Refer to the exhibit. Which configuration must be implemented to establish EBGP peering between R1 and R2?
Refer to the exhibit. A network engineer checks connectivity between two routers. The engineer can ping the remote endpoint but cannot see an ARP entry. Why is there no ARP entry?
Refer to the exhibit. A network engineer must load balance traffic that comes from the NAT Router and is destined to 10.10.110.10, to several FTP servers. Which two commands sets should be applied? (Choose two).
A)
B)
C)
D)
E)
What is a characteristic of the overlay network in the Cisco SD-Access architecture?
Refer to the exhibit. A network engineer must be notified when a user switches to configuration mode. Which script should be applied to receive an SNMP trap and a critical-level log message?
A)
B)
C)
D)
Drag and drop the characteristics from the left onto the technology types on the right.
Which two characteristics apply to the endpoint security aspect of the Cisco Threat Defense architecture? (Choose two.)
Refer to the exhibit.
An engineer entered the command no spanning-tree bpduguard enable on interface Fa 1/0/7. What is the effect of this command on Fa 1/0/7?
Drag anti drop the characteristics from the ten onto the configuration models on the right.
Which option must be used to support a WLC with an IPv6 management address and 100 Cisco Aironet 2800 Series access points that will use DHCP to register?
Which resource is able to be shared among virtual machines deployed on the same physical server?
Drag and drop the characteristics from the left to the table types on the right.
The Gig0/0 interface of two routers is directly connected with a 1G Ethernet link. Which configuration must be applied to the interface of both routers to establish an OSPF adjacency without maintaining a DR/BDR relationship?
A)
B)
C)
D)
Refer to the exhibit.
What is the effect of introducing the sampler feature into the Flexible NetFlow configuration on the router?
Refer to the exhibit.
An engineer must allow R1 to advertise the 192 168.1 0/24 network to R2 R1 must perform this action without sending OSPF packets to SW1 Which command set should be applied?
A)
B)
C)
D)
Refer to the exhibit. A network administrator configured RSPAN to troubleshoot an issue between switch1 and switch2. The switches are connected using interface GigabitEthernet 1/1. An external packet capture device is connected is switch2 interface GigabitEthernet 1/2. Which two commands must be added to complete this configuration? (Choose two)
If the maximum power level assignment for global TPC 802.11a/n/ac is configured to 10 dBm, which power level effectively doubles the transmit power?
A system must validate access rights to all its resources and must not rely on a cached permission matrix. If the access level to a given resource is revoked but is not reflected in the permission matrix, the security is violated. Which term refers to this REST security design principle?
In a Cisco SD-Access wireless architecture which device manages endpoint ID to edge node bindings?
Which Cisco FlexConnect state allows wireless users that are connected to the network to continue working after the connection to the WLC has been lost?
What is the calculation that is used to measure the radiated power of a signal after it has gone through the radio, antenna cable, and antenna?
A company requires a wireless solution to support its mam office and multiple branch locations. All sites have local Internet connections and a link to the main office lor corporate connectivity. The branch offices are managed centrally. Which solution should the company choose?
Which protocol is responsible for data plane forwarding in a Cisco SD-Access deployment?
What does the destination MAC on the outer MAC header identify in a VXLAN packet?
Refer to the exhibit. An engineer must allow the FTP traffic from users on 172.16.1.0 /24 to 172.16.2.0 /24 and block all other traffic. Which configuration must be applied?
A)
B)
C)
D)
What is the function of the fabric control plane node in a Cisco SD-Access deployment?
Which NTP mode must be activated when using a Cisco router as an NTP authoritative server?
Refer to the exhibit Remote users cannot access the Internet but can upload files to the storage server Which configuration must be applied to allow Internet access?
A)
B)
C)
D)
Which configuration enables a device to be configured via NETCONF over SSHv2?
A)
B)
C)
D)
Drag and drop the code snippets from the bottom onto the blanks in the script to convert a Python object into a JSON string. Not all options are used.
