Refer the exhibit.
Which router is the designated router on the segment 192.168.0.0/24?
Refer to the exhibit.
An engineer must configure and validate a CoPP policy that allows the network management server to monitor router R1 via SNMP while protecting the control plane. Which two commands or command sets must be used? (Choose two.)
Which solution do laaS service providers use to extend a Layer 2 segment across a Layer 3 network?
What occurs when a high bandwidth multicast stream is sent over an MVPN using Cisco hardware?
Which element enables communication between guest VMs within a virtualized environment?
Refer to the exhibit.
An engineer must configure static NAT on R1 lo allow users HTTP access to the web server on TCP port 80. The web server must be reachable through ISP 1 and ISP 2. Which command set should be applied to R1 to fulfill these requirements?
Refer to the exhibit.
CR2 and CR3 ate configured with OSPF. Which configuration, when applied to CR1. allows CR1 to exchange OSPF Information with CR2 and CR3 but not with other network devices or on new Interfaces that are added to CR1?
A)
B)
C)
D)
Based on the router's API output in JSON format below, which Python code will display the value of the "hostname" key?
A)
B)
C)
D)
Refer to the exhibit.
After configuring HSRP an engineer enters the show standby command. Which two facts are derived from the output? (Choose two.)
How does Cisco Trustsec enable more flexible access controls for dynamic networking environments and data centers?
In a Cisco SD-Access solution, which protocol is used by an extended node to connect to a single edge node?
Refer to the exhibit.
VPN-A sends point-to-point traffic to VPN-B and receives traffic only from VPN-C VPN-B sends point-to-point traffic to VPN-C and receives traffic only from VPN-A Which configuration is applied?
A)
B)
C)
D)
A network is being migrated from IPV4 to IPV6 using a dual-stack approach. Network management is already 100% IPV6 enabled. In a dual-stack network with two dual-stack NetFlow collections, how many flow exporters are needed per network device in the flexible NetFlow configuration?
Which HHTP status code is the correct response for a request with an incorrect password applied to a REST API session?
In a Cisco StackWise Virtual environment, which planes are virtually combined in the common logical switch?
Which two parameters are examples of a QoS traffic descriptor? (Choose two)
Refer to the exhibit.
An engineer reconfigures the pot-channel between SW1 and SW2 from an access port to a trunk and immediately notices this error in SW1's log.
Which command set resolves this error?
A)
B)
C)
D)
An engineer configures a WLAN with fast transition enabled Some legacy clients fail to connect to this WLAN Which feature allows the legacy clients to connect while still allowing other clients to use fast transition based on then OLTIs?
Which access point mode allows a supported AP to function like a WLAN client would, associating and identifying client connectivity issues?
What are two benefits of implementing a Cisco SD-WAN architecture? (Choose two)
Refer to the exhibit. Which command is required to verify NETCONF capability reply messages?
Refer to the exhibit.
A company requires that all wireless users authenticate using dynamic key generation. Which configuration must be applied?
Refer to the exhibit.
Which two facts does the device output confirm? (Choose two.)
An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy. Which device presents the web authentication for the WLAN?
Refer to the exhibit.
An engineer must add the SNMP interface table to the NetFlow protocol flow records. Where should the SNMP table option be added?
Refer to the exhibit.
An engineer attempts to bundle interface Gi0/0 into the port channel, but it does not function as expected. Which action resolves the issue?
Refer to the exhibit.
On which interfaces should VRRP commands be applied to provide first hop redundancy to PC-01 and PC-02?
A customer wants to use a single SSID to authenticate loT devices using different passwords. Which Layer 2 security type must be configured in conjunction with Cisco ISE to achieve this requirement?
Drag and drop the descriptions from the left onto the routing protocol they describe on the right.
A network engineer is adding an additional 10Gps link to an exiting 2x10Gps LACP-based LAG to augment its capacity. Network standards require a bundle interface to be taken out of service if one of its member links goes down, and the new link must be added with minimal impact to the production network. Drag and drop the tasks that the engineer must perform from the left into the sequence on the right. Not all options are used.
What does the LAP send when multiple WLCs respond to the CISCO_CAPWAP-CONTROLLER.localdomain hostname during the CAPWAP discovery and join process?
Refer to the exhibit.
Object tracking has been configured for VRRP-enabled routers Edge-01 and Edge-02 Which commands cause Edge-02 to preempt Edge-01 in the event that interface G0/0 goes down on Edge-01?
A)
B)
C)
D)
Refer to the exhibit. An engineer must configure an eBGP neighborship to Router B on Router A. The network that is connected to GO/1 on Router A must be advertised to Router B. Which configuration should be applied?
