Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

350-401 Questions and Answers

Question # 6

A large campus network has deployed two wireless LAN controllers to manage the wireless network. WLC1 and WLC2 have been configured as mobility peers. A client device roams from AP1 on WLC1 to AP2 on WLC2, but the controller's client interfaces are on different VLANs. How do the wireless LAN controllers handle the inter-subnet roaming?

A.

WLC1 marks me diem with an anchor entry In Its own database. The database entry is copied to the new controller and marked with a foreign entry on VVLC2.

B.

WLC2 marks the client with an anchor entry In Its own database. The database entry Is copied to the new controller and marked with a foreign entry on WLC1

C.

WLCl marks the client with a foreign entry in its own database. The database entry is copied to the new controller and marked with an anchor entry on WLC2.

D.

WLC2 marks the client with a foreign entry In its own database. The database entry Is copied to the new controller and marked with an anchor entry on WLC1.

Full Access
Question # 7

Which benefit is provided by the Cisco DNA Center telemetry feature?

A.

provides improved network security

B.

inventories network devices

C.

aids In the deployment network configurations

D.

improves the user experience

Full Access
Question # 8

Drag and drop the characteristics from the left onto the deployment types on the right.

Full Access
Question # 9

Refer to the exhibit.

A network engineer must configure the router to use the ISE-Servers group for authentication. If both ISE servers are unavailable, the local username database must be used. If no usernames are defined in the configuration, then the enable password must be the last resort to log in. Which configuration must be applied to achieve this result?

A.

aaa authentication login default group ISE-Servers local enable

B.

aaa authentication login default group enable local ISE-Servers

C.

aaa authorization exec default group ISE-Servers local enable

D.

aaa authentication login error-enable

aaa authentication login default group enable local ISE-Servers

Full Access
Question # 10

Which type of tunnel Is required between two WLCs to enable Intercontroller roaming?

A.

mobility

B.

LWAPP

C.

CAPWAP

D.

iPsec

Full Access
Question # 11

Which VXLAN component is used to encapsulate and decapsulate Ethernet frames?

A.

VNI

B.

GRE

C.

VTEP

D.

EVPN

Full Access
Question # 12

What happens when a FlexConnect AP changes to standalone mode?

A.

All controller-dependent activities stop working except the DFS.

B.

All client roaming continues to work

C.

Only clients on central switching WLANs stay connected.

D.

All clients on an WLANs are disconnected

Full Access
Question # 13

Which protocol is responsible for data plane forwarding in a Cisco SD-Access deployment?

A.

VXLAN

B.

IS-IS

C.

OSPF

D.

LISP

Full Access
Question # 14

Refer to the exhibit. An engineer has configured an IP SLA for UDP echo’s. Which command is needed to start the IP SLA to test every 30 seconds and continue until stopped?

A.

ip sla schedule 100 start-time now life forever

B.

ip sla schedule 30 start-time now life forever

C.

ip sla schedule 100 start-time now life 30

D.

ip sla schedule 100 life forever

Full Access
Question # 15

What is the API keys option for REST API authentication?

A.

a predetermined string that is passed from client to server

B.

a one-time encrypted token

C.

a username that is stored in the local router database

D.

a credential that is transmitted unencrypted

Full Access
Question # 16

Drag and drop the characteristics from the left to the table types on the right.

Full Access
Question # 17

An engineer must configure an EXEC authorization list that first checks a AAA server then a local username. If both methods fail, the user is denied. Which configuration should be applied?

A.

aaa authorization exec default local group tacacs+

B.

aaa authorization exec default local group radius none

C.

aaa authorization exec default group radius local none

D.

aaa authorization exec default group radius local

Full Access
Question # 18

Refer to the exhibit.

An engineer must allow all users in the 10.2.2.0/24 subnet to access the Internet. To conserve address space the public Interface address of 209 165 201.1 must be usedfor all external communication. Which command set accomplishes these requirements?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 19

Refer io me exhibit.

An engineer configures the trunk and proceeds to configure an ESPAN session to monitor VLANs10. 20. and 30. Which command must be added to complete this configuration?

A.

Device(config.mon.erspan.stc)# no filter vlan 30

B.

Devic(config.mon.erspan.src-dst)# no vrf 1

C.

Devic(config.mon.erspan.src-dst)# erspan id 6

D.

Device(config.mon-erspan.Src-dst)# mtu 1460

Full Access
Question # 20

Refer to the exhibit. Which command set must be added to permit and log all traffic that comes from 172.20.10.1 in interface GigabitEthernet0/1 without impacting the functionality of the access list?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 21

Which definition describes JWT in regard to REST API security?

A.

an encrypted JSON token that is used for authentication

B.

an encrypted JSON token that is used for authorization

C.

an encoded JSON token that is used to securely exchange information

D.

an encoded JSON token that is used for authentication

Full Access
Question # 22

Refer to the exhibit. An engineer must configure an eBGP neighborship to Router B on Router A. The network that is connected to GO/1 on Router A must be advertised to Router B. Which configuration should be applied?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 23

An administrator is configuring NETCONF using the following XML string. What must the administrator end the request with?

A.

]]>]]>

B.

C.

D.

Full Access
Question # 24

An engineer must configure an ACL that permits packets which include an ACK in the TCP header Which entry must be included in the ACL?

A.

access-list 10 permit ip any any eq 21 tcp-ack

B.

access-list 110 permit tcp any any eq 21 tcp-ack

C.

access-list 10 permit tcp any any eq 21 established

D.

access-list 110 permit tcp any any eq 21 established

Full Access
Question # 25

A network engineer is configuring OSPF on a router. The engineer wants to prevent having a route to 177.16.0.0/16 learned via OSPF. In the routing table and configures a prefix list using the command ip prefix-list OFFICE seq S deny 172.16.0.0/16. Winch two identical configuration commands must be applied to accomplish the goal? (Choose two.)

A.

distribute-list prefix OFFICE in under the OSPF process

B.

Ip prefix-list OFFICE seq 10 permit 0.0.0.0/0 Ie 32

C.

ip prefix-list OFFICE seq 10 permit 0.0.0.0/0 ge 32

D.

distribute-list OFFICE out under the OSPF process

E.

distribute-list OFFICE in under the OSPF process

Full Access
Question # 26

Which Cisco FlexConnect state allows wireless users that are connected to the network to continue working after the connection to the WLC has been lost?

A.

Authentication Down/Switching Down

B.

Authentication-Central/Switch-Local

C.

Authentication- Down/Switch-Local

D.

Authentication-Central/Switch-Central

Full Access
Question # 27

Which method displays text directly into the active console with a synchronous EEM applet policy?

A.

event manager applet boom

event syslog pattern 'UP'

action 1.0 gets 'logging directly to console'

B.

event manager applet boom

event syslog pattern 'UP'

action 1.0 syslog priority direct msg 'log directly to console'

C.

event manager applet boom

event syslog pattern 'UP'

action 1.0 puts 'logging directly to console'

D.

event manager applet boom

event syslog pattern 'UP'

action 1.0 string 'logging directly to console'

Full Access
Question # 28

What is one benefit of adopting a data modeling language?

A.

augmenting management process using vendor centric actions around models

B.

refactoring vendor and platform specific configurations with widely compatible configurations

C.

augmenting the use of management protocols like SNMP for status subscriptions

D.

deploying machine-friendly codes to manage a high number of devices

Full Access
Question # 29

Refer to the exhibit.

Which command set is needed to configure and verify router R3 to measure the response time from router R3 to the file server located in the data center?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 30

What is an emulated machine that has dedicated compute memory, and storage resources and a fully installed operating system?

A.

Container

B.

Mainframe

C.

Host

D.

virtual machine

Full Access
Question # 31

What is one characteristic of the Cisco SD-Access control plane?

