option
Cuestiones
ayuda
daypo
buscar.php

preguntas1

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del Test:
preguntas1

Descripción:
preguntas

Fecha de Creación: 2022/12/14

Categoría: Otros

Número Preguntas: 104

Valoración:(0)
COMPARTE EL TEST
Nuevo ComentarioNuevo Comentario
Comentarios
NO HAY REGISTROS
Temario:

What is a characteristic of Cisco DNA Northbound APIs?. They utilize RESTCONF. They simplify the management of network infrastructure devices. They utilize multivendor support APIs. They enable automation of network infrastructure based on intent.

Even manager applet CONF_CHANGE action 3.0 syslog Priority informational msg "Configuration changed". ______"SYS-5-CONFIG_I". action 1.0 cli command ________. action 2.0 cli command " show clock _________ : ConfSave.txt".

Drag and drop the characteristics from the left onto the infrastructure deployment models they describe on the right. easy to scale the capacity up and down. highly agile. highly customizable. infrastructure requires large and regular investments.

What is the result of the API request?. The native interface information is read from the network appliance. The information for all interfaces is read from the network appliance. The “params” variable sends data fields to the network appliance. The “params” variable reads data fields from the network appliance.

What is a Type 2 hypervisor?. runs directly on a physical server and includes its own operating system. installed as an application on an already installed operating system. also referred to as a “bare metal hypervisor” because it sits directly on the physical server. supports over-allocation of physical resources.

Drag and drop the characteristics from the left onto the technology types on the right. Puppet is used for this type of technology. Ansible is used for this type of technology. uses machine learning to identify and resolve issues. this type of technology provides automation across multiple technologies and domains. this type of technology enables consistent configuration of infrastructure resources.

Refer to the exhibit. Which two statements about the EEM applet configuration are true? (Choose two) event manager applet LARGECONFIG event cli pattern 'show running-config' sync yes action 1.0 puts 'Warning! This device has a VERY LARGE configuration and may take some time to process' action 1.1 puts nonewline 'Do you wish to continue [Y/N]' action 1.2 gets response action 1.3 string toupper '$response' action 1.4 string match '$_string_result' 'Y' action 2.0 if $_string_result eq 1 action 2.1 cli command 'enable” action 2.2 cli command 'show running-config' action 2.3 puts $_cli_result action 2.4 cli command 'exit' action 2.9 end. The EEM applet requires a case-insensitive response. The running configuration is displayed only if the letter Y is entered at the CLI. The EEM applet runs before the CLI command is executed. The EEM applet runs after the CLI command is executed.

Which three elements determine Air Time efficiency? (Choose three). data rate (modulation density) or QAM. RF group leader. channel bandwidth. dynamic channel assignment. number of spatial streams and spatial reuse. evert-driven RRM.

Refer to the exhibit. list = [1, 2, 3, 4] list[3] = 10 print(list). [1, 2, 10]. [1, 2, 3, 10]. [1, 10, 10, 10]. [1, 2, 10, 4].

What are two benefits of implementing a traditional WAN instead of an SD-WAN solution? (Choose two). comprehensive configuration standardization. faster fault detection. lower data plane overhead. simplified troubleshooting. lower control plane abstraction.

A wireless client is connecting to FlexAP1 which is currently working standalone mode. The AAA authentication process is returning the following AVPs: Tunnel-Private-Group-Id(81): 15 Tunnel-Medium-Type(65): IEEE-802(6) Tunnel-Type(64): VLAN(13). While the AP is in standalone mode, the client will be placed in VLAN 13. While the AP is in standalone mode, the client will be placed in VLAN 10. While the AP is in standalone mode, the client will be placed in VLAN 15. When the AP transitions to connected mode, the client will be de-authenticated. When the AP is in connected mode, the client will be placed in VLAN 13. When the AP is in connected mode, the client will be placed in VLAN 15. When the AP transitions to connected mode, the client will remain associated.

What are two characteristics of Cisco SD-Access elements? (Choose two). The border node has the full RLOC-to-EID mapping database. Fabric endpoints are connected directly to the border node. The control plane node has the full RLOC-to-EID mapping database. Traffic within the fabric always goes through the control plane node. The border node is required for communication between fabric and nonfabric devices.