A)
B)
C)
D)
Refer to the exhibit. Which configuration must be implemented to establish EBGP peering between R1 and R2?
What is the recommended minimum SNR for data applications on wireless networks?
An engineer must configure a new loopback Interface on a router and advertise the interface as a fa4 in OSPF. Which command set accomplishes this task?
A)
B)
C)
D)
Refer to the exhibit. Which configuration must be added to enable GigabitEthemet 0/1 to participate in OSPF?
Drag and drop the characteristics from the left onto the deployment types on the right.
Which method displays text directly into the active console with a synchronous EEM applet policy?
Drag and drop the automation characteristics from the left onto the appropriate tools on the right.
Refer to the exhibit.
R1 is able to ping the R3 fa0/1 Interface. Why do the extended pings fail?
Refer to the exhibit.
An engineer must set up connectivity between a campus aggregation layer and a branch office access layer. The engineer uses dynamic trunking protocol to establish this connection, however, management traffic on VLAN1 is not passing. Which action resolves the issue and allow communication for all configured VLANs?
Refer to the exhibit. Which python code parses the response and prints “18:32:21.474 UTC sun Mar 10 2019?
Refer to the exhibit.
What are two effect of this configuration? (Choose two.)
Refer to the exhibit.
An engineer must configure an ERSPAN session with the remote end of the session 10.10.0.1. Which commands must be added to complete the configuration?
A)
B)
C)
D)
Which resource is able to be shared among virtual machines deployed on the same physical server?
In a Cisco Catalyst switch equipped with two supervisor modules an administrator must temporally remove the active supervisor from the chassis to perform hardware maintenance on it. Which mechanism ensure that the active supervisor removal is not disruptive to the network operation?
Which two features does the Cisco SD-Access architecture add to a traditional campus network? (Choose two.)
Which three resources must the hypervisor make available to the virtual machines? (Choose three)
what is a benefit of using a Type 2 hypervisor instead of a Type 1 hypervisor?
Which option works with a DHCP server to return at least one WLAN management interface IP address during the discovery phase and is dependent upon the VCI of the AP?
Which configuration creates a CoPP policy that provides unlimited SSH access from dient 10.0.0.5 and denies access from all other SSH clients'?
A)
B)
C)
D)
Drag and drop the LISP components on the left to their descriptions on the right. Not all options are used.
A system must validate access rights to all its resources and must not rely on a cached permission matrix. If the access level to a given resource is revoked but is not reflected in the permission matrix, the security is violated. Which term refers to this REST security design principle?
Refer to the exhibit.
An engineer must allow R1 to advertise the 192 168.1 0/24 network to R2 R1 must perform this action without sending OSPF packets to SW1 Which command set should be applied?
A)
B)
C)
D)
A network engineer is configuring OSPF on a router. The engineer wants to prevent having a route to 177.16.0.0/16 learned via OSPF. In the routing table and configures a prefix list using the command ip prefix-list OFFICE seq S deny 172.16.0.0/16. Winch two identical configuration commands must be applied to accomplish the goal? (Choose two.)
Refer to the exhibit. A network administrator configured RSPAN to troubleshoot an issue between switch1 and switch2. The switches are connected using interface GigabitEthernet 1/1. An external packet capture device is connected is switch2 interface GigabitEthernet 1/2. Which two commands must be added to complete this configuration? (Choose two)
Refer to the exhibit. Which command set must be added to permit and log all traffic that comes from 172.20.10.1 in interface GigabitEthernet0/1 without impacting the functionality of the access list?
Drag and drop the characteristics from the left onto the technology types on the right.
Refer to the exhibit.
An engineer configures routing between all routers and must build a configuration to connect R1 to R3 via a GRE tunnel Which configuration must be applied?
A)
B)
C)
D)
Refer to the exhibit.
An engineer must deny Telnet traffic from the loopback interface of router R3 to the Loopback interface of router R2 during, the weekend hours. All other traffic between the loopback interfaces of routers R3 and R2 must be allowed at all times Which command set accomplishes this task?
A)
B)
C)
D)
Which Cisco FlexConnect state allows wireless users that are connected to the network to continue working after the connection to the WLC has been lost?
Which two solutions are used for backing up a Cisco DNA Center Assurance database? (Choose two)
Which feature Is used to propagate ARP broadcast, and link-local frames across a Cisco SD-Access fabric to address connectivity needs for silent hosts that require reception of traffic to start communicating?
An engineer must configure a router to leak routes between two VRFs Which configuration must the engineer apply?
Which option must be used to support a WLC with an IPv6 management address and 100 Cisco Aironet 2800 Series access points that will use DHCP to register?