A.

It is based on VXLAN technology.

B.

Each router processes every possible destination and route

C.

It allows host mobility only in the wireless network.

D.

It stores remote routes in a centralized database server

Full Access
Question # 32

Refer to the exhibit. An attacker can advertise OSPF fake routes from 172.16.20.0 network to the OSPF domain and black hole traffic. Which action must be taken to avoid this attack and still be able to advertise this subnet into OSPF?

A.

Configure 172.16.20.0 as a stub network.

B.

Apply a policy to filter OSPF packets on R2.

C.

Configure a passive Interface on R2 toward 172.16.20.0.

D.

Configure graceful restart on the 172.16.20.0 interface.

Full Access
Question # 33

Drag and drop the LIPS components on the left to the correct description on the right.

Full Access
Question # 34

Which resource is able to be shared among virtual machines deployed on the same physical server?

A.

applications

B.

disk

C.

VM configuration file

D.

operating system

Full Access
Question # 35

Refer to the exhibit. Which configuration must be added to enable GigabitEthemet 0/1 to participate in OSPF?

A.

SF_router (config-router)# network 10.10.1.0 0.0.0.255 area 0

B.

SF_rouier (conng)# network 10.10.1.0 0.0.0.255 area 1

C.

SF_router (conflg-routerp) network 10.10.1.0 0.0.0.255 area 1

D.

SF_rouler (contlg-rouler)# network 10.10.1.0 255.255.255.0 area 0

Full Access
Question # 36

Which feature Is used to propagate ARP broadcast, and link-local frames across a Cisco SD-Access fabric to address connectivity needs for silent hosts that require reception of traffic to start communicating?

A.

Native Fabric Multicast

B.

Layer 2 Flooding

C.

SOA Transit

D.

Multisite Fabric

Full Access
Question # 37

What is a characteristic of a type 2 hypervisor?

A.

ideal for data center

B.

complicated deployment

C.

ideal for client/end-user system

D.

referred to as bare-metal

Full Access
Question # 38

Refer to the exhibit. A network engineer must be notified when a user switches to configuration mode. Which script should be applied to receive an SNMP trap and a critical-level log message?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 39

Drag and drop the LISP components on the left to their descriptions on the right. Not all options are used.

Full Access
Question # 40

How do EIGRP metrics compare to OSPF metrics?

A.

EIGRP metrics are based on a combination of bandwidth and packet loss, and OSPF metrics are based on interface bandwidth.

B.

EIGRP uses the Dijkstra algorithm, and OSPF uses The DUAL algorithm

C.

The EIGRP administrative distance for external routes is 170. and the OSPF administrative distance for external routes is undefined

D.

The EIGRP administrative distance for external routes is 170. and the OSPF administrative distance for external routes is 110

Full Access
Question # 41

What is the JSON syntax that is formed the data?

A.

{'Name'';''Bob johnon';''Age': Sevenfive,''Alive'': true,''FavoriteFoods';[''Cereal';''Mustard';''Onions'}}

B.

{'Name'':''Bob johnon':''Age': 75 ''Alive'': true,''Favorite Foods';[''Cereal';''Mustard';''Onions'}}

C.

{'Name'':''Bob johnon':''Age: 75,''Alive: true, FavoriteFoods;[Cereal, Mustard';''Onions}}

D.

{'Name'': 'Bob johnon','Age': 75,'Alive': true,''FavoriteFoods': 'Cereal';'Mustard','Onions'}}

Full Access
Question # 42

Refer to the exhibit.

What is the effect of introducing the sampler feature into the Flexible NetFlow configuration on the router?

A.

NetFlow updates to the collector are sent 50% less frequently.

B.

Every second IPv4 packet is forwarded to the collector for inspection.

C.

CPU and memory utilization are reduced when compared with what is required for full NetFlow.

D.

The resolution of sampling data increases, but it requires more performance from the router.

Full Access
Question # 43

Refer to the exhibit. A network engineer checks connectivity between two routers. The engineer can ping the remote endpoint but cannot see an ARP entry. Why is there no ARP entry?

A.

The ping command must be executed in the global routing table.

B.

Interface FastEthernet0/0 Is configured in VRF CUST-A, so the ARP entry is also in that VRF.

C.

When VRFs are used. ARP protocol must be enabled In each VRF.

D.

When VRFs are used. ARP protocol is disabled in the global routing table.

Full Access
Question # 44

By default, which virtual MAC address does HSRP group 14 use?

A.

04.16.19.09.4c.0e

B.

00:05:5e:19:0c:14

C.

00:05:0c:07:ac:14

D.

00:00:0c:07:ac:0e

Full Access
Question # 45

Refer to The exhibit.

Assuming that R1 is a CE router, which VRF is assigned to Gi0/0 on R1?

A.

VRF VFN_A

B.

VRF VPN_B

C.

management VRF

D.

default VRF

Full Access
Question # 46

Which two characteristics apply to the endpoint security aspect of the Cisco Threat Defense architecture? (Choose two.)

A.

detect and black ransomware in email attachments

B.

outbound URL analysis and data transfer controls

C.

user context analysis

D.

blocking of fileless malware in real time

E.

cloud-based analysis of threats

Full Access
Question # 47

Which option must be used to support a WLC with an IPv6 management address and 100 Cisco Aironet 2800 Series access points that will use DHCP to register?

A.

43

B.

52

C.

60

D.

82

Full Access
Question # 48

What Is a characteristic of a WLC that is in master controller mode?

A.

All wireless LAN controllers are managed by the master controller.

B.

All new APs that join the WLAN are assigned to the master controller.

C.

Configuration on the master controller is executed on all wireless LAN controllers.

D.

The master controller is responsible for load balancing all connecting clients to other controllers

Full Access
Question # 49

Refer to the exhibit. Which EEM script generates a critical-level syslog message and saves a copy of the running configuration to the bootflash when an administrator saves the running configuration to the startup configuration?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 50

What does the statement print(format(0.8, '.0%')) display?

A.

80%

B.

8%

C.

.08%

D.

8.8%

Full Access
Question # 51

In a Cisco StackWise Virtual environment, which planes are virtually combined in the common logical switch?

A.

control, and forwarding

B.

management and data

C.

control and management

D.

control and data

Full Access
Question # 52

Drag and drop the characteristics from the left onto the deployment models on the right Not all options are used.

Full Access
Question # 53

Drag and drop the characteristics from the left onto the switching mechanisms they describe on the right.

Full Access
Question # 54

Refer to the exhibit.

The WLC administrator sees that the controller to which a roaming client associates has Mobility Role Anchor configured under Clients > Detail. Which type of roaming is supported?

A.

Indirect

B.

Layer 3 intercontroller

C.

Layer 2 intercontroller

D.

Intracontroller

Full Access
Question # 55

What does the destination MAC on the outer MAC header identify in a VXLAN packet?

A.

thee emote spine

B.

the next hop

C.

the leaf switch

D.

the remote switch

Full Access
Question # 56

A customer has a wireless network deployed within a multi-tenant building. The network provides client access, location-based services, and is monitored using Cisco DNA Center. The security departmentwants to locate and track malicious devices based on threat signatures. Which feature is required for this solution?

A.

Cisco aWIPS policies on the WLC

B.

Cisco aWIPS policies on Cisco DNA Center

C.

malicious rogue rules on the WLC

D.

malicious rogue rules on Cisco DNA Center

Full Access
Question # 57

Simulation 01

BGP connectivity exists between Headquarters and both remote sites; however, Remote Site 1 cannot communicate with RemoteSite 2. Configure BGP according to the topology to

goals:

1. Configure R1 and R3 under the BGP process to provide reachability between Remote Site 1 and Remote Site 2. No configuration changes are permitted on R2.

