Independence Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

350-401 Questions and Answers

Question # 6

Refer to the exhibit.

The trunk does not work over the back-to-back link between Switch1 interface Giq1/0/20 and Switch2 interface Gig1/0/20. Which configuration fixes the problem?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 7

Refer to the exhibit.

R2 is the neighboring router of R1. R2 receives an advertisement for network 192 168.10.50/32. Which configuration should be applied for the subnet to be advertised with the original /24 netmask?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 8

Drag and drop the snippets onto the blanks within the code to construct a script that adds a prefix list to a route map and sets the local preference. Not all options are used

Full Access
Question # 9

What does a northbound API accomplish?

A.

programmatic control of abstracted network resources through a centralized controller

B.

access to controlled network resources from a centralized node

C.

communication between SDN controllers and physical switches

D.

controlled access to switches from automated security applications

Full Access
Question # 10

In a three-tier hierarchical campus network design, which action is a design best-practice for the core layer?

A.

provide QoS prioritization services such as marking, queueing, and classification for critical network traffic

B.

provide redundant Layer 3 point-to-point links between the core devices for more predictable and faster convergence

C.

provide advanced network security features such as 802. IX, DHCP snooping, VACLs, and port security

D.

provide redundant aggregation for access layer devices and first-hop redundancy protocols such as VRRP

Full Access
Question # 11

In a Cisco SD-WAN solution, which two functions are performed by OMP? (Choose two.)

A.

advertisement of network prefixes and their attributes

B.

configuration of control and data policies

C.

gathering of underlay infrastructure data

D.

delivery of crypto keys

E.

segmentation and differentiation of traffic

Full Access
Question # 12

An engineer must create a new SSID on a Cisco 9800 wireless LAN controller. The client has asked to use a pre-shared key for authentication Which profile must the engineer edit to achieve this requirement?

A.

RF

B.

Policy

C.

WLAN

D.

Flex

Full Access
Question # 13

Which function does a fabric edge node perform in an SD-Access deployment?

A.

Connects the SD-Access fabric to another fabric or external Layer 3 networks

B.

Connects endpoints to the fabric and forwards their traffic

C.

Provides reachability border nodes in the fabric underlay

D.

Encapsulates end-user data traffic into LISP.

Full Access
Question # 14

What is required for intercontroller Layer 3 roaming?

A.

Mobility groups are established between wireless controllers.

B.

The management VLAN is present as a dynamic VLAN on the second WLC.

C.

WLCs use separate DHCP servers.

D.

WLCs have the same IP addresses configured on their interfaces.

Full Access
Question # 15

Which technology uses network traffic telemetry, contextual information, and file reputation to provide insight into cyber threats?

A.

threat defense

B.

security services

C.

security intelligence

D.

segmentation

Full Access
Question # 16

Which HHTP status code is the correct response for a request with an incorrect password applied to a REST API session?

A.

HTTP Status Code 200

B.

HTTP Status Code 302

C.

HTTP Status Code 401

D.

HTTP Status Code: 504

Full Access
Question # 17

In a Cisco StackWise Virtual environment, which planes are virtually combined in the common logical switch?

A.

management and data

B.

control and management

C.

control, and forwarding

D.

control and data

Full Access
Question # 18

Refer to the exhibit.

A company requires that all wireless users authenticate using dynamic key generation. Which configuration must be applied?

A.

AP(config-if-ssid)# authentication open wep wep_methods

B.

AP(config-if-ssid)# authentication dynamic wep wep_methods

C.

AP(config-if-ssid)# authentication dynamic open wep_dynamic

D.

AP(config-if-ssid)# authentication open eap eap_methods

Full Access
Question # 19

Refer to the exhibit. Which python code parses the response and prints “18:32:21.474 UTC sun Mar 10 2019?

A.

print(response['resut'][0||'simple_time']}

B.

print(response[result']['body']['simple_time']}

C.

print(response['body']['simple_time']}

D.

print(response[jresult']['body']['simple_time']}

Full Access
Question # 20

Which protocol is implemented to establish secure control plane adjacencies between Cisco SD-WAN nodes?

A.

IKF

B.

TLS

C.

IPsec

D.

ESP

Full Access
Question # 21

How do stratum levels relate to the distance from a time source?

