Sei sulla pagina 1di 73
tem 1-0f §0 (Choice; Q1) The login method is configured on the VTY lines of a router with these parameters, 1. The first method for authentication is TACACS 2. If TACACS is unavailable, login is alowed without any provided credentials ‘Which configuration accomplishes this task? A> Rt#shvrun | include aaa asa new:model aga authentication login default group tacacs+ aga session-id common Rvsh run | séetion vy line Vly 0 4 ‘transport inoutnone Rit B. Rt#sh run | include aaa ‘aaa new-model aga authentication login default group tacacs+ none aaa sessior-idcommon Rtdsh run | section vty line viy.0-4 Password 7 02050D400809 Rtzésh run |inéluide username, Rit %©. Rt#shrun linclude aaa aza new-model aaa authentication login telnet group tacacs+ none aaa sessior-id common Rish run | section vty line vy 0-4 6S SX OS Ono ttem 5 of 50 (Choice, Q5) < renege on eh US? aves respnsbieto publi D-0-RLOC mappings or ase? Bae EIR yo BMS. 3 Cur. Y oem Item 6 of 50 (Choice, 06) Which JSON syntax is valid? ADRS etswiteh": name" " Paigt", "gid Se leene {c'eamer" sae Paigt Pe. {'switch’-{'name" "dist", "interfaces" [gigt'“gig2s:"“gig3"T} © D. {Switeh'(name': dist’, interfaces’ [wot ‘a: mnrawigeaon ‘ eee oe be Pane Ymienconmn Silent en (Whee carn ser oi Fn hc s SSD SO Te a ut on en 6 Te pms lb CESS nid ‘Seca one erence fet Hower te eran pghosson he Wace zene amon a 1 carne cat anna am ace Ase | esc ot day ase se a oe WN a ace oN (© Aten ceo see nce ote acer crt nec 1 Testers mut cota reenter ease tem 10 of 50 (Choice, Q10) Which two mechanisms are available to secure NTP? (Choose two.) TACACS-baSed authentication IP prefix list-based, IPsec [Paces list based ‘encrypted authentication tem 11 of 50 (Choice, 11) moon > Whatis one fact about Cisco SD-Access wireless network deployments? >) A) The access faint is part of the fabri¢ underlay. B. The wireless ¢lient is part of the fabric overlay. (| C.-The access point is part of the fabric overlay. D. The WLC is part of the fabric underlay. tem 12 of 50 (Choice, Q12) What is a fact about Cisco EAP-FAST? >, A Itis-an IETF Standard. B. It does not require.a RADIUS server certificate: C--ttoperaies in transparent mode D. itrequires a client certificate. tem 13 of 50 (Choice, 13) ‘Which two pieces of information are necessary to compute SNR? (Choose two.) A EIRP B) transmit power () C-noise floor D. antenna gain E-RSSI eo 1 0 (Gas, a15) 3 Sr g SDL SCN emerson Sas we Ce Wh Tower Dogess ess aie halo wfc rome Farce YAN ae ws ees - Eee staat O°. oJ * B Swtctioteonlgyap ping v ©. Smee ren vont10 é 2. She emcees ated tan efve 10 nenibets6 Gace) em 1 of 80 (Ors, a7) sesosue STEGRESS 00, ns 101240 ase Flere the exhib An engnesr must mad the acces cortrl iat EORESS to alow all Yai rom subnet 101.10.024 to 10120724. The ‘tess conelit sapped he outaurd decom on oder mlslace Ggabt Ele OT Ui corfqurcn carmen ean he engres Ue {Sow tis ate wine dsphng oxstnguali owa? CR cot lp arceso Se oaanaea EGRESS Feat 10) 110259288 2560.10 1:20 2682 2850 5. conta garcess te denied EORESS. tong! artessd cece EGRESS forep oso 0002290) 20000255, emt 109 700000028005 20000255 seo arvary ‘race gv opp acess geup EGRESS out ‘poccossgcupEORESSZ ch conta x Garcess acd esos Semtp 1100000255901 20000265 tem 19 of 50 (Choice, 18) When configuring WPA Enterprise on @ WLAN, which addtional securly component configuration is required? AY PII server RADIUS Senet G. TACACS Server . 3 ° oD. NTP sever lem 19 of 50. (Choice, 019) How does a fabric AP fit in the network? AD Ikis in FlexGinnect mode and.iustbe connected\directly to the fabrie-eelge Switch B Ikisin FlexConect mode-andtrust be connected difectly to the fabiic border node, ‘C-ttis in ical made and must be ¢phnected directly to the fabric Edge Switch 2D. Ibis inocl mode and must be cannected directly fo the fabric border node, tem 20 of 50 (Choice, 20) Which TCP setting is tuned to minimize the risk of fragmentation ona GREAP tunnel? Ok Mss Sk? B) MTU CMRU Sf »D. window size Item 21 of 50 (Choice, Q21) Ri# sh : [evcmogne ae jeeetineout Referto the @xnibL, Which priviege level is assigned to VIV users? A185 B13 See B24 nem 72 tt (Ga azz) Refer me rhb Wnehconigrsoneaablches EBGP naghtorshp baleen Hose te Gert comeredraghbors and ex haiges the Gopuacknetu firth oes rough”? US Eieenocertr 1222 one 2 icone! 10224 opie see ‘Rieapnasrmretion 101 Oman Se 0 Sar Bee ie eet + Batemperetnn 0220 e283 550 ieee He lores Neer tomaart: ESE wisi tates Strong PE i wlan creer, ater ba? ‘atcorg ror eatnte 16216310 remote a | Ralconroateretnar 10220 maak 052 285 SD Riconaioer bp “ Flcong oars 62168 102anotb 2 ilcooncoeretwan 000 mask 255000 atcomprouer np 2 alco roereetior 182168101 ramet. ach olcoog oration 0000 maak 256000 stem 23 of 60 (Choice, 223) 192.168.1012 18 10 6 © Referto he emnE Which I aadess becomes the aebve Dent hop for 182 108 102.024 when 182 168.1012 falis? A tetbeT014 8 400 108 1018 © 192.168.101.19 1D 192160 10188 1 tem 24 of 50 (Choice, @24) Which two operations are valid for RESTCONF? (Choose two.) PUSH ADD HEAD, REMOVE PULL: .) Fy PATCH tien 25 of 50 (Chee, 225) ‘Acasa nas several mal ranches atd warts o deploy WiFi sain wih cal managemer using CAPWAE Which ployment made ress ths reurerer? ‘A ey Exes, mmo D> aroma ‘.oca nede tem 26 of 60 (Cheice, 28) Which exhibit displays a valid JSON file?” AL “hostname""édge_router_1 “interfaces”: [ *Gigabitéthernet/1", “GigabitEthernet1/2", "Gigabitéthernet1/2" 1 iB OLB. f “hostname”: Yedge_router_ 4", “interfaces”. € "GigabitEthernett/1", *GigabitEthernett/2 *Gigabitéthemet1/3", ib E t “hostname”: “edge router)" “interfaces: | *Gigabitéthernet1/1" *GigabitEthernett/2" *GigabitEthernett/2" } { “hostname”: ‘edge_router_4” ‘interfaces’: { *GigabitEthernet1/1" *GigabitEthernett /2" *GigabitEthemett/3" } } stem 27 of 50 (Ghee, 027) Which mtd displays lox dvectly io the acive console wth a synchronous EEM apple poley? eR ‘event manager applet boom ‘event syslog patter ‘UP action 1.0 sting Nagging dec to consi" ‘event manager applet boom ‘event syslog pattern ‘UP clon 1.0 puts 'ogaing drectly to consol ‘event managerapret boom ‘event syslog pater ‘UP ‘acon 1.0.g)slog prionty direct msg Toguing creo console’ _eveit maneger applet boom ‘event Syalog ter ‘UP ‘action 10/gets 'ogaing drecty to console tem 28 ot 80 (Ghee 26) Ps & & |Apethersmncrao prepara a Pan sept. corfgu 2 