What does the destination MAC on the outer MAC header identify in a VXLAN packet?. the leaf switch. the remote spine. the next hop. the remote switch.

Which three elements determine Air Time efficiency? (Choose three). number of spatial streams and spatial reuse. evert-driven RRM. RF group leader. dynamic channel assignment. data rate (modulation density) or QAM. channel bandwidth.

Which definition describes JWT in regard to REST API security?. an encoded JSON token that is used for authentication. an encoded JSON token that is used to securely exchange information. an encrypted JSON token that is used for authorization. an encrypted JSON token that is used for authentication.

How is Layer 3 roaming accomplished in a unified wireless deployment?. The new controller assigns an IP address from the new subnet to the client. An EoIP tunnel is created between the client and the anchor controller to provide seamless connectivity as the client is associated with the new AP. The client database on the original controller is updated the anchor entry, and the new controller database is updated with the foreign entry. The client entry on the original controller is passed to the database on the new controller.

An engineer must establish eBGP peering between router R3 and router R4. Both routers should use their loopback interfaces as the BGP router ID. Which configuration set accomplishes this task?. R3(config)#router bgp 200 R3(config-router)#neighbor 10.24.24.4 remote-as 100 R3(config-router)#neighbor 10.24.24.4 update-source loopback0 R4(config)#router bgp 100 R4(config-router)#neighbor 10.24.24.3 remote-as 200 R4(config-router)#neighbor 10.24.24.3 update-source loopback0. R3(config)#router bgp 200 R3(config-router)#neighbor 10.4.4.4 remote-as 100 R3(config-router)#neighbor 10.4.4.4 update-source loopback0 R4(config)#router bgp 100 R4(config-router)#neighbor 10.3.3.3 remote-as 200 R4(config-router)#neighbor 10.3.3.3 update-source loopback0. R3(config)#router bgp 200 R3(config-router)#neighbor 10.24.24.4 remote-as 100 R3(config-router)#bgp router-id 10.3.3.3 R4(config)#router bgp 100 R4(config-router)#neighbor 10.24.24.3 remote-as 200 R4(config-router)#bgp router-id 10.4.4.4.

Where are operations related to software images located in the Cisco DNA Center GUI?. Provisioning. Design. Assurance. Services.

Which type of tunnel is required between two WLCs to enable intercontroller roaming?. CAPWAP. iPsec. mobility. LWAPP.

What is one benefit of implementing a VSS architecture?. It uses GLBP to balance traffic between gateways. It uses a single database to manage configuration for multiple switches. It provides multiple points of management for redundancy and improved support. It provides a single point of management for improved efficiency.

Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial?. under traffic classification and marking conditions. under all network conditions. under interface saturation conditions. under network convergence conditions.

An engineer runs the sample code, and the terminal returns this output. Which change to the sample code corrects this issue?. Change the JSON method from load() to loads(). Call the read() method explicitly on the test_json string. Use a single set of double quotes and condense test_json to a single line. Enclose null in the test_json string in double quotes.

What is one requirement when mobility tunnels are used between WLCs?. There must not be a firewall between the WLCs. The WLCs must use the same DHCP server. Mobility tunnels must be created over Layer 3 networks. WLC IP ranges must be on the same subnet.

Refer to the exhibit. enable secret cisco username cisco privilege 15 secret cisco aaa new-model aaa authentication login default group radius local aaa authorization network default group radius The network administrator must be able to perform configuration changes when all the RADIUS servers are unreachable. Which configuration allows all commands to be authorized if the user has successfully authenticated?. aaa authorization exec default group radius. aaa authentication login default group radius local none. aaa authorization exec default group radius if-authenticated. aaa authorization exec default group radius none.

Which configuration enables a Cisco router to send information to a TACACS+ server for individual EXEC commands associated with privilege level 15?. Router(config)# aaa accounting exec default start-stop group tacacs+. Router(config)# aaa authorization exec default group tacacs+. Router(config)# aaa accounting commands 15 default start-stop group tacacs+. Router(config)# aaa authorization commands 15 default group tacacs+.

Refer to the exhibit. Which network script automation option or tool is used in the exhibit? https://mydevice.mycompany.com/getstuff?queryName=errors&queryResults=yes. Python. Bash script. NETCONF. REST. EEM.

