Which two features does the Cisco SD-Access architecture add to a traditional campus network? (Choose two.)
Refer to the exhibit. An engineer must configure an eBGP neighborship to Router B on Router A. The network that is connected to GO/1 on Router A must be advertised to Router B. Which configuration should be applied?
A)
B)
C)
D)
Refer to the exhibit.
A network engineer must log in to the router via the console, but the RADIUS servers are not reachable Which credentials allow console access1?
Refer to the exhibit.
An engineer must deny Telnet traffic from the loopback interface of router R3 to the Loopback interface of router R2 during, the weekend hours. All other traffic between the loopback interfaces of routers R3 and R2 must be allowed at all times Which command set accomplishes this task?
A)
B)
C)
D)
Which feature Is used to propagate ARP broadcast, and link-local frames across a Cisco SD-Access fabric to address connectivity needs for silent hosts that require reception of traffic to start communicating?
Refer to the exhibit. Which configuration must be implemented to establish EBGP peering between R1 and R2?
Refer to the exhibit. Which configuration set implements Control plane Policing for SSH and Telnet?
Refer to the exhibit. Which set of commands on router r R1 Allow deterministic translation of private hosts PC1, PC2, and PC3 to addresses in the public space?
A)
B)
C)
D)
Refer to the exhibit.
Based on the configuration in this WLAN security setting, Which method can a client use to authenticate to the network?
Which router is elected the IGMP Querier when more than one router is in the same LAN segment?
Which free application has the ability to make REST calls against Cisco DNA Center?
Refer to the exhibit.
Which GRE tunnel configuration command is missing on R2?
Which two methods are used to interconnect two Cisco SD-Access Fabric sites? (Choose two.)
In a Cisco SD-Access fabric, which control plane protocol is used for mapping and resolving endpoints?
A script contains the statement "while loop != 999:" Which value terminates the loop?
Which configuration creates a CoPP policy that provides unlimited SSH access from dient 10.0.0.5 and denies access from all other SSH clients'?
A)
B)
C)
D)
Refer to the exhibit. A network engineer checks connectivity between two routers. The engineer can ping the remote endpoint but cannot see an ARP entry. Why is there no ARP entry?
Drag and drop the characteristics from the left to the table types on the right.
Refer to the exhibit. A network administrator must configure router B to allow traffic only from network 10.1002.0 to networks outside of router 0. Which configuration must be applied?
A)
B)
C)
D)
Which collection contains the resources to obtain a list of fabric nodes through the vManage API?
Refer to the exhibit.
A network engineer must configure the router to use the ISE-Servers group for authentication. If both ISE servers are unavailable, the local username database must be used. If no usernames are defined in the configuration, then the enable password must be the last resort to log in. Which configuration must be applied to achieve this result?
what is a benefit of using a Type 2 hypervisor instead of a Type 1 hypervisor?
Refer to the exhibit.
The port channel between the switches does not work as expected. Which action resolves the issue?
Refer to the exhibit. Which EEM script generates a critical-level syslog message and saves a copy of the running configuration to the bootflash when an administrator saves the running configuration to the startup configuration?
Refer io me exhibit.
An engineer configures the trunk and proceeds to configure an ESPAN session to monitor VLANs10. 20. and 30. Which command must be added to complete this configuration?
Refer to the exhibit. A network engineer must load balance traffic that comes from the NAT Router and is destined to 10.10.110.10, to several FTP servers. Which two commands sets should be applied? (Choose two).
A)
B)
C)
D)
E)
What is the result when an active route processor fails that combines NSF with SSO?
Refer to the exhibit.
Why does the OSPF neighborship fail between the two interfaces?
Refer to the exhibit.
Which configuration enables fallback to local authentication and authorization when no TACACS+ server is available?
Refer to the exhibit. Which router is elected as the VRRP primary virtual router?
An engineer must export the contents of the devices object in JSON format. Which statement must be used?