Cisco OS XE asad deuce onthe patwort. The admin io wored hat ‘Swarm ghee Pearce eprom Veh pan te eto mana ees l= or Mra «hgesta ne oes he sei anne? of cro=nay> 5 mtecsrtanenenes) Z 6 nheecsorg=rameg) © é ame 3 | @lnetwore 2.2.2.2 8.0.1 soe . Faeroe ein Rrercorgret ie OrvTy OF tray mar Fa Tn rg ven aa FVEORoectin (es no oscaran te Samet meaces tatee 0 Which caguson st cents ths Qos? 2. Rieoniatrerace eso leo i astigt | cong reece aon bp ot prt 8. Rieanipeterace G00 cons nw onion Ra{cony ap ort newark porto port ©: Rilontaffrerace G0 Fema a aca eany-rerace GO. ajc thy orl neta bees 5. Ricantp.nrtertece G00 Filconigraerfetwan 100 00men 280000 ‘Exes ng 2 ewto rage pri! 2 110s (cage reo 10DO0 mack 26 080 Item 30 of 50 (Choice, 30) Which method of account authentication does OAuth 2.0 use within REST APIS? OLA. basic signattire workflow \”B) access tokens C-usernamelrole combination ©D. cooke authentication tem 31 of 50 (Cheice, Q31) Which aigonthms are used to secure REST API from brute attacks and minimize the impact? AL SHAA, SHA:256, and SHA-512 {By PBKDF2;BGtyptyand SGryet C-NDS algorithr-128 and SHA-364 1D. SHA.512 and SHA384 hem 22 of 80 (Cheice, 482) Fide dnewer | ‘ibaa wre clr ome etosen uo tert ela coral, ast cormecvtyadageis earned Tora paride une, Which urnen esol court ts poten” ‘A. No toe eras te nab) ow a eanate sane moby gous nae 18. Noro hearers kin roby grup igre Same ya eave Paes (¢-Alorme caters wane notin grup ae Jara ne same virus merace Fades .Alef the contoersn themabiy grep 2 us he sae mobity arp rare em 5 ot 30 (Sal 85) | Mawar An engncer in pret nae company sgpnstransomare aac, Wich slitn lows the engnseta one eee tage an revere Se enenpion? A Use Coco repewer win asi Ply an an ues bockg SB ean, Use Caco A depayrert hte Expo Proven engin ens 16 Use Cee AP aepieyment wth ean Rt Presetnn engine Era ‘Use ste Frepower abc Wate Yo TOR nets. tem 34 of 50 (Choice, 24) Why is an AP joining a different WLC than the one specified through option 43? \O) A. The AP is joining a primed WLC: XB) The WLC is running a diffefent software version. ) C.-The AP multicast traffic is unable to reach the WLC-through Layer 3 © D. The APs broadcast traffic is unable to reach the WLC through Layer 2. erin shy cgi at ary Tee Wa Kae picket act our 0 te ook of use Rang te ‘teas Ae tae rene mares oases Sar R2 ost sed a aes ier corenng =o janes ata 1 Ricerdeyaune ange WEEKEND ‘ilcarg-imezonge Mpeod Fay Suny 600000000 |Rilcontgeces ie 150d ep host 103.83 hast 102226028 rarge WEEKEND ‘Rtcorghuccess tt 15 perme ay any i(ceofihtverace GON Allen fi access aoup 10 atcomgjne range WEEKEND -FBicenkpte sorgeyenti Saray Suis? 00.00t0 2359, ‘cenfotaecse 1 sen et 1.3 ant 10222 ey kenge WEEKEND Falcomgysscess to perm yy ene WERE stceng}tierace Go Fatceng spose rou 150 cut © Blears WEEREND cpus argepepeds weer 0000 io 2359 V adeneacess ts 150 den tep nest 1033s 1022269 Hume aed WEEN ileetaaccessit 50 perm yan) itceitrierace Go itecno.tp secs grup 2018 {° D-Ritcenine rege WEEKEND S ~ RBleentg omeorgesvonog weekend D000 n 2548 tcotinazcess it 10 peritep est 10843 host 192226023 range WEEKEND ‘Fescehtacese et 150 par py ay be-erge WEEKEND ‘RSlenfotentace cot © Race ie acco rou 60 cu 5 tem 37 of 50 (hee 27) Feri he fab Wit ie rcnul when a cfc adc the mono oesto yr ta cay seam? <8 Rtas nen A 2 on 2 Ce RSPADAe alana > oP sem tz Nao ies cam) & g ee ‘Nah dees remotes oes fois cud nl eos na ati Theses asa pres oe crcokr od OTE, ER era er omer dle ee as ac ee ae ‘nat ype eam occus Retr tothe et Te rte a ose leases inte NAT coriguraton os donee Rave been caectyWerfed What she eect of Ts naga © A dai NA 8 PAT ‘ © sae A oy a © nares emt ot 0 (Si ato) 2 r 3 (Laser) A cerean vse mean cing ns carousels mar a ail coves Bie Ke ee a cna balset g NAG Rocag i ete remem chert snr ea 18 besmecteahiowatin > renee Geom > (ies aT Va eaing AS 200 wh Choose LAK Dae on pnt Resin that BGP hor ve et esn changed ny heats, ch cortgusen sees a lem 49 of 50 (Chcice, @43) g g Which DG? option heps lightweight APS find the IP address of a wireless LAN controler? 8 Ont 60 Ry : : g jon 3 8 m Wry 8 Optonat BY °C-Option 150 a, 2D. Opton er ltem 44 of 60 (Choice, Q44) << What is the roe of the vSmart controler in a Cisco SD-WAN environment? Om Itmanages ihe control plane, ee Oi Bot performs authenticati C < we C-ti8 the centralized network management system 2 a) it manages the data plane & Cc em 46 80 (Gree, 45) (aia Saker Feferfothe exiba Ark engineer conigues # GRE tunel and ies the how niece nel conan What des th abit ort ‘asceriguctan? : DA. The peal eteace MTU e178 785: Beetace wats contoured (0 The heer alu sme rom re out ae D. Mhe urna nade setae dla tem 46 of 80 (Choice, 048) Bre giprigriey 22760 escent es pars mae BEA GBR SENG, ot coo —o eae cn aoe arn Refer wo be exhib Which two commands ensue that DSW! becomes root beige fr VLAN 10.and 20° (Choose two.) 57. spanningsteemet 1 roc primary i & * 1). Spanningttee mst 1 priory °° 6. spanningree mst 4 pony 4008 D. spanningtee mst van 10,20 pron rot EE. Spanning ee stp van 10, 20,09t primary tem toto Choke, 47) eles fie otha fa angina ul ceae a coniguatan Thal executes the show ran comand an thn terminates the sion when user (GCN fogs in Whe coreran changes reared” IR Asoth acess lass keer to woman card 5. A he acess keyword i tho ma aiehoroton command (. Ath atocorare keyerdp he User command (DAs the avocormand keyword the aaa auhenietion command hem 46 of 0 (Chsiee, G48) eee SS NS rs c0 IOS dence? Ved yina is IC relies! and Serviced it wthouk ena: ¥. 