Summer Sale - Limited Time 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 5763r953

Welcome To DumpsPedia

350-401 Sample Questions Answers

Questions 4

Refer to the exhibit. Which configuration change will force BR2 to reach 209 165 201 0/27 via BR1?

Options:

A.

Set the weight attribute to 65.535 on BR1 toward PE1.

B.

Set the local preference to 150 on PE1 toward BR1 outbound

C.

Set the MED to 1 on PE2 toward BR2 outbound.

D.

Set the origin to igp on BR2 toward PE2 inbound.

Buy Now
Questions 5

After a redundant route processor failure occurs on a Layer 3 device, which mechanism allows for packets to be forwarded from a neighboring router based on the most recent tables?

Options:

A.

BFD

B.

RPVST+

C.

RP failover

D.

NSF

Buy Now
Questions 6

Which DHCP option helps lightweight APs find the IP address of a wireless LAN controller?

Options:

A.

Option 43

B.

Option 60

C.

Option 67

D.

Option 150

Buy Now
Questions 7

Which two mechanisms are available to secure NTP? (Choose two.)

Options:

A.

IP prefix list-based

B.

IPsec

C.

TACACS-based authentication

D.

IP access list-based

E.

Encrypted authentication

Buy Now
Questions 8

Drag and drop the descriptions from the left onto the QoS components on the right.

Options:

Buy Now
Questions 9

Refer to the exhibit. The connecting between SW1 and SW2 is not operational. Which two actions resolve the issue? (Choose two)

Options:

A.

configure switchport mode access on SW2

B.

configure switchport nonegotiate on SW2

C.

configure switchport mode trunk on SW2

D.

configure switchport nonegotiate on SW1

E.

configure switchport mode dynamic desirable on SW2

Buy Now
Questions 10

Refer to the exhibit. Which configuration must be applied to R to enable R to reach the server at 172.16.0.1?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 11

Refer to the exhibit.

An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as the exit point. Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplish task?

Options:

A.

R4(config-router)bgp default local-preference 200

B.

R3(config-router)neighbor 10.1.1.1 weight 200

C.

R3(config-router)bgp default local-preference 200

D.

R4(config-router)nighbor 10.2.2.2 weight 200

Buy Now
Questions 12

A customer has several small branches and wants to deploy a WI-FI solution with local management using CAPWAP. Which deployment model meets this requirement?

Options:

A.

Autonomous

B.

Mobility Express

C.

SD-Access wireless

D.

Local mode

Buy Now
Questions 13

Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?

Options:

A.

MACsec

B.

IPsec

C.

SSL

D.

Cisco Trustsec

Buy Now
Questions 14

Drag and drop the characteristics from the left onto the routing protocols they describe on the right.

Options:

Buy Now
Questions 15

What does the cisco DNA REST response indicate?

Options:

A.

Cisco DNA Center has the Incorrect credentials for cat3850-1

B.

Cisco DNA Center is unable to communicate with cat9000-1

C.

Cisco DNA Center has the incorrect credentials for cat9000-1

D.

Cisco DNA Center has the Incorrect credentials for RouterASR-1

Buy Now
Questions 16

Refer io me exhibit.

An engineer configures the trunk and proceeds to configure an ESPAN session to monitor VLANs10. 20. and 30. Which command must be added to complete this configuration?

Options:

A.

Device(config.mon.erspan.stc)# no filter vlan 30

B.

Devic(config.mon.erspan.src-dst)# no vrf 1

C.

Devic(config.mon.erspan.src-dst)# erspan id 6

D.

Device(config.mon-erspan.Src-dst)# mtu 1460

Buy Now
Questions 17

Drag and drop the LISP components on the left to their descriptions on the right. Not all options are used.

Options:

Buy Now
Questions 18

What is the calculation that is used to measure the radiated power of a signal after it has gone through the radio, antenna cable, and antenna?

Options:

A.

EIRP

B.

mW

C.

dBm

D.

dBi

Buy Now
Questions 19

What is the API keys option for REST API authentication?

Options:

A.

a predetermined string that is passed from client to server

B.

a one-time encrypted token

C.

a username that is stored in the local router database

D.

a credential that is transmitted unencrypted

Buy Now
Questions 20

Drag and drop the characteristics from the left onto the infrastructure deployment models on the right.

Options:

Buy Now
Questions 21

If the maximum power level assignment for global TPC 802.11a/n/ac is configured to 10 dBm, which power level effectively doubles the transmit power?

Options:

A.

13dBm

B.

14 dBm

C.

17dBm

D.

20 dBm

Buy Now
Questions 22

Refer to the exhibit.

An engineer must allow R1 to advertise the 192 168.1 0/24 network to R2 R1 must perform this action without sending OSPF packets to SW1 Which command set should be applied?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 23

Refer to the exhibit. A network administrator configured RSPAN to troubleshoot an issue between switch1 and switch2. The switches are connected using interface GigabitEthernet 1/1. An external packet capture device is connected is switch2 interface GigabitEthernet 1/2. Which two commands must be added to complete this configuration? (Choose two)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Buy Now
Questions 24

Refer to the exhibit. A network engineer must be notified when a user switches to configuration mode. Which script should be applied to receive an SNMP trap and a critical-level log message?