Which EEM script generates a critical-level syslog message and saves a copy of the running configuration to the bootflash when an administrator saves the running configuration to the startup configuration?. action 1.0 cli command copy running-config bootflash:/current_config.txt action 2.0 syslog msg “Configuration saved and copied to bootflash”. action 1.0 cli command “enable” action 2.0 cli command “configure terminal” action 3.0 cli command “file prompt quiet” action 4.0 cli command “end” action 5.0 cli command copy running-config bootflash:/current_config.txt action 6.0 cli command “configure terminal” action 7.0 cli command “no file prompt quiet” action 8.0 syslog priority critical msg “Configuration saved and copied to bootflash”. action 1.0 cli command copy running-config bootflash:/current_config.txt action 2.0 syslog priority critical msg”Configuration saved and copied to bootflash”. action 1.0 cli command “enable” action 2.0 cli command “file prompt quiet” action 3.0 cli command copy running-config bootflash:/current_config.txt action 4.0 cli command “no file prompt quiet” action 5.0 syslog priority critical msg “Configuration saved and copied to bootflash”.

What are three valid HSRP states? (Choose three). full. speak. listen. established. INIT. learning.

Which two items are found in YANG data models? (Choose two). container statements. JSON schema. rpc statements. HTTP return codes. XML schema.

Which method is used by an AP to join HA controllers and is configured in NVRAM?. stored WLC information. Primary/Secondary/Tertiary/Backup. IP Helper Addresses. DNS.

A network engineer is adding an additional 10Gbps link to an exiting 2x10Gbps LACP-based LAG to augment its capacity. Network standards require a bundle interface to be taken out of service if one of its member links goes down, and the new link must be added with minimal impact to the production network. Drag and drop the tasks that the engineer must perform from the left into the sequence on the right. Not all options are used. Note: Please type the corresponding numbers of each item on the left to the blank below so that they match the corresponding steps on the right from top to bottom. For example: 3216 (which means 3 for the first, 2 for the second, 1 for the third and 6 for the last step.

A network engineer must log in to the router via the console, but the RADIUS servers are not reachable. Which credentials allow console access?. the username “cisco” and the password “cisco123”. no username and only the password “test123”. the username “cisco” and the password “cisco”. no username and only the password “cisco123”.

What is a characteristic of an AP operating in FlexConnect Mode?. Forwarding continues when the AP loses connectivity to the WLC. APs connect in a mesh topology and elect a root AP. All traffic traverses the WLC to ensure policy enforcement on client traffic. FlexConnect enables an AP to connect to multiple WLCs.

What unit present in Signal-to-noise ratio?. amp. dB. dBm.

What is the wireless received signal strength indicator?. The value of how strong a wireless signal is received, measured in dBm. The value given to the strength of the wireless signal received compared to the noise level. The value of how much wireless signal is lost over a defined amount of distance. The value of how strong the wireless signal is leaving the antenna using transmit power, cable loss, and antenna gain.

Which method should an engineer use to deal with a long-standing contention issue between any two VMs on the same host?. Live migrate the VM to another host. Reset the VM. Reset the host. Adjust the resource reservation limits.

What the role of a fusion in an SD-Access solution?. acts as a DNS server. provides additional forwarding capacity to the fabric. performs route leaking between user-defined virtual networks and shared services. provides connectivity to external networks.

A company requires a wireless solution to support its main office and multiple branch locations. All sites have local Internet connections and a link to the main office for corporate connectivity. The branch offices are managed centrally. Which solution should the company choose?. Cisco DNA Spaces. Cisco Unified Wireless Network. Cisco Catalyst switch with embedded controller. Cisco Mobility Express.

Which statement about LISP encapsulation in an EIGRP OTP implementation is true?. OTP maintains the LISP control plane. OTP uses LISP encapsulation to obtain routes from neighbors. OTP uses LISP encapsulation for dynamic multipoint tunneling. LISP learns the next hop.