8. The NETCONF running datastofé'ts cisrreniy locked. o s © NETCONF msgs veces ae ont YAUG data ole mathe eqn A NETCONE request was made fo a dota madelthat does not eit XS item 49 of 50 (Choice, 249) [Data pateetn (O9Anc0} Essaey sebset, neces oy iasbes SF esses a inary yottostngl tasers > RRS Sage ttcons enue ae, lade F ss eae ares gen oe = — SER te 2 game armed Saegachabin tein 10.99.69.2,"pBhindn Ry ii0d> cipseived paoeat Ray ept iene otal option eyeers 8, padaed dengthesy ecard routes > Seagyor® —* ee oud a 2 poe ae ‘cxievedl Sa yn = anyon? Refer tothe extiatR1 is able to ping the R3 fa0/1 interface. Wy do the extended pings fal? OK The DF tities been set”) b B. Ris missing a retum route to 10.99.69.0/30. ©. The maximum packet size accepted by the command is 1476 bytes: 1D. R2 and R3 do.not have an OSPF adjacency neniaies REE OH) J 3g a ‘Wound access apiein eH re a ae ets aie ceo Rei ance Vie wos wh P 1p ceeded 20 Saytpron tro ook sera paany [fpmeecthetded tac F Gaesepron i010 01 ayo farm a 2) 2.0: paces lator NO HTTP Oe ea ‘np Wpatcas eae Senseo 110101 an part oar a ltem 1 of 50 (Choice, 051) oS xd x Which antenna type should be used for a site-to-site wireless connection? OR patch Wes 2B. Dipole Pagel cag ~ ep. Omnidirectional Ss lem 2 of 60 (Choiee, 62) g g ina leo S0.Aecess tne, wich conv flane protocols used for mapping ard eslvng endponis? Ook DHCP ees 8 mes ey < We ti8h 2 SP tem 3.0 50 (Choice. Q53) g Q ‘Which two characteristics define the intent API provided by Cisco DNA Center? (Choose two.) “7B northbound ® 5 (26. business dutcome oriented") device-orienied E southbound API BR |B SPAN sees 2 marr alae ees neti por FatStheret 6 “©, RSPAU ces | creompléy congue oronting SPAN ses 2 only mets ese wali ony prt Faster A Pe Micra ete eae cae |S Rane esp beset ome rae ‘K eer Sa é RW Sa 8 S seer et oe Ss ie : ltom 8 of 60 (Choiee, 058) =102 16801, por=z2. “gorateonn pamigerict: ‘ 0 device_paramis=(neme'nexus) as m:" yee othe enhibt What does the snippet of code achieve? " ‘A tropens a tunnel and encapsulatés the lgn information ithe host key s Correct |B, Itereates an SSH connection using the SSH key thats stored, andthe passwords ignoré G tcreates atemporary connection oa Cisco Nese device and retieves token to be used for AP cals "0D _Itopers an neciient confection to Cised Nexus device and fnaintainsit for fhe duration of the context (ove 05) ‘atone “atte tensa rotcer agony tevours dinner sranpanes Fs 1. cana mac ap PREPEAG pd ‘Sse aa oe 0 109100 icon ue 0) ‘Mcompease'p nen 10222,oe ap PREFEID Ricoto eae REZ et Giompecienee ea eaneceenno ie S|» eon oe) (Sesigeue ron 101 1c ERED tEarpase tp pe 0.00 Rar ‘ Rigtdea'p en 222rameapPRereI@ oa | © RicomgmonmngPREPEO ree SSseitna seh ope 200 Raewsan rio 0) ‘Racor fen 019 aes PREPERO ox Riesamgetee cot come ese 08 tem 1080 (Crees, C80) tem 1 of $50 (Choice, 61) hk Unease eae ess 192. 168.2 poe ‘standby 20 ip 192.968.250.1 standby 2@ priority 120 ot Hagges Hamer: 02 japMlddress. 192.168. 5-255.255.8 ‘standby 20 ip 192. ae 250.1. standby 20 priority 110 oA Refer to the exhibit What are two effecis ofthis configuration? (Choose two.) DA. Rt becomes the standby-fouter B-IFR1 goes down, R2 becomes active but reverts to Standby when Ri comes back one “PGC HPRt goes down, R2 becomes avive and remains the active device when Rt comes back online. 1D. IF R2 goes down, Ri becomes active but reverts to standby when R2 comes back oniine, ERY becomes the active router tem 2 of 560. (Choice, 062) ‘What are two, considerations when using SSO as a network redundancy feature? (Choose two.) ©..A requires synchronization between Supervisors in dFder to guarantee continuous connectivity 1. B. the muticast State is preserved ducing switchover: (°C. trust be combined with NSF to'sLippart unintenrpted Layer 2 operation’ . both supervisors must be configuied separately \ mist be Combined with NSF to support uninterrupted Layer 3 operations tem 3 of S50 (Choice, G63) Which action is performed by Link Management Protocol in a Cisco StackWise Virtual domain? » AL It determines # the hardware is compatible to form the StackWise Virtual domain. i? B. It rejects any Ghidirectonal ink'rattic forwarding. °C thdetermines which switch becarmies active of standby. D. Ikdiscovers the StackWise domain and brings up SVL interfaces. tem 40 650 (Groiee, 84) How does he EIGRP metric ater tom he OSPF meine? ‘A. The EIGRP jhe is calcul hated on barduith and detay The OSPF metic is callated on bandwidth \_B."The EIGRP mer is caleted based on delay ony The OSPF met: f aleulatect on bandwith ant delay OTR EIGRE metric i calcite based 08 hop count as handinath The OSPF metic calculates on bang and delay. The EIGRP metre i calculated based on uandwain ony. The OSPF mete calculated on day ony tem S.of $50. (Choice, 265) S oz Pe < ‘What the purpose of the LISP roving aed addressing architecture? OA. ereates tres foreach evr nse, meen ace tn nme © B alps utp insta: arin ate area ee it Oe )C. thalows LISP to Be applies as rk virtualization 6veray thought al ©. Reteates headend replication used to delver broadcast and multicast frames tothe ene network, em f 580 (Chee O28) Hee Ano aero TU nas bom caged ss be deta pyacaTopogy rns MTU command tas ben congue cae retinas. (What happen 0. bfe Pa pace reese the GRE tel ts Ree Xt beet. surg te eis ceed? ‘A. Tho poke cated n router. 1B Te packet ames cn ate’ Cth ragmenenn 1 hepa seated ous 1 Thc ares ater fogmere tem 7 of $50 (Choice, Q67) ~Loeeo- —" — DeR Which deployment option of Cisco NGFW provides scalability? Os AL inline tap WS ee “B. high availabilty ore > % 3S 6. Tap em 2. clusterng & \s LBS LS “Meee nett, OH I en a 16 Teese em coms ene ok nen ED Terai somone or fee aie He omatr nt cen ee wate th ith Thee esr teeta pe, be de Fone F ttem 13 of 550 (Ghatce, @73) 3 8 wa eral ti ob tres at iris terete ge pea me? oes VW configuration fle Ws e ABO Ceres arn ok soy VEPR WS 2-8 ppeations es tam 140550 (hate, 074) “Refer ote end Se ees TV ines opt and 0-02? "(%Golt on te 0t and ol on Ee 02 ~ ve |B GO on Eage-01 and G0 on Enge-02 a “©. G0 and Gorton Core »B, 60 ane Go4sen ASW.01 ten 15 680 (Shave. 7H) ‘nas Curr 1 16 0288982501210 1 ilo A iam in sonia scab ‘pro et Caner 72 0.928285 1721611 gtd 1 Got 1 a AM 2 Dn 12 lal “© prouen Cter! F216 425 5826825 12901 aa OT oe Choma et) ns 0 eg [Brot fen 258 256258 Ovni ‘brome 172161 0 286255255 0a) prot Curios! 