A large campus network has deployed two wireless LAN controllers to manage the wireless network. WLC1 and WLC2 have been configured as mobility peers. A client device roams from AP1 on WLC1 to AP2 on WLC2, but the controller's client interfaces are on different VLANs. How do the wireless LAN controllers handle the inter-subnet roaming?
Drag and drop the characteristics from the left onto the deployment types on the right.
Refer to the exhibit.
A network engineer must configure the router to use the ISE-Servers group for authentication. If both ISE servers are unavailable, the local username database must be used. If no usernames are defined in the configuration, then the enable password must be the last resort to log in. Which configuration must be applied to achieve this result?
Which type of tunnel Is required between two WLCs to enable Intercontroller roaming?
Which VXLAN component is used to encapsulate and decapsulate Ethernet frames?
Which protocol is responsible for data plane forwarding in a Cisco SD-Access deployment?
Refer to the exhibit. An engineer has configured an IP SLA for UDP echo’s. Which command is needed to start the IP SLA to test every 30 seconds and continue until stopped?
Drag and drop the characteristics from the left to the table types on the right.
An engineer must configure an EXEC authorization list that first checks a AAA server then a local username. If both methods fail, the user is denied. Which configuration should be applied?
Refer to the exhibit.
An engineer must allow all users in the 10.2.2.0/24 subnet to access the Internet. To conserve address space the public Interface address of 209 165 201.1 must be usedfor all external communication. Which command set accomplishes these requirements?
A)
B)
C)
D)
Refer io me exhibit.
An engineer configures the trunk and proceeds to configure an ESPAN session to monitor VLANs10. 20. and 30. Which command must be added to complete this configuration?
Refer to the exhibit. Which command set must be added to permit and log all traffic that comes from 172.20.10.1 in interface GigabitEthernet0/1 without impacting the functionality of the access list?
Refer to the exhibit. An engineer must configure an eBGP neighborship to Router B on Router A. The network that is connected to GO/1 on Router A must be advertised to Router B. Which configuration should be applied?
A)
B)
C)
D)
An administrator is configuring NETCONF using the following XML string. What must the administrator end the request with?
An engineer must configure an ACL that permits packets which include an ACK in the TCP header Which entry must be included in the ACL?
A network engineer is configuring OSPF on a router. The engineer wants to prevent having a route to 177.16.0.0/16 learned via OSPF. In the routing table and configures a prefix list using the command ip prefix-list OFFICE seq S deny 172.16.0.0/16. Winch two identical configuration commands must be applied to accomplish the goal? (Choose two.)
Which Cisco FlexConnect state allows wireless users that are connected to the network to continue working after the connection to the WLC has been lost?
Which method displays text directly into the active console with a synchronous EEM applet policy?
Refer to the exhibit.
Which command set is needed to configure and verify router R3 to measure the response time from router R3 to the file server located in the data center?
A)
B)
C)
D)
What is an emulated machine that has dedicated compute memory, and storage resources and a fully installed operating system?
Refer to the exhibit. An attacker can advertise OSPF fake routes from 172.16.20.0 network to the OSPF domain and black hole traffic. Which action must be taken to avoid this attack and still be able to advertise this subnet into OSPF?
Drag and drop the LIPS components on the left to the correct description on the right.
Which resource is able to be shared among virtual machines deployed on the same physical server?
Refer to the exhibit. Which configuration must be added to enable GigabitEthemet 0/1 to participate in OSPF?
Which feature Is used to propagate ARP broadcast, and link-local frames across a Cisco SD-Access fabric to address connectivity needs for silent hosts that require reception of traffic to start communicating?
Refer to the exhibit. A network engineer must be notified when a user switches to configuration mode. Which script should be applied to receive an SNMP trap and a critical-level log message?
A)
B)
C)
D)
Drag and drop the LISP components on the left to their descriptions on the right. Not all options are used.
Refer to the exhibit.
What is the effect of introducing the sampler feature into the Flexible NetFlow configuration on the router?
Refer to the exhibit. A network engineer checks connectivity between two routers. The engineer can ping the remote endpoint but cannot see an ARP entry. Why is there no ARP entry?
Refer to The exhibit.
Assuming that R1 is a CE router, which VRF is assigned to Gi0/0 on R1?
Which two characteristics apply to the endpoint security aspect of the Cisco Threat Defense architecture? (Choose two.)