A.

Stratum 1 devices are connected directly to an authoritative time source.

B.

Stratum 15 devices are connected directly to an authoritative time source

C.

Stratum 0 devices are connected directly to an authoritative time source.

D.

Stratum 15 devices are an authoritative time source.

Full Access
Question # 22

Refer to the exhibit.

The OSPF neighborship fails between two routers. What is the cause of this issue?

A.

The OSPF router ID is missing on this router.

B.

The OSPF process is stopped on the neighbor router.

C.

There is an MTU mismatch between the two routers.

D.

The OSPF router ID is missing on the neighbor router.

Full Access
Question # 23

Refer to the exhibit. A network engineer checks connectivity between two routers. The engineer can ping the remote endpoint but cannot see an ARP entry. Why is there no ARP entry?

A.

The ping command must be executed in the global routing table.

B.

Interface FastEthernet0/0 Is configured in VRF CUST-A, so the ARP entry is also in that VRF.

C.

When VRFs are used. ARP protocol must be enabled In each VRF.

D.

When VRFs are used. ARP protocol is disabled in the global routing table.

Full Access
Question # 24

Which signal strength and noise values meet the minimum SNR for voice networks?

A.

signal strength -67 dBm, noise 91 dBm

B.

signal strength -69 dBm, noise 94 dBm

C.

signal strength -68 dBm, noise 89 dBm

D.

signal strength -66 dBm, noise 90 dBm

Full Access
Question # 25

Which LISP infrastructure device provides connectivity between non-sites and LISP sites by receiving non-LISP traffic with a LISP site destination?

A.

PETR

B.

PITR

C.

map resolver

D.

map server

Full Access
Question # 26

An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy. Which device presents the web authentication for the WLAN?

A.

ISE server

B.

local WLC

C.

RADIUS server

D.

anchor WLC

Full Access
Question # 27

Drag and drop the characteristics from the left onto the routing protocols they describe on the right

Full Access
Question # 28

Refer to the exhibit.

Which privilege level is assigned to VTY users?

A.

1

B.

7

C.

13

D.

15

Full Access
Question # 29

A network administrator is preparing a Python scrip to configure a Cisco IOS XE-based device on the network. The administrator is worried that colleagues will make changes to the device while the script is running. Which operation of he in client manager prevent colleague making changes to the device while the scrip is running?

A.

m.lock(config=’running’)

B.

m.lock(target=’running’)

C.

m.freeze(target=’running’)

D.

m.freeze(config=’running’)

Full Access
Question # 30

A client device roams between access points located on different floors in an atrium. The access points are Joined to the same controller and configured in local mode. The access points are in different AP groups and have different IP addresses, but the client VLAN in the groups is the same. Which type of roam occurs?

A.

inter-controller

B.

inter-subnet

C.

intra-VLAN

D.

intra-controller

Full Access
Question # 31

What is the wireless received signal strength indicator?

A.

The value given to the strength of the wireless signal received compared to the noise level

B.

The value of how strong the wireless signal Is leaving the antenna using transmit power, cable loss, and antenna gain

C.

The value of how much wireless signal is lost over a defined amount of distance

D.

The value of how strong a tireless signal is receded, measured in dBm

Full Access
Question # 32

What are two considerations when using SSO as a network redundancy feature? (Choose two)

A.

both supervisors must be configured separately

B.

the multicast state is preserved during switchover

C.

must be combined with NSF to support uninterrupted Layer 2 operations

D.

must be combined with NSF to support uninterrupted Layer 3 operations

E.

requires synchronization between supervisors in order to guarantee continuous connectivity

Full Access
Question # 33

What is the recommended minimum SNR for data applications on wireless networks?

A.

15

B.

20

C.

25

D.

10

Full Access
Question # 34

Which option works with a DHCP server to return at least one WLAN management interface IP address during the discovery phase and is dependent upon the VCI of the AP?

A.

Option 42

B.

Option 15

C.

Option 125

D.

Option 43

Full Access
Question # 35

Refer to the exhibit.

The WLC administrator sees that the controller to which a roaming client associates has Mobility Role Anchor configured under Clients > Detail. Which type of roaming is supported?

A.

Indirect

B.

Layer 3 intercontroller

C.