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
An engineer configures GigabitEthernet 0/1 for VRRP group 115. The router must assume the primary role when it has the highest priority in the group. Which command set is required to complete this task?
Which DHCP option provides the CAPWAP APs with the address of the wireless controller(s)?
A network monitoring system uses SNMP polling to record the statistics of router interfaces The SNMP queries work as expected until an engineer installs a new interface and reloads the router After this action, all SNMP queries for the router fail What is the cause of this issue?
A network administrator is implementing a routing configuration change and enables routing debugs to track routing behavior during the change. The logging output on the terminal is interrupting the command typing process. Which two actions can the network administrator take to minimize the possibility of typing commands incorrectly? (Choose two.)
If a client's radio device receives a signal strength of -67 dBm and the noise floor is -85 dBm, what is the SNR value?
A customer wants to provide wireless access to contractors using a guest portal on Cisco ISE. The portal Is also used by employees A solution is implemented, but contractors receive a certificate error when they attempt to access the portal Employees can access the portal without any errors. Which change must be implemented to allow the contractors and employees to access the portal?
Which Python snippet should be used to store the devices data structure in a JSON file?
A)
B)
C)
D)
Drag and drop the characteristics from the left onto the deployment types on the right.
A company requires a wireless solution to support its mam office and multiple branch locations. All sites have local Internet connections and a link to the main office lor corporate connectivity. The branch offices are managed centrally. Which solution should the company choose?
Refer to the exhibit.
What is the effect of introducing the sampler feature into the Flexible NetFlow configuration on the router?
Refer to the exhibit. Cisco IOS routers R1 and R2 are interconnected using interface Gi0/0. Which configuration allows R1 and R2 to form an OSPF neighborship on interface Gi0/0?
Which of the following protocols has a default administrative distance value of 90?
Refer to the exhibit.
Which configuration must be applied for the TACACS+ server to grant access-level rights to remote users?
Refer to the exhibit.
Refer to the exhibit. An engineer must implement HSRP between two WAN routers. In the event R1 tails and then regains operational status, it must allow 100 seconds for the routing protocol to converge before preemption takes effect. Which configuration is required?
A)
B)
C)
D)
Witch two actions provide controlled Layer 2 network connectivity between virtual machines running on the same hypervisor? (Choose two.)
Which two results occur if Cisco DNA center loses connectivity to devices in the SD-ACCESS fabric? (Choose two)
Which Python code snippet must be added to the script to store the changed interface configuration to a local JSON-formatted file?
Refer to the exhibit Which command must be applied to complete the configuration and enable RESTCONF?
Refer to the exhibit. An engineer builds an EEM script to apply an access list. Which statement must be added to complete the script?
Refer to the exhibit. An engineer must allow the FTP traffic from users on 172.16.1.0 /24 to 172.16.2.0 /24 and block all other traffic. Which configuration must be applied?
A)
B)
C)
D)
Why does the vBond orchestrator have a public IP?
to enable vBond to team the public IP of WAN Edge devices that are behind NAT gateways or in private address space
Which configuration filters out DOT1X messages in the format shown below from being sent toward Syslog server 10.15.20.33?
A)
B)
C)
D)
Which A record type should be configured for access points to resolve the IP address of a wireless LAN controller using DNS?
Simulation 02
Configure HSRP between DISTRO-SW1 and DISTRO-SW2 on VLAN 100 for hosts connected to ACCESS-SW1 to achieve these goals:
1. Configure group number 1 using the virtual IP address of 192.168.1.1/24.
2. Configure DlSTRO-SW1 as the active router using a priority value of 110 and DISTRO-SW2 as the standby router.
3. Ensure that DISTRO-SW2 will take over the active role when DISTRO-SW1 goes down, and when DISTRO-SW1 recovers, it automatically resumes the active role.
DISTRO-SW2
In a Cisco SD-Access environment, which function is performed by the border node?
Refer to the exhibit.
Assuming all links are functional, which path does PC1 take to reach DSW1?
Where in Cisco DNA Center is documentation of each API call, organized by its functional area?