A)

B)

C)

D)

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Buy Now
Questions 25

An engineer has deployed a single Cisco 5520 WLC with a management IP address of 172.16.50.5/24. The engineer must register 50 new Cisco AIR-CAP2802I-E-K9 access points to the WLC using DHCP option 43. The access points are connected to a switch in VLAN 100 that uses the 172.16.100.0/24 subnet. The engineer has configured the DHCP scope on the switch as follows:

The access points are failing to join the wireless LAN controller. Which action resolves the issue?

Options:

A.

configure option 43 Hex F104.AC10.3205

B.

configure option 43 Hex F104.CA10.3205

C.

configure dns-server 172.16.50.5

D.

configure dns-server 172.16.100.1

Buy Now
Questions 26

Drag and drop the characteristics from the left to the table types on the right.

Options:

Buy Now
Questions 27

How does the RIB differ from the FIB?

Options:

A.

The RIB is used to create network topologies and routing tables. The FIB is a list of routes to particular network destinations.

B.

The FIB includes many routes a single destination. The RIB is the best route to a single destination.

C.

The RIB includes many routes to the same destination prefix. The FIB contains only the best route

D.

The FIB maintains network topologies and routing tables. The RIB is a Iist of routes to particular network destinations.

Buy Now
Questions 28

Refer to the exhibit.

An engineer must set up connectivity between a campus aggregation layer and a branch office access layer. The engineer uses dynamic trunking protocol to establish this connection, however, management traffic on VLAN1 is not passing. Which action resolves the issue and allow communication for all configured VLANs?

Options:

A.

Allow all VLANs on the trunk links

B.

Disable Spanning Tree for the native VLAN.

C.

Configure the correct native VLAN on the remote interface

D.

Change both interfaces to access ports.

Buy Now
Questions 29

Refer to the exhibit.

Which commands are required to allow SSH connection to the router?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 30

Which benefit is provided by the Cisco DNA Center telemetry feature?

Options:

A.

provides improved network security

B.

inventories network devices

C.

aids In the deployment network configurations

D.

improves the user experience

Buy Now
Questions 31

What is a characteristic of a type 2 hypervisor?

Options:

A.

ideal for data center

B.

complicated deployment

C.

ideal for client/end-user system

D.

referred to as bare-metal

Buy Now
Questions 32

Which three methods does Cisco DNA Centre use to discover devices? (Choose three)

Options:

A.

CDP

B.

SNMP

C.

LLDP

D.

ping

E.

NETCONF

F.

a specified range of IP addresses

Buy Now
Questions 33

Refer to the exhibit.

Which command set is needed to configure and verify router R3 to measure the response time from router R3 to the file server located in the data center?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 34

Which method displays text directly into the active console with a synchronous EEM applet policy?

Options:

A.

event manager applet boom

event syslog pattern 'UP'

action 1.0 gets 'logging directly to console'

B.

event manager applet boom

event syslog pattern 'UP'

action 1.0 syslog priority direct msg 'log directly to console'

C.

event manager applet boom

event syslog pattern 'UP'

action 1.0 puts 'logging directly to console'

D.

event manager applet boom

event syslog pattern 'UP'

action 1.0 string 'logging directly to console'

Buy Now
Questions 35

Refer to the exhibit. Which command set must be added to permit and log all traffic that comes from 172.20.10.1 in interface GigabitEthernet0/1 without impacting the functionality of the access list?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 36

Refer to the exhibit.

What are two effect of this configuration? (Choose two.)

Options:

A.

Inside source addresses are translated to the 209.165.201.0/27 subnet.

B.

It establishes a one-to-one NAT translation.

C.

The 10.1.1.0/27 subnet is assigned as the inside global address range.

D.

The 209.165.201.0/27 subnet is assigned as the outside local address range.

E.

The 10.1.1.0/27 subnet is assigned as the inside local addresses.

Buy Now
Questions 37

What does the number in an NTP stratum level represent?

Options:

A.

The number of hops it takes to reach the master time server.

B.

The number of hops it takes to reach the authoritative time source.

C.

The amount of offset between the device clock and true time.

D.

The amount of drift between the device clock and true time.

Buy Now
Questions 38

Which protocol is responsible for data plane forwarding in a Cisco SD-Access deployment?

Options:

A.

VXLAN

B.

IS-IS

C.

OSPF

D.

LISP

Buy Now
Questions 39

Which protocol is implemented to establish secure control plane adjacencies between Cisco SD-WAN nodes?

Options:

A.

IKF

B.

TLS

C.

IPsec

D.

ESP

Buy Now
Questions 40

What is one main REST security design principle?

Options:

A.

separation of privilege

B.

password hashing

C.

confidential algorithms

D.

OAuth

Buy Now
Questions 41

Which function does a fabric wireless LAN controller perform In a Cisco SD-Access deployment?

