Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

350-401 Exam Dumps - Implementing Cisco Enterprise Network Core Technologies (ENCOR)

Question # 4

In which two ways does TCAM differ from CAM? (Choose two.)

A.

CAM is used to make Layer 2 forwarding decisions, and TCAM is used for Layer 3 address lookups.

B.

The MAC address table is contained in CAM, and ACL and QoS Information Is stored in TCAM.

C.

CAM Is used by routers for IP address lookups, and TCAM is used to make Layer 2 forwarding decisions.

D.

CAM is used for software switching mechanisms, and TCAM is used for hardware switching mechanisms.

E.

The MAC address table Is contained in TCAM, and ACL and QoS information is stored in CAM.

Full Access
Question # 5

Refer the exhibit.

Which router is the designated router on the segment 192.168.0.0/24?

A.

This segment has no designated router because it is a nonbroadcast network type.

B.

This segment has no designated router because it is a p2p network type.

C.

Router Chicago because it has a lower router ID

D.

Router NewYork because it has a higher router ID

Full Access
Question # 6

How does CEF switching differ from process switching on Cisco devices?

A.

CEF switching saves memory by sorting adjacency tables in dedicate memory on the line cards, and process switching stores all tables in the main memory

B.

CEF switching uses adjacency tables built by the CDP protocol, and process switching uses the routing table

C.

CEF switching uses dedicated hardware processors, and process switching uses the main processor

D.

CEF switching uses proprietary protocol based on IS-IS for MAC address lookup, and process switching uses in MAC address table

Full Access
Question # 7

Refer to the exhibit.

An engineer must configure and validate a CoPP policy that allows the network management server to monitor router R1 via SNMP while protecting the control plane. Which two commands or command sets must be used? (Choose two.)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

F.

Option F

Full Access
Question # 8

Which solution do laaS service providers use to extend a Layer 2 segment across a Layer 3 network?

A.

VLAN

B.

VTEP

C.

VXLAN

D.

VRF

Full Access
Question # 9

What occurs when a high bandwidth multicast stream is sent over an MVPN using Cisco hardware?

A.

The traffic uses the default MDT to transmit the data only if it isa (S,G) multicast route entry

B.

A data MDT is created to if it is a (*, G) multicast route entries

C.

A data and default MDT are created to flood the multicast stream out of all PIM-SM neighbors.

D.

A data MDT is created to allow for the best transmission through the core for (S, G) multicast route entries.

Full Access
Question # 10

Which element enables communication between guest VMs within a virtualized environment?

A.

hypervisor

B.

vSwitch

C.

virtual router

D.

pNIC

Full Access
Question # 11

Refer to the exhibit.

An engineer must configure static NAT on R1 lo allow users HTTP access to the web server on TCP port 80. The web server must be reachable through ISP 1 and ISP 2. Which command set should be applied to R1 to fulfill these requirements?

A.

ip nat inside source static tcp 10.1.1.100 80 209.165.200.225 80 extendable

ip nat inside source static tcp 10.1.1.100 80 209.165.201.1 80 extendable

B.

ip nat inside source static tcp 10.1.1.100 80 209.165.200.225 80

ip nat inside source static tcp 10.1.1.100 80 209.165.201.1 80

C.

ip nat inside source static tcp 10.1.1.100 80 209.165.200.225 80

ip nat inside source static tcp 10.1.1.100 8080 209.165.201.1 8080

D.

ip nat inside source static tcp 10.1.1.100 80 209.165.200.225 80 no-alias

ip nat inside source static tcp 10.1.1.100 80 209.165.201.1 80 no-alias

Full Access
Question # 12

Refer to the exhibit.

CR2 and CR3 ate configured with OSPF. Which configuration, when applied to CR1. allows CR1 to exchange OSPF Information with CR2 and CR3 but not with other network devices or on new Interfaces that are added to CR1?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 13

Based on the router's API output in JSON format below, which Python code will display the value of the "hostname" key?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 14

Refer to the exhibit.

After configuring HSRP an engineer enters the show standby command. Which two facts are derived from the output? (Choose two.)

A.

The router with IP 10.10 1.3 is active because it has a higher IP address

B.

If Fa0/0 is shut down, the HSRP priority on R2 becomes 80

C.

R2 Fa1/0 regains the primary role when the link comes back up

D.

R2 becomes the active router after the hold time expires.

E.

R2 is using the default HSRP hello and hold timers.

Full Access
Question # 15

How does Cisco Trustsec enable more flexible access controls for dynamic networking environments and data centers?

A.

uses flexible NetFlow

B.

assigns a VLAN to the endpoint

C.

classifies traffic based an the contextual identity of the endpoint rather than its IP address

D.

classifies traffic based on advanced application recognition

Full Access
Question # 16

What Is a Type 2 hypervisor?

A.

installed as an application on an already installed operating system

B.

runs directly on a physical server and includes its own operating system

C.

supports over-allocation of physical resources

D.

also referred to as a "bare metal hypervisor" because it sits directly on the physical server

Full Access
Question # 17

In a Cisco SD-Access solution, which protocol is used by an extended node to connect to a single edge node?

A.

VXLAN

B.

IS-IS

C.

802 1Q

D.

CTS

Full Access
Question # 18

How are map-register messages sent in a LISP deployment?

A.

egress tunnel routers to map resolvers to determine the appropriate egress tunnel router

B.

ingress tunnel routers to map servers to determine the appropriate egress tunnel router

C.

egress tunnel routers to map servers to determine the appropriate egress tunnel router

D.

ingress tunnel routers to map resolvers to determine the appropnate egress tunnel router

Full Access
Question # 19

Refer to the exhibit.

VPN-A sends point-to-point traffic to VPN-B and receives traffic only from VPN-C VPN-B sends point-to-point traffic to VPN-C and receives traffic only from VPN-A Which configuration is applied?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 20

When are multicast RPs required?

A.

RPs are required only when using protocol independent multicast dense mode.

B.

By default, the RP is needed penodically to maintain sessions with sources and receivers.

C.

RPs are required for protocol Independent multicast sparse mode and dense mode.

D.

By default, the RP Is needed only start new sessions with sources and receivers.

Full Access
Question # 21

A network is being migrated from IPV4 to IPV6 using a dual-stack approach. Network management is already 100% IPV6 enabled. In a dual-stack network with two dual-stack NetFlow collections, how many flow exporters are needed per network device in the flexible NetFlow configuration?

A.

1

B.

2

C.

4

D.

8

Full Access
Question # 22

Which HHTP status code is the correct response for a request with an incorrect password applied to a REST API session?

A.

HTTP Status Code 200

B.

HTTP Status Code 302

C.

HTTP Status Code 401

D.

HTTP Status Code: 504

Full Access
Question # 23

In a Cisco StackWise Virtual environment, which planes are virtually combined in the common logical switch?

A.

management and data

B.

control and management

C.

control, and forwarding

D.

control and data

Full Access
Question # 24

Refer to the exhibit.

Which JSON syntax is derived from this data?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 25

Which two parameters are examples of a QoS traffic descriptor? (Choose two)

A.

MPLS EXP bits

B.

bandwidth

C.

DSCP

D.

ToS

E.

packet size

Full Access
Question # 26

What is one difference between EIGRP and OSPF?

A.

OSPF is a Cisco proprietary protocol, and EIGRP is an IETF open standard protocol.

B.

OSPF uses the DUAL distance vector algorithm, and EIGRP uses the Dijkstra link-state algorithm

C.

EIGRP uses the variance command lot unequal cost load balancing, and OSPF supports unequal cost balancing by default.

D.

EIGRP uses the DUAL distance vector algorithm, and OSPF uses the Dijkstra link-state algorithm

Full Access
Question # 27

Refer to the exhibit.

An engineer reconfigures the pot-channel between SW1 and SW2 from an access port to a trunk and immediately notices this error in SW1's log.

Which command set resolves this error?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 28

An engineer configures a WLAN with fast transition enabled Some legacy clients fail to connect to this WLAN Which feature allows the legacy clients to connect while still allowing other clients to use fast transition based on then OLTIs?

A.

over the DS

B.

adaptive R

C.

802.11V

D.

802.11k

Full Access
Question # 29

Which access point mode allows a supported AP to function like a WLAN client would, associating and identifying client connectivity issues?

A.

client mode

B.

SE-connect mode

C.

sensor mode

D.

sniffer mode

Full Access
Question # 30

What is the wireless received signal strength indicator?

A.

The value given to the strength of the wireless signal received compared to the noise level

B.

The value of how strong the wireless signal Is leaving the antenna using transmit power, cable loss, and antenna gain

C.

The value of how much wireless signal is lost over a defined amount of distance

D.

The value of how strong a tireless signal is receded, measured in dBm

Full Access
Question # 31

What are two benefits of implementing a Cisco SD-WAN architecture? (Choose two)

A.