1721610256 255-285 0172.18.11 Cuteert ‘Brot wt Cusrmera 12 181 200 56 28625585 19216811 Customer? tem 18550 hove, 278) tem 850 (ae aT) (sews Scaplen ie {chowse tw) | Crete at Pas ple seach ct ACL and apy th lieth re ace 15. Crese an Pee pate, asoct ne rarsom-se sd a he peo el reeie © spay necro map ue ue retae acho erred ae oul mae Ee 0 Raporehecrpiomapard mathe ACL as tfc bate 1 100.0249 10200026 1 Resi cnr a cot ape we Rad et A nem 10 of 550 50 (Chee, are) = = 2g 228 imports avblable APIs for eae device 8 CSV format aL OS Ss Ro Ro & Vs sey 1B Musesan: the “ tat RO GPRS pe ¢Soies eae rain Weare bu ” Me OU 2D Wereales devce packs trough ie use ot 26 SDK “sg & tern 19 of 860 (Choice, 279) OK: caplet P Seresses ee ms “s “ey sexta fs 50 SSRN 0, 8B ae ‘mistouted network packets E excess iter % tem 20 of 550: (Choice, Q80) Which data is properly formatted with JSON? AL | name": Péter; ‘age: 25, “ikesJson": true, “characteristics: ['small’,"strong’"18], } E Bot “name""Peter* rage""25" “likesJson” true “characteristes"['small’strong18] 1 “CL "name" "Peter", "age". "2! slikesJson'true, *characteristics"’{'small’ “arog 18], 4 Dy “name”: "Peter", age’, "25", ‘ikesJson": true, ‘characteristics* ['small’,"strong’.18] } tem 21 of 550. (Choice, Q81) Ina Cisco SD-Access solution, what is the role of the Identity Services Engine? >A. Itis leveraged for dynamic endpoint to group mapping and policy defrition. {Blt isused to analyze endpoint to. app flows and monitor fabric status: Cth provides GUI management andl abstraction via apps that share context D. tt manages the LISP EID database. vet serspfise STAT # os peas Re nep anabsea, en igs seco 021021124 Ogeechee ire teh conrad mtb ated ar ni ‘ergunonnccaah sao hoe A Roaelaitasress tony 76 3 Recon ip ate 129 112662562580 Rowers wn areas 1218 112852552550 1 Reerconto wipases aa ont Roaereonp areas yo tem 23 of 550. (Choice, Q83) Annetwork engineer is configuring Flexible NetFlow and enters these commands: ‘sampler NetFlowt mode random one-out-of 100 interface fastethernet 1/0 flow-sampler NetFlow! ‘What are two results of implementing this feature instead of tradttional NetFlow? (Choose two.) SA. The accuracy of the data to be analyzed is improved. {))B. Oly the flows of top 100 takers are expcited. G_CPU and memory utilization arereduced 1D. The;number of packets to be analyzed are reduced LE. ‘The data export flow is more secure. Item 24 of 850. (Choice, 084) What is provided by the Steaithwvatch component of the Cisco Cyber Threat Defense solution? Oy AY reabtime avjaceness of users devices, and trafficiin the network \” B) dynamic threat control for webstratfic °) C-teal-time threat management to)stop DDoS attacks fo the core and atcess networks D. malwate control Item 25 of 550 (Choice, Q85) get 200.0002 acox (0900. 9¢97 ac01 (v2 dezSeie) mello time 3 tec, hold tine 20 sec Next hello sent in 0.064 aece Preemption enabled Active roster if local Standby outer is 20.0,9.242, priority 190 sn 10.624 sec) ‘2L0) C ae + naepeVAS03-1" (daeuude) <> a device output confirm? (Choose two ) 25) ‘A. The device's HSRP group uses the virtual IP address'10.0.3.242 B_ The device is configured with the default HSRP prionty. {)C. Theldevice iS using the default HSRP hello timer. D. The standby-device is configured with'the default HSRP priority. “CE, The device sends unicast messages to t3 peers. tem 28 of 550 (Choice, Q86) Which outcome is achieved with this Python code? client connect (ip, port=22, username=usr, password=pswd) stdin, stdout, stéem = client exec command (‘show ip bgp 192.168.101.0 bestpathin’) print (stdout) ‘connects to.a Cisco device using Telnet and exports the routing table information ‘displays the output of the show command in a formatted way ‘connects to a Cisco device using SSH and exports the BGP table for the prefix >/D.connects toa Cisco device using SSH and exports the routing table information. tem 27 of 550. (Choice, Q87) ops Which encryption hashing algorithm does NTP use for authentication? > ® SSL \ By AES128 9) C-AES258 2D. MDS, am 28 of 80 (Chae, 8) ‘Av engineer must corigure an ACL hal pens packets when ineuse an ACK‘ the TGP header Which eny mst De nce ne ACL? AY sess. pra tp any 0921 etaishad 18 ecgss S10 pertip an a 421 pack °C bess tt 10 frat i ay ap e921 poke 1 seces.it i0 perm tp any an og eta en 280880 (Cae 8) (ie) Aste tas 29 street eae ty Ec st is a se Go ess at aro 9 ema NLD. The sane waa Pe aN ed Item 20 of 60 (Chaice, @90) ‘What isa characteristic of WLC that isin master controller mode? ©) AL Configuratiai an the master controller is executed on all wireless LAN controllers, 5° B. Anew APS tat join the WLAN ate assigned ta the Master conifer VC. The master contoler is responsible for load bataneing all connecting\ciients to other controllers. 1D. Allwireless LAN controllers are managed by the master controller. em 80 (Cre, ab) pa een eel ingle Ge 20. ih fccpsoyors ibe WLC cams GHGP ep The a need ne SCP sap ont ste oe Open aac 508 SoA aPC EN EE argue cr cner 21885 8 ceri pe Her 00} 02205 (are pon Her 104 C0205 argue reser 1721101 htgred i BGP sos che mca lows Doe ace 28508 A carmque a ener 17218505 8 carne pans ec e30 A005, erie on aac F304 OE Demme ae saner 72181003, tem 22 of 850. (Choice, 92) ‘What's the function of the fabric control plane node In a Cisco SD-Access deplayment?, ».AY It provides Integration with legacy nonfabric-enabled environments, {Bit performs traffic’encapsulation and security profiles enforcement in the fabri. ©) CoAbholds @ Comprehensive datatsase that tracks endpoints and networks in the fabric. 'D. Iti responsible for policy application and network segmentation in the fabric. item 33 of 560 (Choice, 93) How do cloud deployments difer from on-oremises deployments? ~ AS Cloud deployments are more customizable than of oremises deploymenis B. Cloud deployments require longer implementation times than on-premises deployments. ©) Ce Cloud deployments have lower uptront costs than on-premises deployments. 1D. Cloud deployments require less ffequert upgrades than on-premises depioyrrents Item 34 of &50. (Choice, 94) What is ¢ Type 2 hypervisor? » A. supports oveF-allocation of physical resources % Bruns directly on a physical Server and includesi's own operating System, ©). installed a8-an application on an already installed operating system D. also referred'to as a bare metal hypervisor Because it sits directly on the physical server tem 25 of 550 (Choice, Q95) Which function does a fabric AP perform in a Cisco SD-Access deployment? >, AS It manages Wireless clients! membarship information in the fabric. \? B. It updates wireless clients’ locations in the fabric (, C--Itconfigurés sectirty policies dawn to wireless clients in the fabric. D. It connects wireless clients to the fabric. tem 36 of 550. (Choice, 96) What does the number in an NTP stratum level represent? 