A company recently rearranged some users' workspaces and moved several users to different desks. The network administrator receives a report that all of the users who were moved are having connectivity issues. Which of the following is the most likely reason?
Refer to the exhibit.
An engineer deploys a script to retrieve the running configuration from a NETCONF-capable Cisco IOS XE device that is configured with default settings. The script fails. Which configuration must be applied to retrieve the configurauon using NETCONF?
Refer to the exhibit. An engineer must configure an ERSPAN tunnel that mirrors traffic from linux1 on Switch1 to Linux2 on Switch2. Which command must be added to the destination configuration to enable the ERSPAN tunnel?
Refer to the exhibit.
What are two reasons for IP SLA tracking failure? (Choose two )
An engineer must configure the strongest password authentication to locally authenticate on a router. Which configuration must be used?
An engineer configures GigabitEthernet 0/1 for VRRP group 115. The router must assume the primary role when it has the highest priority in the group. Which command set is required to complete this task?
Refer to the exhibit.
VPN-A sends point-to-point traffic to VPN-B and receives traffic only from VPN-C VPN-B sends point-to-point traffic to VPN-C and receives traffic only from VPN-A Which configuration is applied?
A)
B)
C)
D)
In a Cisco SD-WAN solution, how Is the health of a data plane tunnel monitored?
In a three-tier hierarchical campus network design, which action is a design best-practice for the core layer?
Refer to the exhibit.
Which configuration must be applied for the TACACS+ server to grant access-level rights to remote users?
Refer to me exhibit. The NETCONF object is sent to a Cisco IOS XE switch. What is me purpose of the object?
Refer to the exhibit.
Which statement is needed to complete the EEM applet and use the Tel script to store the backup file?
Which tool is used in Cisco DNA Center to build generic configurations that are able to be applied on device with similar network settings?
Refer to the exhibit.
R1 has a BGP neighborship with a directly connected router on interface Gi0/0.
Which command set is applied between the iterations of show ip bgp 2.2.2.2?
Drag and drop the characteristics from the left onto the routing protocol they describe on the right
A technician needs to find the MAC address of a connecting router. Which of the following commands should the technician use?
A customer has 20 stores located throughout a city. Each store has a single Cisco access point managed by a central WLC. The customer wants to gather analysis for users in each store. Which technique supports these requirements?
Which security measure mitigates a man-in-the-middle attack of a REST API?
An engineer must configure router R1 to validate user logins via RADIUS and fall back to the local user database if the RADIUS server is not available. Which configuration must be applied?
Refer to the exhibit. What is printed to the console when this script is run?
Refer to the exhibit.
An engineer configures a trunk between SW1 and SW2 but tagged packets are not passing. Which action fixes the issue?
Refer to the exhibit.
An engineer must create a manually triggered EEM applet to enable the R2 router interface and assign an IP address to it. What is required to complete this configuration?
An engineer is implementing a Cisco MPLS TE tunnel to improve the streaming experience for the clients of a video-on-demand server. Which action must the engineer perform to configure extended discovery to support the MPLS LDP session between the headend and tailend routers?
Drag and drop the characteristics from the left onto the deployment models on the right.
Which two parameters are examples of a QoS traffic descriptor? (Choose two)
How does Cisco Trustsec enable more flexible access controls for dynamic networking environments and data centers?
Refer to the exhibit. A network engineer must configure NETCONF. After creating the configuration, the engineer gets output from the command show line, but not from show running-config. Which command completes the configuration?
Refer to the exhibit. A network operator is attempting to configure an IS-IS adjacency between two routers, but the adjacency cannot be established. To troubleshoot the problem, the operator collects this debugging output. Which interfaces are misconfigured on these routers?
Drag and drop the characteristics from the left onto the infrastructure deployment models they describe on the right.
Refer to the exhibit.