Refer to the exhibit.
Which command set must be applied on R1 to establish a BGP neighborship with R2 and to allow communication from R1 to reach the networks?
A)
B)
C)
D)
Refer to the exhibit .
Which command must be configured for RESTCONF to operate on port 8888?
Refer to the exhibit.
Which configuration must be applied to the HQ router to set up a GRE tunnel between the HQ and BR routers?
A)
B)
C)
D)
Refer to the exhibit.
The administrator troubleshoots an EtherChannel that keeps moving to err-disabled. Which two actions must be taken to resolve the issue? (Choose two.)
What is used to validate the authenticity of the client and is sent in HTTP requests as a JSON object?
An engineer must configure an ACL that permits packets which include an ACK in the TCP header Which entry must be included in the ACL?
Drag and drop the characteristics from the left to the table types on the right.
What is a characteristic of the overlay network in the Cisco SD-Access architecture?
Which function does a fabric wireless LAN controller perform In a Cisco SD-Access deployment?
Refer to the exhibit. A network engineer must block Telnet traffic from hosts in the range of 10.100 2.248 to 10.100.2 255 to the network 10.100.3.0 and permit everything else. Which configuration must the engineer apply'?
A)
B)
C)
D)
Which type of tunnel Is required between two WLCs to enable Intercontroller roaming?
Which component transports data plane traffic across a Cisco SD-WAN network?
If the maximum power level assignment for global TPC 802.11a/n/ac is configured to 10 dBm, which power level effectively doubles the transmit power?
Which AP mode allows an engineer to scan configured channels for rogue access points?
A server running Linux is providing support for virtual machines along with DNS and DHCP services for a small business. Which technology does this represent?
Refer to the exhibit.
A network engineer configures OSPF and reviews the router configuration. Which interface or interface or interface are able to establish OSPF adjacency?
Refer to the exhibit.
A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Which two configuration changes accomplish this? (Choose two).
A customer requests a network design that supports these requirements:
Which protocol does the design include?
An engineer has deployed a single Cisco 5520 WLC with a management IP address of 172.16.50.5/24. The engineer must register 50 new Cisco AIR-CAP2802I-E-K9 access points to the WLC using DHCP option 43. The access points are connected to a switch in VLAN 100 that uses the 172.16.100.0/24 subnet. The engineer has configured the DHCP scope on the switch as follows:
The access points are failing to join the wireless LAN controller. Which action resolves the issue?
Wireless users report frequent disconnections from the wireless network. While troubleshooting a network engineer finds that after the user a disconnect, the connection re-establishes automatically without any input required. The engineer also notices these message logs .
Which action reduces the user impact?
Refer to exhibit.
VLANs 50 and 60 exist on the trunk links between all switches All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server Which command ensures that SW3 receives frames only from VLAN 50?
A network engineer configures a new GRE tunnel and enters the show run command. What does the output verify?
Which method should an engineer use to deal with a long-standing contention issue between any two VMs on the same host?
How does Cisco Trustsec enable more access controls for dynamic networking
environments and data centers?
Which two network problems Indicate a need to implement QoS in a campus network? (Choose two.)
While configuring an IOS router for HSRP with a virtual IP of 10 1.1.1. an engineer sees this log message.
Which configuration change must the engineer make?
Which benefit is offered by a cloud infrastructure deployment but is lacking in an on-premises deployment?
Refer to the exhibit.
Which configuration establishes EBGP neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP?
A)
B)
C)
D)
Which devices does Cisco DNA Center configure when deploying an IP-based access control policy?
A network administrator applies the following configuration to an IOS device.
What is the process of password checks when a login attempt is made to the device?
Refer to the exhibit. An engineer must create a script that appends the output of the show process cpu sorted command to a file.
Running the script causes the output in the exhibit. Which change to the first line of the script resolves the error?
A network engineer configures BGP between R1 and R2. Both routers use BGP peer group CORP and are set up to use MD5 authentication. This message is logged to the console of router R1:
Which two configuration allow peering session to from between R1 and R2? Choose two.)
Refer to the exhibit.
Which configuration allows Customer2 hosts to access the FTP server of Customer1 that has the IP address of 192.168.1.200?
Refer to the exhibit. What does the error message relay to the administrator who is trying to configure a Cisco IOS device?
Drag and drop the characteristics from the left onto the appropriate infrastructure deployment types on the right.
Refer to the exhibit. A network engineer configures NAT on R1 and enters the show command to verity the configuration What does the output confirm?
Refer to the exhibit. After configurating an IPsec VPN, an engineer enters the show command to verify the ISAKMP SA status. What does the status show?