2S The number othops takes to reach the authoritativs time source. « woe The amount of drift e device clock and tnie time oe °C. The number of hops it takes to teach the master time Server. ©. The amount of offset between the deviee clock and true time. 2 tem t860 (ace O87) i ‘ ane ened 30 permit ip any 192.168.0.0 0.0.255.255 | ere oR. Een seg ance rns gait NO nireauecton bl es rethae te epee of ‘Sowing omy pests tsar om fz fenaone inch carmand ceo canaenPe ces? Fllomgonieo 10 18 Rionoioaccoustsexendes 10 Fllonipen soc port py © leone scart 00 ery py ry. ©. ona ooas 10 sn 10 Fleongeses io ang ry ay om 38 0f0 (Chai, 08) Routeries run | © wy Hine wey geo” pe Laseele 20‘ sess , snasatoag 0 Poesia ens oat pe " et Pees oo’ scout Fro owt Seu pay ur aide eg Heenan OH sarah WE coin aches oa? A ire 015 exectmentt 00 <8 ineytyo4 ‘er treat 600 © mevyots evnsetmeos 600 1D mewyots reine nerdeates te ethene shad Corman ees rea carguaon moe entiein eee awn 9 Bg eis ‘erg ce eon ig ese ne Gar ide wh PF ee ER Sore S Vs - . SNR Tawa “A eo yg ent"OSFF RQUTIGERRORE "8 sen lpg OSPF ROUTINGERROR” cat oer OREO + x FER PHS0 A) Re aS ttem 43 of 550. (Chace, 0103) Refer to the exhibit Which Python code snippet prints the descristions of disabled interfaces only? ‘A. for interface in netcont_data("Gigabitetnernet') print("enabied” printintertacet'deseription")) —/B) for interface iy netcont_dataf GigabitEthemet’) Fictertec: tus: printfinterfacef'eeseription’) 46 ee hetcont_datal’GigabitEthemet)) prrrtetacedesonper) D. for itertace innetcont_dataf"Gigabitethernet'y ‘f ntertacef'enabled’)!="alse’ ‘rint(interface’descrioton’)) emt (hake c10) - Osx a ‘A ptt opis even st ess cused gpd tasnhigh cH NB ston AD cored sh rece puso appends pe ¥ 6. acon 49etcommans"stow secs cu sea heed tasnnr pte 0 sen cre eet “stow proces spusotd|aperachich cee" Reucticnseremteea Referothe cat Which coniguatn Pange wiles BR? reach 200406 201 O27 wa BRI? 'A. Sethe onan to jap on BR2toward PE? inbound, “1B. Seline MEDI 1 on PE2 toward BR? cutbound ‘Sette cal prefeencetn 150.0 PE! loyard BAY Gubound 1D, Set the weight atinbute to 65,585 on BRt toward PEt. v item 48 of 950 (Croce, 2106) FReferio he exhib How was spanning rea corigured on Ts wierace? ‘A. Byertenng tie command spanning-tree van 10,2030,40 root primary in th nletace corvigutabon mode £8. By onttng the command spanning-tree porfast trunk nto interface configuration mode CC Byerterngthecormand spanning-trae mstt vit 102,300 inthe lal configuration mode (By entering the command spanning-ree portfast We intexface coriguration mode, et 80 (Chace om?) ‘omihese pees ich cess ted? 1 interne ak man Sspromyt 2 Eicen Shee pataneniatty Oo sock ce abt akan setae YEP domain onpAcrTERE TTatertace G10/0 6 sihcriptlon toc evitent scitchportods ammenis aes Helaos visio sedi descrip 10 Fe oi rrp pcre seen ge a ne Pepe era ST WCE ce epee 7 Orig sen such ponies 1 change VIF dan oman enbon omens ‘©. change Sutera sue por me Brame a0 Change Sut ute porie ram: Sale tem 49 of 550 (Choice, Q109) What is required for a virtual machine to nun? >, A) ahypervisor\and physical server-hiardware \) B) only a Type t-ypervisor (Ca Type 1 hypervisor and a host operating system D. only a Type 2 hypervisor tem 50 of 550 (Choice, Q110) What is a characteristic of a next-generation firewall? >: AY provides intrision prevention, B. only required. at the networkpenmeter ©) C-fiters traffic using Layer 3 and Cayer 4 information only . required in each layer of the network tem 54 of 860 (Chorce, 111) ‘What i the wireless Received Signal Strength Inccator? [AY the value of How strong the wiles signal's leavig the antenna using Vansmt power able loss, and after gan B. theyalueof noi mmuch wigless signal ts st over <'Ueined amount of dance 7G. the value gen the suength ofthe wireless signal ecewed compared tothe noise vel 1. te value of how strong a witless Signals fecened, measured in Item 82 of 550. (Choice, Q112) Which two threats does AMP4E have the ability to block? (Choose two.) A DDoS B. ransomware C. D. email phishing Microsoft Word macro attack E. SQL injection tem 83 of 550 (Choice, 113) What are two characteristics of VKLAN? (Choose two.) Ay Itextends Layer 2 and Layer 3 overlay networks over a Layer 2 underlay. i> B, It has a42-bit network identifier. {)) C-ttuses VTEPs to encapsulate and decapsulate frames. D. Italiows for tp to 16 milion VXLAN segments: E. It lacks support for host mobility estat (Beko any) 3g nae) ees ms pie wr cgi sap oe Th het en A ls ass pet ne ie om Wher Sipe eon A atc pee ork 8 end ey PS 6. Grain ve - “oom & g 4 $ tem 85 of 560 (Chie, 2118) g g \Which two results occur if Cisco DNA Center loses connectivity to devices in the SD-Access fabric? (Choose two.) AY Cisco DNA Cie unable fs ole mentong tain Assurance” WE SB eb Upgelessearrey eee reid Pe 7-User connec te unatiected)” oe ahs ‘eax connected users ae unafeced, bt new Users cannot connect ic EA devices reload after detecting loss of connection to Cisco DNA Genie Item §6 of 560 (Choice, Q116) G ni "platformid”: "ASR1001-X", “reachabilityFé al “alt ureReason” , is": "Reachable”, < eae What does the Cisco. DNA REST response indicate? ‘A Cisco DNA Center is unable to:commiuni¢ate with cat000-1 B. Cisco DNA Center has the incorrect credentials for cat3850-1 ~G. Cisco, DNA Center has the incorrect credentials for cat9000-1 D. Cisco DNA Cefter has the incorrect credential am 7580 (Chae, 117 be er oO" SS Be [Refer othe exhibit A network engheer configures NAT on R and enters the Show command ta verty the configuration What doe's the outpat cantem? 8, Ris coiqeg nt PA rbd pms 6 Rincon et ontodoones 5 50 The pel ger at ever > an ss 350 Cae a8) & ‘Re oths a fer caigug sa Ps VP a cigren ca eS sith in oF Oe OR) rem 6585 (ae 125) (ams ‘eae must cota HRP yp 30a 250 5 ee When Fein Lute oe Roast The eer ove Ras {cpanel roy we Wheh commune sets requre 8 Si) Saas Ho tem 64 of 550. (Choice, Q124) Whats the recommended MTU size for a Cisco SD-Access Fabric? OR 4468 4B) 1500 C-9100. 