Options:

A.

manages fabric-enabled APs and forwards client registration and roaming information to the Control Plane Node

B.

coordinates configuration of autonomous nonfabric access points within the fabric

C.

performs the assurance engine role for both wired and wireless clients

D.

is dedicated to onboard clients in fabric-enabled and nonfabric-enabled APs within the fabric

Buy Now
Questions 42

What is one characteristic of the Cisco SD-Access control plane?

Options:

A.

It is based on VXLAN technology.

B.

Each router processes every possible destination and route

C.

It allows host mobility only in the wireless network.

D.

It stores remote routes in a centralized database server

Buy Now
Questions 43

Refer to the exhibit. Which action completes the configuration to achieve a dynamic continuous mapped NAT for all users?

Options:

A.

Configure a match-host type NAT pool

B.

Reconfigure the pool to use the 192.168 1 0 address range

C.

Increase the NAT pool size to support 254 usable addresses

D.

Configure a one-to-one type NAT pool

Buy Now
Questions 44

What is the centralized control policy in a Cisco SD-WAN deployment?

Options:

A.

list of ordered statements that define user access policies

B.

set of statements that defines how routing is performed

C.

set of rules that governs nodes authentication within the cloud

D.

list of enabled services for all nodes within the cloud

Buy Now
Questions 45

Refer to the exhibit.

An engineer must deny Telnet traffic from the loopback interface of router R3 to the loopback interface of router R2 during the weekend hours. All other traffic between the loopback interfaces of routers R3 and R2 must be allowed at all times. Which command accomplish this task?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 46

Refer to the exhibit. Communication between London and New York is down. Which command set must be applied to the NewYork switch to resolve the issue?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 47

How does Cisco Trustsec enable more access controls for dynamic networking

environments and data centers?

Options:

A.

classifies traffic based on advanced application recognition

B.

uses flexible NetFlow

C.

classifies traffic based on the contextual identity of the endpoint rather than its IP

address correct

D.

assigns a VLAN to the endpoint

Buy Now
Questions 48

Drag and drop the characteristics from the left onto the routing protocols they describe on the right.

Options:

Buy Now
Questions 49

In a Cisco SD-Access solution, what is the role of the Identity Services Engine?

Options:

A.

It is leveraged for dynamic endpoint to group mapping and policy definition.

B.

It provides GUI management and abstraction via apps that share context.

C.

it is used to analyze endpoint to app flows and monitor fabric status.

D.

It manages the LISP EID database.

Buy Now
Questions 50

Which command must be applied to R2 for an OSPF neighborship to form?

Options:

A.

network 20.1.1.2.0.0.0.0 area 0

B.

network 20.1.1.2 255.255.0.0. area 0

C.

network 20.1.1.2.0.0.255.255 area 0

D.

network 20.1.1.2 255.255.255 area 0

Buy Now
Questions 51

What is the function of a VTEP in VXLAN?

Options:

A.

provide the routing underlay and overlay for VXLAN headers

B.

dynamically discover the location of end hosts in a VXLAN fabric

C.

encapsulate and de-encapsulate traffic into and out of the VXLAN fabric

D.

statically point to end host locations of the VXLAN fabric

Buy Now
Questions 52

Refer to the exhibit. What is the effect of this configuration?

Options:

A.

When users attempt to connect to vty lines 0 through 4, the device will authenticate them against TACACS+ if local authentication fails

B.

The device will authenticate all users connecting to vty lines 0 through 4 against TACACS+

C.

The device will allow users at 192.168.0.202 to connect to vty lines 0 through 4 using the password ciscotestkey

D.

The device will allow only users at 192.166.0.202 to connect to vty lines 0 through 4

Buy Now
Questions 53

Refer to the exhibit. POSTMAN is showing an attempt to retrieve network device information from Cisco DNA Center API. What is the issue?

Options:

A.

The URI string is incorrect

B.

The token has expired.

C.

Authentication has failed

D.

The JSON payload contains the incorrect UUID

Buy Now
Questions 54

Refer to the exhibit Drag and drop the snippets into the RESTCONF request to form the request that returns this response Not all options are used

Options:

Buy Now
Questions 55

Refer to the exhibit. What does the error message relay to the administrator who is trying to configure a Cisco IOS device?

Options:

A.

A NETCONF request was made for a data model that does not exist.

B.

The device received a valid NETCONF request and serviced it without error.

C.

A NETCONF message with valid content based on the YANG data models was made, but the request failed.

D.

The NETCONF running datastore is currently locked.

Buy Now
Questions 56

At which Layer does Cisco DNA Center support REST controls?

Options:

A.

EEM applets or scripts

B.

Session layer

C.

YMAL output from responses to API calls

D.

Northbound APIs

Buy Now
Questions 57

An engineer is troubleshooting the Ap join process using DNS. Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?

Options:

A.

wlcbostname.domain.com

B.

cisco-capwap-controller.domain.com

C.

ap-manager.domain.com

D.

primary-wlc.domain.com

Buy Now
Questions 58

Refer to the exhibit.

After configuring the BGP network, an engineer verifies that the path between Servers and Server2 Is functional. Why did RouterSF choose the route from RouterDAL instead of the route from RouterCHI?

Options:

A.

The Router-ID Tor Router DAL is lower than the Roter-ID for RouterCHI.