Layer 2 intercontroller

D.

Intracontroller

Full Access
Question # 36

Refer to the exhibit.

Which command set must be applied on R1 to establish a BGP neighborship with R2 and to allow communication from R1 to reach the networks?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 37

What is an emulated machine that has dedicated compute memory, and storage resources and a fully installed operating system?

A.

Container

B.

Mainframe

C.

Host

D.

virtual machine

Full Access
Question # 38

Which two characteristics apply to the endpoint security aspect of the Cisco Threat Defense architecture? (Choose two.)

A.

detect and black ransomware in email attachments

B.

outbound URL analysis and data transfer controls

C.

user context analysis

D.

blocking of fileless malware in real time

E.

cloud-based analysis of threats

Full Access
Question # 39

Refer the exhibit.

Which configuration elects SW4 as the root bridge for VLAN 1 and puts G0/2 on SW2 into a blocking state?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 40

What Is the difference between the MAC address table and TCAM?

A.

The MAC address table supports partial matches. TCAM requires an exact match.

B.

The MAC address table is contained in TCAM ACL and QoS information is stored in CAM.

C.

Router prefix lookups happen in TCAM. MAC address table lookups happen In CAM.

D.

TCAM is used to make L2 forwarding decisions. CAM is used to build routing tables

Full Access
Question # 41

Which function does a fabric AP perform in a cisco SD-access deployment?

A.

It updates wireless clients' locations in the fabric

B.

It connects wireless clients to the fabric.

C.

It manages wireless clients' membership information in the fabric

D.

It configures security policies down to wireless clients in the fabric.

Full Access
Question # 42

By default, which virtual MAC address does HSRP group 22 use?

A.

c0:42:01:67:05:16

B.

c0:07:0c:ac:00:22

C.

00:00:0c:07:ac:16

D.

00:00:0c:07:ac:22

Full Access
Question # 43

Refer to the exhibit.

Object tracking has been configured for VRRP-enabled routers Edge-01 and Edge-02 Which commands cause Edge-02 to preempt Edge-01 in the event that interface G0/0 goes down on Edge-01?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 44

the following system log message is presented after a network administrator configures a GRE tunnel:

%TUN-5-RECURDOWN Interface Tunnel 0 temporarily disabled due to recursive routing

Why is tunnel 0 disabled?

A.

Because dynamic routing is not enabled

B.

Because the tunnel cannot reach its tunnel destination

C.

Because the best path to the tunnel destination is through the tunnel itself

D.

Because the router cannot recursively identify its egress forwarding interface

Full Access
Question # 45

Refer to the exhibit. What are two results of the NAT configuration? (Choose two.)

A.

Packets with a destination of 200.1.1.1 are translated to 10.1.1.1 or .2. respectively.

B.

A packet that is sent to 200.1.1.1 from 10.1.1.1 is translated to 209.165.201.1 on R1.

C.

R1 looks at the destination IP address of packets entering S0/0 and destined for inside hosts.

D.

R1 processes packets entering E0/0 and S0/0 by examining the source IP address.

E.

R1 is performing NAT for inside addresses and outside address.

Full Access
Question # 46

What is used to validate the authenticity of the client and is sent in HTTP requests as a JSON object?

A.

SSH

B.

HTTPS

C.

JWT

D.

TLS

Full Access
Question # 47

What is one characteristic of VXLAN?

A.

It supports a maximum of 4096 VLANs.

B.

It supports multitenant segments.

C.

It uses STP to prevent loops in the underlay network.

D.

It uses the Layer 2 header to transfer packets through the network underlay.

Full Access
Question # 48

Refer to the exhibit.

Hosts PC1 PC2 and PC3 must access resources on Serve 1. An engineer

configures NAT on Router R1 1e enable the communication and enters the show command to verify operation Which IP address is used by the hosts when they communicate globally to Server1?

A.

155.1.1.1

B.

randorm addresses in the 155.1.1.0/24 range

C.

their own address in the 10.10.10.0/24 rance

D.

155.1.1.5

Full Access
Question # 49

A company recently decided to use RESTCONF instead of NETCONF and many of their NETCONF scripts contain the operation

(operation=”create”).Which RESTCONF operation must be used to replace these statements?

A.

POST

B.

GET

C.