Which configuration elects SW4 as the root bridge for VLAN 1 and puts G0/2 on SW2 into a blocking state?. SW4(config)#spanning-tree vlan 1 priority 32768 ! SW2(config)#interface G0/2 SW2(config-if)#spanning-tree vlan 1 port-priority 0. SW4(config)#spanning-tree vlan 1 priority 32768 ! SW2(config)#int G0/2 SW2(config-if)#spanning-tree cost 128. SW4(config)#spanning-tree vlan 1 priority 0 ! SW2(config)#interface G0/2 SW2(config-if)#spanning-tree vlan 1 port-priority 64. SW4(config)#spanning-tree vlan 1 priority 0 ! SW2(config)#int G0/2 SW2(config-if)#spanning-tree cost 128.

Which two southbound interfaces originate from Cisco DNA Center and terminate at fabric underlay switches? (Choose two). TCP 23: Telnet. UDP 6007: NetFlow. UDP 162: SNMP. ICMP: Discovery. UDP 67: DHCP.

An engineer must design a wireless network to primarily support 5-GHz clients. The clients do not support the UNII-2c portion of the 5-GHz band. Due to application bandwidth requirements, the engineer uses 40-MHz channels. Which design consideration must be made in this scenario?. There are six non-overlapping channels available. There are four non overlapping channel available. There are 12 overlapping channels available. There are 25 overlapping channels available.

Which two statements about VRF-lite are true? (Choose two). It can increase the packet switching rate. It supports most routing protocols, including EIGRP, ISIS, and OSPF. It supports MPLS-VRF label exchange and labeled packets. It can support multiple customers on a single switch. It should be used when a customer’s router is connected to an ISP over OSPF.

An engineer configured the Bonjour Gateway on a Cisco WLC to support Apple Airplay. Users cannot see Apple TV while on the WLAN. Which action resolves this issue?. Enable FlexConnect Local Switching. Disable Neighbor List Dual Band. Enable mDNS Snooping. Disable Directed Multicast.

What is the wireless received signal strength indicator?. The value of how strong the wireless signal is leaving the antenna using transmit power, cable loss, and antenna gain. The value of how much wireless signal is lost over a defined amount of distance. The value of how strong a wireless signal is received, measured in dBm. The value given to the strength of the wireless signal received compared to the noise level.

When is the Design workflow used in Cisco DNA Center?. in a greenfield deployment, with no existing infrastructure. in a brownfield deployment, to modify configuration of existing devices in the network. in a greenfield or brownfield deployment, to wipe out existing data. in a brownfield deployment, to provision and onboard new network devices.

How does NETCONF YANG represent data structures?. in an HTML format. as modules within a tree. in an XML tree format. as strict data structures defined by RFC 6020.

Which configuration creates a CoPP policy that provides unlimited SSH access from client 10.0.0.5 and denies access from all other SSH clients?. access-list 100 permit tcp host 10.0.0.5 any eq 22 access-list 100 deny tcp any any eq 22 ! class-map match-all telnet_copp match access-group 100 ! policy-map CoPP class telnet_copp police 8000 ! control-plane service-policy input CoPP !. Option B ! access-list 100 permit tcp host 10.0.0.5 any eq 22 access-list 100 deny tcp any any eq 22 ! class-map match-all telnet_copp match access-group 100 ! policy-map CoPP class telnet_copp drop ! control-plane service-policy input CoPP !. access-list 100 deny tcp host 10.0.0.5 any eq 22 access-list 100 permit tcp any any eq 22 ! class-map match-all telnet_copp match access-group 100 ! policy-map CoPP class telnet_copp drop ! control-plane service-policy input CoPP !. access-list 100 permit tcp any any eq 22 access-list 100 deny tcp host 10.0.0.5 any eq 22 ! class-map match-all telnet_copp match access-group 100 ! policy-map CoPP class telnet_copp police 8000 ! control-plane service-policy input CoPP !.

How are the Cisco Express Forwarding table and the FIB related to each other?. The Cisco Express Forwarding table allows route lookups to be forwarded to the route processor for processing before they are sent to the FIB. Cisco Express Forwarding uses a FIB to make IP destination prefix-based switching decisions. There can be only one FIB but multiple Cisco Express Forwarding tables on IOS devices. The FIB is used to populate the Cisco Express Forwarding table.