Which option must be used to support a WLC with an IPv6 management address and 100 Cisco Aironet 2800 Series access points that will use DHCP to register?
Refer to the exhibit. Which EEM script generates a critical-level syslog message and saves a copy of the running configuration to the bootflash when an administrator saves the running configuration to the startup configuration?
In a Cisco StackWise Virtual environment, which planes are virtually combined in the common logical switch?
Drag and drop the characteristics from the left onto the deployment models on the right Not all options are used.
Drag and drop the characteristics from the left onto the switching mechanisms they describe on the right.
Refer to the exhibit.
The WLC administrator sees that the controller to which a roaming client associates has Mobility Role Anchor configured under Clients > Detail. Which type of roaming is supported?
What does the destination MAC on the outer MAC header identify in a VXLAN packet?
A customer has a wireless network deployed within a multi-tenant building. The network provides client access, location-based services, and is monitored using Cisco DNA Center. The security departmentwants to locate and track malicious devices based on threat signatures. Which feature is required for this solution?
Simulation 01
BGP connectivity exists between Headquarters and both remote sites; however, Remote Site 1 cannot communicate with RemoteSite 2. Configure BGP according to the topology to
goals:
1. Configure R1 and R3 under the BGP process to provide reachability between Remote Site 1 and Remote Site 2. No configuration changes are permitted on R2.
2. Ensure that the /32 networks at Remote Site 1 and Remote Site 2 can ping each other.
R1
R3
Which A record type should be configured for access points to resolve the IP address of a wireless LAN controller using DNS?
Company policy restricts VLAN 10 to be allowed only on SW1 and SW2. All other VLANs can be on all three switches. An administrator has noticed that VLAN 10 has propagated to SW3. Which configuration corrects the issue?
Refer to the exhibit Remote users cannot access the Internet but can upload files to the storage server Which configuration must be applied to allow Internet access?
A)
B)
C)
D)
Drag and drop the characteristics from the left onto the orchestration tool classifications on the right.
Which language defines the structure or modelling of data for NETCONF and RESTCONF?
Which two results occur if Cisco DNA center loses connectivity to devices in the SD-ACCESS fabric? (Choose two)
the following system log message ispresented after a network administrator configures a GRE tunnel:
%TUN-5-RECURDOWN Interface Tunnel 0 temporarily disabled due to recursive routing
Why is tunnel 0 disabled?
Witch two actions provide controlled Layer 2 network connectivity between virtual machines running on the same hypervisor? (Choose two.)
Refer to the exhibit. Which command allows hosts that are connected to FastEthernet0/2 to access the Internet?
Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right.
Refer to the exhibit.
Why does OSPF fail to establish an adjacency between R1 and R2?
Refer to the exhibit. Which command set enables router R2 to be configured via NETCONF?
A)
B)
C)
D)
Refer to the exhibit Which command must be applied to complete the configuration and enable RESTCONF?
Which LISP component decapsulates messages and forwards them to the map server responsible for the egress tunnel routers?
Refer to the exhibit.
Hosts PC1 PC2 and PC3 must access resources on Serve 1. An engineer
configures NAT on Router R1 1e enable the communication and enters the show command to verify operation Which IP address is used by the hosts when they communicate globally to Server1?
What is an advantage of utilizing data models in a multivendor environment?
Refer to the exhibit.
Assuming all links are functional, which path does PC1 take to reach DSW1?
Which device is responsible for finding EID-to-RLOC mappings when traffic is sent to a LISP-capable site?
Refer to the exhibit.
R1 has a BGP neighborship with a directly connected router on interface Gi0/0.
Which command set is applied between the iterations of show ip bgp 2.2.2.2?
What is one characteristic of Cisco DNA Center and vManage northbound APIs?
Refer to the exhibit. An engineer configures HSRP and enters theshow standbycommand. Which two facts about the network environment are derived from the output? (Choose two.)
Which QoS feature uses the IP Precedence bits in the ToS field of the IP packet header to partition traffic into different priority levels?
Refer to the exhibit. Which command set completes the ERSPAN session configuration?
An engineer must create a script to append and modify device entries in a JSON-formatted file. The script must work as follows:
Until interrupted from the keyboard, the script reads in the hostname of a device, its management IP address, operating system type, and CLI remote access protocol.
