Refer to the exhibit.
Which command when applied to the Atlanta router reduces type 3 LSA flooding into the backbone area and summarizes the inter-area routes on the Dallas router?
Refer to the exhibit.
R2 is the neighboring router of R1. R2 receives an advertisement for network 192 168.10.50/32. Which configuration should be applied for the subnet to be advertised with the original /24 netmask?
A)
B)
C)
D)
A network engineer must configure a router to send logging messages to a syslog server based on these requirements:
uses syslog IP address: 10.10.10.1
uses a reliable protocol
must not use any well-known TCP/UDP ports
Which configuration must be used?
A client device roams between wireless LAN controllers that are mobility peers, Both controllers have dynamic interface on the same client VLAN which type of roam is described?
Refer to the exhibit:
An engineer configures VRRP and issues the show commands to verify operation. What does the engineer confirm about VRRP group 1 from the output?
Refer to the exhibit. A network engineer must configure NETCONF. After creating the configuration, the engineer gets output from the command show line, but not from show running-config. Which command completes the configuration?
In a Cisco SD-WAN solution, which two functions are performed by OMP? (Choose two.)
Refer to the exhibit.
CR2 and CR3 ate configured with OSPF. Which configuration, when applied to CR1. allows CR1 to exchange OSPF Information with CR2 and CR3 but not with other network devices or on new Interfaces that are added to CR1?
A)
B)
C)
D)
A customer requests a design that includes GLBP as the FHRP The network architect discovers that the members of the GLBP group have different throughput capabilities Which GLBP load balancing method supports this environment?
Refer to the exhibit.
All switches are configured with the default port priority value. Which two commands ensure that traffic from PC1 is forwarded over Gi1/3 trunk port between DWS1 and DSW2? (Choose two)
Refer to the exhibit.
An engineer is designing a guest portal on Cisco ISE using the default configuration. During the testing phase, the engineer receives a warning when displaying the guest portal. Which issue is occurring?
Refer to the exhibit.
An engineer must configure and validate a CoPP policy that allows the network management server to monitor router R1 via SNMP while protecting the control plane. Which two commands or command sets must be used? (Choose two.)
Refer to the exhibit.
An engineer must establish eBGP peering between router R3 and router R4. Both routers should use their loopback interfaces as the BGP router ID. Which configuration set accomplishes this task?
Which feature does Cisco TrustSec use to provide scalable, secure communication throughout a network?
Why is an AP joining a different WLC than the one specified through option 43?
What occurs when a high bandwidth multicast stream is sent over an MVPN using Cisco hardware?
What NTP Stratum level is a server that is connected directly to an authoritative time source?
Refer to the exhibit.
VPN-A sends point-to-point traffic to VPN-B and receives traffic only from VPN-C VPN-B sends point-to-point traffic to VPN-C and receives traffic only from VPN-A Which configuration is applied?
A)
B)
C)
D)
Which OSPF networks types are compatible and allow communication through the two peering devices?
In a Cisco SD-WAN solution, how Is the health of a data plane tunnel monitored?
An engineer configures a WLAN with fast transition enabled Some legacy clients fail to connect to this WLAN Which feature allows the legacy clients to connect while still allowing other clients to use fast transition based on then OLTIs?
Refer to the exhibit.
What is the result when a technician adds the monitor session 1 destination remote vlan 223 command1?
A customer wants to provide wireless access to contractors using a guest portal on Cisco ISE. The portal Is also used by employees A solution is implemented, but contractors receive a certificate error when they attempt to access the portal Employees can access the portal without any errors. Which change must be implemented to allow the contractors and employees to access the portal?
Refer to the exhibit.
An engineer reconfigures the pot-channel between SW1 and SW2 from an access port to a trunk and immediately notices this error in SW1's log.
Which command set resolves this error?
A)
B)
C)
D)
Refer to the exhibit.
An engineer configures the BGP adjacency between R1 and R2, however, it fails to establish Which action resolves the issue?
Refer to the exhibit.
An engineers reaching network 172 16 10 0/24 via the R1-R2-R4 path. Which configuration forces the traffic to take a path of R1-R3-R4?
A)
B)
C)
D)
Refer to the exhibit.
Which command must be applied to Router 1 to bring the GRE tunnel to an up/up state?
An engineer is configuring a GRE tunnel interface in the default mode. The engineer has assigned an IPv4 address on the tunnel and sourced the tunnel from an Ethernet interface. Which option also is required on the tunnel interface before it is operational?
Refer to the exhibit.
