the issue?

A.

Enable the Avoid Persistent Non-WiFi Interference option

B.

Disable the Avoid Foreign AP Interference option.

C.

Change the DCA Sensitivity option to High

D.

Enable the Event Driven Radio Resource Management option

Full Access
Question # 5

A response code of 404 is received while using the REST API on Cisco UNA Center to POST to this URI.

/dna/intent/api/v1 /template-programmer/project

What does the code mean?

A.

The client made a request a resource that does not exist.

B.

The server has not implemented the functionality that is needed to fulfill the request.

C.

The request accepted for processing, but the processing was not completed.

D.

The POST/PUT request was fulfilled and a new resource was created, Information about the resource is in the response body.

Full Access
Question # 6

Refer to the exhibit.

Which action must be taken to configure a WLAN for WPA2-AES with PSK and allow only 802.11r-capable clients to connect?

A.

Enable PSK and FT + PSK.

B.

Enable Fast Transition and FT + PSK.

C.

Enable Fast Transition and PSK.

D.

Change Fast Transition to Adaptive Enabled and enable FT * PSK.

Full Access
Question # 7

Drag and drop the configuration management tools from the left onto the configuration styles they use on the right

Full Access
Question # 8

Which next generation firewall feature supports separate security services for multiple departments?

A.

state sharing mode to .trade the user data sessions and replication to the neighbor firewall using a failover link

B.

Layer 3 mode with resource tracking capabilities and automatic configuration synchronization between the nodes and security zones

C.

multicontext mode with specific logical or physical interface allocation within each context and grouped into security zones

D.

virtual switch mode to provide traffic inspection capabilities for the flows entering the firewall and dropping packets based on policy configuration

Full Access
Question # 9

Which technology is the Cisco SD-Access control plane based on?

A.

IS-IS

B.

LISP

C.

Cisco TrustSec

D.

VXLAN

Full Access
Question # 10

Which LISP device is responsible for publishing EID-to-RLOC mappings for a site?

A.

ETR

B.

MS

C.

ITR

D.

MR

Full Access
Question # 11

Which antenna type should be used for a site-to-site wireless connection?

A.

omnidirectional

B.

patch

C.

dipole

D.

Yagi

Full Access
Question # 12

In a Cisco SD-Access solution, which protocol is used by an extended node to connect to a single edge node?

A.

VXIAN

B.

IS-IS

C.

802.1

D.

CTS

Full Access
Question # 13

Which protocol is used by vmanage to push centralized policies to vsmart controllers?

A.

NETCONF

B.

TLS

C.

STUN

D.

OMP

Full Access
Question # 14

Which consideration must be made when using BFD in a network design?

A.

BFD requires a FHRP in order to provide sub second host failover.

B.

BFD can be deployed without any IP routing protocols being configured.

C.

NSF and graceful restart must be enabled on all participating routers.

D.

Cisco Express forwarding and IP routing must be enabled on all participating routers.

Full Access
Question # 15

Which task Is mandatory when provisioning a device through the plug-and-play workflow in Cisco DNA Center?

A.

site assignment

B.

slack serial number assignment

C.

golden image upgrade

D.

template configuration application

Full Access
Question # 16

Whichtwo benefits result from a network design mat uses small and repeatable sections? (Choose two.)

A.

lower monitoring requirements

B.

low latency

C.

scalability

D.

quick failure isolation

E.

improved throughput

Full Access
Question # 17

What are two of benefits of using VXLAN? (Choose two.)

A.

It allows for an unlimited number of segments.

B.

It has fewer devices to manage.

C.

It uses all available Layer 3 paths in the underlying network.

D.

It allows multi-tenanted segmentation.

E.

It uses a MAC in IP/TCP encapsulation technique.

Full Access
Question # 18

What is a characteristic of a Type 2 hypervisor?

A.

quick deployment

B.

ideal for data center

C.

complicated deployment

D.

referred to as bare-metal

Full Access
Question # 19

Refer to the exhibit. Which python code snippet prints the descriptions of disabled interface only?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 20

What is the calculation that is used to measure the radiated power of a signal after it has gone through the radio, antenna cable, and antenna?

A.

EIRP

B.

mW

C.

dBm

D.

dBi

Full Access
Question # 21

Full Access
Question # 22

Full Access
Question # 23

Which method ensures the confidentiality of data exchanged over a REST API?

A.

Use TLS to secure the underlying HTTP session.

B.

Use me POST method Instead or URL-encoded GET to pass parameters.

C.

Deploy digest-based authentication to protect the access to the API.

D.

Encode sensitive data using Base64 encoding.

Full Access
Question # 24

Full Access
Question # 25

Full Access
Question # 26

Full Access
Question # 27

Full Access
Question # 28

Full Access
Question # 29

Full Access
Question # 30

Full Access
Question # 31

OR

Full Access
Question # 32

Full Access
Question # 33

Full Access
Question # 34

Full Access
Question # 35

Full Access
Question # 36

Full Access
Question # 37

Full Access
Question # 38

Full Access
Question # 39

Full Access
Question # 40

Full Access
Question # 41

Full Access
Question # 42

Full Access
Question # 43

Full Access
Question # 44

Full Access
Question # 45

Full Access
Question # 46

Full Access
Question # 47

Full Access
Question # 48

Full Access
Question # 49

Full Access
Question # 50

Full Access