After being interrupted, the script displays the entered entries and adds them to the JSON-formatted file, replacing existing entries whose hostname matches.
The contents of the JSON-formatted file are as follows:
Drag and drop the statements onto the blanks within the code to complete the script. Not all options are used.
Refer to the exhibit.
A company has an internal wireless network with a hidden SSID and RADIUS-based client authentication for increased security. An employee attempts to manually add the company network to a laptop, but the laptop does not attempt to connect to the network. The regulatory domains of the access points and the laptop are identical. Which action resolves this issue?
Refer to the exhibit. Cisco IOS routers R1 and R2 are interconnected using interface Gi0/0. Which configuration allows R1 and R2 to form an OSPF neighborship on interface Gi0/0?
Simulation 04
ConfigureOSPF on both routers according to the topology to achieve these goals:
Drag and drop the LISP components on the left to the correct description on the right.
Refer to the exhibit.
These commands have been added to the configuration of a switch Which command flags an error if it is added to this configuration?
Refer to the exhibit.
Which GRE tunnel configuration command is missing on R2?
Which two methods are used by an AP that is typing to discover a wireless LAN controller? (Choose two.)
Drag and drop the characteristics from the left onto the infrastructure deployment models they describe on the right.
In a Cisco StackWise Virtual environment, which planes are virtually combined in the common logical switch?
Refer to the exhibit.
An engineer configures OSPF and wants to verify the configuration Which configuration is applied to this device?
A)
B)
C)
D)
Refer to the exhibit.
R2 is the neighboring router of R1. R2 receives an advertisement for network 192 168.10.50/32. Which configuration should be applied for the subnet to be advertised with the original /24 netmask?
A)
B)
C)
D)
Refer to the exhibit.
An engineer attempts to establish BGP peering between router CORP and two ISP routers. What is the root cause for the failure between CORP and ISP#2?
Refer to the exhibit.
An engineer attempts to bundle interface Gi0/0 into the port channel, but it does not function as expected. Which action resolves the issue?
The login method is configured on the VTY lines of a router with these parameters
The first method for authentication it TACACS
If TACACS is unavailable login is allowed without any provided credentials
Which configuration accomplishes this task?
An engineer must export the contents of the devices object in JSON format. Which statement must be used?
Refer to the exhibit.
An engineer must permit traffic from these networks and block all other traffic An informational log message should be triggered when traffic enters from these prefixes Which access list must be used?
In a Cisco SD-WAN solution, which two functions are performed by OMP? (Choose two.)
Drag and drop the REST API authentication methods from the left onto their descriptions on the right.
A client device roams between access points located on different floors in an atrium. The access points are Joined to the same controller and configured in local mode. The access points are in different AP groups and have different IP addresses, but the client VLAN in the groups is the same. Which type of roam occurs?
Which protocol is used to encrypt control plane traffic between SD-WAN controllers and SD-WAN endpoints?
Refer to the exhibit.
VPN-A sends point-to-point traffic to VPN-B and receives traffic only from VPN-C VPN-B sends point-to-point traffic to VPN-C and receives traffic only from VPN-A Which configuration is applied?
A)
B)
C)
D)
What is the function of a control-plane node In a Cisco SD-Access solution?
Refer to the exhibit.
What is the result when a switch that is running PVST+ is added to this network?
A network engineer is adding an additional 10Gps link to an exiting 2x10Gps LACP-based LAG to augment its capacity. Network standards require a bundle interface to be taken out of service if one of its member links goes down, and the new link must be added with minimal impact to the production network. Drag and drop the tasks that the engineer must perform from the left into the sequence on the right. Not all options are used.
Refer to the exhibit.
An engineer is troubleshooting an application running on Apple phones. The application Is receiving incorrect QoS markings. The systems administrator confirmed that ail configuration profiles are correct on the Apple devices. Which change on the WLC optimizes QoS for these devices?
Which element enables communication between guest VMs within a virtualized environment?
Which OSPF networks types are compatible and allow communication through the two peering devices?
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
Refer to the exhibit.
After configuring HSRP an engineer enters the show standby command. Which two facts are derived from the output? (Choose two.)
Refer to the exhibit. Which two commands are needed to allow for full reachability between AS 1000 and AS 2000? (Choose two)
An engineer must configure HSRP group 300 on a Cisco IOS router. When the router is functional, it must be the must be the active HSRP router. The peer router has been configured using the default priority value. Which command set is required?