Refer to the exhibit. An engineer is using XML in an application to send information to a RESTCONF-enabled device. After sending the request, the engineer gets this response message and a HTTP response code of 400. What do these responses tell the engineer?. The Accept header sent was application/xml. The Content-Type header sent was application/xml. JSON body was used. POST was used instead of PUT to update.

A network engineer must load balance traffic that comes from the NAT Router and is destined to 10.10.110.10, to several FTP servers. Which two commands sets should be applied? (Choose two). ip nat pool ftp-pool 10.10.110.2 10.10.110.9 netmask 255.255.255.0 access-list 23 permit 10.10.110.10 ip nat inside destination-list 23 pool ftp-pool. interface gig0/0 ip address 10.10.110.1 255.255.255.0 ip nat inside interface gig0/1 ip address 172.16.1.1 255.255.255.252 ip nat outside. ip nat pool ftp-pool 10.10.110.2 10.10.110.9 netmask 255.255.255.0 type rotary access-list 23 permit 10.10.110.10 ip nat inside destination-list 23 pool ftp-pool. interface gig0/0 ip address 10.10.110.1 255.255.255.0 ip nat outside interface gig0/1 ip address 172.16.1.1 255.255.255.252 ip nat inside.

Refer to the exhibit. event manager applet config-alert event cli pattern “conf t.*” sync yes A network engineer must be notified when a user switches to configuration mode. Which script should be applied to receive an SNMP trap and a critical-level log message?. action 1.0 snmp-trap strdata “Configuration change alarm” action 1.1 syslog priority critical msg “Configuration change alarm”. action 1.0 snmp-trap strdata “Configuration change alarm” action 1.0 syslog priority critical msg “Configuration change alarm”. action 1.0 snmp-trap strdata “Configuration change critical alarm”. action 1.0 snmp-trap strdata “Configuration change alarm” action 2.0 syslog msg “Configuration change alarm”.

What is used to measure the total output energy of a Wi-Fi device?. dBm. dBi. mW. EIRP.

Drag and drop the snippets onto the blanks within the code to construct a script that adds a prefix list to a route map and sets the local preference. Not all options are used. Please type the corresponding numbers of each item to the blank below to match with four textboxes from top to bottom. For example: 1362.

In a Cisco SD-Access solution, which protocol is used by an extended node to connect to a single edge node?. CTS. IS-IS. 802.1Q. VXLAN.

Which two statements about Cisco Express Forwarding load balancing are true? (Choose two). Each hash maps directly to a single entry in the RIB. It combines the source IP address subnet mask to create a hash for each destination. Each hash maps directly to a single entry in the adjacency table. Cisco Express Forwarding can load-balance over a maximum of two destinations. It combines the source and destination IP addresses to create a hash for each destination.

Which statement about LISP encapsulation in an EIGRP OTP implementation is true?. LISP learns the next hop. OTP uses LISP encapsulation for dynamic multipoint tunneling. OTP maintains the LISP control plane. OTP uses LISP encapsulation to obtain routes from neighbors.

Which two Cisco SD-Access components provide communication between traditional network elements and controller layer? (Choose two). network data platform. partner ecosystem. network control platform. network underlay. fabric overlay.

Which two characteristics apply to the endpoint security aspect of the Cisco Threat Defense architecture? (Choose two). cloud-based analysis of threats. outbound URL analysis and data transfer controls. user context analysis. detect and block ransomware in email attachments. blocking of fileless malware in real time.

Drag and drop the automation characteristics from the left onto the appropriate tools on the right. Please type the corresponding numbers of each item on the left to the blank below and sort them in ascending order. For example: 1324 (which means 13 for first group, 24 for second group).Please type your answer here:

Which LISP device is responsible for publishing EID-to-RLOC mappings for a site?. MR. MS. ETR. ITR.

In which two ways does TCAM differ from CAM? (Choose two). CAM is used for software switching mechanisms, and TCAM is used for hardware switching mechanisms. CAM is used by routers for IP address lookups, and TCAM is used to make Layer 2 forwarding decisions. CAM is used to make Layer 2 forwarding decisions, and TCAM is used for Layer 3 address lookups. The MAC address table is contained in CAM, and ACL and QoS information is stored in TCAM. The MAC address table is contained in TCAM, and ACL and QoS information is stored in CAM.