It provides resilient and effective traffic flow using MPLS.

B.

It improves endpoint protection by integrating embedded and cloud security features.

C.

It allows configuration of application-aware policies with real time enforcement.

D.

It simplifies endpoint provisioning through standalone router management

E.

It enforces a single. scalable. hub-and-spoke topology.

Full Access
Question # 32

Refer to the exhibit. Which command is required to verify NETCONF capability reply messages?

A.

show netconf | section rpc-reply

B.

show netconf rpc-reply

C.

show netconf xml rpc-reply

D.

show netconf schema | section rpc-reply

Full Access
Question # 33

Refer to the exhibit.

A company requires that all wireless users authenticate using dynamic key generation. Which configuration must be applied?

A.

AP(config-if-ssid)# authentication open wep wep_methods

B.

AP(config-if-ssid)# authentication dynamic wep wep_methods

C.

AP(config-if-ssid)# authentication dynamic open wep_dynamic

D.

AP(config-if-ssid)# authentication open eap eap_methods

Full Access
Question # 34

What is a characteristic of Cisco StackWise technology?

A.

It uses proprietary cabling

B.

It supports devices that are geographically separated

C.

lt combines exactly two devices

D.

It is supported on the Cisco 4500 series.

Full Access
Question # 35

When is the Design workflow used In Cisco DNA Center?

A.

in a greenfield deployment, with no existing infrastructure

B.

in a greenfield or brownfield deployment, to wipe out existing data

C.

in a brownfield deployment, to modify configuration of existing devices in the network

D.

in a brownfield deployment, to provision and onboard new network devices

Full Access
Question # 36

Refer to the exhibit.

Which two facts does the device output confirm? (Choose two.)

A.

The device sends unicast messages to its peers

B.

The device's HSRP group uses the virtual IP address 10.0.3.242

C.

The standby device is configured with the default HSRP priority.

D.

The device is using the default HSRP hello timer

E.

The device is configured with the default HSRP priority

Full Access
Question # 37

An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy. Which device presents the web authentication for the WLAN?

A.

ISE server

B.

local WLC

C.

RADIUS server

D.

anchor WLC

Full Access
Question # 38

Refer to the exhibit.

An engineer must add the SNMP interface table to the NetFlow protocol flow records. Where should the SNMP table option be added?

A.

under the interface

B.

under the flow record

C.

under the flow monitor

D.

under the flow exporter

Full Access
Question # 39

What is required for a virtual machine to run?

A.

a Type 1 hypervisor and a host operating system

B.

a hypervisor and physical server hardware

C.

only a Type 1 hypervisor

D.

only a Type 2 hypervisor

Full Access
Question # 40

Refer to the exhibit.

An engineer attempts to bundle interface Gi0/0 into the port channel, but it does not function as expected. Which action resolves the issue?

A.

Configure channel-group 1 mode active on interface Gi0/0.

B.

Configure no shutdown on interface Gi0/0

C.

Enable fast LACP PDUs on interface Gi0/0.

D.

Set LACP max-bundle to 2 on interface Port-channeM

Full Access
Question # 41

Refer to the exhibit.

Which privilege level is assigned to VTY users?

A.

1

B.

7

C.

13

D.

15

Full Access
Question # 42

Which antenna type should be used for a site-to-site wireless connection?

A.

Omnidirectional

B.

dipole

C.

patch

D.

Yagi

Full Access
Question # 43

Refer to the exhibit.

On which interfaces should VRRP commands be applied to provide first hop redundancy to PC-01 and PC-02?

A.

G0/0 and G0/1 on Core

B.

G0/0 on Edge-01 and G0/0 on Edge-02

C.

G0/1on Edge-01 and G0/1 on Edge-02

D.

G0/0 and G0/1 on ASW-01

Full Access
Question # 44

A customer wants to use a single SSID to authenticate loT devices using different passwords. Which Layer 2 security type must be configured in conjunction with Cisco ISE to achieve this requirement?

A.

Fast Transition

B.

Central Web Authentication

C.

Cisco Centralized Key Management

D.

Identity PSK

Full Access
Question # 45

Drag and drop the descriptions from the left onto the routing protocol they describe on the right.

Full Access
Question # 46

By default, which virtual MAC address does HSRP group 16 use?

A.

c0:41:43:64:13:10

B.

00:00:0c 07:ac:10

C.

00:05:5c:07:0c:16

D.

05:00:0c:07:ac:16

Full Access
Question # 47

A network engineer is adding an additional 10Gps link to an exiting 2x10Gps LACP-based LAG to augment its capacity. Network standards require a bundle interface to be taken out of service if one of its member links goes down, and the new link must be added with minimal impact to the production network. Drag and drop the tasks that the engineer must perform from the left into the sequence on the right. Not all options are used.

Full Access
Question # 48

What does the LAP send when multiple WLCs respond to the CISCO_CAPWAP-CONTROLLER.localdomain hostname during the CAPWAP discovery and join process?

A.

broadcast discover request

B.

join request to all the WLCs

C.

unicast discovery request to each WLC

D.

Unicast discovery request to the first WLS that resolves the domain name

Full Access
Question # 49

Drag and drop the tools from the left onto the agent types on the right.

Full Access
Question # 50

Refer to the exhibit. What is generated by the script?

A.

the cdp neighbors

B.

the routing table

C.

the router processes

D.

the running configuration

Full Access
Question # 51

Refer to the exhibit.

Object tracking has been configured for VRRP-enabled routers Edge-01 and Edge-02 Which commands cause Edge-02 to preempt Edge-01 in the event that interface G0/0 goes down on Edge-01?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 52

What does the number in an NTP stratum level represent?

A.

The number of hops it takes to reach the master time server.

B.

The number of hops it takes to reach the authoritative time source.

C.

The amount of offset between the device clock and true time.

D.

The amount of drift between the device clock and true time.

Full Access
Question # 53

What happens when a FlexConnect AP changes to standalone mode?

A.

All controller-dependent activities stop working except the DFS.

B.

All client roaming continues to work

C.

Only clients on central switching WLANs stay connected.

D.

All clients on an WLANs are disconnected

Full Access
Question # 54

Refer to the exhibit. An engineer must configure an eBGP neighborship to Router B on Router A. The network that is connected to GO/1 on Router A must be advertised to Router B. Which configuration should be applied?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 55

Refer to the exhibit. Which configuration must be implemented to establish EBGP peering between R1 and R2?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 56

What is the recommended minimum SNR for data applications on wireless networks?

A.

15

B.

20

C.

25

D.

10

Full Access
Question # 57

An engineer must configure a new loopback Interface on a router and advertise the interface as a fa4 in OSPF. Which command set accomplishes this task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 58

Refer to the exhibit. Which configuration must be added to enable GigabitEthemet 0/1 to participate in OSPF?

A.

SF_router (config-router)# network 10.10.1.0 0.0.0.255 area 0

B.

SF_rouier (conng)# network 10.10.1.0 0.0.0.255 area 1

C.

SF_router (conflg-routerp) network 10.10.1.0 0.0.0.255 area 1

D.

SF_rouler (contlg-rouler)# network 10.10.1.0 255.255.255.0 area 0

Full Access
Question # 59

Drag and drop the characteristics from the left onto the deployment types on the right.

Full Access
Question # 60

Which method displays text directly into the active console with a synchronous EEM applet policy?

A.

event manager applet boom

event syslog pattern 'UP'

action 1.0 gets 'logging directly to console'

B.

event manager applet boom

event syslog pattern 'UP'

action 1.0 syslog priority direct msg 'log directly to console'

C.

event manager applet boom

event syslog pattern 'UP'

action 1.0 puts 'logging directly to console'

D.

event manager applet boom

event syslog pattern 'UP'

action 1.0 string 'logging directly to console'

Full Access
Question # 61

What is the API keys option for REST API authentication?

A.

a predetermined string that is passed from client to server

B.

a one-time encrypted token

C.

a username that is stored in the local router database

D.

a credential that is transmitted unencrypted

Full Access
Question # 62

Drag and drop the automation characteristics from the left onto the appropriate tools on the right.

Full Access
Question # 63

Refer to the exhibit.

R1 is able to ping the R3 fa0/1 Interface. Why do the extended pings fail?

A.

The DF bit has been set

B.

The maximum packet size accepted by the command is 147G bytes

C.

R2 and R3 do not have an OSPF adjacency

D.

R3 is missing a return route to 10.99.69.0/30

Full Access
Question # 64

What is one main REST security design principle?

A.

separation of privilege

B.

password hashing

C.

confidential algorithms

D.

OAuth

Full Access
Question # 65

Refer to the exhibit.

An engineer must set up connectivity between a campus aggregation layer and a branch office access layer. The engineer uses dynamic trunking protocol to establish this connection, however, management traffic on VLAN1 is not passing. Which action resolves the issue and allow communication for all configured VLANs?

