Black Friday Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

Question # 6

Refer to the exhibit. A network operator is attempting to configure an IS-IS adjacency between two routers, but the adjacency cannot be established. To troubleshoot the problem, the operator collects this debugging output. Which interfaces are misconfigured on these routers?

A.

The peer router interface is configured as Level 1 only, and the R2 interface is configured as Level 2 only

B.

The R2 interface is configured as Level 1 only, and the Peer router interface is configured as Level 2 only

C.

The R2 interface is configured as point-to-point, and the peer router interface is configured as multipoint.

D.

The peer router interface is configured as point-as-point, and the R2 interface is configured as multipoint.

Full Access
Question # 7

What is the differences between TCAM and the MAC address table?

A.

The MAC address table is contained in CAM ACL and QoS information is stored in TCAM

B.

The MAC address table supports partial matches. TCAM requires an exact match

C.

Router prefix lookups happens in CAM. MAC address table lookups happen in TCAM.

D.

TCAM is used to make Layer 2 forwarding decisions CAM is used to build routing tables

Full Access
Question # 8

What are two considerations when using SSO as a network redundancy feature? (Choose two)

A.

both supervisors must be configured separately

B.

the multicast state is preserved during switchover

C.

must be combined with NSF to support uninterrupted Layer 2 operations

D.

must be combined with NSF to support uninterrupted Layer 3 operations

E.

requires synchronization between supervisors in order to guarantee continuous connectivity

Full Access
Question # 9

Which two actions, when applied in the LAN network segment, will facilitate Layer 3 CAPWAP discovery for lightweight AP? (Choose two.)

A.

Utilize DHCP option 17.

B.

Configure WLC IP address on LAN switch.

C.

Utilize DHCP option 43.

D.

Configure an ip helper-address on the router interface

E.

Enable port security on the switch port

Full Access
Question # 10

Which measurement is used from a post wireless survey to depict the cell edge of the access points?

A.

SNR

B.

Noise

C.

RSSI

D.

CCI

Full Access
Question # 11

Refer to the exhibit.

An engineer is installing a new pair of routers in a redundant configuration. Which protocol ensures that traffic is not disrupted in the event of a hardware failure?

A.

HSRPv1

B.

GLBP

C.

VRRP

D.

HSRPv2

Full Access
Question # 12

Refer to the exhibit.

An engineer must configure a SPAN session. What is the effect of the configuration?

A.

Traffic sent on VLANs 10, 11, and 12 is copied and sent to interface g0/1.

B.

Traffic sent on VLANs 10 and 12 only is copied and sent to interface g0/1.

C.

Traffic received on VLANs 10, 11, and 12 is copied and sent to Interface g0/1.

D.

Traffic received on VLANs 10 and 12 only is copied and sent to interface g0/1.

Full Access
Question # 13

Refer to the exhibit.

What is required to configure a second export destination for IP address 192.168.10.1?

A.

Specify a VRF.

B.

Specify a different UDP port.

C.

Specify a different flow ID

D.

Configure a version 5 flow-export to the same destination.

E.

Specify a different TCP port.

Full Access
Question # 14

Which technology is used as the basis for the cisco sd-access data plane?

A.

IPsec

B.

LISP

C.

VXLAN

D.

802.1Q

Full Access
Question # 15

Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial?

A.

under interface saturation condition

B.

under network convergence condition

C.

under all network condition

D.

under traffic classification and marking conditions.

Full Access
Question # 16

What is a benefit of Type 1 hypervisors?

A.

Administrators are able to load portable virtual machine packages in OVA or QCOW2 formats.

B.

Network engineers are able to create virtual networks o interconnect virtual machines in Layer 2 topologies

C.

Operators are able to leverage orchestrators to manage workloads that run on multiple Type 1 hypervisors

D.

Storage engineers are able to leverage VMDK files to provide storage to virtual machine.