B.

The route from RouterOAL has a lower MED.

C.

BGP is not running on RouterCHI.

D.

There is a static route in RouterSF for 10.0.0.0/24.

Buy Now
Questions 59

Refer to the exhibit .

Which command must be configured for RESTCONF to operate on port 8888?

Options:

A.

ip http port 8888

B.

restconf port 8888

C.

ip http restconf port 8888

D.

restconf http port 8888

Buy Now
Questions 60

Refer to the exhibit. What is achieved by this code?

Options:

A.

It unshuts the loopback interface

B.

It renames the loopback interface

C.

It deletes the loopback interface

D.

It displays the loopback interface

Buy Now
Questions 61

In a Cisco SD-Access wireless architecture which device manages endpoint ID to edge node bindings?

Options:

A.

fabric control plane node

B.

fabric wireless controller

C.

fabric border node

D.

fabric edge node

Buy Now
Questions 62

By default, which virtual MAC address does HSRP group 14 use?

Options:

A.

04.16.19.09.4c.0e

B.

00:05:5e:19:0c:14

C.

00:05:0c:07:ac:14

D.

00:00:0c:07:ac:0e

Buy Now
Questions 63

Refer to the exhibit.

Object tracking has been configured for VRRP-enabled routers Edge-01 and Edge-02 Which commands cause Edge-02 to preempt Edge-01 in the event that interface G0/0 goes down on Edge-01?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 64

Refer to the exhibit.

The administrator troubleshoots an EtherChannel that keeps moving to err-disabled. Which two actions must be taken to resolve the issue? (Choose two.)

Options:

A.

Reload the switch to force EtherChannel renegotiation

B.

Ensure that interfaces Gi1/0/2 and Gi1/0/3 connect to the same neighboring switch.

C.

Ensure that the switchport parameters of Port channel1 match the parameters of the port channel on the neighbor switch

D.

Ensure that the corresponding port channel interface on the neighbor switch is named Port-channel1.

E.

Ensure that the neighbor interfaces of Gi1/0/2 and Gi/0/3 are configured as members of the same EtherChannel

Buy Now
Questions 65

A system must validate access rights to all its resources and must not rely on a cached permission matrix. If the access level to a given resource is revoked but is not reflected in the permission matrix, the security is violated. Which term refers to this REST security design principle?

Options:

A.

economy of mechanism

B.

complete mediation

C.

separation of privilege

D.

least common mechanism

Buy Now
Questions 66

Refer the exhibit.

Which router is the designated router on the segment 192.168.0.0/24?

Options:

A.

This segment has no designated router because it is a nonbroadcast network type.

B.

This segment has no designated router because it is a p2p network type.

C.

Router Chicago because it has a lower router ID

D.

Router NewYork because it has a higher router ID

Buy Now
Questions 67

Refer to the exhibit.

An engineer must create a configuration that executes the show run command and then terminates the session when user CCNP legs in. Which configuration change is required?

Options:

A.

Add the access-class keyword to the username command

B.

Add the access-class keyword to the aaa authentication command

C.

Add the autocommand keyword to the username command

D.

Add the autocommand keyword to the aaa authentication command

Buy Now
Questions 68

Which JSON syntax is valid?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 69

What are two differences between the RIB and the FIB? (Choose two.)

Options:

A.

The FIB is derived from the data plane, and the RIB is derived from the FIB.

B.

The RIB is a database of routing prefixes, and the FIB is the Information used to choose the egress interface for each packet.

C.

FIB is a database of routing prefixes, and the RIB is the information used to choose the egress interface for each packet.

D.

The FIB is derived from the control plane, and the RIB is derived from the FIB.

E.

The RIB is derived from the control plane, and the FIB is derived from the RIB.

Buy Now
Questions 70

What is a characteristic of MACsec?

Options:

A.

802.1AE provides encryption and authentication services

B.

802.1AE is bult between the host and switch using the MKA protocol, which negotiates encryption keys based on the master session key from a successful 802.1X session

C.

802.1AE is bult between the host and switch using the MKA protocol using keys generated via the Diffie-Hellman algorithm (anonymous encryption mode)

D.

802.1AE is negotiated using Cisco AnyConnect NAM and the SAP protocol

Buy Now
Questions 71

Which outbound access list, applied to the WAN interface of a router, permits all traffic except for http traffic sourced from the workstation with IP address 10.10.10.1?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 72

Refer to the exhibit.

The IP SLA is configured in a router. An engineer must configure an EEM applet to shut down the interface and bring it back up when there is a problem with the IP SLA. Which configuration should the engineer use?

Options:

A.

event manager applet EEM_IP_SLA

event track 10 state down

B.

event manager applet EEM_IP_SLA

event track 10 state unreachable

C.

event manager applet EEM_IP_SLA

event sla 10 state unreachable

D.

event manager applet EEM_IP_SLA

event sla 10 state down

Buy Now
Questions 73

Refer to the exhibit. An engineer must create a script that appends the output of the show process cpu sorted command to a file.

