Refer to the exhibit.
The trunk does not work over the back-to-back link between Switch1 interface Giq1/0/20 and Switch2 interface Gig1/0/20. Which configuration fixes the problem?
A)
B)
C)
D)
Refer to the exhibit.
R2 is the neighboring router of R1. R2 receives an advertisement for network 192 168.10.50/32. Which configuration should be applied for the subnet to be advertised with the original /24 netmask?
A)
B)
C)
D)
Drag and drop the snippets onto the blanks within the code to construct a script that adds a prefix list to a route map and sets the local preference. Not all options are used
In a three-tier hierarchical campus network design, which action is a design best-practice for the core layer?
In a Cisco SD-WAN solution, which two functions are performed by OMP? (Choose two.)
An engineer must create a new SSID on a Cisco 9800 wireless LAN controller. The client has asked to use a pre-shared key for authentication Which profile must the engineer edit to achieve this requirement?
Which function does a fabric edge node perform in an SD-Access deployment?
Which technology uses network traffic telemetry, contextual information, and file reputation to provide insight into cyber threats?
Which HHTP status code is the correct response for a request with an incorrect password applied to a REST API session?
In a Cisco StackWise Virtual environment, which planes are virtually combined in the common logical switch?
Refer to the exhibit.
A company requires that all wireless users authenticate using dynamic key generation. Which configuration must be applied?
Refer to the exhibit. Which python code parses the response and prints “18:32:21.474 UTC sun Mar 10 2019?
Which protocol is implemented to establish secure control plane adjacencies between Cisco SD-WAN nodes?
Refer to the exhibit.
The OSPF neighborship fails between two routers. What is the cause of this issue?
Refer to the exhibit. A network engineer checks connectivity between two routers. The engineer can ping the remote endpoint but cannot see an ARP entry. Why is there no ARP entry?
Which signal strength and noise values meet the minimum SNR for voice networks?
Which LISP infrastructure device provides connectivity between non-sites and LISP sites by receiving non-LISP traffic with a LISP site destination?
An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy. Which device presents the web authentication for the WLAN?
Drag and drop the characteristics from the left onto the routing protocols they describe on the right
A network administrator is preparing a Python scrip to configure a Cisco IOS XE-based device on the network. The administrator is worried that colleagues will make changes to the device while the script is running. Which operation of he in client manager prevent colleague making changes to the device while the scrip is running?
A client device roams between access points located on different floors in an atrium. The access points are Joined to the same controller and configured in local mode. The access points are in different AP groups and have different IP addresses, but the client VLAN in the groups is the same. Which type of roam occurs?
What are two considerations when using SSO as a network redundancy feature? (Choose two)
What is the recommended minimum SNR for data applications on wireless networks?
Which option works with a DHCP server to return at least one WLAN management interface IP address during the discovery phase and is dependent upon the VCI of the AP?
Refer to the exhibit.
The WLC administrator sees that the controller to which a roaming client associates has Mobility Role Anchor configured under Clients > Detail. Which type of roaming is supported?
Refer to the exhibit.
Which command set must be applied on R1 to establish a BGP neighborship with R2 and to allow communication from R1 to reach the networks?
A)
B)
C)
D)
What is an emulated machine that has dedicated compute memory, and storage resources and a fully installed operating system?
Which two characteristics apply to the endpoint security aspect of the Cisco Threat Defense architecture? (Choose two.)
Refer the exhibit.
Which configuration elects SW4 as the root bridge for VLAN 1 and puts G0/2 on SW2 into a blocking state?
A)
B)
C)
D)
Refer to the exhibit.
Object tracking has been configured for VRRP-enabled routers Edge-01 and Edge-02 Which commands cause Edge-02 to preempt Edge-01 in the event that interface G0/0 goes down on Edge-01?
A)
B)
C)
D)
the following system log message is presented after a network administrator configures a GRE tunnel:
%TUN-5-RECURDOWN Interface Tunnel 0 temporarily disabled due to recursive routing
Why is tunnel 0 disabled?