2D. 17914 tem 65 of 550. (Choice, Q125) Which LISP component is required for a LISP site to communicate with a nor-LISP site? >) AY Proxy ETR OBER CR 2D. Proxy fR hem 66 of 550. (Choice, 128) In which two ways does TCALM die from CAM? (Choose two) 2) A The AC ade table is contained in TCA, and\ACL and QoS information is Stored e'CAM. Cay is ust reuters foc addese lookups’ and TCAM i us Q make Layer 2(orwrting deci YPC CAs usted ta rake Layer 2 fopvarding decinthia, ard TCAM ts use for Layer ares lookups ‘D. CAs used for software such mechanisms, and TCAM is used Jor hardvare setchng mechanisms. . The MAC address table is contarned in CAM, ard ACL and QoS informatio 1s stored in TCA. ene 880 Cre ata & sonst map reqs asaes em TRS forward th essg65 16 eS 8 te anonss reuse req USP rt tom one aes fort USP sen aes stefani) 70. com tet the LISP» AS list of VLAN Hames \” Bo access token to make calls'to\Cisco DNA Center , C--client health status D. list of global issues that are logged in Cisco DNA Center tem 84 of 550. (Choice, Q144) Which definition describes JWT in regard to REST API security? >: A. an encrypted JSON token that ig used for authentication \” B. anencrypted JSON token thats used for authorization ( C--an encoded JSON token that is used for authentication 'D. an encoded JSON token that is used to Securely exchange Information tern 85 of 550 (Chace, @145) ‘Anetuork engineer must conigur a router to send loging messages toa syslog server based on these requirements: 1 uses sysog adress: 10-1010.1 2 Gees atelebe protocol {3 must notuse any wel-known TCPIUOP ports ‘Which configuration must be used? A. logging host 10.10.10.1 ransport te port 1024 Blogging hast 10.10.10 transport ud port 1028 ‘©. logging host 10.10.10. transport udp pont 1026 logging crignid 10 10 10:4 SShpew tae Genet: ee $ os ee Fete net Astor mgr tog m8 oe ae nok Et he RADU cers em escalates aces? © usrare anon te aso Yet © nousrame i one passer esco25" tern 87 of S80 (Chae, 147) { Faetcogm cess 1101 pore fp tier (aca) Faneearas lr ap OF Ray eit pert eo Ker oy tas CaP ‘©, Roaeagh acest at 10 pet ye. fearon dos ccs h aeaene pow ps — Refer to the extitit Which commands are requiredta allaw SSH connections tothe router? ea os Pk Rotcran een een? se a epieminen sats s eet Fewer case map case san fedeteonporaph nichczes mt ‘packets Fever on cs cosh Sincectedres op top otos] sab wm tne Scdetcaeas cinerea Aeaaeseyornpy racer 10 fot ‘cdetecry prep eb cz oh ‘areata apo gate i crore aon art eri cst nap coat | Resecrig cman mache p19 re cae deta on) eet pap pe 10 caer aon ast voeTa yee naa 1 orem rr 0 por tom ea? mse eferad rave © brGBlp rte Oba” oaelcniaBoxcers 0 Pama ena Wreaeigenntigedtamy Oto PESO 18 et ol CA oe aes i OIE v sta trusts tic pay cers an ne camactor dence S$ D tanita Chopeaceneotecrtnie ores ; ; tem 9 050 (Chae, 0149) < = S & ic econ des ie wees LA eta pao a Gta SDAcEs pet? ee rot emcee aint: eat i VS SS ‘Sere wthinthe fabric OA OY See Ge iecop egies Sinan seal een 5 performs the assurance engine le for bot wired and wreless cents 9 Cc, 15 eee DLA se Lo COE aT gE DTA an tranch oh aes er Teepe ves Ser ssc menus ne evecon henner marae a nV paar Viner acanathe he est eran a Fenaree vans? 1 Conregconer ape maine ens ete 1 Change oa rstces nacess pee © Ose Spine Tee rane A, Aa Ae cts tem a8 foe, 61) Vk olay 100 - a 2818200224 mask 256.258 255 284 agin 20162012 1200 © rer bp 0 a. 70 24 5255 285.24 pu 208 168 22m 120 56 felt 195 9 ‘200 mack 25825255 228 ‘eottor 2 tsa ao vents 20 ‘eon £0 165.2024 mask 26255255224 oghter 2820 oD renee 20 et 880 (Ora 012) Sas ROE ae Te cg Oo TINT Ra Bn Rar A TaD cre Ot on RaerAs teint Senimmasmanees ge area ante Series cae oe ee ae : Se cea tem 550 (Chake 0155) 0 ee nan At BLE OR DED eRe HIS ats ess norm sone Senses ag go either tet SRS fad eae ose eau Se ESSN sss snseanenniocowe ‘en 2 eearmare oe Mc Seiiaaeness Stebel ee may tee Car Be Saar eestor sen iogmes S eee SN ee ee rt 1sddekaminhis Dome CS Sian Tc fond atts pep ome” : Seon 20 el comma ton wee "Sen 3.0 yop per tomato ep ENABLE, OSPF_DEBUG" ° Item 94 of 860 (Choice, Q154) ~B- There @ 2 loop in the path ta the server (©. The gateway cannot trensiate the server domain name. . The server is altemping to load balace beeen ins 10.100 100 1 and 10 100:200 1 Rem 95 f S50 (Chaice, 2155) &. & Be em esos gs ns corm Gomi g ne (Chee, 8) Koss Prescrg0s 2 sarceip16009 (paste ite facie tre now sowie sea 20 ‘pan scleah cite twee sansme now aw pret rec 172201919 soney 1201082 ‘Savoia ow Item 87 of 850. (Choice, 157) g Whatis one characte NO-RY y Se Itis based on VXLAN technol iS id PB) stores remote routes in ac database server, °CHtallows hast mobility only in the Wireless network © D. Each router processes every possible destination and route. of the Cisco SD-Access control plane? tem 9 of 560 (Ghoee, 2158) g Which technology enables a redundant supervisor engine to take over when the primary supervisor engine fails? Qe $80) NS We Oy 8 FHRP. or oy ee DG, Grace ~ Y 20. NS & é ltem 89 of 550. (Choice, 159) & ‘Which character formatting is required for DHCP Option 43 to function with current AP models? AOA Basets VS WS 2 8 pe PRS Pes C-ascn ae aha oP S 5 Item 100 of 550. (Choice, Q160) Whatis @ charact of a type2 hypervisor? AO,A complicated'teployment A. SPB) beers WSeGare metabo BC) °C ideal for cfientlend-user system). ©. ideal for deta center & et 0 (Chae 161 Die) ‘Rife ne ni Renew cries cng ever tor ns BN acne comec RW RS GRE el Yeh cegaen ust espe? ren Pe omepeady Rn acaeaae ‘ponmesr 1312552582560, ine as ass ass 2tba Sossee Tat Se ea Seen ede ings aa Set eae ten es desta 2125 102 of 880. (Choice, Q162) What is a characteristic of traffic shaping? NAS queues out-of profile pac! ‘the buffer is full Pe B. causes TCP retransmi ickets are dropped 7C-drops-outorprofile packets “|” ©D. canbe applied in both trafic directions |. Conic beter VRRP ete eed ig HOS © Rlperay #101012 eineraatle D. Tometeoraee 10101122 Perma them 106 of $50 (Choice, Q165) & 3 S'S oe RAS suet relate to ne Ce x e S Wwe Svatum 15 devices are connected dir ectiy to an authoritative time source: ey B, Stratum 15 devices are an authortatie timesourcs) > KOSU VC. Stratum Oidevices are connected directly ‘to.an authoritative time soutee 2) Stratum t deices are connected direct) to an authortaive ime : a. ORI 2 te ets (Choice, Q168) & 3 . L 3 enema ge sat weenaee geen eeu vuoi Tih wae rad reac Smal? Eucemonscies wee SS tie or ana gerne feemicsoe sca lamegdinng acne eats regi geaeecim Os PLS het mn in tt in GA ses ii US ver sy Pak cmprenenene rng ization {over contol plane abstraction |” S ‘tem 110 of 560: (Choice, 2170) ‘A. Rt usemame admin pviege 15 ‘aaa authonzalon exe defauh eal > 1B. Rt aaa new-model aaa authorization exec default tocal ‘enable aaa admin priege 15, © : 26. Risemame admin pilege 18 ‘asa authorizaion exee deta ioe © netcontyang 1B. Rtsnetconeyang ‘Username adn prvlege 15 secret cisco123 Item 111 of $50, (Choice, @171) < ‘What is one method for achieving REST API security? & gw