PUT

D.

CREATE

Full Access
Question # 50

What is a characteristics of a vSwitch?

A.

supports advanced Layer 3 routing protocols that are not offered by a hardware switch

B.

enables VMs to communicate with each other within a virtualized server

C.

has higher performance than a hardware switch

D.

operates as a hub and broadcasts the traffic toward all the vPorts

Full Access
Question # 51

Which there application has the ability to make REST calls against Cisco DNA Center?

A.

API Explorer

B.

REST Explorer

C.

Postman

D.

Mozilla

Full Access
Question # 52

Refer to the exhibit. Cisco IOS routers R1 and R2 are interconnected using interface Gi0/0. Which configuration allows R1 and R2 to form an OSPF neighborship on interface Gi0/0?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 53

Which function does a Cisco SD-Access extended node perform?

A.

provides fabric extension to nonfabric devices through remote registration and configuration

B.

performs tunneling between fabric and nonfabric devices to route traffic over unknown networks

C.

used to extend the fabric connecting to downstream nonfabric enabled Layer 2 switches

D.

in charge of establishing Layer 3 adjacencies with nonfabric unmanaged node

Full Access
Question # 54

Drag anti drop the characteristics from the ten onto the configuration models on the right.

Full Access
Question # 55

What is the JSON syntax that is formed the data?

A.

{'Name'';''Bob johnon';''Age': Sevenfive,''Alive'': true,''FavoriteFoods';[''Cereal';''Mustard';''Onions'}}

B.

{'Name'':''Bob johnon':''Age': 75 ''Alive'': true,''Favorite Foods';[''Cereal';''Mustard';''Onions'}}

C.

{'Name'':''Bob johnon':''Age: 75,''Alive: true, FavoriteFoods;[Cereal, Mustard';''Onions}}

D.

{'Name'': 'Bob johnon','Age': 75,'Alive': true,''FavoriteFoods': 'Cereal';'Mustard','Onions'}}

Full Access
Question # 56

How does the RIB differ from the FIB?

A.

The RIB is used to create network topologies and routing tables. The FIB is a list of routes to particular network destinations.

B.

The FIB includes many routes a single destination. The RIB is the best route to a single destination.

C.

The RIB includes many routes to the same destination prefix. The FIB contains only the best route

D.

The FIB maintains network topologies and routing tables. The RIB is a Iist of routes to particular network destinations.

Full Access
Question # 57

Which two methods are used to reduce the AP coverage area? (Choose two)

A.

Reduce channel width from 40 MHz to 20 MHz

B.

Disable 2.4 GHz and use only 5 GHz.

C.

Reduce AP transmit power.

D.

Increase minimum mandatory data rate

E.

Enable Fastlane

Full Access
Question # 58

Drag and drop the characteristics from the left onto the protocols they apply to on the right?

Full Access
Question # 59

A customer has recently implemented a new wireless infrastructure using WLC-5520 at a site directly next to a large commercial airport. Users report that they intermittently lose WI-FI connectivity, and troubleshooting reveals it is due to frequent channel changes. Which two actions fix this issue? (Choose two)

A.

Remove UNII-2 and Extended UNII-2 channels from the 5 Ghz channel list

B.

Restore the DCA default settings because this automatically avoids channel interference.

C.

Configure channels on the UNIk2 and the Extended UNII-2 sub-bands of the 5 Ghz band only

D.

Enable DFS channels because they are immune to radar interference.

E.

Disable DFS channels to prevent interference with Doppler radar

Full Access
Question # 60

Refer to the exhibit. External users require HTTP connectivity to an internal company web server that is listening on TCP port 8080. Which command set accomplishes this requirement?

A)

B)

C)

D)

E)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 61

Refer to the exhibit.

An engineer must modify the access control list EGRESS to allow all IP traffic from subnet 10.1.10.0/24 to 10.1.2.0/24. The access control list is applied in the outbound direction on router interface GigabitEthemet 0/1. Which configuration commands can the engineer use to allow this traffic without disrupting existing traffic flows?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 62

How is 802.11 traffic handled in a fabric-enabled SSID?