Refer to the exhibit. What are two results of the NAT configuration? (Choose two.)
What is used to validate the authenticity of the client and is sent in HTTP requests as a JSON object?
Refer to the exhibit.
Hosts PC1 PC2 and PC3 must access resources on Serve 1. An engineer
configures NAT on Router R1 1e enable the communication and enters the show command to verify operation Which IP address is used by the hosts when they communicate globally to Server1?
A company recently decided to use RESTCONF instead of NETCONF and many of their NETCONF scripts contain the operation
Which there application has the ability to make REST calls against Cisco DNA Center?
Refer to the exhibit. Cisco IOS routers R1 and R2 are interconnected using interface Gi0/0. Which configuration allows R1 and R2 to form an OSPF neighborship on interface Gi0/0?
Drag anti drop the characteristics from the ten onto the configuration models on the right.
Drag and drop the characteristics from the left onto the protocols they apply to on the right?
A customer has recently implemented a new wireless infrastructure using WLC-5520 at a site directly next to a large commercial airport. Users report that they intermittently lose WI-FI connectivity, and troubleshooting reveals it is due to frequent channel changes. Which two actions fix this issue? (Choose two)
Refer to the exhibit. External users require HTTP connectivity to an internal company web server that is listening on TCP port 8080. Which command set accomplishes this requirement?
A)
B)
C)
D)
E)
Refer to the exhibit.
An engineer must modify the access control list EGRESS to allow all IP traffic from subnet 10.1.10.0/24 to 10.1.2.0/24. The access control list is applied in the outbound direction on router interface GigabitEthemet 0/1. Which configuration commands can the engineer use to allow this traffic without disrupting existing traffic flows?
A)
B)
C)
D)
Refer to the exhibit. An engineer configures CoPP and enters the show command to verify the implementation. What is the result of the configuration?
A network engineer configures BGP between R1 and R2. Both routers use BGP peer group CORP and are set up to use MD5 authentication. This message is logged to the console of router R1:
Which two configuration allow peering session to from between R1 and R2? Choose two.)
Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial?
Refer to the exhibit.
Which troubleshooting a routing issue, an engineer issues a ping from S1 to S2. When two actions from the initial value of the TTL? (Choose two.)
Refer to the exhibit. An engineer must create a script that appends the output of the show process cpu sorted command to a file.
Which congestion queuing method on Cisco IOS based routers uses four static queues?
Refer to the exhibit.
A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Which two configuration changes accomplish this? (Choose two).
What is a consideration when designing a Cisco SD-Access underlay network?
Running the script causes the output in the exhibit. Which change to the first line of the script resolves the error?
An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:
Which two statements does the engineer use to explain these values to the customer? (Choose two)
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?
Which benefit is offered by a cloud infrastructure deployment but is lacking in an on-premises deployment?
Refer to the exhibit. Which configuration must be applied to R to enable R to reach the server at 172.16.0.1?
A)
B)
C)
D)
Drag and drop the characteristics from the left onto the appropriate infrastructure deployment types on the right.
Refer to the exhibit.
Which HTTP JSON response does the python code output give?
Which outbound access list, applied to the WAN interface of a router, permits all traffic except for http traffic sourced from the workstation with IP address 10.10.10.1?
A)
B)
C)
D)
Refer to the exhibit. Communication between London and New York is down. Which command set must be applied to the NewYork switch to resolve the issue?
A)
B)
C)
D)
Refer to the exhibit.
Which type of antenna is show on the radiation patterns?
What does Call Admission Control require the client to send in order to reserve the bandwidth?
Which OSPF networks types are compatible and allow communication through the two peering devices?
Refer to the exhibit.
An engineer must add the SNMP interface table to the NetFlow protocol flow records. Where should the SNMP table option be added?
Refer to the exhibit.
What is the effect of these commands on the BR and HQ tunnel interfaces?
Refer to the exhibit.
An engineer reconfigures the pot-channel between SW1 and SW2 from an access port to a trunk and immediately notices this error in SW1's log.
Which command set resolves this error?
A)
B)
C)
D)