A.

Allow all VLANs on the trunk links

B.

Disable Spanning Tree for the native VLAN.

C.

Configure the correct native VLAN on the remote interface

D.

Change both interfaces to access ports.

Full Access
Question # 66

Refer to the exhibit. Which python code parses the response and prints “18:32:21.474 UTC sun Mar 10 2019?

A.

print(response['resut'][0||'simple_time']}

B.

print(response[result']['body']['simple_time']}

C.

print(response['body']['simple_time']}

D.

print(response[jresult']['body']['simple_time']}

Full Access
Question # 67

What Is a characteristic of a WLC that is in master controller mode?

A.

All wireless LAN controllers are managed by the master controller.

B.

All new APs that join the WLAN are assigned to the master controller.

C.

Configuration on the master controller is executed on all wireless LAN controllers.

D.

The master controller is responsible for load balancing all connecting clients to other controllers

Full Access
Question # 68

Which benefit is realized by implementing SSO?

A.

IP first-hop redundancy

B.

communication between different nodes for cluster setup

C.

physical link redundancy

D.

minimal network downtime following an RP switchover

Full Access
Question # 69

What is an OVF?

A.

a package that is similar to an IMG and that contains an OVA file used to build a virtual machine

B.

an alternative form of an ISO that Is used to install the base operating system of a virtual machine

C.

the third step in a P2V migration

D.

a package of files that is used to describe a virtual machine or virtual appliance

Full Access
Question # 70

Refer to the exhibit.

What are two effect of this configuration? (Choose two.)

A.

Inside source addresses are translated to the 209.165.201.0/27 subnet.

B.

It establishes a one-to-one NAT translation.

C.

The 10.1.1.0/27 subnet is assigned as the inside global address range.

D.

The 209.165.201.0/27 subnet is assigned as the outside local address range.

E.

The 10.1.1.0/27 subnet is assigned as the inside local addresses.

Full Access
Question # 71

Refer to the exhibit.

An engineer must configure an ERSPAN session with the remote end of the session 10.10.0.1. Which commands must be added to complete the configuration?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 72

Which resource is able to be shared among virtual machines deployed on the same physical server?

A.

applications

B.

disk

C.

VM configuration file

D.

operating system

Full Access
Question # 73

What is a TLOC in a Cisco SD-WAN deployment?

A.

value that identifies a specific tunnel within the Cisco SD-WAN overlay

B.

identifier that represents a specific service offered by nodes within the Cisco SD-WAN overlay

C.

attribute that acts as a next hop for network prefixes

D.

component set by the administrator to differentiate similar nodes that offer a common service

Full Access
Question # 74

In a Cisco Catalyst switch equipped with two supervisor modules an administrator must temporally remove the active supervisor from the chassis to perform hardware maintenance on it. Which mechanism ensure that the active supervisor removal is not disruptive to the network operation?

A.

NSF/NSR

B.

SSO

C.

HSRP

D.

VRRP

Full Access
Question # 75

Which two features does the Cisco SD-Access architecture add to a traditional campus network? (Choose two.)

A.

software-defined segmentation

B.

private VLANs

C.

SD-WAN

D.

modular QoS

E.

identity services

Full Access
Question # 76

How does NETCONF YANG represent data structures?

A.

as strict data structures denned by RFC 6020

B.

in an XML tree format

C.

in an HTML format

D.

as modules within a tree

Full Access
Question # 77

Which three resources must the hypervisor make available to the virtual machines? (Choose three)

A.

memory

B.

bandwidth

C.

IP address

D.

processor

E.

storage

F.

secure access

Full Access
Question # 78

what is a benefit of using a Type 2 hypervisor instead of a Type 1 hypervisor?

A.

better application performance

B.

Improved security because the underlying OS is eliminated

C.

Improved density and scalability

D.

ability to operate on hardware that is running other OSs

Full Access
Question # 79

Which option works with a DHCP server to return at least one WLAN management interface IP address during the discovery phase and is dependent upon the VCI of the AP?

A.

Option 42

B.

Option 15

C.

Option 125

D.

Option 43

Full Access
Question # 80

Which configuration creates a CoPP policy that provides unlimited SSH access from dient 10.0.0.5 and denies access from all other SSH clients'?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 81

What is a characteristic of a Type I hypervisor?

A.

It is installed on an operating system and supports other operating systems above it.

B.

It is referred to as a hosted hypervisor.

C.

Problems in the base operating system can affect the entire system.

D.

It is completely independent of the operating system.

Full Access
Question # 82

Drag and drop the LISP components on the left to their descriptions on the right. Not all options are used.

Full Access
Question # 83

What is one characteristic of the Cisco SD-Access control plane?

A.

It is based on VXLAN technology.

B.

Each router processes every possible destination and route

C.

It allows host mobility only in the wireless network.

D.

It stores remote routes in a centralized database server

Full Access
Question # 84

A system must validate access rights to all its resources and must not rely on a cached permission matrix. If the access level to a given resource is revoked but is not reflected in the permission matrix, the security is violated. Which term refers to this REST security design principle?

A.

economy of mechanism

B.

complete mediation

C.

separation of privilege

D.

least common mechanism

Full Access
Question # 85

Refer to the exhibit.

An engineer must allow R1 to advertise the 192 168.1 0/24 network to R2 R1 must perform this action without sending OSPF packets to SW1 Which command set should be applied?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 86

A network engineer is configuring OSPF on a router. The engineer wants to prevent having a route to 177.16.0.0/16 learned via OSPF. In the routing table and configures a prefix list using the command ip prefix-list OFFICE seq S deny 172.16.0.0/16. Winch two identical configuration commands must be applied to accomplish the goal? (Choose two.)

A.

distribute-list prefix OFFICE in under the OSPF process

B.

Ip prefix-list OFFICE seq 10 permit 0.0.0.0/0 Ie 32

C.

ip prefix-list OFFICE seq 10 permit 0.0.0.0/0 ge 32

D.

distribute-list OFFICE out under the OSPF process

E.

distribute-list OFFICE in under the OSPF process

Full Access
Question # 87

Refer to the exhibit. A network administrator configured RSPAN to troubleshoot an issue between switch1 and switch2. The switches are connected using interface GigabitEthernet 1/1. An external packet capture device is connected is switch2 interface GigabitEthernet 1/2. Which two commands must be added to complete this configuration? (Choose two)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 88

Refer to the exhibit. Which command set must be added to permit and log all traffic that comes from 172.20.10.1 in interface GigabitEthernet0/1 without impacting the functionality of the access list?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 89

Drag and drop the characteristics from the left onto the technology types on the right.

Full Access
Question # 90

Refer to the exhibit.

An engineer configures routing between all routers and must build a configuration to connect R1 to R3 via a GRE tunnel Which configuration must be applied?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 91

Refer to the exhibit.

An engineer must deny Telnet traffic from the loopback interface of router R3 to the Loopback interface of router R2 during, the weekend hours. All other traffic between the loopback interfaces of routers R3 and R2 must be allowed at all times Which command set accomplishes this task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 92

Which Cisco FlexConnect state allows wireless users that are connected to the network to continue working after the connection to the WLC has been lost?

A.

Authentication Down/Switching Down

B.

Authentication-Central/Switch-Local

C.

Authentication- Down/Switch-Local

D.

Authentication-Central/Switch-Central

Full Access
Question # 93

Which two solutions are used for backing up a Cisco DNA Center Assurance database? (Choose two)

A.

NFS share

B.

non-linux server

C.

local server

D.

remote server

E.

bare metal server

Full Access
Question # 94

Which feature Is used to propagate ARP broadcast, and link-local frames across a Cisco SD-Access fabric to address connectivity needs for silent hosts that require reception of traffic to start communicating?

A.

Native Fabric Multicast

B.

Layer 2 Flooding

C.

SOA Transit

D.

Multisite Fabric

Full Access
Question # 95

An engineer must configure a router to leak routes between two VRFs Which configuration must the engineer apply?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 96

Which option must be used to support a WLC with an IPv6 management address and 100 Cisco Aironet 2800 Series access points that will use DHCP to register?

A.

43

B.

52

C.

60

D.

82

Full Access
Question # 97

Refer to the exhibit.

Which command set must be applied on R1 to establish a BGP neighborship with R2 and to allow communication from R1 to reach the networks?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 98

Refer to the exhibit .

Which command must be configured for RESTCONF to operate on port 8888?

A.

ip http port 8888

B.

restconf port 8888

C.

ip http restconf port 8888

D.

restconf http port 8888

Full Access
Question # 99

Refer to the exhibit.

Which configuration must be applied to the HQ router to set up a GRE tunnel between the HQ and BR routers?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 100

What is the JSON syntax that is formed the data?