Refer to the exhibit.
What are two effects of this configuration? (Choose two.)
Refer to the exhibit.
An engineer implemented several configuration changes and receives the logging message on switch1. Which action should the engineer take to resolve this issue?
Drag and drop the solutions that comprise Cisco Cyber Threat Defense from the left onto the objectives they accomplish on the right.
Refer to the exhibit.
SwitchC connects HR and Sales to the Core switch However, business needs require that no traffic from the Finance VLAN traverse this switch Which command meets this requirement?
A)
B)
C)
D)
Drag and drop the threat defense solutions from the left onto their descriptions on the right.
In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC?
Refer to the exhibit Drag and drop the snippets into the RESTCONF request to form the request that returns this response Not all options are used
An engineer is concerned with the deployment of new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements?
Drag and drop the virtual components from the left onto their deceptions on the right.
Refer to the exhibit.
An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as the exit point. Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplish task?
What does Call Admission Control require the client to send in order to reserve the bandwidth?
Refer to the exhibit.
An engineer must modify the access control list EGRESS to allow all IP traffic from subnet 10.1.10.0/24 to 10.1.2.0/24. The access control list is applied in the outbound direction on router interface GigabitEthemet 0/1. Which configuration commands can the engineer use to allow this traffic without disrupting existing traffic flows?
A)
B)
C)
D)
Which features does Cisco EDR use to provide threat detection and response protection?
Refer to the exhibit. Communication between London and New York is down. Which command set must be applied to the NewYork switch to resolve the issue?
A)
B)
C)
D)
Which configuration restricts the amount of SSH that a router accepts 100 kbps?
A)
B)
C)
D)
Drag and drop the LISP components from the left onto the function they perform on the right. Not all options are used.
A network engineer is configuring Flexible Netflow and enters these commands
Sampler Netflow1
Mode random one-out-of 100
Interface fastethernet 1/0
Flow-sampler netflow1
Which are two results of implementing this feature instead of traditional Netflow? (Choose two.)
A customer has several small branches and wants to deploy a WI-FI solution with local management using CAPWAP. Which deployment model meets this requirement?
Refer to the exhibit. An engineer is configuring an EtherChannel between Switch1 and Switch2 and notices the console message on switch2. Based on the output, which action resolves this issue?
Which TLV value must be added to Option 43 when DHCP is used to ensure that APs join the WLC?
Users have reported an issue connecting to a server over the network. A workstation was recently added to the network and configured with a shared USB printer. Which of the following is most likely causing the issue?
An engineer applies this configuration to router R1. How does R1 respond when the user ‘cisco’ logs in?
Refer to the exhibit. Cisco IOS routers R1 and R2 are interconnected using interface Gi0/0. Which configuration allows R1 and R2 to form an OSPF neighborship on interface Gi0/0?
A customer requires their wireless network to be fully functional, even if the wireless controller fails. Which wireless design supports these requirements?
What is a characteristic of the Cisco DMA Center Template Editor feature?
Drag and drop the characteristics from the left onto the switching mechanisms they describe on the right.
Refer to the exhibit Which two commands are required on route» R1 to block FTP and allow all other traffic from the Branch 2 network’ (Choose two)
Refer to the exhibit.
Which HTTP request produced the REST API response that was returned by Cisco DNA Center?
Which two methods are used to interconnect two Cisco SD-Access Fabric sites? (Choose two.)
Which action limits the total amount of memory and CPU that is used by a collection of VMs?
In a Cisco SD-Access environment, which function is performed by the border node?
Refer to the exhibit.
Both controllers are in the same mobility group. Which result occurs when client 1 roams between APs that are registered to different controllers in the same WLAN?
Which technology reduces the implementation of STP and leverages both unicast and multicast?
Refer to the exhibit. What is printed to the console when this script is run?
Refer to the exhibit.
Which statement is needed to complete the EEM applet and use the Tel script to store the backup file?
A network administrator received reports that a 40Gb connection is saturated. The only server the administrator can use for data collection in that location has a 10Gb connection to the network. Which of the following is the best method to use on the server to determine the source of the saturation?
Refer to me exhibit. The NETCONF object is sent to a Cisco IOS XE switch. What is me purpose of the object?
Which Cisco WLC feature allows a wireless device to perform a Layer 3 roam between two separate controllers without changing the client IP address?
Drag and drop the characteristics from the left onto the routing protocol they describe on the right
Drag and drop the code snippets from the bottom onto the blanks in the Python script to convert a Python object into a JSON string. Not all options are used.
Refer to the exhibit.
The OSPF neighborship fails between two routers. What is the cause of this issue?