2. Ensure that the /32 networks at Remote Site 1 and Remote Site 2 can ping each other.

R1

R3

Full Access
Question # 58

How is traffic classified when using Cisco TrustSec technology?

A.

with the VLAN

B.

with the MAC address

C.

with the IP address

D.

with the security group tag

Full Access
Question # 59

Which A record type should be configured for access points to resolve the IP address of a wireless LAN controller using DNS?

A.

CISCO.CONTROLLER.localdomain

B.

CISCO.CAPWAP.CONTROLLER.localdomain

C.

CISCO-CONTROLLER.localdomain

D.

CISCO-CAPWAP-CONTROLLER.localdomain

Full Access
Question # 60

Company policy restricts VLAN 10 to be allowed only on SW1 and SW2. All other VLANs can be on all three switches. An administrator has noticed that VLAN 10 has propagated to SW3. Which configuration corrects the issue?

A.

SW1(config)#intgi1/1

SW1(config)#switchport trunk allowed vlan 1-9,11-4094

B.

SW2(config)#intgi1/2

SW2(config)#switchport trunk allowed vlan 10

C.

SW2(config)#int gi1/2

SW2(config)#switchport trunk allowed vlan 1-9,11-4094

D.

SWl(config)#intgi1/1

SW1(config)#switchport trunk allowed vlan 10

Full Access
Question # 61

Refer to the exhibit Remote users cannot access the Internet but can upload files to the storage server Which configuration must be applied to allow Internet access?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 62

Drag and drop the characteristics from the left onto the orchestration tool classifications on the right.

Full Access
Question # 63

What is the rose of the vSmart controller in a Cisco SD-WN environment?

A.

it performs authentication and authorization

B.

it manages the control plane.

C.

it is the centralized network management system

D.

it manages the data plane

Full Access
Question # 64

Which language defines the structure or modelling of data for NETCONF and RESTCONF?

A.

YAM

B.

YANG

C.

JSON

D.

XML

Full Access
Question # 65

By default, which virtual MAC address does HSRP group 41 use?

A.

0c:5e:ac:07:0c:29

B.

00:05:0c:07:ac:41

C.

004:41:73:18:84:29

D.

00:00:0c:07:ac:29

Full Access
Question # 66

Which two results occur if Cisco DNA center loses connectivity to devices in the SD-ACCESS fabric? (Choose two)

A.

All devices reload after detecting loss of connection to Cisco DNA Center

B.

Already connected users are unaffected, but new users cannot connect

C.

User connectivity is unaffected

D.

Cisco DNA Center is unable to collect monitoring data in Assurance

E.

Users lose connectivity

Full Access
Question # 67

the following system log message ispresented after a network administrator configures a GRE tunnel:

%TUN-5-RECURDOWN Interface Tunnel 0 temporarily disabled due to recursive routing

Why is tunnel 0 disabled?

A.

Because dynamic routing is not enabled

B.

Because the tunnel cannot reach its tunnel destination

C.

Because the best path to the tunnel destination is through the tunnel itself

D.

Because the router cannot recursively identify its egress forwarding interface

Full Access
Question # 68

Witch two actions provide controlled Layer 2 network connectivity between virtual machines running on the same hypervisor? (Choose two.)

A.

Use a single trunk link to an external Layer2 switch.

B.

Use a virtual switch provided by the hypervisor.

C.

Use a virtual switch running as a separate virtual machine.

D.

Use a single routed link to an external router on stick.

E.

Use VXLAN fabric after installing VXLAN tunneling drivers on the virtual machines.

Full Access
Question # 69

Which element is unique to a Type 2 hypervisor?

A.

memory

B.

VM OS

C.

host OS

D.

host hardware

Full Access
Question # 70

Refer to the exhibit. Which command allows hosts that are connected to FastEthernet0/2 to access the Internet?

A.

ip nat inside source list 10 interface FastEthernet0/1 overload

B.

ip nat inside source list 10 interface FastEthernet0/2 overload

C.

ip nat outside source list 10 interface FastEthernet0/2 overload

D.

ip nat outside source static 209.165.200.225 10.10.10.0 overload

Full Access
Question # 71

What is difference between TCAM and the MAC address table?

A.

TCAM is used to make Lalyer 2 forwarding decisions CAM is used to build routing tables.

B.

The MAC address table supports partial matches .TCAM requires an exact match.

C.

The MAC address table is contained in CAM.ACL and QoS information is stored in TCAM.

D.

Router prefix lookups happens in CAM.MAC address table lookups happen in TCAM.

Full Access
Question # 72

Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right.

Full Access
Question # 73

Refer to the exhibit.

Why does OSPF fail to establish an adjacency between R1 and R2?

A.

authentication mismatch

B.

interface MTU mismatch

C.

area mismatch

D.

timers mismatch

Full Access
Question # 74

Refer to the exhibit. Which command set enables router R2 to be configured via NETCONF?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 75

Refer to the exhibit Which command must be applied to complete the configuration and enable RESTCONF?

A.

ip http secure-server

B.

ip http server

C.

ip http secure-port 443

D.

ip http client username restconf

Full Access
Question # 76

Drag and drop the tools from the left onto the agent types on the right.

Full Access
Question # 77

Which LISP component decapsulates messages and forwards them to the map server responsible for the egress tunnel routers?

A.

Ingress Tunnel Router

B.

Map Resolver

C.

Proxy ETR

D.

Router Locator

Full Access
Question # 78

Refer to the exhibit.

Hosts PC1 PC2 and PC3 must access resources on Serve 1. An engineer

configures NAT on Router R1 1e enable the communication and enters the show command to verify operation Which IP address is used by the hosts when they communicate globally to Server1?

A.

155.1.1.1

B.

randorm addresses in the 155.1.1.0/24 range

C.

their own address in the 10.10.10.0/24 rance

D.

155.1.1.5

Full Access
Question # 79

Which component handles the orchestration plane of the Cisco SD-WAN?

A.

vBond

B.

cSmart

C.

vManage

D.

WAN Edge

Full Access
Question # 80

What is an advantage of utilizing data models in a multivendor environment?

A.

lowering CPU load incurred to managed devices

B.

improving communication security with binary encoded protocols

C.

facilitating a unified approach to configuration and management

D.

removing the distinction between configuration and runtime state data

Full Access
Question # 81

Refer to the exhibit.

Assuming all links are functional, which path does PC1 take to reach DSW1?

A.

PC1 goes from ALSW1 to DSW2 to CORE to DSW1.

B.

PC1 goes from ALSW1 to DSW2 to DSW1.

C.

PC1 goes from ALSW1 to DSW1.

D.

PC1 goes from ALSW1 to DSW2 to ALSW2 to DSW1.

Full Access
Question # 82

Which device is responsible for finding EID-to-RLOC mappings when traffic is sent to a LISP-capable site?

A.

map server

B.

map resolver

C.

ingress tunnel router

D.

egress tunnel router

Full Access
Question # 83

Refer to the exhibit.

R1 has a BGP neighborship with a directly connected router on interface Gi0/0.

Which command set is applied between the iterations of show ip bgp 2.2.2.2?

A.

R1(config)#router bgp 65001

R1(config-router)#neighbor 192.168.50.2 shutdown

B.

R1(config)#router bgp 65002

R1(config-router)#neighbor 192.168.50.2 shutdown

C.

R1(config)#no ip route 192.168.50.2 255.255.255.255 Gi0/0

D.

R1(config)#ip route 2.2.2.2 255.255.255.255 192.168.50.2

Full Access
Question # 84

Refer to the exhibit.

What is output by this code?

A.

8 7 6 5

B.

-4 -5 -6 -7

C.

-1 -2-3-4

D.

4 5 6 7

Full Access
Question # 85

What is one characteristic of Cisco DNA Center and vManage northbound APIs?

A.