A.

{'Name'';''Bob johnon';''Age': Sevenfive,''Alive'': true,''FavoriteFoods';[''Cereal';''Mustard';''Onions'}}

B.

{'Name'':''Bob johnon':''Age': 75 ''Alive'': true,''Favorite Foods';[''Cereal';''Mustard';''Onions'}}

C.

{'Name'':''Bob johnon':''Age: 75,''Alive: true, FavoriteFoods;[Cereal, Mustard';''Onions}}

D.

{'Name'': 'Bob johnon','Age': 75,'Alive': true,''FavoriteFoods': 'Cereal';'Mustard','Onions'}}

Full Access
Question # 101

Refer to the exhibit.

The administrator troubleshoots an EtherChannel that keeps moving to err-disabled. Which two actions must be taken to resolve the issue? (Choose two.)

A.

Reload the switch to force EtherChannel renegotiation

B.

Ensure that interfaces Gi1/0/2 and Gi1/0/3 connect to the same neighboring switch.

C.

Ensure that the switchport parameters of Port channel1 match the parameters of the port channel on the neighbor switch

D.

Ensure that the corresponding port channel interface on the neighbor switch is named Port-channel1.

E.

Ensure that the neighbor interfaces of Gi1/0/2 and Gi/0/3 are configured as members of the same EtherChannel

Full Access
Question # 102

By default, which virtual MAC address Goes HSRP group 25 use?

A.

05:5c:5e:ac:0c:25

B.

04:16:6S:96:1C:19

C.

00:00:0c:07:ac:19

D.

00:00:0c:07:ac:25

Full Access
Question # 103

What is used to validate the authenticity of the client and is sent in HTTP requests as a JSON object?

A.

SSH

B.

HTTPS

C.

JWT

D.

TLS

Full Access
Question # 104

Which two Cisco SD-WAN components exchange OMP information?

A.

vAnaiytlcs

B.

vSmart

C.

WAN Edge

D.

vBond

E.

vManage

Full Access
Question # 105

An engineer must configure an ACL that permits packets which include an ACK in the TCP header Which entry must be included in the ACL?

A.

access-list 10 permit ip any any eq 21 tcp-ack

B.

access-list 110 permit tcp any any eq 21 tcp-ack

C.

access-list 10 permit tcp any any eq 21 established

D.

access-list 110 permit tcp any any eq 21 established

Full Access
Question # 106

Drag and drop the characteristics from the left to the table types on the right.

Full Access
Question # 107

What is a characteristic of the overlay network in the Cisco SD-Access architecture?

A.

It uses a traditional routed access design to provide performance and high availability to the network.

B.

It consists of a group of physical routers and switches that are used to maintain the network.

C.

It provides isolation among the virtual networks and independence from the physical network.

D.

It provides multicast support to enable Layer 2 Hooding capability in the underlay network.

Full Access
Question # 108

Which function does a fabric wireless LAN controller perform In a Cisco SD-Access deployment?

A.

manages fabric-enabled APs and forwards client registration and roaming information to the Control Plane Node

B.

coordinates configuration of autonomous nonfabric access points within the fabric

C.

performs the assurance engine role for both wired and wireless clients

D.

is dedicated to onboard clients in fabric-enabled and nonfabric-enabled APs within the fabric

Full Access
Question # 109

Refer to the exhibit. A network engineer must block Telnet traffic from hosts in the range of 10.100 2.248 to 10.100.2 255 to the network 10.100.3.0 and permit everything else. Which configuration must the engineer apply'?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 110

Which type of tunnel Is required between two WLCs to enable Intercontroller roaming?

A.

mobility

B.

LWAPP

C.

CAPWAP

D.

iPsec

Full Access
Question # 111

Which component transports data plane traffic across a Cisco SD-WAN network?

A.

vSmart

B.

vManage

C.

cEdge

D.

vBond

Full Access
Question # 112

If the maximum power level assignment for global TPC 802.11a/n/ac is configured to 10 dBm, which power level effectively doubles the transmit power?

A.

13dBm

B.

14 dBm

C.

17dBm

D.

20 dBm

Full Access
Question # 113

What are two benefits of YANG? (Choose two.)

A.

It enforces the use of a specific encoding format for NETCONF.

B.

It collects statistical constraint analysis information.

C.

It enables multiple leaf statements to exist within a leaf list.

D.

It enforces configuration semantics.

E.

It enforces configuration constraints.

Full Access
Question # 114

Which AP mode allows an engineer to scan configured channels for rogue access points?

A.

sniffer

B.

monitor

C.

bridge

D.

local

Full Access
Question # 115

A server running Linux is providing support for virtual machines along with DNS and DHCP services for a small business. Which technology does this represent?

A.

container

B.

Type 1 hypervisor

C.

hardware pass-thru

D.

Type 2 hypervisor

Full Access
Question # 116

Refer to the exhibit.

A network engineer configures OSPF and reviews the router configuration. Which interface or interface or interface are able to establish OSPF adjacency?

A.

GigabitEthemet0/1 and GigabitEthernet0/1.40

B.

only GigabitEthernet0/1

C.

only GigabttEthernet0/0

D.

Gigabit Ethernet0/0 and GigabitEthemet0/1

Full Access
Question # 117

Which encryption hashing algorithm does NTP use for authentication?

A.

SSL

B.

MD5

C.

AES128

D.

AES256

Full Access
Question # 118

Refer to the exhibit.

A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Which two configuration changes accomplish this? (Choose two).

A.

Create an IPsec profile, associate the transform-set ACL, and apply the profile to the tunnel interface.

B.

Apply the crypto map to the tunnel interface and change the tunnel mode to tunnel mode ipsec ipv4.

C.

Remove all configuration related to crypto map from R1 and R2 and eliminate the ACL.

D.

Create an IPsec profile, associate the transform-set, and apply the profile to the tunnel interface.

E.

Remove the crypto map and modify the ACL to allow traffic between 10.10.0.0/24 to 10.20.0.0/24.

Full Access
Question # 119

What is a characteristic of YANG?

A.

It is a Cisco proprietary language that models NETCONF data

B.

It allows model developers to create custom data types

C.

It structures data in an object-oriented fashion to promote model reuse

D.

It provides loops and conditionals to control now within models

Full Access
Question # 120

A customer requests a network design that supports these requirements:

Which protocol does the design include?

A.

HSRP version 2

B.

VRRP version 2

C.

GLBP

D.

VRRP version 3

Full Access
Question # 121

What are two differences between the RIB and the FIB? (Choose two.)

A.

The FIB is derived from the data plane, and the RIB is derived from the FIB.

B.

The RIB is a database of routing prefixes, and the FIB is the Information used to choose the egress interface for each packet.

C.

FIB is a database of routing prefixes, and the RIB is the information used to choose the egress interface for each packet.

D.

The FIB is derived from the control plane, and the RIB is derived from the FIB.

E.

The RIB is derived from the control plane, and the FIB is derived from the RIB.

Full Access
Question # 122

An engineer has deployed a single Cisco 5520 WLC with a management IP address of 172.16.50.5/24. The engineer must register 50 new Cisco AIR-CAP2802I-E-K9 access points to the WLC using DHCP option 43. The access points are connected to a switch in VLAN 100 that uses the 172.16.100.0/24 subnet. The engineer has configured the DHCP scope on the switch as follows:

The access points are failing to join the wireless LAN controller. Which action resolves the issue?

A.

configure option 43 Hex F104.AC10.3205

B.

configure option 43 Hex F104.CA10.3205

C.

configure dns-server 172.16.50.5

D.

configure dns-server 172.16.100.1

Full Access
Question # 123

Wireless users report frequent disconnections from the wireless network. While troubleshooting a network engineer finds that after the user a disconnect, the connection re-establishes automatically without any input required. The engineer also notices these message logs .

Which action reduces the user impact?

A.

increase the AP heartbeat timeout

B.

increase BandSelect

C.

enable coverage hole detection

D.

increase the dynamic channel assignment interval

Full Access
Question # 124

Refer to exhibit.

VLANs 50 and 60 exist on the trunk links between all switches All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server Which command ensures that SW3 receives frames only from VLAN 50?

A.

SW1 (config)#vtp pruning

B.

SW3(config)#vtp mode transparent

C.

SW2(config)=vtp pruning

D.

SW1 (config >»vtp mode transparent

Full Access
Question # 125

A network engineer configures a new GRE tunnel and enters the show run command. What does the output verify?

A.

The tunnel will be established and work as expected

B.

The tunnel destination will be known via the tunnel interface

C.

The tunnel keepalive is configured incorrectly because they must match on both sites

D.

The default MTU of the tunnel interface is 1500 byte.

Full Access
Question # 126

Which method should an engineer use to deal with a long-standing contention issue between any two VMs on the same host?