Drag and drop the automation characteristics from the left onto the corresponding tools on the right.
Refer to the exhibit.
Which configuration enables fallback to local authentication and authorization when no TACACS+ server is available?
Based on the router's API output in JSON format below, which Python code will display the value of the “hostname" key?
High bandwidth utilization is occurring on interface Gig0/1 of a router. An engineer must identify the flows that are consuming the most bandwidth. Cisco DNA Center is used as a flow exporter and is configured with the IP address 192.168.23.1 and UDP port 23000. Which configuration must be applied to set NetFlow data export and capture on the router?
A)
B)
C)
D)
An engineer must configure a new WLAN that allows a user to enter a passphrase and provides forward secrecy as a security measure. Which Layer 2 WLAN configuration is required on the Cisco WLC?
A network engineer must configure a switch to allow remote access for all feasible protocols. Only a password must be requested for device authentication and all idle sessions must be terminated in 30 minutes. Which configuration must be applied?
Which technology is used to provide Layer 2 and Layer 3 logical networks in the Cisco SD-Access architecture?
Drag and drop the characteristics from the left onto the deployment model on the right.
Refer to the exhibit. Which configuration must be applied to ensure that the preferred path for traffic from AS 65010 toward AS 65020 uses the R2 to R4 path?
A)
B)
C)
D)
the following system log message is presented after a network administrator configures a GRE tunnel:
%TUN-5-RECURDOWN Interface Tunnel 0 temporarily disabled due to recursive routing
Why is tunnel 0 disabled?
Refer to the exhibit. A network engineer configures NAT on R1 and enters me show command to verity me configuration What toes the output confirm?
Which configuration enables a device to be configured via NETCONF over SSHv2?
A)
B)
C)
D)
Refer to the exhibit. Which router is elected as the VRRP primary virtual router?
Which solution simplifies management ot secure access to network resources?
Which Python code snippet must be added to the script to store the changed interface configuration to a local JSON-formatted file?
Refer to the exhibit. Which configuration set implements Control plane Policing for SSH and Telnet?
Refer to the exhibit.
An engineer must create a manually triggered EEM applet to enable the R2 router interface and assign an IP address to it. What is required to complete this configuration?
Refer to the exhibit. What is the cause of the communication failure between R1 and R4?
Refer to the exhibit.
Which GRE tunnel configuration command is missing on R2?
Refer to the exhibit Users cannot reach the web server at 192.168 100 1. What is the root cause for the failure?
Drag and drop the characteristics from the left onto the switching architectures on the right.
When a wired client connects to an edge switch in a Cisco SD-Access fabric, which component decides whether the client has access to the network?
Which DNS lookup does an access point perform when attempting CAPWAP discovery?
A network administrator for a small office is adding a passive IDS to its network switch for the purpose of inspecting network traffic. Which of the following should the administrator use?
Which two features are available only in next-generation firewalls? (Choose two.)
Which version of NetFlow does Cisco Threat Defense utilize to obtain visibility into the network?
Refer to the exhibit.
The inside and outside interfaces u configuration of this device have been correctly identified. What is the effect of this configuration?
Refer to the exhibit. An engineer attempts to configure standby group 512 on interface GigabitEthernet0/1, but the configuration is not accepted. Which command resolves this problem?
AN engineer is implementing a route map to support redistribution within BGP. The route map must configured to permit all unmatched routes. Which action must the engineer perform to complete this task?
A network administrator is implementing a routing configuration change and enables routing debugs to track routing behavior during the change. The logging output on the terminal is interrupting the command typing process. Which two actions can the network administrator take to minimize the possibility of typing commands incorrectly? (Choose two.)
Refer to the exhibit. PC-1 must access the web server on port 8080. To allow this traffic, which statement must be added to an access control list that is applied on SW2 port G0/0 in the inbound direction?
A vulnerability assessment highlighted that remote access to the switches is permitted using unsecure and unencrypted protocols Which configuration must be applied to allow only secure and reliable remote access for device administration?
Refer to the exhibit.
What is the effect of these commands on the BR and HQ tunnel interfaces?
How must network management traffic be treated when defining QoS policies?
Which two characteristics define the Intent API provided by Cisco DNA Center? (Choose two.)
Drag and drop the characteristics from the left onto the deployment models on the right.
Drag and drop characteristics of PIM dense mode from the left to the right.
Refer to the exhibit.
What is the result when a switch that is running PVST+ is added to this network?
Drag and drop the snippets onto the blanks within the code to construct a script that adds a prefix list to a route map and sets the local preference. Not all options are used
What are two considerations when using SSO as a network redundancy feature? (Choose two)