A.

centrally switched back to WLC where the user traffic is mapped to a VXLAN on the WLC

B.

converted by the AP into 802.3 and encapsulated into VXLAN

C.

centrally switched back to WLC where the user traffic is mapped to a VLAN on the WLC

D.

converted by the AP into 802.3 and encapsulated into a VLAN

Full Access
Question # 63

Refer to the exhibit. An engineer configures CoPP and enters the show command to verify the implementation. What is the result of the configuration?

A.

All traffic will be policed based on access-list 120.

B.

If traffic exceeds the specified rate, it will be transmitted and remarked.

C.

Class-default traffic will be dropped.

D.

ICMP will be denied based on this configuration.

Full Access
Question # 64

A network engineer configures BGP between R1 and R2. Both routers use BGP peer group CORP and are set up to use MD5 authentication. This message is logged to the console of router R1:

Which two configuration allow peering session to from between R1 and R2? Choose two.)

A.

R1(config-router)#neighbor 10.10.10.1 peer-group CORP R1(config-router)#neighbor CORP password Cisco

B.

R2(config-router)#neighbor 10.120.10.1 peer-group CORP R2(config-router)#neighbor CORP password Cisco

C.

R2(config-router)#neighbor 10.10.10.1 peer-group CORP R2(config-router)#neighbor PEER password Cisco

D.

R1(config-router)#neighbor 10.120.10.1 peer-group CORP R1(config-router)#neighbor CORP password Cisco

E.

R2(config-router)#neighbor 10.10.10.1 peer-group CORP R2(config-router)#neighbor CORP password Cisco

Full Access
Question # 65

Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial?

A.

under interface saturation condition

B.

under network convergence condition

C.

under all network condition

D.

under traffic classification and marking conditions.

Full Access
Question # 66

Refer to the exhibit.

Which troubleshooting a routing issue, an engineer issues a ping from S1 to S2. When two actions from the initial value of the TTL? (Choose two.)

A.

The packet reaches R3, and the TTL expires

B.

R2 replies with a TTL exceeded message

C.

R3 replies with a TTL exceeded message.

D.

The packet reaches R2 and the TTL expires

E.

R1 replies with a TTL exceeded message

F.

The packet reaches R1 and the TTL expires.

Full Access
Question # 67

Refer to the exhibit. An engineer must create a script that appends the output of the show process cpu sorted command to a file.

A.

action 4.0 syslog command “show process cpu sorted | append flash:high-cpu-file”

B.

action 4.0 publish-event “show process cpu sorted | append flash:high-cpu-file”

C.

action 4.0 ens-event “show process cpu sorted | append flash:high-cpu-file”

D.

action 4.0 cli command “show process cpu sorted | append flash:high-cpu-file”

Full Access
Question # 68

Which congestion queuing method on Cisco IOS based routers uses four static queues?

A.

Priority

B.

custom

C.

weighted fair

D.

low latency

Full Access
Question # 69

Refer to the exhibit.

A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Which two configuration changes accomplish this? (Choose two).

A.

Create an IPsec profile, associate the transform-set ACL, and apply the profile to the tunnel interface.

B.

Apply the crypto map to the tunnel interface and change the tunnel mode to tunnel mode ipsec ipv4.

C.

Remove all configuration related to crypto map from R1 and R2 and eliminate the ACL.

D.

Create an IPsec profile, associate the transform-set, and apply the profile to the tunnel interface.

E.

Remove the crypto map and modify the ACL to allow traffic between 10.10.0.0/24 to 10.20.0.0/24.

Full Access
Question # 70

What is a consideration when designing a Cisco SD-Access underlay network?

A.

End user subnets and endpoints are part of the underlay network.

B.

The underlay switches provide endpoint physical connectivity for users.

C.

Static routing is a requirement,

D.

It must support IPv4 and IPv6 underlay networks

Full Access
Question # 71

Which data is properly formatted with JSON?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 72

Running the script causes the output in the exhibit. Which change to the first line of the script resolves the error?

A.

from ncclient import

B.

import manager

C.

from ncclient import*

D.

import ncclient manager

Full Access
Question # 73

Which method of account authentication does OAuth 2.0 within REST APIs?

A.

username/role combination

B.

access tokens

C.

cookie authentication

D.

basic signature workflow

Full Access
Question # 74

An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:

Which two statements does the engineer use to explain these values to the customer? (Choose two)

A.