Options:

A.

action 4.0 syslog command “show process cpu sorted | append flash:high-cpu-file”

B.

action 4.0 publish-event “show process cpu sorted | append flash:high-cpu-file”

C.

action 4.0 ens-event “show process cpu sorted | append flash:high-cpu-file”

D.

action 4.0 cli command “show process cpu sorted | append flash:high-cpu-file”

Buy Now
Questions 74

While configuring an IOS router for HSRP with a virtual IP of 10 1.1.1. an engineer sees this log message.

Which configuration change must the engineer make?

Options:

A.

Change the HSRP group configuration on the local router to 1.

B.

Change the HSRP virtual address on the local router to 10.1.1.1.

C.

Change the HSRP virtual address on the remote router to 10.1.1.1.

D.

Change the HSRP group configuration on the remote router to 1.

Buy Now
Questions 75

Which LISP component is required for a LISP site to communicate with a non-LISP site?

Options:

A.

ETR

B.

ITR

C.

Proxy ETR

D.

Proxy ITR

Buy Now
Questions 76

Which congestion queuing method on Cisco IOS based routers uses four static queues?

Options:

A.

Priority

B.

custom

C.

weighted fair

D.

low latency

Buy Now
Questions 77

What is used to perform OoS packet classification?

Options:

A.

the Options field in the Layer 3 header

B.

the Type field in the Layer 2 frame

C.

the Flags field in the Layer 3 header

D.

the TOS field in the Layer 3 header

Buy Now
Questions 78

Refer to the exhibit. An engineer is configuring an EtherChannel between Switch1 and Switch2 and notices the console message on switch2. Based on the output, which action resolves this issue?

Options:

A.

Configure less member ports on Switch2.

B.

Configure the same port channel interface number on both switches

C.

Configure the same EtherChannel protocol on both switches

D.

Configure more member ports on Switch1.

Buy Now
Questions 79

When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?

Options:

A.

logging host 10.2.3.4 vrf mgmt transport tcp port 6514

B.

logging host 10.2.3.4 vrf mgmt transport udp port 6514

C.

logging host 10.2.3.4 vrf mgmt transport tcp port 514

D.

logging host 10.2.3.4 vrf mgmt transport udp port 514

Buy Now
Questions 80

What is the output of this code?

Options:

A.

username Cisco

B.

get_credentials

C.

username

D.

CISCO

Buy Now
Questions 81

In an SD-Access solution what is the role of a fabric edge node?

Options:

A.

to connect external Layer 3- network to the SD-Access fabric

B.

to connect wired endpoint to the SD-Access fabric

C.

to advertise fabric IP address space to external network

D.

to connect the fusion router to the SD-Access fabric

Buy Now
Questions 82

In cisco SD_WAN, which protocol is used to measure link quality?

Options:

A.

OMP

B.

BFD

C.

RSVP

D.

IPsec

Buy Now
Questions 83

Refer to the exhibit.

An engineer entered the command no spanning-tree bpduguard enable on interface Fa 1/0/7. What is the effect of this command on Fa 1/0/7?

Options:

A.

It remains in err-disabled state until the shutdown/no shutdown command is entered in the interface configuration mode.

B.

It remains in err-disabled state until the errdisable recovery cause failed-port-state command is entered in the global configuration mode.

C.

It remains in err-disabled state until the no shutdown command is entered in the interface configuration mode.

D.

It remains in err-disabled state until the spanning-tree portfast bpduguard disable command is entered in the interface configuration mode.

Buy Now
Questions 84

Which configuration creates a CoPP policy that provides unlimited SSH access from dient 10.0.0.5 and denies access from all other SSH clients'?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 85

Refer to the exhibit.

A network engineer must configure the router to use the ISE-Servers group for authentication. If both ISE servers are unavailable, the local username database must be used. If no usernames are defined in the configuration, then the enable password must be the last resort to log in. Which configuration must be applied to achieve this result?

Options:

A.

aaa authentication login default group ISE-Servers local enable

B.

aaa authentication login default group enable local ISE-Servers

C.

aaa authorization exec default group ISE-Servers local enable

D.

aaa authentication login error-enable

aaa authentication login default group enable local ISE-Servers

Buy Now
Questions 86

An administrator is configuring NETCONF using the following XML string. What must the administrator end the request with?

Options:

A.

]]>]]>

B.

C.

D.

Buy Now
Questions 87

Refer to the exhibit.

Which command set must be applied on R1 to establish a BGP neighborship with R2 and to allow communication from R1 to reach the networks?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 88

Refer to the exhibit. An engineer tries to log in to router R1. Which configuration enables a successful login?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 89

An engineer must configure an EXEC authorization list that first checks a AAA server then a local username. If both methods fail, the user is denied. Which configuration should be applied?

Options:

A.

aaa authorization exec default local group tacacs+

B.

aaa authorization exec default local group radius none

C.

aaa authorization exec default group radius local none

D.

aaa authorization exec default group radius local

Buy Now
Questions 90

A company requires a wireless solution to support its mam office and multiple branch locations. All sites have local Internet connections and a link to the main office lor corporate connectivity. The branch offices are managed centrally. Which solution should the company choose?

Options:

A.