After running the code in the exhibit. Which step reduces the amount of data that NETCONF server returns to the NETCONF client, to only the interface’s configuration?
Refer to the exhibit.
Which IP address becomes the active next hop for 192.168.102 0/24 when 192.168.101.2 fails?
Refer to the exhibit
Communication between London and New York is down Which to resolve this issue?
A)
B)
C)
D)
Which LISP device is responsible for publishing EID-to-RLOC mappings for a site?
Drag and drop the descriptions of the VSS technology from the left to the right. Not all options are used.
Based on the router's API output in JSON format below, which Python code will display the value of the "hostname" key?
A)
B)
C)
D)
Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right.
Refer to the exhibit.
An engineer must configure static NAT on R1 lo allow users HTTP access to the web server on TCP port 80. The web server must be reachable through ISP 1 and ISP 2. Which command set should be applied to R1 to fulfill these requirements?
Refer to the exhibit.
Which configuration change ensures that R1 is the active gateway whenever it is in a functional state for the 172.30.110.0724 network?
A)
B)
C)
D)
Drag and drop the automation characteristics from the left onto the appropriate tools on the right.
Which protocol is implemented to establish secure control plane adjacencies between Cisco SD-WAN nodes?
Refer to the exhibit.
After the code is run on a Cisco IOS-XE router, the response code is 204.
What is the result of the script?
Refer to the exhibit.
A network engineer must configure the router to use the ISE-Servers group for authentication. If both ISE servers are unavailable, the local username database must be used. If no usernames are defined in the configuration, then the enable password must be the last resort to log in. Which configuration must be applied to achieve this result?
Which two features does the Cisco SD-Access architecture add to a traditional campus network? (Choose two.)
Refer to the exhibit.
An engineer must allow all users in the 10.2.2.0/24 subnet to access the Internet. To conserve address space the public Interface address of 209 165 201.1 must be usedfor all external communication. Which command set accomplishes these requirements?
A)
B)
C)
D)
A network engineer is configuring OSPF on a router. The engineer wants to prevent having a route to 177.16.0.0/16 learned via OSPF. In the routing table and configures a prefix list using the command ip prefix-list OFFICE seq S deny 172.16.0.0/16. Winch two identical configuration commands must be applied to accomplish the goal? (Choose two.)
Refer to the exhibit. An engineer tries to log in to router R1. Which configuration enables a successful login?
A)
B)
C)
D)
Refer to the exhibit.
Object tracking has been configured for VRRP-enabled routers Edge-01 and Edge-02 Which commands cause Edge-02 to preempt Edge-01 in the event that interface G0/0 goes down on Edge-01?
A)
B)
C)
D)
Refer to the exhibit. Which command set must be added to permit and log all traffic that comes from 172.20.10.1 in interface GigabitEthernet0/1 without impacting the functionality of the access list?
Which two solutions are used for backing up a Cisco DNA Center Assurance database? (Choose two)
Drag and drop the Cisco SD-Access solution areas from the left onto the protocols they use on the right.
Drag anti drop the characteristics from the ten onto the configuration models on the right.
In a Cisco Catalyst switch equipped with two supervisor modules an administrator must temporally remove the active supervisor from the chassis to perform hardware maintenance on it. Which mechanism ensure that the active supervisor removal is not disruptive to the network operation?
Which two characteristics apply to the endpoint security aspect of the Cisco Threat Defense architecture? (Choose two.)
Refer to the exhibit.
Which command set must be applied on R1 to establish a BGP neighborship with R2 and to allow communication from R1 to reach the networks?
A)
B)
C)
D)
The Gig0/0 interface of two routers is directly connected with a 1G Ethernet link. Which configuration must be applied to the interface of both routers to establish an OSPF adjacency without maintaining a DR/BDR relationship?
A)
B)
C)
D)
Which VXLAN component is used to encapsulate and decapsulate Ethernet frames?
Refer to the exhibit.
The administrator troubleshoots an EtherChannel that keeps moving to err-disabled. Which two actions must be taken to resolve the issue? (Choose two.)
Refer to the exhibit. A network engineer must block Telnet traffic from hosts in the range of 10.100 2.248 to 10.100.2 255 to the network 10.100.3.0 and permit everything else. Which configuration must the engineer apply'?
A)
B)
C)
D)
Which method displays text directly into the active console with a synchronous EEM applet policy?
What is the calculation that is used to measure the radiated power of a signal after it has gone through the radio, antenna cable, and antenna?
Refer to the exhibit.