Which tool is used in Cisco DNA Center to build generic configurations that are able to be applied on device with similar network settings?
Which hypervisor requires a host OS to run and is not allowed to directly access the hosts hardware and resources?
Based on the router's API output in JSON format below, which Python code will display the value of the “hostname" key?
An engineer must configure a new WLAN that allows a user to enter a passphrase and provides forward secrecy as a security measure. Which Layer 2 WLAN configuration is required on the Cisco WLC?
A wireless administrator must create a new web authentication corporate SSID that will be using ISE as the external RADIUS server. The guest VLAN must be specified after the authentication completes. Which action must be performed to allow the ISE server to specify the guest VLAN?
An engineer is connected to a Cisco router through a Telnet session. Which command must be issued to view the logging messages from the current session as soon as they are generated by the router?
An engineer is configuring RADIUS-Based Authentication with EAP MS-CHAPv2 is configured on a client device.
Which outer method protocol must be configured on the ISE to support this
authentication type?
Which QoS feature uses the IP Precedence bits in the ToS field of the IP packet header to partition traffic into different priority levels?
Refer to the exhibit. An engineer configures HSRP and enters the show standby command. Which two facts about the network environment are derived from the output? (Choose two.)
Refer to the exhibit.
Extended access-list 100 is configured on interface GigabitEthernet 0/0 in an inbound direction, but it does not have the expected behavior of allowing only packets to or from 192.168.0.0/16. Which command set properly configures the access list?
Refer to the exhibit. Which configuration is required to summarize the Area 2 networks that are advertised to Area 0?
Simulation 04
Configure OSPF on both routers according to the topology to achieve these goals:
Which LISP infrastructure device provides connectivity between non-sites and LISP sites by receiving non-LISP traffic with a LISP site destination?
Refer to the exhibit.
Which two commands ensure that DSW1 becomes root bridge for VLAN 10 and 20?
: 262 DRAG DROP
Drag and drop the snippets onto the blanks within the code to construct a script that brings up the failover Ethernet port if the primary port goes down and also shuts down the failover port when the primary returns to service. Not all options are used.
What does the Cisco DNA Center use to enable the delivery of applications through a network and to yield analytics for innovation?
The login method is configured on the VTY lines of a router with these parameters
Which configuration accomplishes this task?
Refer to the exhibit.
An engineer attempts to bundle interface Gi0/0 into the port channel, but it does not function as expected. Which action resolves the issue?
Which access point mode allows a supported AP to function like a WLAN client would, associating and identifying client connectivity issues?
Refer to the Exhibit.
An engineer is installing a new pair of routers in a redundant configuration. When checking on the standby status of each router the engineer notices that the routers are not functioning as expected. Which action will resolve the configuration error?
Refer the exhibit.
Which router is the designated router on the segment 192.168.0.0/24?
Refer to the exhibit.
Which JSON syntax is derived from this data?
A)
B)
C)
D)
Refer to the exhibit.
An engineer configures the BGP adjacency between R1 and R2, however, it fails to establish Which action resolves the issue?
A client device roams between wireless LAN controllers that are mobility peers, Both controllers have dynamic interface on the same client VLAN which type of roam is described?
Refer to the exhibit.
Which command must be applied to Router 1 to bring the GRE tunnel to an up/up state?
AN engineer is implementing MPLS OAM to monitor traffic within the MPLS domain. Which action must the engineer perform to prevent from being forwarded beyond the service provider domain when the LSP is down?
Which two characteristics define the Intent API provided by Cisco DNA Center? (Choose two.)
An engineer must create a new SSID on a Cisco 9800 wireless LAN controller. The client has asked to use a pre-shared key for authentication Which profile must the engineer edit to achieve this requirement?
Which method is used by an AP to join HA controllers and is configured in NVRAM?
An engineer must enable a login authentication method that allows a user to log in by using local authentication if all other defined authentication methods fail Which configuration should be applied?