Cisco United Wireless Network

B.

Cisco DNA Spaces

C.

Cisco Catalyst switch with embedded controller

D.

Cisco Mobility Express

Buy Now
Questions 91

What is a characteristics of traffic policing?

Options:

A.

lacks support for marking or remarking

B.

must be applied only to outgoing traffic

C.

can be applied in both traffic directions

D.

queues out-of-profile packets until the buffer is full

Buy Now
Questions 92

Options:

A.

S2 is configured as LACP. Change the channel group mode to passive

B.

S2 is configured with PAgP. Change the channel group mode to active.

C.

S1 is configured with LACP. Change the channel group mode to on

D.

S1 is configured as PAgP. Change the channel group mode to desirable

Buy Now
Questions 93

What is one benefit of adopting a data modeling language?

Options:

A.

augmenting management process using vendor centric actions around models

B.

refactoring vendor and platform specific configurations with widely compatible configurations

C.

augmenting the use of management protocols like SNMP for status subscriptions

D.

deploying machine-friendly codes to manage a high number of devices

Buy Now
Questions 94

Drag anti drop the characteristics from the ten onto the configuration models on the right.

Options:

Buy Now
Questions 95

A Cisco DNA Center REST API sends a PUT to the /dna/intent/api/v1/network-device endpoint A response code of 504 is received What does the code indicate?

Options:

A.

The response timed out based on a configured interval

B.

The user does not have authorization to access this endpoint.

C.

The username and password are not correct

D.

The web server is not available

Buy Now
Questions 96

What is an OVF?

Options:

A.

a package that is similar to an IMG and that contains an OVA file used to build a virtual machine

B.

an alternative form of an ISO that Is used to install the base operating system of a virtual machine

C.

the third step in a P2V migration

D.

a package of files that is used to describe a virtual machine or virtual appliance

Buy Now
Questions 97

What is a TLOC in a Cisco SD-WAN deployment?

Options:

A.

value that identifies a specific tunnel within the Cisco SD-WAN overlay

B.

identifier that represents a specific service offered by nodes within the Cisco SD-WAN overlay

C.

attribute that acts as a next hop for network prefixes

D.

component set by the administrator to differentiate similar nodes that offer a common service

Buy Now
Questions 98

Which benefit is realized by implementing SSO?

Options:

A.

IP first-hop redundancy

B.

communication between different nodes for cluster setup

C.

physical link redundancy

D.

minimal network downtime following an RP switchover

Buy Now
Questions 99

Which resource is able to be shared among virtual machines deployed on the same physical server?

Options:

A.

applications

B.

disk

C.

VM configuration file

D.

operating system

Buy Now
Questions 100

Which option works with a DHCP server to return at least one WLAN management interface IP address during the discovery phase and is dependent upon the VCI of the AP?

Options:

A.

Option 42

B.

Option 15

C.

Option 125

D.

Option 43

Buy Now
Questions 101

By default, which virtual MAC address Goes HSRP group 25 use?

Options:

A.

05:5c:5e:ac:0c:25

B.

04:16:6S:96:1C:19

C.

00:00:0c:07:ac:19

D.

00:00:0c:07:ac:25

Buy Now
Questions 102

A large campus network has deployed two wireless LAN controllers to manage the wireless network. WLC1 and WLC2 have been configured as mobility peers. A client device roams from AP1 on WLC1 to AP2 on WLC2, but the controller's client interfaces are on different VLANs. How do the wireless LAN controllers handle the inter-subnet roaming?

Options:

A.

WLC1 marks me diem with an anchor entry In Its own database. The database entry is copied to the new controller and marked with a foreign entry on VVLC2.

B.

WLC2 marks the client with an anchor entry In Its own database. The database entry Is copied to the new controller and marked with a foreign entry on WLC1

C.

WLCl marks the client with a foreign entry in its own database. The database entry is copied to the new controller and marked with an anchor entry on WLC2.

D.

WLC2 marks the client with a foreign entry In its own database. The database entry Is copied to the new controller and marked with an anchor entry on WLC1.

Buy Now
Questions 103

How do EIGRP metrics compare to OSPF metrics?

Options:

A.

EIGRP metrics are based on a combination of bandwidth and packet loss, and OSPF metrics are based on interface bandwidth.

B.

EIGRP uses the Dijkstra algorithm, and OSPF uses The DUAL algorithm

C.

The EIGRP administrative distance for external routes is 170. and the OSPF administrative distance for external routes is undefined

D.

The EIGRP administrative distance for external routes is 170. and the OSPF administrative distance for external routes is 110

Buy Now
Questions 104

Refer to the exhibit. Which EEM script generates a critical-level syslog message and saves a copy of the running configuration to the bootflash when an administrator saves the running configuration to the startup configuration?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 105

Which type of tunnel Is required between two WLCs to enable Intercontroller roaming?

Options:

A.

mobility

B.

LWAPP

C.

CAPWAP

D.

iPsec

Buy Now
Questions 106

Refer to the exhibit. What is generated by the script?

Options:

A.

the cdp neighbors

B.

the routing table

C.

the router processes

D.

the running configuration

Buy Now
Questions 107

Reter to the exhibit.