A)
B)
C)
D)
Which configuration restricts the amount of SSH that a router accepts 100 kbps?
A)
B)
C)
D)
A customer has recently implemented a new wireless infrastructure using WLC-5520 at a site directly next to a large commercial airport. Users report that they intermittently lose WI-FI connectivity, and troubleshooting reveals it is due to frequent channel changes. Which two actions fix this issue? (Choose two)
Which component of the Cisco Cyber Threat Defense solution provides user and flow context analysis?
Refer to the exhibit.
Security policy requires all idle-exec sessions to be terminated in 600 seconds. Which configuration achieves this goal?
Refer to the exhibit.
What is the Json syntax that is formed from the data?
Which two network problems Indicate a need to implement QoS in a campus network? (Choose two.)
Refer to the exhibit.
The IP SLA is configured in a router. An engineer must configure an EEM applet to shut down the interface and bring it back up when there is a problem with the IP SLA. Which configuration should the engineer use?
An engineer must provide wireless converge in a square office. The engineer has only one AP and believes that it should be placed it in the middle of the room. Which antenna type should the engineer use?
Refer to the exhibit.
Based on the configuration in this WLAN security setting, Which method can a client use to authenticate to the network?
Refer to the exhibit.
An engineer configures monitoring on SW1 and enters the show command to verify operation. What does the output confirm?
Refer to Exhibit.
MTU has been configured on the underlying physical topology, and no MTU command has been configured on the tunnel interfaces. What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared?
Refer to the exhibit.
After implementing the configuration 172.20.20.2 stops replaying to ICMP echoes, but the default route fails to be removed. What is the reason for this behavior?
Which DHCP option helps lightweight APs find the IP address of a wireless LAN controller?
Refer to the exhibit. The connecting between SW1 and SW2 is not operational. Which two actions resolve the issue? (Choose two)
A customer requests a network design that supports these requirements:
Which protocol does the design include?
Refer to the exhibit.
Which troubleshooting a routing issue, an engineer issues a ping from S1 to S2. When two actions from the initial value of the TTL? (Choose two.)
Which devices does Cisco DNA Center configure when deploying an IP-based access control policy?
Drag and drop the characteristics from the left onto the protocols they apply to on the right?
An engineer has deployed a single Cisco 5520 WLC with a management IP address of 172.16.50.5/24. The engineer must register 50 new Cisco AIR-CAP2802I-E-K9 access points to the WLC using DHCP option 43. The access points are connected to a switch in VLAN 100 that uses the 172.16.100.0/24 subnet. The engineer has configured the DHCP scope on the switch as follows:
The access points are failing to join the wireless LAN controller. Which action resolves the issue?
Refer to the exhibit.
Which configuration establishes EBGP neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP?
A)
B)
C)
D)
Refer to the exhibit Which single security feature is recommended to provide Network Access Control in the enterprise?
Refer to the exhibit. Communication between London and New York is down. Which command set must be applied to the NewYork switch to resolve the issue?
A)
B)
C)
D)
An engineer is concerned with the deployment of new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements?
An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:
Which two statements does the engineer use to explain these values to the customer? (Choose two)
Refer to the exhibit.
An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as the exit point. Assuming that all BGP neighbor relationships have been formed and that theattributes have not been changed on any of the routers, which configuration accomplish task?
How does an on-premises infrastructure compare to a cloud infrastructure?
Drag and drop the characteristics from the left onto the appropriate infrastructure deployment types on the right.
Refer to the exhibit. An engineer configures a new HSRP group. While reviewing the HSRP status, the engineer sees the logging message generated on R2. Which is the cause of the message?
Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?
Refer to the exhibit.
Which HTTP JSON response does the python code output give?
Refer to the exhibit. After configurating an IPsec VPN, an engineer enters the show command to verify the ISAKMP SA status. What does the status show?
Refer to the exhibit.
An engineer deploys a script to retrieve the running configuration from a NETCONF-capable Cisco IOS XE device that is configured with default settings. The script fails. Which configuration must be applied to retrieve the configurauon using NETCONF?
Drag and drop the automation characteristics from the left onto the corresponding tools on the right. Not all options are used.