Qy x BS are built-in}protocols known as Web Services S€curity ising a eB a MD§ hash to seein ae. using’a combination of XML enehybtion andXML signatures 2D. using HTTPS and TLS encryption tem 112 of $50 (Choice, @172) g g WIENS fi: osntion MAC onthe CUP MN ear iderdly in a VALAN RS? & AOR theleat switch OS 7 Pe wae remote épiie\, eee ay x Se ys QC. the next hop) ye ¥ 28 the remote switch 13550 (ace, 0173) "Sec Aree wm De FT Fo vanevn T7101 17219204 nck erat WE crt mete tose tet tty pen vane Regioeeare : _ Miironctoeo mn © Ja + Reomrcects Soon RISER ei St histone eons Soe ae 6 slengdtnses ORE ys woe nsnaere tcontn e ‘ob ir iehooncase 1 Haye 20000% Riana eta item scese rt et coma acess tt 20 permt ep 17248 190 00255 172 192000 & ie a acecstt abeermt en W2N8 100002 TZ 18200002882 Sie err oon Etleang ti eaecese gap 120 tem 114 of 860 (Choice, 174) Router#sh accesgclist BS are on gee 1 100 aro ¢\tepcany: any pe ne! eee Nocans light 2o-permit tcp any ys eq-22 Refer to the exhiok, Vwhich configuration set implements Control Plane Policing for SSH and Telnet? >A. Router(cofiigyiclass-map ¢lasé-telnet Router(config-cmapy#riatch access-grop 100, Router(confighéclass-map class-ssh Router(config-cmap}#match access-group 107 © Router(config)spalicy-map CoPP- Router(contig-map}#class class-telnet=ssh Router(config:pmap-c)#police 1000000 conformeaction transmit Router(configh#eontrol plane Router(config-cp)#service-paley/input GPP. © 8. Router(Configiiclass-map match-any class-conifal Router(config-cmap}#match access-group 100, Router(config-cmap#match access-group 107 Router(contig}#policy-map GoPP Router(config-emap}# class class-control Router(config-pmap-c}# police: 1000000 Conform-action transmit Router(config)#control-plane Router(config-cp)#service-policy input GoPP ‘G, Router(config)#class-man type inspect match-all Rouler(config-cmap}dmatch access-group 100 Router(config-cmap}#match access-group 101 Router(confg)époicy-map CoPP Router(config-pmap class class-controt Router(config-pmap-c)foolice 1000000 conform aciion transmit © Router(contg)#contro-plane Router(config-cp)#service-palicy output CoPP © D. Router(configytelass-map match-all class.contral Router(config-cmap}#match access-group 100, Router(conig-cmap}#match access-group 101 Router(confg)#palicy-map CoPP, Router(conig-pmaplitciass class-contol Router(con?g-aman-c}#police 1000000 conform-action transmit Rouier(confgycontro-plane Router(confg:¢p}#senvce-polcy output CoPP en fist Ve a a POS Pix sisi hs 5 YY Sex : : / $1 show run } Begin interface port-channet -_S2e show run | begin interface port-charinet. a lotertace S ‘terface 5 acess esoonsoceo Si 90° ‘astenginetOnt SPE Se co ‘mode trunk see? inode went oo ¥ COSMO ONCE IS) Vv v ‘otertace Fast€tmeret0? Swtchport mode trunk: ofr etal ri passha Benes Sand SV. WRGhaon ese ne? ) A Configure LAGP mode on S1 tolpassve.. ©.B. Configure switch port mode to ISL on $2 ©. Configure LAGP mode on $1 to active. D. Configure PAgP mode on St to desirable. Item 117 of 550, (Choice, Q177) ‘Which features does Cisco EDR use to provide threat detection and response prctection? any carer ea retreating SOB frewaling and nmusion °C. cloud analysand endpoint freyal contols ©D. canlainer-based agents és item 118 of 860. (Choice, 178) ‘What is one beneft of adopting a date modeling language? 7B eaorn rar nd ato spec confor with wie cémoable congas 28° B) augmenting the use of ent protocols like SNMP for sriptions G-Guamertinig management proces’ using vendo certié actions around médels © ©. déploying machine-‘iendly codes to managé 2 high numberof devices: WS PROS PHS re io i,m = anaes tem 20 Cen, 10) icgieee Nasvamonacmnamimcaana See cet ean es a am Raa afr he Nb les repr hat hy cannot come: ois SSD using he powded PSK Which acto witresohe tse? Dene he erect Ra Poy Seb! Be PSK unde uhercston key manager . 2 6 hey te charbea tis 880." PRM G MN PRTG ‘VD. opine Cored nerfoce to tis WLAN, v om 28S (Goce, a8 eo i ‘ es ae heb wen a i.e sSeoszostnaaar sunerorOs roi neal eon oe ssepqatatnwcses sees o/s nner AGRA nt ead on a [sis tzosszaaes nec S0ONTONDL2. Got memenacLAE corey ntanaded reat part. Refer teal, Archi ghar wobleahont ange win op chanel atsen Sand SH. Which corer occas ie ane? \ gS chennai Yorn coe 8. Sw2|¢anh hanna go 10 m9 on © si(comg. ranma gu 10 mode arable 0 SWatcong sicroert mode nk ett (Chace O18) oe ort cs ae =e penile goes ome zi Gea SS ersten Feros oP Apron Ts aera ross str wha Nie SI sd RAOUS ed el ute Pseasescuty Moen Sopa stb meh se abe eyo terse egy oar ‘tone ster Yn cen fone 2. Uae erp are ten SSD eter 8 Ene Comet mn fs eae eas pons eee ( Lntresnteswrete chnes chet emu crane ati ppt he csc parte Charge sey peo WPAZ Pearl AES, them 125 of $50, (Choice, Q185) What does a VANG mode provide? PUR uper access interact rect yitnine CLI of tedevice to rece Semoay network iiigurations ‘OB tandardioee dea struc fr ofthetranSpertprotecols é So staan aceel cncte omc eadp al ured oe Qu daSeet de® ©D. creation of transport protocols and hei interaction wihthe OS sent it eae, 10 OX Ox _ were) ‘ie ts wee ree tn ear Tee pun rete aed ns end Sere im nem estan nes Wace Inskinus fo nds one ILE em 127 at 650 (Grice, 167) ee Hom do the RIB andthe FB er? ee & eb setae ets ™ aun ane comos anton seston? os Bye he csp os ROA PRS! RP Se Races gi cere TS OL Sac Q Se 2 Selim cea toe tn Z emia Ces a0 ‘g sac creo 05 og © Teton, cst sed ewe mets oe cre th cn serpent ee got Comer o \ tapas seater ete (ce O18) Ea ee —— a os cor a Derg rman tac 8 tgeumarperistrch pm 1 leantgrumerpanstarc angi adiecs 172181010 , earigmmenpanste arpa 72 16108 ta tn 0 (cbce, a0) item 131 of 560. (Choice, 191) SD Q apa ‘ue sous 18210612 © tunel destition 200.1.4.4 @ tunnel source 172.18.1.0 ©) D, tunnel source 200.1.1.1 Seen tem itse0 (eee ate) D. Omniirections tent Venice, 86) o lero the ei What oes Pon se?” |. wes theusetiome fr aspect ®aatess rn a abase 8 errs tte RADIS userame ora specie ess © etre TACACS+ voor for spect Pes tem 137 of 550. (Choice, 197) What is the purpose of the weight attribute in an EID-to-RLOC mapping? >) A It determines the administrative distance of LISP generated routes in the RIB. \° B> It indicates the load-balancing fatio between ETRs of the same priority” ©)’ C-thidentities the preferred RLOG address family © D. Itindicates the preference for using LISP over native IP connectivity Item 138 of 650. (Choice, Q198) What is a characteristic of para-virtualization? » RY Para-virtualiZation allows direct access between the guest OS andthe hypervisor. 