What is one benefit of adopting a data modeling language?. refactoring vendor and platform specific configurations with widely compatible configurations. augmenting the use of management protocols like SNMP for status subscriptions. deploying machine-friendly codes to manage a high number of devices. augmenting management process using vendor centric actions around models.

Which threat defense mechanism, when deployed at the network perimeter, protects against zero-day attacks?. intrusion prevention. sandbox. stateful inspection. SSL decryption.

What is an OVF?. a package of files that is used to describe a virtual machine or virtual appliance. the third step in a P2V migration. an alternative form of an ISO that is used to install the base operating system of a virtual machine. a package that is similar to an IMG and that contains an OVA file used to build a virtual machine.

Which two statements about IP SLA are true? (Choose two). It uses NetFlow for passive traffic monitoring. It is Layer 2 transport-independent. SNMP access is not supported. It uses active traffic monitoring. The IP SLA responder is a component in the source Cisco device. It can measure MOS.

Which design principle should be followed in a Cisco SD-Access wireless network deployment?. The WLC is connected outside of the fabric. The WLC is part of the fabric overlay. The access point is connected outside of the fabric. The WLC is part of the fabric underlay.

Which two GRE features are configured to prevent fragmentation? (Choose two). PMTUD. DF bit Clear. MTU ignore. TCP window size. TCP MSS. IP MTU.

Which two statements about EIGRP load balancing are true? (Choose two). EIGRP supports unequal-cost paths by default. Cisco Express Forwarding is required to load-balance across interfaces. A path can be used for load balancing only if it is a feasible successor. EIGRP supports 6 unequal-cost paths. Any path in the EIGRP topology table can be used for unequal-cost load balancing.

Which two sources cause interference for Wi-Fi networks? (Choose two). mirrored wall. incandesent lights. fish tank. DECT 6.0 cordless. 900MHz baby monitor.

Which action occurs during a Layer 3 roam?. Client receives a new ip address after getting authenticated. Client traffic is tunneled back to the original controller after a Layer 3 roam occurs. Client database entry is moved from the old controller to the new controller. The client is marked as “Foreign” on the original controller.

Drag and drop the REST API authentication method from the left to the description on the right. secure vault. HTTP basic authentication. OAuth. token-based authentication.

Why would a log file contain a * next to the date?. The network device was unable to reach the NTP server when the log messages were recorded. The network device is not configured to use NTP. The network device is not configured to use NTP time stamps for logging. The network device was receiving NTP time when the log messages were recorded.

Which function is handled by vManage in the Cisco SD-WAN fabric?. Performs remote software upgrades for WAN Edge, vSmart and vBond. Distributes policies that govern data forwarding. Establishes IPsec tunnels with nodes. Establishes BFD sessions to test liveliness of links and nodes.

What is the recommended minimum SNR for data applications on wireless networks?. 20. 25. 10. 15.

Which benefit is provided by the Cisco DNA Center telemetry feature?. improves the user experience. aids in the deployment network configurations. provides improved network security. inventories network devices.

Which two prerequisites must be met before Cisco DNA Center can provision a device? (Choose two). The provisioned device must be put into bootloader mode. Cisco DNA Center must have the software image for the provisioned device in its image repository. The provisioned device must recognize Cisco DNA Center as its LLDP neighbor. The provisioned device must be configured with cli and snmp credentials that are known to DNA center. Cisco DNA Center must have IP connectivity to the provisioned device.

What is the calculation that is used to measure the radiated power of a signal after it has gone through the radio, antenna cable, and antenna?. dBi. dBm. mW. EIRP.

You are configuring a controller that runs Cisco IOS XE by using the CLI. Which three configuration options are used for 802.11w Protected Management Frames? (Choose three). comeback-time. mandatory. saquery-retry-time. association-comeback. enable. SA teardown protection.

An engineer is troubleshooting an application running on Apple phones. The application is receiving incorrect QoS markings. The systems administrator confirmed that all configuration profiles are correct on the Apple devices. Which change on the WLC optimizes QoS for these devices?. Enable Fastlane. Change the QoS level to Platinum. Configure AVC Profiles. Set WMM to required.