They push configuration changes down to devices.

B.

They implement the RESTCONF protocol.

C.

They exchange XML-formatted content.

D.

They implement the NETCONF protocol.

Full Access
Question # 86

Refer to the exhibit. An engineer configures HSRP and enters theshow standbycommand. Which two facts about the network environment are derived from the output? (Choose two.)

A.

The local device has a higher priority selling than the active router

B.

The virtual IP address of the HSRP group is 10.1.1.1.

C.

If the local device fails to receive a hello from the active router for more than 5 seconds, it becomes the active router.

D.

The hello and hold timers are set to custom values.

E.

If a router with a higher IP address and same HSRP priority as the active router becomes available, that router becomes the new active router 5 seconds later.

Full Access
Question # 87

Which QoS feature uses the IP Precedence bits in the ToS field of the IP packet header to partition traffic into different priority levels?

A.

marking

B.

shaping

C.

policing

D.

classification

Full Access
Question # 88

What is the function of vBond in a Cisco SD-WAN deployment?

A.

initiating connections with SD-WAN routers automatically

B.

pushing of configuration toward SD-WAN routers

C.

onboarding of SD-WAN routers into the SD-WAN overlay

D.

gathering telemetry data from SD-WAN routers

Full Access
Question # 89

Refer to the exhibit. Which command set completes the ERSPAN session configuration?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 90

By default, which virtual MAC address does HSRP group 30 use?

A.

00:05:0c:07:ac:30

B.

00:00:0c:07:ac:1e

C.

05:0c:5e:ac:07:30

D.

00:42:18:14:05:1e

Full Access
Question # 91

An engineer must create a script to append and modify device entries in a JSON-formatted file. The script must work as follows:

    Until interrupted from the keyboard, the script reads in the hostname of a device, its management IP address, operating system type, and CLI remote access protocol.

    After being interrupted, the script displays the entered entries and adds them to the JSON-formatted file, replacing existing entries whose hostname matches.

The contents of the JSON-formatted file are as follows:

Drag and drop the statements onto the blanks within the code to complete the script. Not all options are used.

Full Access
Question # 92

Refer to the exhibit.

A company has an internal wireless network with a hidden SSID and RADIUS-based client authentication for increased security. An employee attempts to manually add the company network to a laptop, but the laptop does not attempt to connect to the network. The regulatory domains of the access points and the laptop are identical. Which action resolves this issue?

A.

Ensure that the "Connect even if this network is not broadcasting" option is selected.

B.

Limit the enabled wireless channels on the laptop to the maximum channel range that is supported by the access points.

C.

Change the security type to WPA2-Personal AES.

D.

Use the empty string as the hidden SSID network name.

Full Access
Question # 93

Refer to the exhibit. Cisco IOS routers R1 and R2 are interconnected using interface Gi0/0. Which configuration allows R1 and R2 to form an OSPF neighborship on interface Gi0/0?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 94

Simulation 04

ConfigureOSPF on both routers according to the topology to achieve these goals:

Full Access
Question # 95

Drag and drop the LISP components on the left to the correct description on the right.

Full Access
Question # 96

Refer to the exhibit.

These commands have been added to the configuration of a switch Which command flags an error if it is added to this configuration?

A.

monitor session 1 source interface port-channel 6

B.

monitor session 1 source vlan 10

C.

monitor session 1 source interface FatEtheret0/1 x

D.

monitor session 1 source interface port-channel 7,port-channel8

Full Access
Question # 97

Refer to the exhibit.

Which GRE tunnel configuration command is missing on R2?

A.

tunnel source 192.181.2

B.

tunnel source 172.16.1.0

C.

tunnel source 200.1.1.1

D.

tunnel destination 200.1.1.1

Full Access
Question # 98

Which two methods are used by an AP that is typing to discover a wireless LAN controller? (Choose two.)

A.

Cisco Discovery Protocol neighbour

B.

broadcasting on the local subnet

C.

DNS lookup cisco-DNA-PRIMARY.localdomain

D.

DHCP Option 43

E.

querying other APs

Full Access
Question # 99

Drag and drop the characteristics from the left onto the infrastructure deployment models they describe on the right.

Full Access
Question # 100

In a Cisco StackWise Virtual environment, which planes are virtually combined in the common logical switch?

A.

management and data

B.

control and management

C.

control, and forwarding

D.

control and data

Full Access
Question # 101

Refer to the exhibit.

An engineer configures OSPF and wants to verify the configuration Which configuration is applied to this device?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 102

Refer to the exhibit.

R2 is the neighboring router of R1. R2 receives an advertisement for network 192 168.10.50/32. Which configuration should be applied for the subnet to be advertised with the original /24 netmask?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 103

Refer to the exhibit.

An engineer attempts to establish BGP peering between router CORP and two ISP routers. What is the root cause for the failure between CORP and ISP#2?

A.

Router ISP#2 is configured to use SHA-1 authentication.

B.

There is a password mismatch between router CORP and router ISP#2.

C.

Router CORP is configured with an extended access control list.

D.

MD5 authorization is configured incorrectly on router ISP#2.

Full Access
Question # 104

Refer to the exhibit.

An engineer attempts to bundle interface Gi0/0 into the port channel, but it does not function as expected. Which action resolves the issue?

A.

Configure channel-group 1 mode active on interface Gi0/0.

B.

Configure no shutdown on interface Gi0/0

C.

Enable fast LACP PDUs on interface Gi0/0.

D.

Set LACP max-bundle to 2 on interface Port-channeM

Full Access
Question # 105

The login method is configured on the VTY lines of a router with these parameters

    The first method for authentication it TACACS

    If TACACS is unavailable login is allowed without any provided credentials

Which configuration accomplishes this task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 106

An engineer must export the contents of the devices object in JSON format. Which statement must be used?

A.

json.repr(Devices)

B.

json.dumps(Devices)

C.

json.prints(Devices)

D.

json.loads(Devices)

Full Access
Question # 107

Which deployment option of Cisco NGFW provides scalability?

A.

tap

B.

clustering

C.

inline tap

D.

high availability

Full Access
Question # 108

Refer to the exhibit.

An engineer must permit traffic from these networks and block all other traffic An informational log message should be triggered when traffic enters from these prefixes Which access list must be used?

A.

access-list acl_subnets permit ip 10.0.32.0 0 0.0.255 log

B.

access-list acl_subnets permit ip 10.0.32.0 0.0.7.255 log

C.

access-list acl_subnets permit ip 10.0.32.0 0.0.7.255 access-list acl_subnets deny ip any log

D.

access-list acl_subnets permit ip 10.0.32.0 255.255.248.0 log

Full Access
Question # 109

In a Cisco SD-WAN solution, which two functions are performed by OMP? (Choose two.)

A.

advertisement of network prefixes and their attributes

B.

configuration of control and data policies

C.

gathering of underlay infrastructure data

D.

delivery of crypto keys

E.

segmentation and differentiation of traffic

Full Access
Question # 110

When is the Design workflow used In Cisco DNA Center?

A.

in a greenfield deployment, with no existing infrastructure

B.

in a greenfield or brownfield deployment, to wipe out existing data

C.

in a brownfield deployment, to modify configuration of existing devices in the network

D.

in a brownfield deployment, to provision and onboard new network devices

Full Access
Question # 111

Drag and drop the REST API authentication methods from the left onto their descriptions on the right.

Full Access
Question # 112

A client device roams between access points located on different floors in an atrium. The access points are Joined to the same controller and configured in local mode. The access points are in different AP groups and have different IP addresses, but the client VLAN in the groups is the same. Which type of roam occurs?

A.

inter-controller

B.

inter-subnet

C.

intra-VLAN

D.

intra-controller

Full Access
Question # 113

Which protocol is used to encrypt control plane traffic between SD-WAN controllers and SD-WAN endpoints?