An administrator troubleshoots intermittent connectivity from internal hosts to an external public server. Some internal hosts can connect to the server while others receive an ICMP Host Unreachable message and these hosts change over time. What is the cause of this issue?

Options:

A.

The translator does not use aOdress overloading

B.

The NAT ACL does not match alt internal hosts

C.

The NAT ACL and NAT pool share the same name

D.

The NAT pool netmask rs excessively wide

Buy Now
Questions 108

Which two features does the Cisco SD-Access architecture add to a traditional campus network? (Choose two.)

Options:

A.

software-defined segmentation

B.

private VLANs

C.

SD-WAN

D.

modular QoS

E.

identity services

Buy Now
Questions 109

Which feature Is used to propagate ARP broadcast, and link-local frames across a Cisco SD-Access fabric to address connectivity needs for silent hosts that require reception of traffic to start communicating?

Options:

A.

Native Fabric Multicast

B.

Layer 2 Flooding

C.

SOA Transit

D.

Multisite Fabric

Buy Now
Questions 110

What Is the difference between the MAC address table and TCAM?

Options:

A.

The MAC address table supports partial matches. TCAM requires an exact match.

B.

The MAC address table is contained in TCAM ACL and QoS information is stored in CAM.

C.

Router prefix lookups happen in TCAM. MAC address table lookups happen In CAM.

D.

TCAM is used to make L2 forwarding decisions. CAM is used to build routing tables

Buy Now
Questions 111

Refer to The exhibit.

Assuming that R1 is a CE router, which VRF is assigned to Gi0/0 on R1?

Options:

A.

VRF VFN_A

B.

VRF VPN_B

C.

management VRF

D.

default VRF

Buy Now
Questions 112

Refer to the exhibit.

Which configuration must be applied to the HQ router to set up a GRE tunnel between the HQ and BR routers?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 113

Refer to the exhibit.

Which statement is needed to complete the EEM applet and use the Tel script to store the backup file?

Options:

A.

action 2.0 cli command "write_backup.tcl tcl"

B.

action 2.0 cli command "flash:write_backup.tcl"

C.

action 2.0 cli command "write_backup.tcl"

D.

action 2.0 cli command "telsh flash:write_backup.tcl"

Buy Now
Questions 114

A network administrator is preparing a Python scrip to configure a Cisco IOS XE-based device on the network. The administrator is worried that colleagues will make changes to the device while the script is running. Which operation of he in client manager prevent colleague making changes to the device while the scrip is running?

Options:

A.

m.lock(config=’running’)

B.

m.lock(target=’running’)

C.

m.freeze(target=’running’)

D.

m.freeze(config=’running’)

Buy Now
Questions 115

What are two characteristics of Cisco SD-Access elements? (Choose two.)

Options:

A.

The border node is required for communication between fabric and nonfabric devices.

B.

Traffic within the fabric always goes through the control plane node.

C.

Fabric endpoints are connected directly to the border node.

D.

The control plane node has the full RLOC-to-EID mapping database.

E.

The border node has the full RLOC-to-EID mapping database.

Buy Now
Questions 116

Which two methods are used to assign security group tags to the user in a Cisco Trust Sec architecture? (Choose two )

Options:

A.

modular QoS

B.

policy routing

C.

web authentication

D.

DHCP

E.

IEEE 802.1x

Buy Now
Questions 117

Which router is elected the IGMP Querier when more than one router is in the same LAN segment?

Options:

A.

The router with the shortest uptime

B.

The router with the lowest IP address

C.

The router with the highest IP address

D.

The router with the longest uptime

Buy Now
Questions 118

Refer to the exhibit.

The WLC administrator sees that the controller to which a roaming client associates has Mobility Role Anchor configured under Clients > Detail. Which type of roaming is supported?

Options:

A.

Indirect

B.

Layer 3 intercontroller

C.

Layer 2 intercontroller

D.

Intracontroller

Buy Now
Questions 119

Refer to the exhibit.

An engineer configures a trunk between SW1 and SW2 but tagged packets are not passing. Which action fixes the issue?

Options:

A.

Configure SW1 with dynamic auto mode on interface FastEthernet0/1.

B.

Configure the native VLAN to be the same VLAN on both switches on interface FastEthernet0/1.

C.

Configure SW2 with encapsulation dot1q on interface FastEthernet0/1.

D.

Configure FastEthernet0/1 on both switches for static trunking.

Buy Now
Questions 120

By default, which virtual MAC address does HSRP group 12 use?

Options:

A.

00 5e0c:07:ac:12

B.

05:44:33:83:68:6c

C.

00:00:0c:07:ac:0c

D.

00:05:5e:00:0c:12

Buy Now
Questions 121

Refer to the exhibit. What is printed to the console when this script is run?

Options:

A.

a key-value pair in tuple type

B.

a key-value pair in list type

C.

a key-value pair in string type

D.

an error

Buy Now
Questions 122

Drag and drop the code snippets from the bottom onto the blanks in the Python script to print the device model to the screen and write JSON data to a file Not all options are used

Options:

Buy Now
Questions 123

An engineer applies this EEM applet to a router:

What does the applet accomplish?