What are two reasons why broadcast radiation is caused in the virtual machine environment? (Choose two). Communication between vSwitch and network switch is multicast based. Communication between vSwitch and network switch is broadcast based. Virtual machines communicate primarily through broadcast mode. vSwitch must interrupt the server CPU to process the broadcast packet. The Layer 2 domain can be large in virtual machine environments.

What is a characteristics of traffic policing?. must be applied only to outgoing traffic. queues out-of-profile packets until the buffer is full. lacks support for marking or remarking. can be applied in both traffic directions.

Drag and drop the characteristics from the left onto the configuration models on the right. Please type the corresponding numbers of each item on the left to the blank below and sort them in ascending order. For example: 1324 (which means 13 for first group, 24 for second group). Please type your answer here:

What are two benefits of implementing a Cisco SD-WAN architecture? (Choose two). It provides resilient and effective traffic flow using MPLS. It allows configuration of application-aware policies with real time enforcement. It simplifies endpoint provisioning through standalone router management. It enforces a single, scalable, hub-and-spoke topology. It improves endpoint protection by integrating embedded and cloud security features.

What is an advantage of using BFD?. It has sub-second failure detection for layer 1 and layer 3 problems. It detects local link failure at layer 1 and updates routing table. It detects local link failure at layer 3 and updates routing protocols. It has sub-second failure detection for layer 1 and layer 2 problems.

How do EIGRP metrics compare to OSPF metrics?. The EIGRP administrative distance for external routes is 170, and the OSPF administrative distance for external routes is undefined. EIGRP metrics are based on a combination of bandwidth and packet loss, and OSPF metrics are based on interface bandwidth. The EIGRP administrative distance for external routes is 170, and the OSPF administrative distance for external routes is 110. EIGRP uses the Dijkstra algorithm, and OSPF uses The DUAL algorithm.

Drag and drop the characteristics from the left onto the orchestration tool classifications on the right. Configuration_Management_vs_Orchestration_2.jpg Please type the corresponding numbers of each item on the left to the blank below and sort them in ascending order. For example: 1324 (which means 13 for first group, 24 for second group). Please type your answer here:

Which two statements about AAA authentication are true? (Choose two). KRB5 authentication disables user access when an incorrect password is entered. RADIUS authentication queries the router’s local username database. TACACS+ authentication uses an RSA server to authenticate users. Local authentication is maintained on the router. Local user names are case-insensitive.

What step resolves the authentication issue?. use basic authentication. target 192.168.100.82 in the URI. restart the vsmart host. change the port to 12446.

A customer deploys a new wireless network to perform location-based services using Cisco DNA Spaces. The customer has a single WLC located on-premises in a secure data center. The security team does not want to expose the WLC to the public Internet. Which solution allows the customer to securely send RSSI updates to Cisco DNA Spaces?. Perform tethering with Cisco DNA Center. Replace the WLC with a cloud-based controller. Implement Cisco Mobility Services Engine. Deploy a Cisco DNA Spaces connector as a VM.

What is a TLOC in a Cisco SD-WAN deployment?. identifier that represents a specific service offered by nodes within the Cisco SD-WAN overlay. attribute that acts as a next hop for network prefixes. value that identifies a specific tunnel within the Cisco SD-WAN overlay. component set by the administrator to differentiate similar nodes that offer a common service.

Which function does a fabric wireless LAN controller perform in a Cisco SD-Access deployment?. manages fabric-enabled APs and forwards client registration and roaming information to the Control Plane Node. performs the assurance engine role for both wired and wireless clients. coordinates configuration of autonomous nonfabric access points within the fabric. is dedicated to onboard clients in fabric-enabled and nonfabric-enabled APs within the fabric.

What is a characteristic of the overlay network in the Cisco SD-Access architecture?. It provides multicast support to enable Layer 2 flooding capability in the Underlay. It uses a traditional routed access design to provide performance and high availability to the network. It consists of a group of physical routers and switches that are used to maintain the network. It provides isolation among the virtual networks and independence from the physical network.