A.

DTLS

B.

IPsec

C.

PGP

D.

HTTPS

Full Access
Question # 114

Refer to the exhibit.

VPN-A sends point-to-point traffic to VPN-B and receives traffic only from VPN-C VPN-B sends point-to-point traffic to VPN-C and receives traffic only from VPN-A Which configuration is applied?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 115

What is the function of a control-plane node In a Cisco SD-Access solution?

A.

to run a mapping system that manages endpoint to network device relationships

B.

to implement policies and communicate with networks outside the fabric

C.

to connect external Layer 3 networks to the SD-Access fabric

D.

to connect APs and wireless endpoints to the SD-Access fabric

Full Access
Question # 116

Refer to the exhibit.

What is the result when a switch that is running PVST+ is added to this network?

A.

DSW2 operates in Rapid PVST+ and the new switch operates in PVST+

B.

Both switches operate in the PVST+ mode

C.

Spanning tree is disabled automatically on the network

D.

Both switches operate in the Rapid PVST+ mode.

Full Access
Question # 117

A network engineer is adding an additional 10Gps link to an exiting 2x10Gps LACP-based LAG to augment its capacity. Network standards require a bundle interface to be taken out of service if one of its member links goes down, and the new link must be added with minimal impact to the production network. Drag and drop the tasks that the engineer must perform from the left into the sequence on the right. Not all options are used.

Full Access
Question # 118

Refer to the exhibit.

An engineer is troubleshooting an application running on Apple phones. The application Is receiving incorrect QoS markings. The systems administrator confirmed that ail configuration profiles are correct on the Apple devices. Which change on the WLC optimizes QoS for these devices?

A.

Enable Fastlane

B.

Set WMM to required

C.

Change the QoS level to Platinum

D.

Configure AVC Profiles

Full Access
Question # 119

Which element enables communication between guest VMs within a virtualized environment?

A.

hypervisor

B.

vSwitch

C.

virtual router

D.

pNIC

Full Access
Question # 120

When are multicast RPs required?

A.

RPs are required only when using protocol independent multicast dense mode.

B.

By default, the RP is needed penodically to maintain sessions with sources and receivers.

C.

RPs are required for protocol Independent multicast sparse mode and dense mode.

D.

By default, the RP Is needed only start new sessions with sources and receivers.

Full Access
Question # 121

Which OSPF networks types are compatible and allow communication through the two peering devices?

A.

broadcast to nonbroadcast

B.

point-to-multipoint to nonbroadcast

C.

broadcast to point-to-point

D.

point-to-multipoint to broadcast

Full Access
Question # 122

Drag and drop the characteristics from the left onto the routing protocols they describe on the right.

Full Access
Question # 123

What is YANG used for?

A.

scraping data via CLI

B.

processing SNMP read-only polls

C.

describing data models

D.

providing a transport for network configuration data between client and server

Full Access
Question # 124

Refer to the exhibit.

After configuring HSRP an engineer enters the show standby command. Which two facts are derived from the output? (Choose two.)

A.

The router with IP 10.10 1.3 is active because it has a higher IP address

B.

If Fa0/0 is shut down, the HSRP priority on R2 becomes 80

C.

R2 Fa1/0 regains the primary role when the link comes back up

D.

R2 becomes the active router after the hold time expires.

E.

R2 is using the default HSRP hello and hold timers.

Full Access
Question # 125

Full Access
Question # 126

Full Access
Question # 127

Full Access
Question # 128

Full Access
Question # 129

Full Access
Question # 130

Full Access
Question # 131

Full Access
Question # 132

Full Access
Question # 133

Full Access
Question # 134

OR

Full Access
Question # 135

Full Access
Question # 136

Full Access
Question # 137

Full Access
Question # 138

Full Access
Question # 139

OR

OR

OR

Full Access
Question # 140

Full Access
Question # 141

Full Access
Question # 142

Full Access
Question # 143

Full Access
Question # 144

Full Access
Question # 145

Full Access
Question # 146

Full Access
Question # 147

Full Access
Question # 148

Refer to the exhibit. Which two commands are needed to allow for full reachability between AS 1000 and AS 2000? (Choose two)

A.

R1#network 192.168.0.0 mask 255.255.0.0

B.

R2#no network 10.0.0.0 255.255.255.0

C.

R2#network 192.168.0.0 mask 255.255.0.0

D.

R2#network 209.165.201.0 mask 255.255.192.0

E.

R1#no network 10.0.0.0 255.255.255.0

Full Access
Question # 149

What is the centralized control policy in a Cisco SD-WAN deployment?

A.

list of ordered statements that define user access policies

B.

set of statements that defines how routing is performed

C.

set of rules that governs nodes authentication within the cloud

D.

list of enabled services for all nodes within the cloud

Full Access
Question # 150

What are two benefits of YANG? (Choose two.)

A.

It enforces the use of a specific encoding format for NETCONF.

B.

It collects statistical constraint analysis information.

C.

It enables multiple leaf statements to exist within a leaf list.

D.

It enforces configuration semantics.

E.

It enforces configuration constraints.

Full Access
Question # 151

Which encryption hashing algorithm does NTP use for authentication?

A.

SSL

B.

MD5

C.

AES128

D.

AES256

Full Access
Question # 152

An engineer must configure HSRP group 300 on a Cisco IOS router. When the router is functional, it must be the must be the active HSRP router. The peer router has been configured using the default priority value. Which command set is required?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 153

Which configuration restricts the amount of SSH that a router accepts 100 kbps?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 154

What are two characteristics of VXLAN? (Choose two)

A.

It uses VTEPs to encapsulate and decapsulate frames.

B.

It has a 12-bit network identifier

C.

It allows for up to 16 million VXLAN segments

D.

It lacks support for host mobility

E.

It extends Layer 2 and Layer 3 overlay networks over a Layer 2 underlay.

Full Access
Question # 155

A customer has recently implemented a new wireless infrastructure using WLC-5520 at a site directly next to a large commercial airport. Users report that they intermittently lose WI-FI connectivity, and troubleshooting reveals it is due to frequent channel changes. Which two actions fix this issue? (Choose two)

A.

Remove UNII-2 and Extended UNII-2 channels from the 5 Ghz channel list

B.

Restore the DCA default settings because this automatically avoids channel interference.

C.

Configure channels on the UNIk2 and the Extended UNII-2 sub-bands of the 5 Ghz band only

D.

Enable DFS channels because they are immune to radar interference.

E.

Disable DFS channels to prevent interference with Doppler radar

Full Access
Question # 156

Which component of the Cisco Cyber Threat Defense solution provides user and flow context analysis?

A.

Cisco Firepower and FireSIGHT

B.

Cisco Stealth watch system

C.

Advanced Malware Protection

D.

Cisco Web Security Appliance

Full Access
Question # 157

Refer to the exhibit.

Security policy requires all idle-exec sessions to be terminated in 600 seconds. Which configuration achieves this goal?

A.

line vty 0 15

absolute-timeout 600

B.

line vty 0 15

exec-timeout

C.

line vty 01 5

exec-timeout 10 0

D.

line vty 0 4

exec-timeout 600

Full Access
Question # 158

Refer to the exhibit.

What is the Json syntax that is formed from the data?

A.

{Name: Bob Johnson, Age: 75, Alive: true, Favorite Foods: [Cereal, Mustard, Onions]}

B.

{"Name": "Bob Johnson", "Age": 75, "Alive": true, "Favorite Foods": ["Cereal", "Mustard", "Onions"]}

C.

{"˜Name': "˜Bob Johnson', "˜Age': 75, "˜Alive': True, "˜Favorite Foods': "˜Cereal', "˜Mustard', "˜Onions'}

D.