A.

Adjust the resource reservation limits

B.

Live migrate the VM to another host

C.

Reset the VM

D.

Reset the host

Full Access
Question # 127

What is one fact about Cisco SD-Access wireless network deployments?

A.

The access point is part of the fabric underlay

B.

The WLC is part of the fabric underlay

C.

The access point is part the fabric overlay

D.

The wireless client is part of the fabric overlay

Full Access
Question # 128

Refer to me exhibit. What is the cause of the log messages?

A.

hello packet mismatch

B.

OSPF area change

C.

MTU mismatch

D.

IP address mismatch

Full Access
Question # 129

How is 802.11 traffic handled in a fabric-enabled SSID?

A.

centrally switched back to WLC where the user traffic is mapped to a VXLAN on the WLC

B.

converted by the AP into 802.3 and encapsulated into VXLAN

C.

centrally switched back to WLC where the user traffic is mapped to a VLAN on the WLC

D.

converted by the AP into 802.3 and encapsulated into a VLAN

Full Access
Question # 130

How does Cisco Trustsec enable more access controls for dynamic networking

environments and data centers?

A.

classifies traffic based on advanced application recognition

B.

uses flexible NetFlow

C.

classifies traffic based on the contextual identity of the endpoint rather than its IP

address correct

D.

assigns a VLAN to the endpoint

Full Access
Question # 131

Which two network problems Indicate a need to implement QoS in a campus network? (Choose two.)

A.

port flapping

B.

excess jitter

C.

misrouted network packets

D.

duplicate IP addresses

E.

bandwidth-related packet loss

Full Access
Question # 132

While configuring an IOS router for HSRP with a virtual IP of 10 1.1.1. an engineer sees this log message.

Which configuration change must the engineer make?

A.

Change the HSRP group configuration on the local router to 1.

B.

Change the HSRP virtual address on the local router to 10.1.1.1.

C.

Change the HSRP virtual address on the remote router to 10.1.1.1.

D.

Change the HSRP group configuration on the remote router to 1.

Full Access
Question # 133

Which benefit is offered by a cloud infrastructure deployment but is lacking in an on-premises deployment?

A.

efficient scalability

B.

virtualization

C.

storage capacity

D.

supported systems

Full Access
Question # 134

Refer to the exhibit.

Which configuration establishes EBGP neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 135

Which devices does Cisco DNA Center configure when deploying an IP-based access control policy?

A.

All devices integrating with ISE

B.

selected individual devices

C.

all devices in selected sites

D.

all wired devices

Full Access
Question # 136

Refer to the exhibit. What is the effect of this configuration?

A.

When users attempt to connect to vty lines 0 through 4, the device will authenticate them against TACACS+ if local authentication fails

B.

The device will authenticate all users connecting to vty lines 0 through 4 against TACACS+

C.

The device will allow users at 192.168.0.202 to connect to vty lines 0 through 4 using the password ciscotestkey

D.

The device will allow only users at 192.166.0.202 to connect to vty lines 0 through 4

Full Access
Question # 137

A network administrator applies the following configuration to an IOS device.

What is the process of password checks when a login attempt is made to the device?

A.

A TACACS+server is checked first. If that check fail, a database is checked?

B.

A TACACS+server is checked first. If that check fail, a RADIUS server is checked. If that check fail. a local database is checked.

C.

A local database is checked first. If that fails, a TACACS+server is checked, if that check fails, a RADUIS server is checked.

D.

A local database is checked first. If that check fails, a TACACS+server is checked.

Full Access
Question # 138

Refer to the exhibit. An engineer must create a script that appends the output of the show process cpu sorted command to a file.

A.

action 4.0 syslog command “show process cpu sorted | append flash:high-cpu-file”

B.

action 4.0 publish-event “show process cpu sorted | append flash:high-cpu-file”

C.

action 4.0 ens-event “show process cpu sorted | append flash:high-cpu-file”

D.

action 4.0 cli command “show process cpu sorted | append flash:high-cpu-file”

Full Access
Question # 139

Running the script causes the output in the exhibit. Which change to the first line of the script resolves the error?

A.

from ncclient import

B.

import manager

C.

from ncclient import*

D.

import ncclient manager

Full Access
Question # 140

A network engineer configures BGP between R1 and R2. Both routers use BGP peer group CORP and are set up to use MD5 authentication. This message is logged to the console of router R1:

Which two configuration allow peering session to from between R1 and R2? Choose two.)

A.

R1(config-router)#neighbor 10.10.10.1 peer-group CORP R1(config-router)#neighbor CORP password Cisco

B.

R2(config-router)#neighbor 10.120.10.1 peer-group CORP R2(config-router)#neighbor CORP password Cisco

C.

R2(config-router)#neighbor 10.10.10.1 peer-group CORP R2(config-router)#neighbor PEER password Cisco

D.

R1(config-router)#neighbor 10.120.10.1 peer-group CORP R1(config-router)#neighbor CORP password Cisco

E.

R2(config-router)#neighbor 10.10.10.1 peer-group CORP R2(config-router)#neighbor CORP password Cisco

Full Access
Question # 141

What does the cisco DNA REST response indicate?

A.

Cisco DNA Center has the Incorrect credentials for cat3850-1

B.

Cisco DNA Center is unable to communicate with cat9000-1

C.

Cisco DNA Center has the incorrect credentials for cat9000-1

D.

Cisco DNA Center has the Incorrect credentials for RouterASR-1

Full Access
Question # 142

Refer to the exhibit.

Which configuration allows Customer2 hosts to access the FTP server of Customer1 that has the IP address of 192.168.1.200?

A.

ip route vrf Customerl 172.16.1.0 255.255.255.0 172.16.1.1 global

ip route vrf Customer 192.168.1.200 255.255.255.255 192.168.1.1 global

ip route 192.168.1.0 255.255.255.0 VlanlO

ip route 172.16.1.0 255.255.255.0 Vlan20

B.

ip route vrf Customerl 172.16.1.0 255.255.255.0 172.16.1.1 Customer2

ip route vrf Customer 192.168.1.200 255.255.255.255 192.168.1.1 Customerl

C.

ip route vrf Customerl 172.16.1.0 255.255.255.0 172.16.1.1 Customerl

ip route vrf Customer 192.168.1.200 255.255.255.255 192.168.1.1 Customer2

D.

ip route vrf Customerl 172.16.1.1 255.255.255.255 172.16.1.1 global

ip route vrf Customer 192.168.1.200 255.255.255.0 192.168.1.1 global

ip route 192.168.1.0 255.255.255.0 VlanlO

ip route 172.16.1.0 255.255.255.0 Vlan20

Full Access
Question # 143

Refer to the exhibit. What does the error message relay to the administrator who is trying to configure a Cisco IOS device?

A.

A NETCONF request was made for a data model that does not exist.

B.

The device received a valid NETCONF request and serviced it without error.

C.

A NETCONF message with valid content based on the YANG data models was made, but the request failed.

D.

The NETCONF running datastore is currently locked.

Full Access
Question # 144

Drag and drop the characteristics from the left onto the appropriate infrastructure deployment types on the right.

Full Access
Question # 145

Refer to the exhibit. A network engineer configures NAT on R1 and enters the show command to verity the configuration What does the output confirm?

A.

The first pocket triggered NAT to add on entry to NAT table

B.

R1 is configured with NAT overload parameters

C.

A Telnet from 160.1.1 1 to 10.1.1.10 has been initiated.

D.

R1 to configured with PAT overload parameters

Full Access
Question # 146

Refer to the exhibit. After configurating an IPsec VPN, an engineer enters the show command to verify the ISAKMP SA status. What does the status show?

A.

ISAKMP SA is authenticated and can be used for Quick Mode.

B.

Peers have exchanged keys, but ISAKMP SA remains unauthenticated.

C.

VPN peers agreed on parameters for the ISAKMP SA

D.

ISAKMP SA has been created, but it has not continued to form.

Full Access
Question # 147

Refer to the exhibit.

What are two effects of this configuration? (Choose two.)

A.

R1 becomes the active router.

B.

R1 becomes the standby router.

C.

If R2 goes down, R1 becomes active but reverts to standby when R2 comes back online.

D.

If R1 goes down. R2 becomes active and remains the active device when R1 comes back online.

E.

If R1 goes down, R2 becomes active but reverts to standby when R1 comes back online.

Full Access
Question # 148

Refer to the exhibit How was spanning-tree configured on this interface?

A.

By entering the command spanning-tree portfast trunk in the interface configuration mode.

B.

By entering the command spanning-tree portfast in the interface configuration mode

C.

By entering the command spanning-tree mst1 vlan 10,20,30,40 in the global configuration mode

D.

By entering the command spanning-tree vlan 10,20,30,40 root primary in the interface configuration mode

Full Access
Question # 149

Refer to the exhibit.