Full Access
Question # 17

Refer to the exhibit. An engineer is configuring an EtherChannel between Switch1 and Switch2 and notices the console message on switch2. Based on the output, which action resolves this issue?

A.

Configure less member ports on Switch2.

B.

Configure the same port channel interface number on both switches

C.

Configure the same EtherChannel protocol on both switches

D.

Configure more member ports on Switch1.

Full Access
Question # 18

Drag and drop the solutions that comprise Cisco Cyber Threat Defense from the left onto the objectives they accomplish on the right.

Full Access
Question # 19

Which two items are found in YANG data models? (Choose two.)

A.

HTTP return codes

B.

rpc statements

C.

JSON schema

D.

container statements

E.

XML schema

Full Access
Question # 20

Which HHTP status code is the correct response for a request with an incorrect password applied to a REST API session?

A.

HTTP Status Code 200

B.

HTTP Status Code 302

C.

HTTP Status Code 401

D.

HTTP Status Code: 504

Full Access
Question # 21

An engineer must create an EEM script to enable OSPF debugging in the event the OSPF neighborship goes down. Which script must the engineer apply?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 22

Refer to the exhibit.

A company requires that all wireless users authenticate using dynamic key generation. Which configuration must be applied?

A.

AP(config-if-ssid)# authentication open wep wep_methods

B.

AP(config-if-ssid)# authentication dynamic wep wep_methods

C.

AP(config-if-ssid)# authentication dynamic open wep_dynamic

D.

AP(config-if-ssid)# authentication open eap eap_methods

Full Access
Question # 23

Refer to the exhibit.

What does the snippet of code achieve?

A.

It creates a temporary connection to a Cisco Nexus device and retrieves a token to be used for API calls.

B.

It opens a tunnel and encapsulates the login information, if the host key is correct.

C.

It opens an ncclient connection to a Cisco Nexus device and maintains it for the duration of the context.

D.

It creates an SSH connection using the SSH key that is stored, and the password is ignored.

Full Access
Question # 24

An engineer must configure HSRP group 300 on a Cisco IOS router. When the router is functional, it must be the must be the active HSRP router. The peer router has been configured using the default priority value. Which command set is required?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 25

What is a VPN in a Cisco SD-WAN deployment?

A.

common exchange point between two different services

B.

attribute to identify a set of services offered in specific places in the SD-WAN fabric

C.

virtualized environment that provides traffic isolation and segmentation in the SD-WAN fabric

D.

virtual channel used to carry control plane information

Full Access
Question # 26

Refer to the exhibit.

A GRE tunnel has been created between HO and BR routers. What is the tunnel IP on the HQ router?

A.

10.111.111.1

B.

10.111.111.2

C.

209.165.202.130

D.

209.165.202.134

Full Access
Question # 27

Drag and drop the DHCP messages that are exchanged between a client and an AP into the order they are exchanged on the right.

Full Access
Question # 28

Drag and drop the descriptions from the left onto the QoS components on the right.

Full Access
Question # 29

How are the different versions of IGMP compatible?

A.

IGMPv2 is compatible only with IGMPv1.

B.

IGMPv2 is compatible only with IGMPv2.

C.

IGMPv3 is compatible only with IGMPv3.

D.

IGMPv3 is compatible only with IGMPv1

Full Access
Question # 30

Drag and drop the LISP components from the left onto the function they perform on the right. Not all options are used.

Full Access
Question # 31

Which two network problems Indicate a need to implement QoS in a campus network? (Choose two.)

A.

port flapping

B.

excess jitter

C.

misrouted network packets

D.

duplicate IP addresses

E.

bandwidth-related packet loss

Full Access
Question # 32

What do Cisco DNA southbound APIs provide?

A.

Interface between the controller and the network devices

B.

NETCONF API interface for orchestration communication

C.

RESful API interface for orchestrator communication

D.