An engineer configures routing between all routers and must build a configuration to connect R1 to R3 via a GRE tunnel Which configuration must be applied?
A)
B)
C)
D)
Refer to the exhibit.
An engineer must set up connectivity between a campus aggregation layer and a branch office access layer. The engineer uses dynamic trunking protocol to establish this connection, however, management traffic on VLAN1 is not passing. Which action resolves the issue and allow communication for all configured VLANs?
Refer to the exhibit. An attacker can advertise OSPF fake routes from 172.16.20.0 network to the OSPF domain and black hole traffic. Which action must be taken to avoid this attack and still be able to advertise this subnet into OSPF?
A system must validate access rights to all its resources and must not rely on a cached permission matrix. If the access level to a given resource is revoked but is not reflected in the permission matrix, the security is violated. Which term refers to this REST security design principle?
Refer the exhibit.
Which configuration elects SW4 as the root bridge for VLAN 1 and puts G0/2 on SW2 into a blocking state?
A)
B)
C)
D)
Which configuration creates a CoPP policy that provides unlimited SSH access from dient 10.0.0.5 and denies access from all other SSH clients'?
A)
B)
C)
D)
Drag and drop the characteristics from the left onto the deployment types on the right.
What is an emulated machine that has dedicated compute memory, and storage resources and a fully installed operating system?
Which two Cisco SD-Access components provide communication between traditional network elements and controller layer? (choose two)
An engineer must configure a new loopback Interface on a router and advertise the interface as a fa4 in OSPF. Which command set accomplishes this task?
A)
B)
C)
D)
If the maximum power level assignment for global TPC 802.11a/n/ac is configured to 10 dBm, which power level effectively doubles the transmit power?
Refer to the exhibit.
An engineer must allow R1 to advertise the 192 168.1 0/24 network to R2 R1 must perform this action without sending OSPF packets to SW1 Which command set should be applied?
A)
B)
C)
D)
Refer to the exhibit .
Which command must be configured for RESTCONF to operate on port 8888?
What is used to validate the authenticity of the client and is sent in HTTP requests as a JSON object?
Refer to the exhibit.
An engineer must configure an ERSPAN session with the remote end of the session 10.10.0.1. Which commands must be added to complete the configuration?
A)
B)
C)
D)
Refer to the exhibit. Which configuration must be added to enable GigabitEthemet 0/1 to participate in OSPF?
Refer to the exhibit.
What are two effect of this configuration? (Choose two.)
Simulation 04
ConfigureOSPF on both routers according to the topology to achieve these goals:
Refer to the exhibit.
Which configuration enables fallback to local authentication and authorization when no TACACS+ server is available?
Refer to the exhibit. A network administrator must configure router B to allow traffic only from network 10.1002.0 to networks outside of router 0. Which configuration must be applied?
A)
B)
C)
D)
Refer to the exhibit.
A company has an internal wireless network with a hidden SSID and RADIUS-based client authentication for increased security. An employee attempts to manually add the company network to a laptop, but the laptop does not attempt to connect to the network. The regulatory domains of the access points and the laptop are identical. Which action resolves this issue?
Drag and drop the characteristics from the left onto the switching architectures on the right.
A customer deploys a new wireless network to perform location-based services using Cisco DNA Spaces The customer has a single WLC located on-premises in a secure data center. The security team does not want to expose the WLC to the public Internet. Which solution allows the customer to securely send RSSI updates to Cisco DNA Spaces?
Refer to the exhibit Remote users cannot access the Internet but can upload files to the storage server Which configuration must be applied to allow Internet access?
A)
B)
C)
D)
Refer to the exhibit. An engineer configures HSRP and enters theshow standbycommand. Which two facts about the network environment are derived from the output? (Choose two.)
Which two new security capabilities are introduced by using a next-generation firewall at the Internet edge? (Choose two.)
Refer to the exhibit. An engineer is reaching network 172.16.10.0/24 via the R1-R2-R4 path. Which configuration forces the traffic to fake a path of R1-R3-R4?
A)
B)
C)
D)
Which authorization framework gives third-party applications limited access to HTTP services?
How does Cisco Express Forwarding switching differ from process switching on Cisco devices?
Drag and drop the LISP components on the left to the correct description on the right.
An engineer applies this configuration to router R1. How does R1 respond when the user ‘cisco’ logs in?
Refer to the exhibit. Traffic is not passing between SW1 and SW2. Which action fixes the issue?
Refer to the exhibit. Which command allows hosts that are connected to FastEthernet0/2 to access the Internet?