5B. Para-virtualizétion guest sérvers are unaware of onélanother. (2) °.~ (°C.-Para-virualization lacks Support for containers 1D. Para-virtalization alows the host hardware ta be directly accessed tem 139 of 560 (Choice, 199) ‘An EEM applet contains this command: event snmp oid 1.3.64.3.7.1.2.3.6.2.8.9 get-type next entry-op at entry-val 80 polkinterval 8 ‘What is the resull of the command? A: An SNMP event is generaied when the value equals 80% for eight polling cycles. BL An SNMP evetit is generated wiién the value is greater than 80% for éight poling tycles .C. An SNMP event is generated when the value reaches 80%. D. An SNMP variable is monitored and an action is triggered when the value exceeds 80% item 140 of 860. (Choice, 200) A. (0.5) B012345 C.01234 DL06 Item 141 of 560. (Choice, 201) Whatis an advantage of utilizing data models in a multivendor environment? >» AY facilitating a Unified approach to configuration and ‘management \ B. removing’the distinction between configuration‘and runtime state data (, C-lowering CPU load incurred to managed devices ©. Improving communication security with binary-encoded protocols ltem 142 of 860 (Choice, @202) ‘What is @ benefit of using segmentation with TrustSec? 2 AL Packets sent between endpoints on a LAN are encrypted using symmetric key cryptography. {°B. Firewall niles ate'streamiiiéd by Using business-le(2l profiles %.— 1) Ceintegety checks prevent data trom belong modticd in transit »-D. Security group tags enable network Segmentation’ tem 14 ot 60 10aee a5) cron aces ten ase oe Spe Ra can GG Y Speedanen’ ch ‘paneworans ci mtonnt homeasloea selon) Pe ey RERTDBEeaRT egies dys asigts ee te nnery atau ton aNETCOIE candle Cac OSE dee t s rged a at Sons estos Wha cone mae ape tee eater G FETC 1 dekeupomneraneeow tc et oe ain a 0 tose ttn tem 144 of 880 (Choice, 204) What is characteristic of a Type 1 hypervisor? >A. Problems in the base operating system can affect the entire system. {.° B, Itis.installed on/zh operating system and supports other operating systems above it )'C-ttis completely independent of he operating System. ©: this referred to as a hosted hypanisor. ltem 146 of 860 (Choice, 0205) g How is traffic classified when using Cisco TrustSec technology? \ Ou with the MAC.address: WS Sy Bare IP address ¥ oe Sy 'C.-4with the VEAN ae 2&0. with the'security grouptag tem ot 60 (ie, 206) SE ate RCA en TO ETE BH FONT TH RET TT Gt WK en (ose ‘A. Raariconagacess st 10Fpemk 810002000025 ry euuslcomoiey 00 Rowers 18 outcast 0 pert 00020000259 my empath oo asertompen beri 10 ct ©. Raarcongiacess 1 port 161002000025 ny ‘rtcmoiarece tt 1 Soy owesiconei ant? ftomo ier 8 . s a. aaa pat @0708 4000025 ey ‘eertcamoyarese tt 10 Sor ltem 147 af 850 (Choice, 207) g What do Chef and Ansible have in common? Oe They use YAML as their pri Bediaton it 0 a. They aedierless mere = DCeThey rely ona declarative ©. They rely on’ procedural approach setae enc ‘tect ees a ote Yah ees a eat en al CoWol 60 Se ee ar ar ta (Cie, 20) ia 003. 'Viani023", Vian2046,,"Vian3009., ‘Vian3999)),‘version’:"1.0)| tees 8 anunesesponse) ©. Vrest vs 2. stamanes Item 150 of $50. (Choice, Q210) Whats one characteristic of Cisco SD-Access networks? > A. Devices are assigned to virtual networks based on their VLAN membership. «° B) Scalable Group tags are uséd for macroseamentation RC )C--Alltrafic is Layer’ 3 within the fabric ©-D. Virtual networks are used for microsegmentation tem 161 of 660 (Choice, G211) What are two best practices when designing a campus Layer 3 infrastructure? (Choose two.) 7A) Summarize from the access layer toward the aggregation layer. 1° B. (Configure passive. interface ort nontranst. links: ©) C. Implement security features atthe core. D. Tune Cisco Express Forwarding oad balancing hash for ECMP routing. [E\ Summarize routes from the aggregation layer toward the core layer. ter S59 ori 212) (a ‘Anengneeemust congue GigabtEnemet Of VRE group G8 The over must asure the rary ole when Les the ghee prey the group Which ‘Smond stmos apie? OM Washes inet ae essass0 9 ime iow! ‘are 100 Senaiyes beoret 2 ee One here90 ious aoe ezsase0 (no eer ‘np aeration $8 ? & Gasser oo 10s aeassass0 ony 68 oct ocerer 1. -_ Sohabyespeeree Saag oo 02 Saas 50 ‘moase 010 10" ‘ey 110 | Item 158 of 860. (Choice, Q213) Which authorization framework gives third-party appications limited access to HTTP services? > AL IPsec 47 By GRE VC-OKuth 2.01 2D. Basic Auih tem itt 80 (che, ce) (ie How d dou deioyrens compare or erices deoymens? 1. Cla eplayrens ronte aber cer egeentesecr wo fone brea terse dears cen pon ene coon 1. Chu epost ele arson acre, wraeas eres dees ten ck Me ay asotan, 6. ar delomets rember) nse, wheeas secu aches ard nemesis 1 Chaddelaretemandse scare cherie heres anprericesSeoymens weiner sete te 18 50 (Chace, G28) ‘ine a ONS ost eco corgued tr anew Cac AOS WLC, whch Pasta mist be ado alow As 10 uccestly score WLC? 1. CONTROLER cAPWAP-CIsCO. °C CAPWAP-CISCO. CONTROLLER 10 CISCO-CONTROLLER-CAPWAe ter 59 ore, 216) co ‘An engneee must rpkrret a confront alow nein adminis o canect the console port 8 ee ard authenticate oe he network Wh (cron coi ener ae Bo ihecmantagn ene gauoraue 1S ihercson wg conse mw mt! than oe tate stem 157 ot 850 (Choice, 2217) \Which two new secunty capabiies are intruced by using a next-generation few tthe ntemet edge? (Choose to.) AY stateful packét inspection Oa) vey Pe. NAT 1B. application evel inspection integrated intrusion prevention Item 159 of 560 (Choice, Q2t8) Which feature is provided by Cisco Mobily Services Engine in a Cisco Wireless Unified Network architecture? AY Itadds client tracking and location APL BI adds cent packet capturing: °C. thenablés NetFlow data colection D_ Ih identiies authentication problems. Item 189 of 550. (Choice, 219) Why would a small or mid-size business choose a cloud solution over an on-premises solution? >, A. Cloud providés greater abilty for customization than on-premises. <.° B. Cloud pravidesmore contrél ayer the implementation process than on-premises | C. Cloud provides lower upfront cost than-on-premises. © Clout provides higher data security than on-premises ter Sa ore 224)

Potrebbero piacerti anche