All switches are configured with the default port priority value. Which two commands ensure that traffic from PC1 is forwarded over Gi1/3 trunk port between DWS1 and DSW2? (Choose two)
Refer to the exhibit.
What is the effect of these commands on the BR and HQ tunnel interfaces?
Refer to the exhibit.
Which IP address becomes the active next hop for 192.168.102 0/24 when 192.168.101.2 fails?
What NTP Stratum level is a server that is connected directly to an authoritative time source?
Refer to the exhibit
Communication between London and New York is down Which to resolve this issue?
A)
B)
C)
D)
Refer to the exhibit. Router BRDR-1 is configured to receive the 0.0.0.0/0 and 172.17.1.0/24 network via BGP and advertise them into OSPF are 0. An engineer has noticed that the OSPF domain is receiving only the 172.17.1.0/24 route and default route 0.0.0.0/0 is still missing. Which configurating must engineer apply to resolve the problem?
An administrator must enable Telnet access to Router X using the router username and password database for authentication. Which configuration should be applied?
A)
B)
C)
D)
Drag and drop characteristics of PIM dense mode from the left to the right.
Refer to the exhibit.
An engineer must establish eBGP peering between router R3 and router R4. Both routers should use their loopback interfaces as the BGP router ID. Which configuration set accomplishes this task?
Refer to the exhibit.
An engineer configures OSPF and wants to verify the configuration Which configuration is applied to this device?
A)
B)
C)
D)
Refer to the exhibit.
What is the result when a switch that is running PVST+ is added to this network?
The login method is configured on the VTY lines of a router with these parameters.
Which configuration accomplishes this task?
An engineer must create an EEM applet that sends a syslog message in the event a change happens in the network due to trouble with an OSPF process. Which action should the engineer use?
AN engineer is implementing a route map to support redistribution within BGP. The route map must configured to permit all unmatched routes. Which action must the engineer perform to complete this task?
Refer to the exhibit.
A network architect has partially configured static NAT. which commands should be asked to complete the configuration?
Drag and drop the descriptions of the VSS technology from the left to the right. Not all options are used.
Which solution do laaS service providers use to extend a Layer 2 segment across a Layer 3 network?
Which antenna type should be used for a site-to-site wireless connection?
Refer to the exhibit.
An engineer troubleshoots connectivity issues with an application. Testing is performed from the server gateway, and traffic with the DF bit set is dropped along the path after increasing packet size. Removing the DF bit setting at the gateway prevents the packets from being dropped. What is the cause of this issue?
Which feature does Cisco TrustSec use to provide scalable, secure communication throughout a network?
What is the process for moving a virtual machine from one host machine to another with no downtime?
Refer to the exhibit.
CR2 and CR3 ate configured with OSPF. Which configuration, when applied to CR1. allows CR1 to exchange OSPF Information with CR2 and CR3 but not with other network devices or on new Interfaces that are added to CR1?
A)
B)
C)
D)
Which Python code snippet must be added to the script to save the returned configuration as a JSON-formatted file?
A)
B)
C)
D)
Refer to the exhibit. PC-1 must access the web server on port 8080. To allow this traffic, which statement must be added to an access control list that is applied on SW2 port G0/0 in the inbound direction?
Drag and drop the snippets onto the blanks within the code to construct a script that adds a prefix list to a route map and sets the local preference. Not all options are used
Refer to the exhibit. An engineer has configured Cisco ISE to assign VLANs to clients based on their method of authentication, but this is not working as expected. Which action will resolve this issue?
Refer to the exhibit.
The IP SLA is configured in a router. An engineer must configure an EEM applet to shut down the interface and bring it back up when there is a problem with the IP SLA. Which configuration should the engineer use?
A customer has several small branches and wants to deploy a WI-FI solution with local management using CAPWAP. Which deployment model meets this requirement?
Refer the exhibit.
Which router is the designated router on the segment 192.168.0.0/24?
A network administrator applies the following configuration to an IOS device.
What is the process of password checks when a login attempt is made to the device?