Refer to the exhibit. Which configuration is required to summarize the Area 2 networks that are advertised to Area 0?
Which Python code snippet must be added to the script to store the changed interface configuration to a local JSON-formatted file?
Refer to the exhibit. An engineer must protect the CPU of the router from high rates of NTP, SNMP, and SSH traffic. Which two configurations must be applied to drop these types of traffic when it continuously exceeds 320 kbps? (Choose two)
Refer to the exhibit. An engineer must allow the FTP traffic from users on 172.16.1.0 /24 to 172.16.2.0 /24 and block all other traffic. Which configuration must be applied?
A)
B)
C)
D)
A firewall address of 192 166.1.101 can be pinged from a router but, when running a traceroute to It, this output is received
What is the cause of this issue?
Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right.
Refer to the exhibit.
An engineer must assign an IP address of 192.168.1.1/24 to the GigabitEtherenet1 interface. Which two commands must be added to the existing configuration to accomplish this task? (Choose two.)
Refer to the exhibit. An engineer builds an EEM script to apply an access list. Which statement must be added to complete the script?
Which Quality of Service (QoS) mechanism allows the network administrator to control the maximum rate of traffic received or sent on a given interface?
Why would a customer implement an on-premises solution instead of a cloud solution?
Which device, in a LISP routing architecture, receives and de-encapsulates LISP traffic for endpoints within a LISP-capable site?
An engineer must configure a new WLAN that allows a user to enter a passphrase and provides forward secrecy as a security measure. Which Layer 2 WLAN configuration is required on the Cisco WLC?
Which IP SLA operation requires the IP SLA responder to be configured on the remote end?
An engineer is describing QoS to a client. Which two facts apply to traffic policing? (Choose two.)
Which language defines the structure or modelling of data for NETCONF and RESTCONF?
Which NTP mode must be activated when using a Cisco router as an NTP authoritative server?
Refer to the exhibit. An engines configured TACACS^ to authenticate remote users but the configuration is not working as expected Which configuration must be applied to enable access?
A)
B)
C)
D)
Drag and drop the descriptions from the left onto the routing protocol they describe on the right.
Drag and drop the characteristics from the left onto the switching mechanisms they describe on the right.
Drag and drop the snippets onto the blanks within the code to create an EEM script that adds an entry to a locally stored text file with a timestamp when a configuration change is made. Not all options are used.
Drag and drop the automation characteristics from the left onto the corresponding tools on the right.
In a wireless network environment, what is calculated using the numencal values of the transmitter power level, cable loss, and antenna gain?
Which port is required to allow APs to join a WLC when directed broadcasts are used on a Cisco iOS switch?
Drag and drop the description of the VSS technology from the left to the right. NOT all options are used.
Which security feature does stateless authentication and authorization use for REST API calls?
Refer to the exhibit.
Which configuration must be applied for the TACACS+ server to grant access-level rights to remote users?
High bandwidth utilization is occurring on interface Gig0/1 of a router. An engineer must identify the flows that are consuming the most bandwidth. Cisco DNA Center isused as a flow exporter and is configured with the IP address 192.168.23.1 and UDP port 23000. Which configuration must be applied to set NetFlow data export and capture on the router?
A)
B)
C)
D)
Why are stateless calls executed by REST API useful in cloud applications?
Refer to the exhibit.
What does the response "204 No Content mean for the REST API request?
Refer to the exhibit.
An administrator must collect basic statistics about the approximate amount of IPv4 and IPv6 flows entering Gi0/0 using NetFlow. However, the administrator is concerned that NetFlow processing during periods of high utilization on Gi0/0 will overwhelm the router CPU Which configuration minimizes CPU impact and keeps the data flows across Gi0/0 Intact?
Refer to the exhibit.
An engineer deploys a script to retrieve the running configuration from a NETCONF-capable Cisco IOS XE device that is configured with default settings. The script fails. Which configuration must be applied to retrieve the configurauon using NETCONF?
Refer to the exhibit.
An engineer is creating a Pytnon script to fetch the BGP configuration from a device using RESTCONF. What does the output Indicate?
Which DNS record type is required to allow APs to discover a WLC by using DNS on IPv4?
In a cisco DNA center plug and play environment, why would a device be labeled unclaimed?
Why would a small or mid-size business choose a cloud solution over an on-premises solution?
Refertothe exhibit. A network engineer Is troubleshooting an Issue with the file server based on reports of slow file transmissions. Which two commands or command sets are required. In switch SW1 to analyze the traffic from the file server with a packet analyzer? (Choose two.)