An engineer implemented several configuration changes and receives the logging message on switch1. Which action should the engineer take to resolve this issue?

A.

Change the VTP domain to match on both switches

B.

Change Switch2 to switch port mode dynamic auto

C.

Change Switch1 to switch port mode dynamic auto

D.

Change Switch1 to switch port mode dynamic desirable

Full Access
Question # 150

Drag and drop the solutions that comprise Cisco Cyber Threat Defense from the left onto the objectives they accomplish on the right.

Full Access
Question # 151

What are two characteristics of VXLAN? (Choose two)

A.

It uses VTEPs to encapsulate and decapsulate frames.

B.

It has a 12-bit network identifier

C.

It allows for up to 16 million VXLAN segments

D.

It lacks support for host mobility

E.

It extends Layer 2 and Layer 3 overlay networks over a Layer 2 underlay.

Full Access
Question # 152

Which function in handled by vManage in the cisco SD-WAN fabric?

A.

Establishes BFD sessions to test liveliness of links and nodes.

B.

Distributes polices that govern data forwarding.

C.

Performs remote software upgrades for WAN Edge vSmart and vBond.

D.

Establishes iPsec tunnels with nodes

Full Access
Question # 153

What is used to perform OoS packet classification?

A.

the Options field in the Layer 3 header

B.

the Type field in the Layer 2 frame

C.

the Flags field in the Layer 3 header

D.

the TOS field in the Layer 3 header

Full Access
Question # 154

What is one difference between saltstack and ansible?

A.

SaltStack uses an API proxy agent to program Cisco boxes on agent mode, whereas Ansible uses a Telnet connection

B.

SaltStack uses the Ansible agent on the box, whereas Ansible uses a Telnet server on the box

C.

SaltStack is constructed with minion, whereas Ansible is constructed with YAML

D.

SaltStack uses SSH to interact with Cisco devices, whereas Ansible uses an event bus

Full Access
Question # 155

Refer to the exhibit.

SwitchC connects HR and Sales to the Core switch However, business needs require that no traffic from the Finance VLAN traverse this switch Which command meets this requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 156

Drag and drop the threat defense solutions from the left onto their descriptions on the right.

Full Access
Question # 157

In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC?

A.

Layer 3

B.

inter-xTR

C.

auto anchor

D.

fast roam

Full Access
Question # 158

Refer to the exhibit Drag and drop the snippets into the RESTCONF request to form the request that returns this response Not all options are used

Full Access
Question # 159

An engineer is concerned with the deployment of new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements?

A.

Router(config)# ip sla responder udp-connect 172.29.139.134 5000

B.

Router(config)# ip sla responder tcp-connect 172.29.139.134 5000

C.

Router(config)# ip sla responder udp-echo 172.29.139.134 5000

D.

Router(config)# ip sla responder tcp-echo 172.29.139.134 5000

Full Access
Question # 160

Drag and drop the virtual components from the left onto their deceptions on the right.

Full Access
Question # 161

Refer to the exhibit.

An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as the exit point. Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplish task?

A.

R4(config-router)bgp default local-preference 200

B.

R3(config-router)neighbor 10.1.1.1 weight 200

C.

R3(config-router)bgp default local-preference 200

D.

R4(config-router)nighbor 10.2.2.2 weight 200

Full Access
Question # 162

Which JSON syntax is valid?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 163

What does Call Admission Control require the client to send in order to reserve the bandwidth?

A.

SIP flow information

B.

Wi-Fi multimedia

C.

traffic specification

D.

VoIP media session awareness

Full Access
Question # 164

Refer to the exhibit.

An engineer must modify the access control list EGRESS to allow all IP traffic from subnet 10.1.10.0/24 to 10.1.2.0/24. The access control list is applied in the outbound direction on router interface GigabitEthemet 0/1. Which configuration commands can the engineer use to allow this traffic without disrupting existing traffic flows?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 165

Which features does Cisco EDR use to provide threat detection and response protection?

A.

containment, threat intelligence, and machine learning

B.

firewalling and intrusion prevention

C.

container-based agents

D.

cloud analysis and endpoint firewall controls

Full Access
Question # 166

Which three elements determine Air Time efficiency? (Choose three)

A.

evert-driven RRM

B.

data rate (modulation density) or QAM

C.

channel bandwidth

D.

number of spatial streams and spatial reuse

E.

RF group leader

F.

dynamic channel assignment

Full Access
Question # 167

Refer to the exhibit. Communication between London and New York is down. Which command set must be applied to the NewYork switch to resolve the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 168

At which Layer does Cisco DNA Center support REST controls?

A.

EEM applets or scripts

B.

Session layer

C.

YMAL output from responses to API calls

D.

Northbound APIs

Full Access
Question # 169

Which two methods are used to reduce the AP coverage area? (Choose two)

A.

Reduce channel width from 40 MHz to 20 MHz

B.

Disable 2.4 GHz and use only 5 GHz.

C.

Reduce AP transmit power.

D.

Increase minimum mandatory data rate

E.

Enable Fastlane

Full Access
Question # 170

Which configuration restricts the amount of SSH that a router accepts 100 kbps?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 171

Drag and drop the LISP components from the left onto the function they perform on the right. Not all options are used.

Full Access
Question # 172

A network engineer is configuring Flexible Netflow and enters these commands

Sampler Netflow1

Mode random one-out-of 100

Interface fastethernet 1/0

Flow-sampler netflow1

Which are two results of implementing this feature instead of traditional Netflow? (Choose two.)

A.

CPU and memory utilization are reduced.

B.

Only the flows of top 100 talkers are exported

C.

The data export flow is more secure.

D.

The number of packets to be analyzed are reduced

E.

The accuracy of the data to be analyzed is improved

Full Access
Question # 173

A customer has several small branches and wants to deploy a WI-FI solution with local management using CAPWAP. Which deployment model meets this requirement?

A.

Autonomous

B.

Mobility Express

C.

SD-Access wireless

D.

Local mode

Full Access
Question # 174

In cisco SD_WAN, which protocol is used to measure link quality?

A.

OMP

B.

BFD

C.

RSVP

D.

IPsec

Full Access
Question # 175

Refer to the exhibit. An engineer is configuring an EtherChannel between Switch1 and Switch2 and notices the console message on switch2. Based on the output, which action resolves this issue?

A.

Configure less member ports on Switch2.

B.

Configure the same port channel interface number on both switches

C.

Configure the same EtherChannel protocol on both switches

D.

Configure more member ports on Switch1.

Full Access
Question # 176

Which TLV value must be added to Option 43 when DHCP is used to ensure that APs join the WLC?

A.

0x77

B.

AAA

C.

0xf1

D.

642

Full Access
Question # 177

Simulation 07

Full Access
Question # 178

Which JSON script is properly formatted?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 179

Users have reported an issue connecting to a server over the network. A workstation was recently added to the network and configured with a shared USB printer. Which of the following is most likely causing the issue?

A.

The switch is oversubscribed and cannot handle the additional throughput.

B.

The printer is tying up the server with DHCP discover messages.

C.

The web server's back end was designed for only single-threaded applications.

D.

The workstation was configured with a static IP that is the same as the server.

Full Access
Question # 180

An engineer applies this configuration to router R1. How does R1 respond when the user ‘cisco’ logs in?

A.

It displays the startup config and then permits the user to execute commands

B.

It places the user into EXEC mode and permits the user to execute any command

C.

It displays the startup config and then terminates the session.

D.

It places the user into EXEC mode but permits the user to execute only the show startup-config command

Full Access
Question # 181

Refer to the exhibit. Cisco IOS routers R1 and R2 are interconnected using interface Gi0/0. Which configuration allows R1 and R2 to form an OSPF neighborship on interface Gi0/0?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 182

A customer requires their wireless network to be fully functional, even if the wireless controller fails. Which wireless design supports these requirements?

A.

FlexConnect

B.

mesh

C.

centralized

D.

embedded

Full Access
Question # 183

What is a characteristic of the Cisco DMA Center Template Editor feature?

A.

It facilitates software upgrades lo network devices from a central point.

B.

It facilitates a vulnerability assessment of the network devices.

C.

It provides a high-level overview of the health of every network device.

D.

It uses a predefined configuration through parameterized elements or variables.

Full Access
Question # 184

Drag and drop the characteristics from the left onto the switching mechanisms they describe on the right.

Full Access
Question # 185

Refer to the exhibit Which two commands are required on route» R1 to block FTP and allow all other traffic from the Branch 2 network’ (Choose two)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 186

How do the RIB and the FIB differ?

A.

FIB contains routes learned through a dynamic routing protocol, and the RIB contains routes that are static or directly connected.

B.

RIB contains the interface for a destination, and the FIB contains the next hop information.

C.

FIB is derived from the control plane, and the RIB is derived from the data plane.