What is a benefit of a virtual machine when compared with a physical server?
Where is radio resource management performed in a cisco SD-access wireless solution?
An engineer plans to use Python to convert text files that contain device information lo JSON. Drag and drop the code snippets from the bottom onto the blanks in the code to construct the request. Not all options are used.
What is a characteristic of the Cisco DMA Center Template Editor feature?
Refer to the exhibit.
A network engineer issues the debug command while troubleshooting a network issue. What does the output confirm?
Which configuration filters out DOT1X messages in the format shown below from being sent toward Syslog server 10.15.20.33?
A)
B)
C)
D)
What is the result when an active route processor fails that combines NSF with SSO?
Which IP SLA operation requires the IP SLA responder to be configured on the remote end?
Which solution simplifies management ot secure access to network resources?
Which two results occur if Cisco DNA Center loses connectivity to devices in the SD-Access fabric? (Choose two)
Refer to the exhibit.
Both controllers are in the same mobility group. Which result occurs when client 1 roams between APs that are registered to different controllers in the same WLAN?
Which authorization framework gives third-party applications limited access to HTTP services?
Refer to the exhibit.
An engineer must assign an IP address of 192.168.1.1/24 to the GigabitEtherenet1 interface. Which two commands must be added to the existing configuration to accomplish this task? (Choose two.)
Which of the following fiber connector types is the most likely to be used on a network interface card?
A network administrator for a small office is adding a passive IDS to its network switch for the purpose of inspecting network traffic. Which of the following should the administrator use?
Simulation 02
Configure HSRP between DISTRO-SW1 and DISTRO-SW2 on VLAN 100 for hosts connected to ACCESS-SW1 to achieve these goals:
1. Configure group number 1 using the virtual IP address of 192.168.1.1/24.
2. Configure DlSTRO-SW1 as the active router using a priority value of 110 and DISTRO-SW2 as the standby router.
3. Ensure that DISTRO-SW2 will take over the active role when DISTRO-SW1 goes down, and when DISTRO-SW1 recovers, it automatically resumes the active role.
DISTRO-SW2
Refer to Ihe exhibit. An engineer must update the existing configuation to achieve these resu ts:
• Only administrators from the 192.168 1.0.'?4 subnet can access the vty lines.
* Access to the vty lines using clear-text protocols is prohibited.
Which command set should be appled?
A)
B)
C)
D)
Drag and drop the snippets onto the blanks within the code to create an EEM script that adds an entry to a locally stored text file with a timestamp when a configuration change is made. Not all options are used.
Refer to the exhibit.
Which configuration change ensures that R1 is the active gateway whenever it is in a functional state for the 172.30.110.0724 network?
A)
B)
C)
D)
Refer to the exhibit.
On which interfaces should VRRP commands be applied to provide first hop redundancy to PC-01 and PC-02?
Which DHCP option provides the CAPWAP APs with the address of the wireless controller(s)?
An engineer must enable a login authentication method that allows a user to log in by using local authentication if all other defined authentication methods fail Which configuration should be applied?
Why is an AP joining a different WLC than the one specified through option 43?
What is provided by the Stealthwatch component of the Cisco Cyber Threat Defense solution?
What occurs when a high bandwidth multicast stream is sent over an MVPN using Cisco hardware?
A customer requests a network design that supports these requirements:
Which protocol does the design include?
Refer to the exhibit Which single security feature is recommended to provide Network Access Control in the enterprise?
Which features does Cisco EDR use to provide threat detection and response protection?
What is a consideration when designing a Cisco SD-Access underlay network?
Refer to the exhibit.
Security policy requires all idle-exec sessions to be terminated in 600 seconds. Which configuration achieves this goal?
Refer to the exhibit. Rapid PVST+ is enabled on all switches. Which command set must be configured on switch1 to achieve the following results on port fa0/1?
A)
B)
C)
D)
Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel?