{"Name": "Bob Johnson", "Age": Seventyfive, "Alive": true, "Favorite Foods": ["Cereal", "Mustard", "Onions"]}

Full Access
Question # 159

Which two network problems Indicate a need to implement QoS in a campus network? (Choose two.)

A.

port flapping

B.

excess jitter

C.

misrouted network packets

D.

duplicate IP addresses

E.

bandwidth-related packet loss

Full Access
Question # 160

Which two threats does AMP4E have the ability to block? (Choose two.)

A.

DDoS

B.

ransomware

C.

Microsoft Word macro attack

D.

SQL injection

E.

email phishing

Full Access
Question # 161

Refer to the exhibit.

The IP SLA is configured in a router. An engineer must configure an EEM applet to shut down the interface and bring it back up when there is a problem with the IP SLA. Which configuration should the engineer use?

A.

event manager applet EEM_IP_SLA

event track 10 state down

B.

event manager applet EEM_IP_SLA

event track 10 state unreachable

C.

event manager applet EEM_IP_SLA

event sla 10 state unreachable

D.

event manager applet EEM_IP_SLA

event sla 10 state down

Full Access
Question # 162

An engineer must provide wireless converge in a square office. The engineer has only one AP and believes that it should be placed it in the middle of the room. Which antenna type should the engineer use?

A.

directional

B.

polarized

C.

Yagi

D.

omnidirectional

Full Access
Question # 163

Which device makes the decision for a wireless client to roam?

A.

wireless client

B.

wireless LAN controller

C.

access point

D.

WCS location server

Full Access
Question # 164

Refer to the exhibit.

Based on the configuration in this WLAN security setting, Which method can a client use to authenticate to the network?

A.

text string

B.

username and password

C.

certificate

D.

RADIUS token

Full Access
Question # 165

What is a characteristic of MACsec?

A.

802.1AE provides encryption and authentication services

B.

802.1AE is bult between the host and switch using the MKA protocol, which negotiates encryption keys based on the master session key from a successful 802.1X session

C.

802.1AE is bult between the host and switch using the MKA protocol using keys generated via the Diffie-Hellman algorithm (anonymous encryption mode)

D.

802.1AE is negotiated using Cisco AnyConnect NAM and the SAP protocol

Full Access
Question # 166

Refer to the exhibit.

An engineer configures monitoring on SW1 and enters the show command to verify operation. What does the output confirm?

A.

SPAN session 1 monitors activity on VLAN 50 of a remote switch

B.

SPAN session 2 only monitors egress traffic exiting port FastEthernet 0/14.

C.

SPAN session 2 monitors all traffic entering and exiting port FastEthernet 0/15.

D.

RSPAN session 1 is incompletely configured for monitoring

Full Access
Question # 167

Refer to Exhibit.

MTU has been configured on the underlying physical topology, and no MTU command has been configured on the tunnel interfaces. What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared?

A.

The packet arrives on router C without fragmentation.

B.

The packet is discarded on router A

C.

The packet is discarded on router B

D.

The packet arrives on router C fragmented.

Full Access
Question # 168

Refer to the exhibit.

After implementing the configuration 172.20.20.2 stops replaying to ICMP echoes, but the default route fails to be removed. What is the reason for this behavior?

A.

The source-interface is configured incorrectly.

B.

The destination must be 172.30.30.2 for icmp-echo

C.

The default route is missing the track feature

D.

The threshold value is wrong.

Full Access
Question # 169

Which DHCP option helps lightweight APs find the IP address of a wireless LAN controller?

A.

Option 43

B.

Option 60

C.

Option 67

D.

Option 150

Full Access
Question # 170

Refer to the exhibit. The connecting between SW1 and SW2 is not operational. Which two actions resolve the issue? (Choose two)

A.

configure switchport mode access on SW2

B.

configure switchport nonegotiate on SW2

C.

configure switchport mode trunk on SW2

D.

configure switchport nonegotiate on SW1

E.

configure switchport mode dynamic desirable on SW2

Full Access
Question # 171

A customer requests a network design that supports these requirements:

Which protocol does the design include?

A.

HSRP version 2

B.

VRRP version 2

C.

GLBP

D.

VRRP version 3

Full Access
Question # 172

Refer to the exhibit.

Which troubleshooting a routing issue, an engineer issues a ping from S1 to S2. When two actions from the initial value of the TTL? (Choose two.)

A.

The packet reaches R3, and the TTL expires

B.

R2 replies with a TTL exceeded message

C.

R3 replies with a TTL exceeded message.

D.

The packet reaches R2 and the TTL expires

E.

R1 replies with a TTL exceeded message

F.

The packet reaches R1 and the TTL expires.

Full Access
Question # 173

Which devices does Cisco DNA Center configure when deploying an IP-based access control policy?

A.

All devices integrating with ISE

B.

selected individual devices

C.

all devices in selected sites

D.

all wired devices

Full Access
Question # 174

Drag and drop the characteristics from the left onto the protocols they apply to on the right?

Full Access
Question # 175

An engineer has deployed a single Cisco 5520 WLC with a management IP address of 172.16.50.5/24. The engineer must register 50 new Cisco AIR-CAP2802I-E-K9 access points to the WLC using DHCP option 43. The access points are connected to a switch in VLAN 100 that uses the 172.16.100.0/24 subnet. The engineer has configured the DHCP scope on the switch as follows:

The access points are failing to join the wireless LAN controller. Which action resolves the issue?

A.

configure option 43 Hex F104.AC10.3205

B.

configure option 43 Hex F104.CA10.3205

C.

configure dns-server 172.16.50.5

D.

configure dns-server 172.16.100.1

Full Access
Question # 176

Refer to the exhibit.

Which configuration establishes EBGP neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 177

What is the function of a VTEP in VXLAN?

A.

provide the routing underlay and overlay for VXLAN headers

B.

dynamically discover the location of end hosts in a VXLAN fabric

C.

encapsulate and de-encapsulate traffic into and out of the VXLAN fabric

D.

statically point to end host locations of the VXLAN fabric

Full Access
Question # 178

What are two differences between the RIB and the FIB? (Choose two.)

A.

The FIB is derived from the data plane, and the RIB is derived from the FIB.

B.

The RIB is a database of routing prefixes, and the FIB is the Information used to choose the egress interface for each packet.

C.

FIB is a database of routing prefixes, and the RIB is the information used to choose the egress interface for each packet.

D.

The FIB is derived from the control plane, and the RIB is derived from the FIB.

E.

The RIB is derived from the control plane, and the FIB is derived from the RIB.

Full Access
Question # 179

Refer to the exhibit Which single security feature is recommended to provide Network Access Control in the enterprise?

A.

MAB

B.

802.1X

C.

WebAuth

D.

port security sticky MAC

Full Access
Question # 180

Refer to the exhibit. Communication between London and New York is down. Which command set must be applied to the NewYork switch to resolve the issue?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 181

An engineer is concerned with the deployment of new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements?

A.

Router(config)# ip sla responder udp-connect 172.29.139.134 5000

B.

Router(config)# ip sla responder tcp-connect 172.29.139.134 5000

C.

Router(config)# ip sla responder udp-echo 172.29.139.134 5000

D.

Router(config)# ip sla responder tcp-echo 172.29.139.134 5000

Full Access
Question # 182

What is the recommended MTU size for a Cisco SD-Access Fabric?

A.

1500

B.

9100

C.

4464

D.

17914

Full Access
Question # 183

Which characteristic distinguishes Ansible from Chef?

A.

Ansible lacs redundancy support for the master server. Chef runs two masters in an active/active mode.

B.

Ansible uses Ruby to manage configurations. Chef uses YAML to manage configurations.

C.

Ansible pushes the configuration to the client. Chef client pulls the configuration from the server.

D.