Drag and drop the snippets onto the blanks within the code to construct a script that adds a prefix list to a route map and sets the local preference. Not all options are used
Refer to the exhibit.
An engineer must add the SNMP interface table to the NetFlow protocol flow records. Where should the SNMP table option be added?
Refer to the exhibit.
A company requires that all wireless users authenticate using dynamic key generation. Which configuration must be applied?
Which two GRE features are configured to prevent fragmentation? (Choose two.)
Refer to the exhibit. A network engineer must configure NETCONF. After creating the configuration, the engineer gets output from the command show line, but not from show running-config. Which command completes the configuration?
Refer to the exhibit.
An engineer entered the command no spanning-tree bpduguard enable on interface Fa 1/0/7. What is the effect of this command on Fa 1/0/7?
Which component transports data plane traffic across a Cisco SD-WAN network?
Refer to The exhibit.
Assuming that R1 is a CE router, which VRF is assigned to Gi0/0 on R1?
The login method is configured on the VTY lines of a router with these parameters.
Which configuration accomplishes this task?
Drag and drop characteristics of PIM dense mode from the left to the right.
How must network management traffic be treated when defining QoS policies?
In a three-tier hierarchical campus network design, which action is a design best-practice for the core layer?
Refer to the exhibit.
What is the effect of these commands on the BR and HQ tunnel interfaces?
Refer to the exhibit.
Which command set must be added to the configuration to analyze 50 packets out of every 100?
A)
B)
C)
D)
Which feature does Cisco TrustSec use to provide scalable, secure communication throughout a network?
Refer to the exhibit.
CR2 and CR3 ate configured with OSPF. Which configuration, when applied to CR1. allows CR1 to exchange OSPF Information with CR2 and CR3 but not with other network devices or on new Interfaces that are added to CR1?
A)
B)
C)
D)
Refer to the exhibit.
An engineer must create a configuration that prevents R3from receiving the LSA about 172.16.1.4/32.Which configuration set achieves this goal?
Refer to the exhibit.
An engineer attempts to establish BGP peering between router CORP and two ISP routers. What is the root cause for the failure between CORP and ISP#2?
An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy. Which device presents the web authentication for the WLAN?
A network engineer configures a WLAN controller with increased security for web access. There is IP connectivity with the WLAN controller, but the engineer cannot start a management session from a web browser. Which action resolves the issued
A network engineer is enabling HTTPS access to the core switch, which requires a certificate to be installed on the switch signed by the corporate certificate authority Which configuration commands are required to issue a certificate signing request from the core switch?
A)
B)
C)
D)
Refer to the exhibit.
The trunk does not work over the back-to-back link between Switch1 interface Giq1/0/20 and Switch2 interface Gig1/0/20. Which configuration fixes the problem?
A)
B)
C)
D)
Why is an AP joining a different WLC than the one specified through option 43?
Refer to the exhibit.
All switches are configured with the default port priority value. Which two commands ensure that traffic from PC1 is forwarded over Gi1/3 trunk port between DWS1 and DSW2? (Choose two)
Refer to the exhibit.
A network engineer is enabling logging to a local buffer, to the terminal and to a syslog server for all debugging level logs filtered by facility code 7. Which command is needed to complete this configuration snippet?
Refer to the exhibit.
Which command when applied to the Atlanta router reduces type 3 LSA flooding into the backbone area and summarizes the inter-area routes on the Dallas router?
Refer to the exhibit.
How does the router handle traffic after the CoPP policy is configured on the router?
What are two common sources of interference for Wi-Fi networks? (Choose two.)
An engineer must create an EEM applet that sends a syslog message in the event a change happens in the network due to trouble with an OSPF process. Which action should the engineer use?
What occurs when a high bandwidth multicast stream is sent over an MVPN using Cisco hardware?
Refer to the exhibit. An attacker can advertise OSPF fake routes from 172.16.20.0 network to the OSPF domain and black hole traffic. Which action must be taken to avoid this attack and still be able to advertise this subnet into OSPF?