The signal strength at location C is too weak to support web surfing

B.

Location D has the strongest RF signal strength

C.

The RF signal strength at location B is 50% weaker than location A

D.

The signal strength at location B is 10 dB better than location C

E.

The RF signal strength at location C is 10 times stronger than location B

 

Full Access
Question # 75

Drag and drop the characteristics from the left onto the routing protocols they describe on the right.

Full Access
Question # 76

When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?

A.

logging host 10.2.3.4 vrf mgmt transport tcp port 6514

B.

logging host 10.2.3.4 vrf mgmt transport udp port 6514

C.

logging host 10.2.3.4 vrf mgmt transport tcp port 514

D.

logging host 10.2.3.4 vrf mgmt transport udp port 514

Full Access
Question # 77

Which benefit is offered by a cloud infrastructure deployment but is lacking in an on-premises deployment?

A.

efficient scalability

B.

virtualization

C.

storage capacity

D.

supported systems

Full Access
Question # 78

Refer to the exhibit. Which configuration must be applied to R to enable R to reach the server at 172.16.0.1?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 79

What is a benefit of data modeling languages like YANG?

A.

They enable programmers to change or write their own application within the device operating system.

B.

They create more secure and efficient SNMP OIDs.

C.

They make the CLI simpler and more efficient.

D.

They provide a standardized data structure, which results in configuration scalability and consistency.

Full Access
Question # 80

Drag and drop the characteristics from the left onto the appropriate infrastructure deployment types on the right.

Full Access
Question # 81

Refer to the exhibit.

Which HTTP JSON response does the python code output give?

A.

NameError: name 'json' is not defined

B.

KeyError 'kickstart_ver_str'

C.

7.61

D.

7.0(3)I7(4)

Full Access
Question # 82

Which outbound access list, applied to the WAN interface of a router, permits all traffic except for http traffic sourced from the workstation with IP address 10.10.10.1?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 83

Refer to the exhibit. Communication between London and New York is down. Which command set must be applied to the NewYork switch to resolve the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 84

Refer to the exhibit.

Which type of antenna is show on the radiation patterns?

A.

Dipole

B.

Yagi

C.

Patch

D.

Omnidirectional

Full Access
Question # 85

What does Call Admission Control require the client to send in order to reserve the bandwidth?

A.

SIP flow information

B.

Wi-Fi multimedia

C.

traffic specification

D.

VoIP media session awareness

Full Access
Question # 86

What does the cisco REST response indicate?

A.

Cisco DNA Center has the Incorrect credentials for cat3850-1

B.

Cisco DNA Center is unable to communicate with cat9000-1

C.

Cisco DNA Center has the incorrect credentials for cat9000-1

D.

Cisco DNA Center has the Incorrect credentials for RouterASR-1

Full Access
Question # 87

Which OSPF networks types are compatible and allow communication through the two peering devices?

A.

broadcast to nonbroadcast

B.

point-to-multipoint to nonbroadcast

C.

broadcast to point-to-point

D.

point-to-multipoint to broadcast

Full Access
Question # 88

Refer to the exhibit.

An engineer must add the SNMP interface table to the NetFlow protocol flow records. Where should the SNMP table option be added?

A.

under the interface

B.

under the flow record

C.

under the flow monitor

D.

under the flow exporter

Full Access
Question # 89

Refer to the exhibit.

What is the effect of these commands on the BR and HQ tunnel interfaces?

A.

The tunnel line protocol goes down when the keepalive counter reaches 6

B.

The keepalives are sent every 5 seconds and 3 retries

C.

The keepalives are sent every 3 seconds and 5 retries

D.

The tunnel line protocol goes down when the keepalive counter reaches 5

Full Access
Question # 90

Refer to the exhibit.

An engineer reconfigures the pot-channel between SW1 and SW2 from an access port to a trunk and immediately notices this error in SW1's log.

Which command set resolves this error?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 91

How does a fabric AP fit in the network?

A.

It is in local mode and must be connected directly to the fabric border node

B.

It is in FlexConnect mode and must be connected directly to the fabric edge switch.

C.

It is in FlexConnect mode and must be connected directly to the fabric border node

D.

It is in local mode and must be connected directly to the fabric edge switch.

Full Access