The Ansible server can run on Linux, Unix or Windows. The Chef server must run on Linux or Unix.

Full Access
Question # 184

An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:

Which two statements does the engineer use to explain these values to the customer? (Choose two)

A.

The signal strength at location C is too weak to support web surfing

B.

Location D has the strongest RF signal strength

C.

The RF signal strength at location B is 50% weaker than location A

D.

The signal strength at location B is 10 dB better than location C

E.

The RF signal strength at location C is 10 times stronger than location B

 

Full Access
Question # 185

Refer to the exhibit.

An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as the exit point. Assuming that all BGP neighbor relationships have been formed and that theattributes have not been changed on any of the routers, which configuration accomplish task?

A.

R4(config-router)bgp default local-preference 200

B.

R3(config-router)neighbor 10.1.1.1 weight 200

C.

R3(config-router)bgp default local-preference 200

D.

R4(config-router)nighbor 10.2.2.2 weight 200

Full Access
Question # 186

How does an on-premises infrastructure compare to a cloud infrastructure?

A.

On-premises can increase compute power faster than cloud

B.

On-premises requires less power and cooling resources than cloud

C.

On-premises offers faster deployment than cloud

D.

On-premises offers lower latency for physically adjacent systems than cloud.

Full Access
Question # 187

Drag and drop the characteristics from the left onto the appropriate infrastructure deployment types on the right.

Full Access
Question # 188

Refer to the exhibit. An engineer configures a new HSRP group. While reviewing the HSRP status, the engineer sees the logging message generated on R2. Which is the cause of the message?

A.

The same virtual IP address has been configured for two HSRP groups

B.

The HSRP configuration has caused a spanning-tree loop

C.

The HSRP configuration has caused a routing loop

D.

A PC is on the network using the IP address 10.10.1.1

Full Access
Question # 189

Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?

A.

MACsec

B.

IPsec

C.

SSL

D.

Cisco Trustsec

Full Access
Question # 190

What is a fact about Cisco EAP-FAST?

A.

It does not require a RADIUS server certificate.

B.

It requires a client certificate.

C.

It is an IETF standard.

D.

It operates in transparent mode.

Full Access
Question # 191

Which HTTP code must be returned to prevent the script form exiting?

A.

200

B.

201

C.

300

D.

301

Full Access
Question # 192

Refer to the exhibit.

Which HTTP JSON response does the python code output give?

A.

NameError: name 'json' is not defined

B.

KeyError 'kickstart_ver_str'

C.

7.61

D.

7.0(3)I7(4)

Full Access
Question # 193

What does the cisco DNA REST response indicate?

A.

Cisco DNA Center has the Incorrect credentials for cat3850-1

B.

Cisco DNA Center is unable to communicate with cat9000-1

C.

Cisco DNA Center has the incorrect credentials for cat9000-1

D.

Cisco DNA Center has the Incorrect credentials for RouterASR-1

Full Access
Question # 194

Refer to the exhibit. After configurating an IPsec VPN, an engineer enters the show command to verify the ISAKMP SA status. What does the status show?

A.

ISAKMP SA is authenticated and can be used for Quick Mode.

B.

Peers have exchanged keys, but ISAKMP SA remains unauthenticated.

C.

VPN peers agreed on parameters for the ISAKMP SA

D.

ISAKMP SA has been created, but it has not continued to form.

Full Access
Question # 195

What is a benefit of data modeling languages like YANG?

A.

They enable programmers to change or write their own application within the device operating system.

B.

They create more secure and efficient SNMP OIDs.

C.

They make the CLI simpler and more efficient.

D.

They provide a standardized data structure, which results in configuration scalability and consistency.

Full Access
Question # 196

Which data is properly formatted with JSON?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 197

Refer to the exhibit.

An engineer deploys a script to retrieve the running configuration from a NETCONF-capable Cisco IOS XE device that is configured with default settings. The script fails. Which configuration must be applied to retrieve the configurauon using NETCONF?

A.

Print (netconf_host.get_config('show running'!)

B.

hostkey_verify=True,

C.

device_params={name':'ios-xe'})

D.

port=830

Full Access
Question # 198

Drag and drop the automation characteristics from the left onto the corresponding tools on the right. Not all options are used.

Full Access
Question # 199

An engineer must configure Interface and sensor monitoring on a router. The NMS server is located in a trusted zone with IP address 10.15.2.19. Communication between the router and the NMS server must be encrypted and password-protected using the most secure algorithms. Access must be allowed only for the NMS server and with the minimum permission levels needed. Which configuration must the engineer apply?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 200

How does the Cisco SD-Access control plane simplify traditional routing environments?

A.

Routing adjacencies are no longer required.

B.

Full routing tables are shared and ensure that all routers know all paths within the underlay fabric and overlay.

C.

Separation of EID and RLOC reduces the size of routing tables.

D.

Routers query all routes to the map server.

Full Access
Question # 201

Simulation 09

Full Access
Question # 202

When a wired client connects to an edge switch in a Cisco SD-Access fabric, which component decides whether the client has access to the network?

A.

control-plane node

B.

edge node

C.

Identity services Engine

D.

RADIUS server

Full Access
Question # 203

What is the preferred QoS marking for delay-sensitive real-time protocols such as RTP?

A.

CS1

B.

ATM-CLP

C.

EF

D.

AF

Full Access
Question # 204

Refer to the exhibit. An administrator writes a script to fetch the list of devices that are registered with Cisco DNA Center. Why does the execution abort?

A.

The authentication URL is incorrect.

B.

The "dna-center" hostname cannot be resolved to an IP address.

C.

The TLS certificate of DNA Center is invalid.

D.

The username or the password is Incorrect.

Full Access
Question # 205

Which virtualization component creates VMs and performs hardware abstraction that allows multiple VMs to run at the same time?

A.

rkt

B.

Docker

C.

container

D.

hypervisor

Full Access
Question # 206

Which type of antenna is designed to provide a 360-degree radiation pattern?

A.

Yagi

B.

directional

C.

omnidirectional

D.

patch

Full Access
Question # 207

Simulation 04

Full Access
Question # 208

Where is the wireless LAN controller located in a mobility express deployment?

A.

There is no wireless LAN controller in the network.

B.

The wireless LAN controller is embedded into the access point.

C.

The wireless LAN controller exists in the cloud.

D.

The wireless LAN controller exists in a server that is dedicated for this purpose.

Full Access
Question # 209

Which RF value represents the declineofthe RF signal amplitude over a given distance?

A.

signal-to-noise ration

B.

effective isotropic racketed power

C.

free space path loss

D.

received signal strength indicator

Full Access
Question # 210

Refer to the exhibit.

An engineer is creating a Pytnon script to fetch the BGP configuration from a device using RESTCONF. What does the output Indicate?

A.

The BGP data resource identifier in the URL Incorrect.

B.

There is no BGP process running on the device

C.

RESTCONF is not enabled on the device.

Full Access
Question # 211

An engineer must use flexible NetFlow on a group of switches. To prevent overloading of the flow collector, if the flow is idle for 20 seconds, the flow sample should be exported. Which command set should be applied?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 212

Which solution should be used in a high-density wireless environment to increase bandwidth for each user?

A.

Increase antenna size

B.

Increase the mandatory minimum data rate.

C.

Increase the cell size of each AP.

D.

Increase TX power.

Full Access
Question # 213

How is OAuth framework used in REST API?

A.

by providing the user credentials to the external application

B.

by providing the external application a token that authorizes access to the account

C.

as a framework to hash the security Information in the REST URL

D.

as a framework to hide the security information in the REST URL

Full Access
Question # 214

What is the role of vSmart in a Cisco SD-WAN environment?

A.

to monitor, configure, and maintain SD-WAN devices

B.

to establish secure control plane connections

C.

to provide secure data plane connectivity over WAN Inks

D.

to perform initial authentication of devices

Full Access
Question # 215

What is a characteristic of a traditional WAN?