A Cisco DNA Center REST API sends a PUT to the /dna/intent/api/v1/network-device endpoint A response code of 504 is received What does the code indicate?
An engineer must configure an EXEC authorization list that first checks a AAA server then a local username. If both methods fail, the user is denied. Which configuration should be applied?
Refer to the exhibit. Which command set must be added to permit and log all traffic that comes from 172.20.10.1 in interface GigabitEthernet0/1 without impacting the functionality of the access list?
An engineer must configure a new loopback Interface on a router and advertise the interface as a fa4 in OSPF. Which command set accomplishes this task?
A)
B)
C)
D)
The Gig0/0 interface of two routers is directly connected with a 1G Ethernet link. Which configuration must be applied to the interface of both routers to establish an OSPF adjacency without maintaining a DR/BDR relationship?
A)
B)
C)
D)
Which Cisco FlexConnect state allows wireless users that are connected to the network to continue working after the connection to the WLC has been lost?
Drag and drop the LISP components on the left to their descriptions on the right. Not all options are used.
Which two Cisco SD-Access components provide communication between traditional network elements and controller layer? (choose two)
Refer to the exhibit.
Object tracking has been configured for VRRP-enabled routers Edge-01 and Edge-02 Which commands cause Edge-02 to preempt Edge-01 in the event that interface G0/0 goes down on Edge-01?
A)
B)
C)
D)
Which two solutions are used for backing up a Cisco DNA Center Assurance database? (Choose two)
An engineer is configuring Local WebAuth on a Cisco Wireless LAN Controller. According to RFC 5737, WHICH VIRTUAL IP address must be used in this configuration?
If the maximum power level assignment for global TPC 802.11a/n/ac is configured to 10 dBm, which power level effectively doubles the transmit power?
Drag and drop the LIPS components on the left to the correct description on the right.
What is an emulated machine that has dedicated compute memory, and storage resources and a fully installed operating system?
What is the calculation that is used to measure the radiated power of a signal after it has gone through the radio, antenna cable, and antenna?
Refer to the exhibit.
Which configuration must be applied to the HQ router to set up a GRE tunnel between the HQ and BR routers?
A)
B)
C)
D)
Refer to the exhibit.
Which command set is needed to configure and verify router R3 to measure the response time from router R3 to the file server located in the data center?
A)
B)
C)
D)
Which protocol is implemented to establish secure control plane adjacencies between Cisco SD-WAN nodes?
Refer to the exhibit.
Which commands are required to allow SSH connection to the router?
A)
B)
C)
D)
Which two characteristics apply to the endpoint security aspect of the Cisco Threat Defense architecture? (Choose two.)
Which resource is able to be shared among virtual machines deployed on the same physical server?
Which type of tunnel Is required between two WLCs to enable Intercontroller roaming?
Refer to the exhibit.
What are two effect of this configuration? (Choose two.)
Refer to the exhibit. A network engineer must be notified when a user switches to configuration mode. Which script should be applied to receive an SNMP trap and a critical-level log message?
A)
B)
C)
D)
Which AP mode allows an engineer to scan configured channels for rogue access points?
Drag and drop the characteristics from the left onto the appropriate infrastructure deployment types on the right.
Refer to the exhibit.
An engineer must create a configuration that executes the show run command and then terminates the session when user CCNP legs in. Which configuration change is required?
Which DHCP option helps lightweight APs find the IP address of a wireless LAN controller?
In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC?
Refer to the exhibit.
What are two effects of this configuration? (Choose two.)
Refer to the exhibit.
An engineer must modify the access control list EGRESS to allow all IP traffic from subnet 10.1.10.0/24 to 10.1.2.0/24. The access control list is applied in the outbound direction on router interface GigabitEthemet 0/1. Which configuration commands can the engineer use to allow this traffic without disrupting existing traffic flows?
A)
B)
C)
D)
An engineer configures HSRP group 37. The configuration does not modify the default virtual MAC address. Which virtual MAC address does the group use?
A network administrator applies the following configuration to an IOS device.