A)
B)
C)
D)
An engineer receives a report that an application exhibits poor performance. On the switch where the server is connected, this syslog message is visible:
SW_MATM4-MACFLAP_N0HF: Host 0054.3831.8253 in vlan 14 is flapping between port GUAM and port Gi1/0/2.
What is causing the problem?
Refer to the exhibit.
An engineer must send the 172.16.2.0 /24 user traffic to a packet capture tool to troubleshoot an issue. Which action completes the configuration?
A technician is assisting a user who cannot connect to a website. The technician attempts to ping the default gateway and DNS server of the workstation. According to troubleshooting methodology, this is an example of:
Refer to the exhibit. An engineer attempts to use RESTCONF to configure GigabitEthernet2 on a remote router with IP address 192.168.159.10. but the configuration fails. Which configuration is required to complete the action?
An engineer must configure a multicast UDP jitter operation. Which configuration should be applied?
A)
B)
C)
D)
Reler to the exhibit. An engineer a configuring WebAuth on a Cisco Catalyst 9000 Series WIC. The engineer has purchased a third-party certificate using the FQDN of the WLC as the CN and intends to use bit on the WebAuth splash page What must be configured so that the clients do not receive a certificate error?
What is a benefit of Cisco TrustSec in a multilayered LAN network design?
Refer to the exhibit.
Which configuration must be added to enable remote access only using SSHv1 or SSHv2 to this router?
A)
B)
C)
D)
What is provided to the client to identify the authenticated session in subsequent API calls after authenticating to the Cisco DNA Center API?
What is the preferred QoS marking for delay-sensitive real-time protocols such as RTP?
Which of the following fiber connector types is the most likely to be used on a network interface card?
Refer to the exhibit.
An engineer must create a manually triggered EEM applet to enable the R2 router interface and assign an IP address to it. What is required to complete this configuration?
Drag and drop the automation characteristics from the left onto the corresponding tools on the right. Not all options are used.
Which configuration filters outDOT1Xmessages in the format shown below from being sent toward Syslog server 10.15.20.33?
A)
B)
C)
D)
Which control plane protocol is used between Cisco SD-WAN routers and vSmart controllers?
Which configuration allows administrators to configure the device through the console port and use a network authentication server?
A)
B)
C)
D)
Refer to the exhibit.
An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as an entry point. Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplish task?
Refer to the exhibit.
Which type of antenna is show on the radiation patterns?
Which AP mode allows an engineer to scan configured channels for rogue access points?
Which two network problems Indicate a need to implement QoS in a campus network? (Choose two.)
Running the script causes the output in the exhibit. Which change to the first line of the script resolves the error?
Refer to the exhibit. External users require HTTP connectivity to an internal company web server that is listening on TCP port 8080. Which command set accomplishes this requirement?
A)
B)
C)
D)
E)
“HTTP/1.1 204 content†is returned when cur –I –x delete command is issued. Which situation has occurred?
Refer to the exhibit.
SwitchC connects HR and Sales to the Core switch However, business needs require that no traffic from the Finance VLAN traverse this switch Which command meets this requirement?
A)
B)
C)
D)
Drag and drop the virtual components from the left onto their deceptions on the right.
When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?
Refer to the exhibit.
A network engineer configures OSPF and reviews the router configuration. Which interface or interface or interface are able to establish OSPF adjacency?
A company plans to implement intent-based networking in its campus infrastructure. Which design facilities a migrate from a traditional campus design to a programmer fabric designer?
Refer to the exhibit. Which set of commands on router r R1 Allow deterministic translation of private hosts PC1, PC2, and PC3 to addresses in the public space?
A)
B)
C)
D)
Refer to the exhibit.Anetwork engineer configuresNATon R1 and enters theshowcommand to verity the configuration What does the output confirm?
A customer requests a network design that supports these requirements:
Which protocol does the design include?
Refer to the exhibit.
Which HTTP JSON response does the python code output give?
How does Cisco Trustsec enable more access controls for dynamic networking
environments and data centers?
Which DHCP option helps lightweight APs find the IP address of a wireless LAN controller?
Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial?
Refer the exhibit.
Which router is the designated router on the segment 192.168.0.0/24?
In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC?
Refer to the exhibit.
What are two effects of this configuration? (Choose two.)
Refer to the exhibit Which single security feature is recommended to provide Network Access Control in the enterprise?
Refer to the exhibit. A network engineer troubleshoots an issue with the port channel between SW1 and SW2. which command resolves the issue?
A)
B)
C)
D)