Interface between the controller and the consumer

Full Access
Question # 33

A company plans to implement intent-based networking in its campus infrastructure. Which design facilities a migrate from a traditional campus design to a programmer fabric designer?

A.

Layer 2 access

B.

three-tier

C.

two-tier

D.

routed access

Full Access
Question # 34

Refer to the exhibit. An engineer must deny HTTP traffic from host A to host B while allowing all other communication between the hosts, drag and drop the commands into the configuration to achieve these results. Some commands may be used more than once. Not all commands are used.

Full Access
Question # 35

Refer to the exhibit.

What is the Json syntax that is formed from the data?

A.

{Name: Bob Johnson, Age: 75, Alive: true, Favorite Foods: [Cereal, Mustard, Onions]}

B.

{"Name": "Bob Johnson", "Age": 75, "Alive": true, "Favorite Foods": ["Cereal", "Mustard", "Onions"]}

C.

{"˜Name': "˜Bob Johnson', "˜Age': 75, "˜Alive': True, "˜Favorite Foods': "˜Cereal', "˜Mustard', "˜Onions'}

D.

{"Name": "Bob Johnson", "Age": Seventyfive, "Alive": true, "Favorite Foods": ["Cereal", "Mustard", "Onions"]}

Full Access
Question # 36

An engineer is configuring a GRE tunnel interface in the default mode. The engineer has assigned an IPv4 address on the tunnel and sourced the tunnel from an Ethernet interface. Which option also is required on the tunnel interface before it is operational?

A.

(config-if)#tunnel destination

B.

(config-if)#keepalive

C.

(config-if)#ip mtu

D.

(config-if)#ip tcp adjust-mss

Full Access
Question # 37

Which function does a fabric edge node perform in an SD-Access deployment?

A.

Connects the SD-Access fabric to another fabric or external Layer 3 networks

B.

Connects endpoints to the fabric and forwards their traffic

C.

Provides reachability border nodes in the fabric underlay

D.

Encapsulates end-user data traffic into LISP.

Full Access
Question # 38

Refer to the exhibit.

SwitchC connects HR and Sales to the Core switch However, business needs require that no traffic from the Finance VLAN traverse this switch Which command meets this requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 39

Refer the exhibit.

Which router is the designated router on the segment 192.168.0.0/24?

A.

This segment has no designated router because it is a nonbroadcast network type.

B.

This segment has no designated router because it is a p2p network type.

C.

Router Chicago because it has a lower router ID

D.

Router NewYork because it has a higher router ID

Full Access
Question # 40

Which technology uses network traffic telemetry, contextual information, and file reputation to provide insight into cyber threats?

A.

threat defense

B.

security services

C.

security intelligence

D.

segmentation

Full Access
Question # 41

What does Call Admission Control require the client to send in order to reserve the bandwidth?

A.

SIP flow information

B.

Wi-Fi multimedia

C.

traffic specification

D.

VoIP media session awareness

Full Access
Question # 42

Which three methods does Cisco DNA Centre use to discover devices? (Choose three)

A.

CDP

B.

SNMP

C.

LLDP

D.

ping

E.

NETCONF

F.

a specified range of IP addresses

Full Access
Question # 43

If the noise floor is -90 dBm and wireless client is receiving a signal of -75 dBm, what is the SNR?

A.

15

B.

1.2

C.

-165

D.

.83

Full Access
Question # 44

Which method of account authentication does OAuth 2.0 within REST APIs?

A.

username/role combination

B.

access tokens

C.

cookie authentication

D.

basic signature workflow

Full Access
Question # 45

Refer to the exhibit.

What are two effects of this configuration? (Choose two.)

A.

R1 becomes the active router.

B.

R1 becomes the standby router.

C.

If R2 goes down, R1 becomes active but reverts to standby when R2 comes back online.

D.

If R1 goes down. R2 becomes active and remains the active device when R1 comes back online.

E.

If R1 goes down, R2 becomes active but reverts to standby when R1 comes back online.

Full Access