Which python snippet should be used to store the device data structure in a JSON file? import json Devices= {'Switches':[{'name': 'AccSW1', 'ip':'2001:db8:db8:db8::1'}, {'name': 'AccSW2', 'ip':'2001:db8:db8:db8::2'}], 'Routers': [{'name': 'CE1', 'ip':'2001:db8:db8:db8::1'}, {'name': 'CE2', 'ip':'2001:db8:db8:db8::2'} ] }. with open(“devices.json”,”w”) as OutFile: Devices = json.load(OutFile). with open(“devices.json”,”w”) as OutFile: json.dumps(Devices). OutFile = open(“devices.json”,”w”) OutFile.write(str(Devices)) OutFile.close(). OutFile = open(“devices.json”,”w”) json.dump(Devices, OutFile) OutFile.Close().

An engineer must configure the wireless endpoints to authenticate using Active Directory credentials in an encrypted tunnel in addition to using a hashed password. Which action is required?. Configure EAP-TLS with MSCHAP v2. Configure PEAP with GTC. Configure EAP-TLS with GTC. Configure PEAP with MSCHAP v2.

Which component transports data plane traffic across a Cisco SD-WAN network?. vBond. cEdge. vManage. vSmart.

A customer deploys a new wireless network to perform location-based services using Cisco DNA Spaces. The customer has a single WLC located on-premises in a secure data center. The security team does not want to expose the WLC to the public Internet. Which solution allows the customer to securely send RSSI updates to Cisco DNA Spaces?. Replace the WLC with a cloud-based controller. Deploy a Cisco DNA Spaces connector as a VM. Perform tethering with Cisco DNA Center. Implement Cisco Mobility Services Engine.

Which function does a Cisco SD-Access extended node perform?. provides fabric extension to nonfabric devices through remote registration and configuration. used to extend the fabric connecting to downstream nonfabric enabled Layer 2 switches. performs tunneling between fabric and nonfabric devices to route traffic over unknown networks. in charge of establishing Layer 3 adjacencies with nonfabric unmanaged node.

What is a benefit of Type 1 hypervisors?. Network engineers are able to create virtual networks of interconnect virtual machines in Layer 2 topologies. Storage engineers are able to leverage VMDK files to provide storage to virtual machine. Administrators are able to load portable virtual machine packages in OVA or QCOW2 formats. Operators are able to leverage orchestrators to manage workloads that run on multiple Type 1 hypervisors.

script contains the statement “while loop != 999:”. Which value terminates the loop?. A value less then or equal to 999. A value equal to 999. value greater then or equal to 999. value not equal to 999.

What are two benefits of implementing a Cisco SD-WAN architecture? (Choose two). It allows configuration of application-aware policies with real time enforcement. It improves endpoint protection by integrating embedded and cloud security features. It enforces a single, scalable, hub-and-spoke topology. It simplifies endpoint provisioning through standalone router management. It provides resilient and effective traffic flow using MPLS.

Which of the following statements regarding BFD are correct? (Choose two). BFD is supported only on physical interfaces. BFD detects link failures in less than one second. BFD is supported by OSPF, EIGRP, BGP, and IS-IS. BFD creates one session per routing protocol per interface. BFD can bypass a failed peer without relying on a routing protocol. BFD consumes more CPU resources than routing protocol timers do.

Refer to the exhibit. You have just created a new VRF on PE3. You have enabled debug ip bgp vpnv4 unicast updates on PE1, and you can see the route in the debug, but not in the BGP VPNv4 table. Which two statements are true? (Choose two) *Jun19 11:12: BGP(4):10.1.1.2 rcvd UPDATE w/ attr:nexthop 10.1.1.2, origin ?, localpref 100,metric 0,extended community RT:999:999 *Jun19 11:12: BGP(4):10.1.1.2 rcvd 999:999:192.168.1.99/32,label 29–DENIED due to:extended community not supported. VPNv4 is not configured between PE1 and PE3. PE1 will reject the route due to automatic route filtering. After you configure route-target import 999:999 for a VRF on PE3, the route will be accepted. After you configure route-target import 999:999 for a VRF on PE1, the route will be accepted. address-family ipv4 vrf is not configured on PE3.

What is a benefit of using a Type 2 hypervisor instead of a Type 1 hypervisor?. improved density and scalability. improved security because the underlying OS is eliminated. better application performance. ability to operate on hardware that is running other OSs.

Denunciar Test