D.

RIB is derived from the control plane, and the FIB is derived from the RIB.

Full Access
Question # 187

Refer to the exhibit.

Which HTTP request produced the REST API response that was returned by Cisco DNA Center?

A.

fetch /network-device?macAddress=ac:4a:56:6c:7c:00

B.

POST/network-device?macAddress=ac:4a:56:6c:7c:00

C.

GET/network-device?macAddress=ac:4a:56:6c:7c:00

Full Access
Question # 188

Which two methods are used to interconnect two Cisco SD-Access Fabric sites? (Choose two.)

A.

SD-Access transit

B.

fabric interconnect

C.

wireless transit

D.

IP-based transit

E.

SAN transit

Full Access
Question # 189

Which action limits the total amount of memory and CPU that is used by a collection of VMs?

A.

Place the collection of VMs in a resource pool.

B.

Place the collection of VMs in a vApp.

C.

Limit the amount of memory and CPU that is available to the cluster.

D.

Limit the amount of memory and CPU that is available to the individual VMs.

Full Access
Question # 190

In a Cisco SD-Access environment, which function is performed by the border node?

A.

Connect uteri and devices to the fabric domain.

B.

Group endpoints into IP pools.

C.

Provide reachability information to fabric endpoints.

D.

Provide connectivity to traditional layer 3 networks.

Full Access
Question # 191

Refer to the exhibit.

Both controllers are in the same mobility group. Which result occurs when client 1 roams between APs that are registered to different controllers in the same WLAN?

A.

Client 1 contact controller B by using an EoIP tunnel.

B.

CAPWAP tunnel is created between controller A and controller B.

C.

Client 1 users an EoIP tunnel to contact controller A.

D.

The client database entry moves from controller A to controller B.

Full Access
Question # 192

Which technology reduces the implementation of STP and leverages both unicast and multicast?

A.

VSS

B.

VXLAN

C.

VPC

D.

VLAN

Full Access
Question # 193

Which JSON script is properly formatted?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 194

Refer to the exhibit. What is printed to the console when this script is run?

A.

a key-value pair in tuple type

B.

a key-value pair in list type

C.

a key-value pair in string type

D.

an error

Full Access
Question # 195

Refer to the exhibit.

Which statement is needed to complete the EEM applet and use the Tel script to store the backup file?

A.

action 2.0 cli command "write_backup.tcl tcl"

B.

action 2.0 cli command "flash:write_backup.tcl"

C.

action 2.0 cli command "write_backup.tcl"

D.

action 2.0 cli command "telsh flash:write_backup.tcl"

Full Access
Question # 196

A network administrator received reports that a 40Gb connection is saturated. The only server the administrator can use for data collection in that location has a 10Gb connection to the network. Which of the following is the best method to use on the server to determine the source of the saturation?

A.

Port mirroring

B.

Log aggregation

C.

Flow data

D.

Packet capture

Full Access
Question # 197

Refer to me exhibit. The NETCONF object is sent to a Cisco IOS XE switch. What is me purpose of the object?

A.

view the configuration of all GigabitEthernet interfaces.

B.

Discover the IP address of interface GigabitEthernet.

C.

Set the description of interface GigabitEthernet1 to *1*.

D.

Remove the IP address from interface GigabitEthernet1.

Full Access
Question # 198

What does the Cisco DNA Center Authentication API provide?

A.

list of global issues that are logged in Cisco DNA Center

B.

access token to make calls to Cisco DNA Center

C.

list of VLAN names

D.

dent health status

Full Access
Question # 199

Which Cisco WLC feature allows a wireless device to perform a Layer 3 roam between two separate controllers without changing the client IP address?

A.

mobile IP

B.

mobility tunnel

C.

LWAPP tunnel

D.

GRE tunnel

Full Access
Question # 200

Drag and drop the characteristics from the left onto the routing protocol they describe on the right

Full Access
Question # 201

Drag and drop the code snippets from the bottom onto the blanks in the Python script to convert a Python object into a JSON string. Not all options are used.

Full Access
Question # 202

Refer to the exhibit.

The OSPF neighborship fails between two routers. What is the cause of this issue?

A.

The OSPF router ID is missing on this router.

B.

The OSPF process is stopped on the neighbor router.

C.

There is an MTU mismatch between the two routers.

D.

The OSPF router ID is missing on the neighbor router.

Full Access
Question # 203

Drag and drop the automation characteristics from the left onto the corresponding tools on the right.

Full Access
Question # 204

Refer to the exhibit.

Which configuration enables fallback to local authentication and authorization when no TACACS+ server is available?

A.

Router(config)# aaa authentication login default local Router(config)# aaa authorization exec default local

B.

Router(config)# aaa authentication login default group tacacs+ local Router(config)# aaa authorization exec default group tacacs+ local

C.

Router(config)# aaa fallback local

D.

Router(config)# aaa authentication login FALLBACK local Router(config)# aaa authorization exec FALLBACK local

Full Access
Question # 205

Based on the router's API output in JSON format below, which Python code will display the value of the “hostname" key?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 206

High bandwidth utilization is occurring on interface Gig0/1 of a router. An engineer must identify the flows that are consuming the most bandwidth. Cisco DNA Center is used as a flow exporter and is configured with the IP address 192.168.23.1 and UDP port 23000. Which configuration must be applied to set NetFlow data export and capture on the router?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 207

Refer to the exhibit.

What is achieved by the XML code?

A.

It reads the access list sequence numbers from the output of the show ip access-list extended flp command into a dictionary list.

B.

It displays the output of the show ip access-list extended flp command on the terminal screen

C.

It displays the access list sequence numbers from the output of the show Ip access-list extended flp command on the terminal screen

D.

It reads the output of the show ip access-list extended flp command into a dictionary list.

Full Access
Question # 208

An engineer must configure a new WLAN that allows a user to enter a passphrase and provides forward secrecy as a security measure. Which Layer 2 WLAN configuration is required on the Cisco WLC?

A.

WPA2 Personal

B.

WPA3 Enterprise

C.

WPA3 Personal

D.

WPA2 Enterprise

Full Access
Question # 209

A network engineer must configure a switch to allow remote access for all feasible protocols. Only a password must be requested for device authentication and all idle sessions must be terminated in 30 minutes. Which configuration must be applied?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 210

Which technology is used to provide Layer 2 and Layer 3 logical networks in the Cisco SD-Access architecture?

A.

underlay network

B.

VPN routing/forwarding

C.

easy virtual network

D.

overlay network

Full Access
Question # 211

Drag and drop the characteristics from the left onto the deployment model on the right.

Full Access
Question # 212

Refer to the exhibit. Which configuration must be applied to ensure that the preferred path for traffic from AS 65010 toward AS 65020 uses the R2 to R4 path?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 213

the following system log message is presented after a network administrator configures a GRE tunnel:

%TUN-5-RECURDOWN Interface Tunnel 0 temporarily disabled due to recursive routing

Why is tunnel 0 disabled?

A.

Because dynamic routing is not enabled

B.

Because the tunnel cannot reach its tunnel destination

C.

Because the best path to the tunnel destination is through the tunnel itself

D.

Because the router cannot recursively identify its egress forwarding interface

Full Access
Question # 214

Refer to the exhibit. A network engineer configures NAT on R1 and enters me show command to verity me configuration What toes the output confirm?

A.

The first pocket triggered NAT to add an entry to the NAT table

B.

R1 is configured with NAT overload parameters.

C.

A Telnet session from 160.1.1.1 to 10.1.1.10 has been initiated.

D.

R1 a configured win PAT overload parameters

Full Access
Question # 215

What is the purpose of the weight attribute in an EID-lo-RLOC mapping?

A.

it indicates the preference for using LISP over native IP connectivity.

B.

it determines the administrative distance of LISP generated routes in the RIB

C.

It identifies the preferred RLOC address family.

D.

it indicates the load-balancing ratio between CTRs of 9m earns priority.

Full Access
Question # 216

Which configuration enables a device to be configured via NETCONF over SSHv2?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 217

In lhe Cisco DNA Center Image Repository, what is a golden image?

A.

The latest software image that is available for a specific device type

B.

The Cisco recommended software image for a specific device type.

C.

A software image that is compatible with multiple device types.

D.

A software image that meets the compliance requirements of the organization.

Full Access
Question # 218

Refer to the exhibit. Which router is elected as the VRRP primary virtual router?

A.

Router B

B.

Router D

C.

Router C

D.

Router A

Full Access
Question # 219

Which solution simplifies management ot secure access to network resources?

A.

RFC 3580-based solution to enable authenticated access leveraging RADIUS and AV pairs

B.

TrustSec to logically group internal user environments and assign policies

C.

802.1AE to secure communication in the network domain

D.