What is the process of password checks when a login attempt is made to the device?
A network engineer is configuring Flexible Netflow and enters these commands
Sampler Netflow1
Mode random one-out-of 100
Interface fastethernet 1/0
Flow-sampler netflow1
Which are two results of implementing this feature instead of traditional Netflow? (Choose two.)
Refer to the exhibit.
Security policy requires all idle-exec sessions to be terminated in 600 seconds. Which configuration achieves this goal?
Refer to the exhibit.
Which HTTP JSON response does the python code output give?
In a Cisco SD-Access solution, what is the role of the Identity Services Engine?
When a wireless client roams between two different wireless controllers, a network connectivity outage is experience for a period of time. Which configuration issue would cause this problem?
Drag and drop the LISP components from the left onto the function they perform on the right. Not all options are used.
Which configuration restricts the amount of SSH that a router accepts 100 kbps?
A)
B)
C)
D)
Refer to the exhibit. An engineer is investigating why guest users are able to access other guest user devices when the users are connected to the customer guest WLAN. What action resolves this issue?
What are two benefits of virtual switching when compared to hardware switching? (Choose two.)
An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:
Which two statements does the engineer use to explain these values to the customer? (Choose two)
Refer to the exhibit.
An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as an entry point. Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplish task?
Refer to the exhibit.
An engineer implemented several configuration changes and receives the logging message on switch1. Which action should the engineer take to resolve this issue?
Drag and drop the DHCP messages that are exchanged between a client and an AP into the order they are exchanged on the right.
Refer to the exhibit.
After implementing the configuration 172.20.20.2 stops replaying to ICMP echoes, but the default route fails to be removed. What is the reason for this behavior?
Refer to the exhibit Which single security feature is recommended to provide Network Access Control in the enterprise?
When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?
Refer to the exhibit.
The IP SLA is configured in a router. An engineer must configure an EEM applet to shut down the interface and bring it back up when there is a problem with the IP SLA. Which configuration should the engineer use?
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required?
Which measurement is used from a post wireless survey to depict the cell edge of the access points?
Refer to the exhibit.
Which configuration establishes EBGP neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP?
A)
B)
C)
D)
Refer to the exhibit.
Which configuration allows Customer2 hosts to access the FTP server of Customer1 that has the IP address of 192.168.1.200?
Drag and drop the threat defense solutions from the left onto their descriptions on the right.
Refer to the exhibit. Which configuration must be applied to R to enable R to reach the server at 172.16.0.1?
A)
B)
C)
D)
Refer to the exhibit. A network engineer troubleshoots an issue with the port channel between SW1 and SW2. which command resolves the issue?
A)
B)
C)
D)
Refer to exhibit.
VLANs 50 and 60 exist on the trunk links between all switches All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server Which command ensures that SW3 receives frames only from VLAN 50?
Which command set configures RSPAN to capture outgoing traffic from VLAN 3 on interface GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface?
A)
B)
C)
D)
How does Cisco Trustsec enable more access controls for dynamic networking
environments and data centers?
An engineer has deployed a single Cisco 5520 WLC with a management IP address of 172.16.50.5/24. The engineer must register 50 new Cisco AIR-CAP2802I-E-K9 access points to the WLC using DHCP option 43. The access points are connected to a switch in VLAN 100 that uses the 172.16.100.0/24 subnet. The engineer has configured the DHCP scope on the switch as follows:
The access points are failing to join the wireless LAN controller. Which action resolves the issue?
Refer to the exhibit. After configurating an IPsec VPN, an engineer enters the show command to verify the ISAKMP SA status. What does the status show?
Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial?
Which two network problems Indicate a need to implement QoS in a campus network? (Choose two.)
A customer requests a network design that supports these requirements:
Which protocol does the design include?
Refer to the exhibit. An engineer attempts to configure a trunk between switch sw1 and switch SW2 using DTP, but the trunk does not form. Which command should the engineer apply to switch SW2 to resolve this issue?