An engineer must configure Interface and sensor monitoring on a router. The NMS server is located in a trusted zone with IP address 10.15.2.19. Communication between the router and the NMS server must be encrypted and password-protected using the most secure algorithms. Access must be allowed only for the NMS server and with the minimum permission levels needed. Which configuration must the engineer apply?
A)
B)
C)
D)
How does the Cisco SD-Access control plane simplify traditional routing environments?
When a wired client connects to an edge switch in a Cisco SD-Access fabric, which component decides whether the client has access to the network?
What is the preferred QoS marking for delay-sensitive real-time protocols such as RTP?
Refer to the exhibit. An administrator writes a script to fetch the list of devices that are registered with Cisco DNA Center. Why does the execution abort?
Which virtualization component creates VMs and performs hardware abstraction that allows multiple VMs to run at the same time?
Which type of antenna is designed to provide a 360-degree radiation pattern?
Where is the wireless LAN controller located in a mobility express deployment?
Which RF value represents the declineofthe RF signal amplitude over a given distance?
Refer to the exhibit.
An engineer is creating a Pytnon script to fetch the BGP configuration from a device using RESTCONF. What does the output Indicate?
An engineer must use flexible NetFlow on a group of switches. To prevent overloading of the flow collector, if the flow is idle for 20 seconds, the flow sample should be exported. Which command set should be applied?
A)
B)
C)
D)
Which solution should be used in a high-density wireless environment to increase bandwidth for each user?
A customer requires their wireless network to be fully functional, even if the wireless controller fails. Which wireless design supports these requirements?
Drag and drop the code snippets from the bottom onto the blanks in the code to construct a request that configures a deny rule on an access list?
Which hypervisor requires a host OS to run and is not allowed to directly access the hosts hardware and resources?
Refer to the exhibit.
A network engineer must permit administrators to automatically authenticate if there is no response from cither of the AAA servers. Which configuration achieves these results?
Refer to the exhibit.
Which configuration must be added to enable remote access only using SSHv1 or SSHv2 to this router?
A)
B)
C)
D)
A wireless administrator must create a new web authentication corporate SSID that will be using ISE as the external RADIUS server. The guest VLAN must be specified after the authentication completes. Which action must be performed to allow the ISE server to specify the guest VLAN?
Which two methods are used to assign security group tags to the user in a Cisco Trust Sec architecture? (Choose two )
A customer has two Cisco WLCs that manage separate APs throughout a building. Each WLC advertises the same SSID but terminates on different interfaces. Users report that they drop their connections and change IP addresses when roaming. Which action resolves this issue?
In a campus network design, what ate two benefits of using BFD tor failure detection? (Choose two.)
Which Cisco WLC feature allows a wireless device to perform a Layer 3 roam between two separate controllers without changing the client IP address?
Drag and drop the characteristics from the left onto the corresponding infrastructure deployment models on the right.
Refer to the exhibit. An engineer must update the existing configuration to achieve these results
Only administrators from the 192.168.1.0/24 subnet can access the vty lines.
Access to the vty lines using dear-text protocols is prohibited.
Which command set should be applied?
Which TLV value must be added to Option 43 when DHCP is used to ensure that APs join the WLC?
A network administrator is designing a new network for a company that has frequent power spikes. The company wants to ensure that employees can the best solution for the administrator to recommend?
An engineer must configure a new WLAN 802.11r and requires users to enter a passphrase. What must be configured to support this requirement?
Refer to the exhibit. Link 1 uses a copper connection and link 2 uses a fiber connection. The fiber port must be the primary port for all forwarding. The output of the show spanning-tree command on SW2 shows that the fiber port is blocked by Spanning Tree. After entering the spanning-tree port-priority 32 command on G0/1 on SW2, the port remains blocked. Which command should be entered on the ports connected to Link 2 is resolve the issue?
Refertothe exhibit. A network engineer Is troubleshooting an Issue with the file server based on reports of slow file transmissions. Which two commands or command sets are required. In switch SW1 to analyze the traffic from the file server with a packet analyzer? (Choose two.)
A)
B)
C)
D)
Which template is used when multiple templates are grouped together to run in succession in Cisco DNA Center?
Drag and drop the characteristics from the left onto the deployment models on the right.
Refer to the exhibit. An engineer must deny HTTP traffic from host A to host B while allowing all other communication between the hosts. Which command set accomplishes this task?