ISE to automate network access control leveraging RADIUS AV pairs

Full Access
Question # 220

Which Python code snippet must be added to the script to store the changed interface configuration to a local JSON-formatted file?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 221

Refer to the exhibit. Which configuration set implements Control plane Policing for SSH and Telnet?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 222

How does Protocol Independent Multicast function?

A.

In sparse mode, it establishes neighbor adjacencies and sends hello messages at 5-second intervals.

B.

It uses the multicast routing table to perform the multicast forwarding function.

C.

It uses unicast routing information to perform the multicast forwarding function.

D.

It uses broadcast routing information to perform the multicast forwarding function.

Full Access
Question # 223

Refer to the exhibit.

An engineer must create a manually triggered EEM applet to enable the R2 router interface and assign an IP address to it. What is required to complete this configuration?

A.

R2(config-applel)# event oir

B.

R2(config-apple)#action 4 cli command "ip add 172.16.1.1 0.0.0.255"

C.

R2(config)# event manager session cli username

D.

R2(config-apple)# event none sync yes

Full Access
Question # 224

Simulation 10

Full Access
Question # 225

Refer to the exhibit. What is the cause of the communication failure between R1 and R4?

A.

R1 is configured with the no ip unreachables command.

B.

R2 is denying ICMP

C.

R4 is denying ICMP.

D.

R3 is denying ICMP.

Full Access
Question # 226

Refer to the exhibit.

Which GRE tunnel configuration command is missing on R2?

A.

tunnel source 192.181.2

B.

tunnel source 172.16.1.0

C.

tunnel source 200.1.1.1

D.

tunnel destination 200.1.1.1

Full Access
Question # 227

In which way are EIGRP and OSPF similar?

A.

They both support unequal-cost load balancing

B.

They both support MD5 authentication for routing updates.

C.

They nave similar CPU usage, scalability, and network convergence times.

D.

They both support autosummarization

Full Access
Question # 228

Refer to the exhibit Users cannot reach the web server at 192.168 100 1. What is the root cause for the failure?

A.

The server is attempting to load balance between links 10.100 100.1 and 10 100.200.1.

B.

The server is out of service.

C.

There is a loop in the path to the server.

D.

The gateway cannot translate the server domain name.

Full Access
Question # 229

Drag and drop the characteristics from the left onto the switching architectures on the right.

Full Access
Question # 230

When a wired client connects to an edge switch in a Cisco SD-Access fabric, which component decides whether the client has access to the network?

A.

control-plane node

B.

edge node

C.

Identity services Engine

D.

RADIUS server

Full Access
Question # 231

Which DNS lookup does an access point perform when attempting CAPWAP discovery?

A.

CISCO-DNA-CONTROLLER local

B.

CAPWAP-CONTROLLER local

C.

CISCO-CONTROLLER local

D.

CISCO-CAPWAP-CONTROLLER local

Full Access
Question # 232

A network administrator for a small office is adding a passive IDS to its network switch for the purpose of inspecting network traffic. Which of the following should the administrator use?

A.

SNMPtrap

B.

Port mirroring

C.

Syslog collection

D.

API integration

Full Access
Question # 233

Which two features are available only in next-generation firewalls? (Choose two.)

A.

virtual private network

B.

deep packet inspection

C.

stateful inspection

D.

application awareness

E.

packet filtering

Full Access
Question # 234

Which version of NetFlow does Cisco Threat Defense utilize to obtain visibility into the network?

A.

NBAR2

B.

IPFIX

C.

8

D.

flexible

Full Access
Question # 235

: 264

What is a characteristic of para-virtualization?

A.

Para-virtualization allows direct access between the guest OS and the hypervisor.

B.

Para-virtualization allows the host hardware to be directly accessed.

C.

Para-virtualization guest servers are unaware of one another.

D.

Para-virtualization lacks support for containers.

Full Access
Question # 236

Refer to the exhibit.

The inside and outside interfaces u configuration of this device have been correctly identified. What is the effect of this configuration?

A.

dynamic NAT

B.

NAT64

C.

PAT

D.

static NAT

Full Access
Question # 237

Refer to the exhibit. An engineer attempts to configure standby group 512 on interface GigabitEthernet0/1, but the configuration is not accepted. Which command resolves this problem?

A.

standby version 2

B.

standby 512 preempt

C.

standby redirects

D.

standby 512 priority 100

Full Access
Question # 238

How does SSO work with HSRP to minimize network disruptions?

A.

It enables HSRP to elect another switch in the group as the active HSRP switch.

B.

It ensures fast failover in the case of link failure.

C.

It enables data forwarding along known routes following a switchover, white the routing protocol reconverges.

D.

It enables HSRP to failover to the standby RP on the same device.

Full Access
Question # 239

AN engineer is implementing a route map to support redistribution within BGP. The route map must configured to permit all unmatched routes. Which action must the engineer perform to complete this task?

A.

Include a permit statement as the first entry

B.

Include at least one explicit deny statement

C.

Remove the implicit deny entry

D.

Include a permit statement as the last entry

Full Access
Question # 240

What does a northbound API accomplish?

A.

programmatic control of abstracted network resources through a centralized controller

B.

access to controlled network resources from a centralized node

C.

communication between SDN controllers and physical switches

D.

controlled access to switches from automated security applications

Full Access
Question # 241

Which new enhancement was implemented in Wi-Fi 6?

A.

Wi-Fi Protected Access 3

B.

4096 Quadrature Amplitude Modulation Mode

C.

Channel bonding

D.

Uplink and Downlink Orthogonal Frequency Division Multiple Access

Full Access
Question # 242

A network administrator is implementing a routing configuration change and enables routing debugs to track routing behavior during the change. The logging output on the terminal is interrupting the command typing process. Which two actions can the network administrator take to minimize the possibility of typing commands incorrectly? (Choose two.)

A.

Configure the logging synchronous global configuration command

B.

Configure the logging delimiter feature

C.

Configure the logging synchronous command under the vty

D.

Press the TAB key to reprint the command in a new line

E.

increase the number of lines on the screen using the terminal length command

Full Access
Question # 243

Refer to the exhibit. PC-1 must access the web server on port 8080. To allow this traffic, which statement must be added to an access control list that is applied on SW2 port G0/0 in the inbound direction?

A.

permit host 172.16.0.2 host 192.168.0.5 eq 8080

B.

permit host 192.168.0.5 host 172.16.0.2 eq 8080

C.

permit host 192.168.0.5 eq 8080 host 172.16.0.2

D.

permit host 192.168.0.5 it 8080 host 172.16.0.2

Full Access
Question # 244

A vulnerability assessment highlighted that remote access to the switches is permitted using unsecure and unencrypted protocols Which configuration must be applied to allow only secure and reliable remote access for device administration?

A.

line vty 0 15

login local

transport input none

B.

line vty 0 15

login local

transport input telnet ssh

C.

line vty 0 15

login local

transport input ssh

D.

line vty 0 15

login local

transport input all

Full Access
Question # 245

Refer to the exhibit.

What is the effect of these commands on the BR and HQ tunnel interfaces?

A.

The tunnel line protocol goes down when the keepalive counter reaches 6

B.

The keepalives are sent every 5 seconds and 3 retries

C.

The keepalives are sent every 3 seconds and 5 retries

D.

The tunnel line protocol goes down when the keepalive counter reaches 5

Full Access
Question # 246

How must network management traffic be treated when defining QoS policies?

A.

as delay-sensitive traffic in a low latency queue

B.

using minimal bandwidth guarantee

C.

using the same marking as IP routing

D.

as best effort

Full Access
Question # 247

Which two characteristics define the Intent API provided by Cisco DNA Center? (Choose two.)

A.

northbound API

B.

business outcome oriented

C.

device-oriented

D.

southbound API

E.

procedural

Full Access
Question # 248

Drag and drop the characteristics from the left onto the deployment models on the right.

Full Access
Question # 249

Drag and drop characteristics of PIM dense mode from the left to the right.

Full Access
Question # 250

Refer to the exhibit.

What is the result when a switch that is running PVST+ is added to this network?

A.

DSW2 operates in Rapid PVST+ and the new switch operates in PVST+

B.

Both switches operate in the PVST+ mode

C.

Spanning tree is disabled automatically on the network

D.

Both switches operate in the Rapid PVST+ mode.

Full Access
Question # 251

Drag and drop the snippets onto the blanks within the code to construct a script that adds a prefix list to a route map and sets the local preference. Not all options are used

Full Access
Question # 252

What are two considerations when using SSO as a network redundancy feature? (Choose two)

A.

both supervisors must be configured separately

B.

the multicast state is preserved during switchover

C.

must be combined with NSF to support uninterrupted Layer 2 operations

D.

must be combined with NSF to support uninterrupted Layer 3 operations

E.

requires synchronization between supervisors in order to guarantee continuous connectivity

Full Access