Which outbound access list, applied to the WAN interface of a router, permits all traffic except for http traffic sourced from the workstation with IP address 10.10.10.1?
A)
B)
C)
D)
Which measurement is used from a post wireless survey to depict the cell edge of the access points?
An engineer is troubleshooting the Ap join process using DNS. Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?
A server running Linux is providing support for virtual machines along with DNS and DHCP services for a small business. Which technology does this represent?
An engineer configures HSRP group 37. The configuration does not modify the default virtual MAC address. Which virtual MAC address does the group use?
An engineer is concerned with the deployment of new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements?
Refer to the exhibit. POSTMAN is showing an attempt to retrieve network device information from Cisco DNA Center API. What is the issue?
Refer to the exhibit. An engineer is configuring an EtherChannel between Switch1 and Switch2 and notices the console message on switch2. Based on the output, which action resolves this issue?
An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:
Which two statements does the engineer use to explain these values to the customer? (Choose two)
Which controller is capable of acting as a STUN server during the onboarding process of Edge devices?
Which congestion queuing method on Cisco IOS based routers uses four static queues?
Refer to the exhibit.
An engineer must deny Telnet traffic from the loopback interface of router R3 to the loopback interface of router R2 during the weekend hours. All other traffic between the loopback interfaces of routers R3 and R2 must be allowed at all times. Which command accomplish this task?
A)
B)
C)
D)
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
Which design principle slates that a user has no access by default to any resource, and unless a resource is explicitly granted, it should be denied?
Refer to the exhibit.
An engineer is troubleshooting a connectivity issue and executes a traceoute. What does the result confirm?
Refer to the exhibit. After configurating an IPsec VPN, an engineer enters the show command to verify the ISAKMP SA status. What does the status show?
Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial?
Refer to the exhibit. Which set of commands on router r R1 Allow deterministic translation of private hosts PC1, PC2, and PC3 to addresses in the public space?
A)
B)
C)
D)
What are two benefits of virtual switching when compared to hardware switching? (Choose two.)
Drag and drop the characteristics from the left onto the appropriate infrastructure deployment types on the right.
Which AP mode allows an engineer to scan configured channels for rogue access points?
Drag and drop the characteristics from the left onto the orchestration tools they describe on the right.
Refer to the exhibit. An engineer attempts to create a configuration to allow the Blue VRF to leak into the global routing table, but the configuration does not function as expected. Which action resolves this issue?
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
Refer to exhibit.
VLANs 50 and 60 exist on the trunk links between all switches All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server Which command ensures that SW3 receives frames only from VLAN 50?
Drag and drop the descriptions from the left onto the QoS components on the right.
Which AP mode allows an engineer to scan configured channels for rogue access points?
A customer has recently implemented a new wireless infrastructure using WLC-5520 at a site directly next to a large commercial airport. Users report that they intermittently lose WI-FI connectivity, and troubleshooting reveals it is due to frequent channel changes. Which two actions fix this issue? (Choose two)
Which LISP infrastructure device provides connectivity between non-sites and LISP sites by receiving non-LISP traffic with a LISP site destination?
Refer to the exhibit. Which configuration must be applied to ensure that the preferred path for traffic from AS 65010 toward AS 65020 uses the R2 to R4 path?
A)
B)
C)
D)
Refer to the exhibit.
The OSPF neighborship fails between two routers. What is the cause of this issue?
Which of the following should a junior security administrator recommend implementing to mitigate malicious network activity?
Which component transports data plane traffic across a Cisco SD-WAN network?
Refer to the exhibit.
Which configuration must be applied to the HQ router to set up a GRE tunnel between the HQ and BR routers?
A)
B)
C)
D)
An engineer is configuring Local WebAuth on a Cisco Wireless LAN Controller. According to RFC 5737, WHICH VIRTUAL IP address must be used in this configuration?
Refer to the exhibit. Which EEM script generates a critical-level syslog message and saves a copy of the running configuration to the bootflash when an administrator saves the running configuration to the startup configuration?