A.

low complexity and high overall solution scale

B.

centralized reachability, security, and application policies

C.

operates over DTLS and TLS authenticated and secured tunnels

D.

united data plane and control plane

Full Access
Question # 216

What is a characteristics of an AP operating in FlexConnect mode?

A.

All traffic traverses the WLC to ensure policy enforcement on client traffic .

B.

Forwarding for locally switched traffic continues when the AP loses connectivity to the WLC.

C.

APs connect in a mesh topology and elect a root AP.

D.

FlexConnect enables an Ap to connect to multiple WLCs.

Full Access
Question # 217

A customer requires their wireless network to be fully functional, even if the wireless controller fails. Which wireless design supports these requirements?

A.

FlexConnect

B.

mesh

C.

centralized

D.

embedded

Full Access
Question # 218

Drag and drop the code snippets from the bottom onto the blanks in the code to construct a request that configures a deny rule on an access list?

Full Access
Question # 219

Which hypervisor requires a host OS to run and is not allowed to directly access the hosts hardware and resources?

A.

native

B.

bare metal

C.

type 1

D.

type 2

Full Access
Question # 220

Refer to the exhibit.

A network engineer must permit administrators to automatically authenticate if there is no response from cither of the AAA servers. Which configuration achieves these results?

A.

aaa authentication login default group tacacs+ line

B.

aaa authentication login default group radius none

C.

aaa authentication login default group radius

D.

aaa authentication enable default group radius local

Full Access
Question # 221

Refer to the exhibit.

Which configuration must be added to enable remote access only using SSHv1 or SSHv2 to this router?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 222

A wireless administrator must create a new web authentication corporate SSID that will be using ISE as the external RADIUS server. The guest VLAN must be specified after the authentication completes. Which action must be performed to allow the ISE server to specify the guest VLAN?

A.

Set AAA Policy name.

B.

Enable AAA Override

C.

Set RADIUS Profiling

D.

Enable Network Access Control State.

Full Access
Question # 223

Which two methods are used to assign security group tags to the user in a Cisco Trust Sec architecture? (Choose two )

A.

modular QoS

B.

policy routing

C.

web authentication

D.

DHCP

E.

IEEE 802.1x

Full Access
Question # 224

What are two characteristics of a directional antenna? (Choose two.)

A.

high gain

B.

receive signals equally-from all directions

C.

commonly used to cover large areas

D.

provides the most focused and narrow beam width

E.

low gain

Full Access
Question # 225

What is a characteristic of a Type 2 hypervisor?

A.

It eliminates the need for an underlying operating system.

B.

Its main task is to manage hardware resources between different operating systems

C.

Problems in the base operating system can affect the entire system.

D.

It is completely independent of the operating system

Full Access
Question # 226

A customer has two Cisco WLCs that manage separate APs throughout a building. Each WLC advertises the same SSID but terminates on different interfaces. Users report that they drop their connections and change IP addresses when roaming. Which action resolves this issue?

A.

Enable client toad balancing.

B.

Enable fast roaming.

C.

Configure high availability.

D.

Configure mobility groups.

Full Access
Question # 227

In which way are EIGRP and OSPF similar?

A.

Both protocol support auto summarization.

B.

Both protocols support unequal-cost load balancing.

C.

Both protocols use hello packets to discover neighbors

D.

Both protocols send updates using unicast addresses

Full Access
Question # 228

In a campus network design, what ate two benefits of using BFD tor failure detection? (Choose two.)

A.

BFD provides path failure detection in less than a second.

B.

BFD is an efficient way to reduce memory and CPU usage.

C.

BFD provides fault tolerance by enabling multiple routers to appear as a single virtual router.

D.

BFD speeds up routing convergence time.

E.

BFD enables network peers to continue forwarding packets in the event of a restart.

Full Access
Question # 229

Which Cisco WLC feature allows a wireless device to perform a Layer 3 roam between two separate controllers without changing the client IP address?

A.

mobile IP

B.

mobility tunnel

C.

LWAPP tunnel

D.

GRE tunnel

Full Access
Question # 230

Drag and drop the characteristics from the left onto the corresponding infrastructure deployment models on the right.

Full Access
Question # 231

Refer to the exhibit.

Which antenna emits this radiation pattern?

A.

omnidirectional

B.

Yagi

C.

RP-TNC

D.

dish

Full Access
Question # 232

Refer to the exhibit. An engineer must update the existing configuration to achieve these results

    Only administrators from the 192.168.1.0/24 subnet can access the vty lines.

    Access to the vty lines using dear-text protocols is prohibited.

Which command set should be applied?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 233

Which JSON script is properly formatted?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 234

Which TLV value must be added to Option 43 when DHCP is used to ensure that APs join the WLC?

A.

0x77

B.

AAA

C.

0xf1

D.

642

Full Access
Question # 235

A network administrator is designing a new network for a company that has frequent power spikes. The company wants to ensure that employees can the best solution for the administrator to recommend?

A.

Generator

B.

Cold site

C.

Redundant power supplies

D.

Uninterruptible power supply

Full Access
Question # 236

An engineer must configure a new WLAN 802.11r and requires users to enter a passphrase. What must be configured to support this requirement?

A.

802.1X and Fast Transition

B.

FT PSK and Fast Transition

C.

802.1X and SUITEB-1X

D.

FT PSK and SUITEB-1X

Full Access
Question # 237

Refer to the exhibit. Link 1 uses a copper connection and link 2 uses a fiber connection. The fiber port must be the primary port for all forwarding. The output of the show spanning-tree command on SW2 shows that the fiber port is blocked by Spanning Tree. After entering the spanning-tree port-priority 32 command on G0/1 on SW2, the port remains blocked. Which command should be entered on the ports connected to Link 2 is resolve the issue?

A.

Enter spanning-tree port-priority 64 on SW2

B.

Enter spanning-tree port-priority 224 on SW1.

C.

Enter spanning-tree port-priority 4 on SW2.

D.

Enter spanning-tree port-priority 32 on SW1.

Full Access
Question # 238

When is GLBP preferred over HSRP?

A.

When encrypted helm are required between gateways h a single group.

B.

When the traffic load needs to be shared between multiple gateways using a single virtual IP.

C.

When the gateway routers are a mix of Cisco and non-Cisco routers

D.

When clients need the gateway MAC address lo Be the same between multiple gateways

Full Access
Question # 239

Refer to the exhibit. What is the result of the configuration?

A.

It enables NTP in client mode

B.

It allows interface g0/1 to send and receive NTP broadcast packets

C.

It allows interface g0/1 to send NTP broadcast packets.

D.

It allows interface g0/1 to receive NTP broadcast packets.

Full Access
Question # 240

Refertothe exhibit. A network engineer Is troubleshooting an Issue with the file server based on reports of slow file transmissions. Which two commands or command sets are required. In switch SW1 to analyze the traffic from the file server with a packet analyzer? (Choose two.)

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 241

Simulation 07

Full Access
Question # 242

What is a characteristics of VXLAN?

A.

It extends Layer 2 and Layer 3 overlay networks over a Layer 2 underlay.

B.

It has a 12-byt packet header.

C.

It frame encapsulation is performed by MAC-In-UDP

D.

It uses TCP for transport

Full Access
Question # 243

Which template is used when multiple templates are grouped together to run in succession in Cisco DNA Center?

A.

composite

B.

regular

C.

project

D.

configuration

Full Access
Question # 244

Drag and drop the characteristics from the left onto the deployment models on the right.

Full Access
Question # 245

Refer to the exhibit. An engineer must deny HTTP traffic from host A to host B while allowing all other communication between the hosts. Which command set accomplishes this task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access