Refer to the exhibit. Which command set must be added to permit and log all traffic that comes from 172.20.10.1 in interface GigabitEthernet0/1 without impacting the functionality of the access list?
Which Python snippet should be used to store the devices data structure in a JSON file?
A)
B)
C)
D)
What is the recommended minimum SNR for data applications on wireless networks?
Refer to the exhibit. An attacker can advertise OSPF fake routes from 172.16.20.0 network to the OSPF domain and black hole traffic. Which action must be taken to avoid this attack and still be able to advertise this subnet into OSPF?
Reter to the exhibit.
An administrator troubleshoots intermittent connectivity from internal hosts to an external public server. Some internal hosts can connect to the server while others receive an ICMP Host Unreachable message and these hosts change over time. What is the cause of this issue?
Which two features does the Cisco SD-Access architecture add to a traditional campus network? (Choose two.)
Refer the exhibit.
Which configuration elects SW4 as the root bridge for VLAN 1 and puts G0/2 on SW2 into a blocking state?
A)
B)
C)
D)
Which protocol is implemented to establish secure control plane adjacencies between Cisco SD-WAN nodes?
An engineer must configure a new loopback Interface on a router and advertise the interface as a fa4 in OSPF. Which command set accomplishes this task?
A)
B)
C)
D)
Which option works with a DHCP server to return at least one WLAN management interface IP address during the discovery phase and is dependent upon the VCI of the AP?
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
Refer to the exhibit.
An engineer must configure an ERSPAN session with the remote end of the session 10.10.0.1. Which commands must be added to complete the configuration?
A)
B)
C)
D)
Refer to the exhibit.
An engineer must deny Telnet traffic from the loopback interface of router R3 to the Loopback interface of router R2 during, the weekend hours. All other traffic between the loopback interfaces of routers R3 and R2 must be allowed at all times Which command set accomplishes this task?
A)
B)
C)
D)
Refer to the exhibit.
How should the script be completed so that each device configuration is saved into a JSON-formatted file under the device name?
A)
B)
C)
D)
A network engineer is configuring OSPF on a router. The engineer wants to prevent having a route to 177.16.0.0/16 learned via OSPF. In the routing table and configures a prefix list using the command ip prefix-list OFFICE seq S deny 172.16.0.0/16. Winch two identical configuration commands must be applied to accomplish the goal? (Choose two.)
Which method displays text directly into the active console with a synchronous EEM applet policy?
Drag and drop the Cisco SD-Access solution areas from the left onto the protocols they use on the right.
Which configuration creates a CoPP policy that provides unlimited SSH access from dient 10.0.0.5 and denies access from all other SSH clients'?
A)
B)
C)
D)
Refer to The exhibit.
Assuming that R1 is a CE router, which VRF is assigned to Gi0/0 on R1?
Drag and drop the automation characteristics from the left onto the appropriate tools on the right.
An administrator is configuring NETCONF using the following XML string. What must the administrator end the request with?
Which two Cisco SD-Access components provide communication between traditional network elements and controller layer? (choose two)
Refer to the exhibit.
An engineer configures routing between all routers and must build a configuration to connect R1 to R3 via a GRE tunnel Which configuration must be applied?
A)
B)
C)
D)
Refer to the exhibit. An engineer must configure an eBGP neighborship to Router B on Router A. The network that is connected to GO/1 on Router A must be advertised to Router B. Which configuration should be applied?
A)
B)
C)
D)
Refer to the exhibit.
After configuring HSRP an engineer enters the show standby command. Which two facts are derived from the output? (Choose two.)
Refer to the exhibit. A network engineer troubleshoots an issue with the port channel between SW1 and SW2. which command resolves the issue?
A)
B)
C)
D)
Which two network problems Indicate a need to implement QoS in a campus network? (Choose two.)
What does Call Admission Control require the client to send in order to reserve the bandwidth?
When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required?