Options:

A.

It generates a syslog message every 600 seconds on the status of the specified MAC address.

B.

It checks the MAC address table every 600 seconds to see if the specified address has been learned.

C.

It compares syslog output to the MAC address table every 600 seconds and generates an event when there is a match.

D.

It compares syslog output to the MAC address table every 600 seconds and generates an event when no match is found.

Buy Now
Questions 124

How does Cisco Express Forwarding switching differ from process switching on Cisco devices?

Options:

A.

Cisco Express Forwarding switching uses adjacency tables built by the CDP protocol, and process switching uses the routing table.

B.

Cisco Express Forwarding switching uses dedicated hardware processors, and process switching uses the main processor.

C.

Cisco Express Forwarding swithing saves memory by storing adjacency tables in dedicated memory on the line cards, and process switching stores all tables in the main memory.

D.

Cisco Express Forwarding switching uses a proprietary protocol based on IS-IS for MAC address lookup, and process switching uses the MAC address table.

Buy Now
Questions 125

Refer to the exhibit.

Which action must be taken to configure a WLAN for WPA2-AES with PSK and allow only 802.l1r-capable clients to connect?

Options:

A.

Change Fast Transition to Adaptive Enabled and enable FT * PSK

B.

Enable Fast Transition and FT + PSK.

C.

Enable Fast Transition and PSK

D.

Enable PSK and FT + PSK.

Buy Now
Questions 126

An engineer is describing QoS to a client. Which two facts apply to traffic policing? (Choose two.)

Options:

A.

Policing adapts to network congestion by queuing excess traffic

B.

Policing should be performed as close to the destination as possible

C.

Policing drops traffic that exceeds the defined rate

D.

Policing typically delays the traffic, rather than drops it

E.

Policing should be performed as close to the source as possible

Buy Now
Questions 127

Which configuration enables a device to be configured via NETCONF over SSHv2?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 128

A customer has 20 stores located throughout a city. Each store has a single Cisco access point managed by a central WLC. The customer wants to gather analysis for users in each store. Which technique supports these requirements?

Options:

A.

angle of arrival

B.

hyperlocation

C.

trilateration

D.

presence

Buy Now
Questions 129

Which device is responsible for finding EID-to-RLOC mappings when traffic is sent to a LISP-capable site?

Options:

A.

map server

B.

map resolver

C.

ingress tunnel router

D.

egress tunnel router

Buy Now
Questions 130

When a DNS host record is configured for a new Cisco AireOS WLC, which hostname must be added to allow APs to successfully discover the WLC?

Options:

A.

CONTROLLER-CAPWAP-CISCO

B.

CISCO-CONTROLLER-CAPWAP

C.

CAPWAP-CISCO-CONTROLLER

D.

CISCO-CAPWAP-CONTROLLER

Buy Now
Questions 131

: 194

Refer to the exhibit.

Which type of antenna is shown on the radiation patterns?

Options:

A.

Yagi

B.

dipole

C.

patch

D.

omnidirectional

Buy Now
Questions 132

Refer to the exhibit. Which configuration set implements Control plane Policing for SSH and Telnet?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 133

Which device, in a LISP routing architecture, receives and de-encapsulates LISP traffic for endpoints within a LISP-capable site?

Options:

A.

MR

B.

ETR

C.

OMS

D.

ITR

Buy Now
Questions 134

Refer to the exhibit. What are two results of the NAT configuration? (Choose two.)

Options:

A.

Packets with a destination of 200.1.1.1 are translated to 10.1.1.1 or .2. respectively.

B.

A packet that is sent to 200.1.1.1 from 10.1.1.1 is translated to 209.165.201.1 on R1.

C.

R1 looks at the destination IP address of packets entering S0/0 and destined for inside hosts.

D.

R1 processes packets entering E0/0 and S0/0 by examining the source IP address.

E.

R1 is performing NAT for inside addresses and outside address.

Buy Now
Questions 135

Refer to the exhibit. An engineer is reaching network 172.16.10.0/24 via the R1-R2-R4 path. Which configuration forces the traffic to fake a path of R1-R3-R4?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 136

What is a characteristic of the Cisco DMA Center Template Editor feature?

Options:

A.

It facilitates software upgrades lo network devices from a central point.

B.

It facilitates a vulnerability assessment of the network devices.

C.

It provides a high-level overview of the health of every network device.

D.

It uses a predefined configuration through parameterized elements or variables.

Buy Now
Questions 137

What is the rose of the vSmart controller in a Cisco SD-WN environment?

Options:

A.

it performs authentication and authorization

B.

it manages the control plane.

C.

it is the centralized network management system

D.

it manages the data plane

Buy Now
Questions 138

What is the function of the fabric control plane node in a Cisco SD-Access deployment?

Options:

A.

It is responsible for policy application and network segmentation in the fabric

B.

It performs traffic encapsulation and security profiles enforcement in the fabric

C.

It holds a comprehensive database that tracks endpoints and networks in the fabric

D.

It provides integration with legacy nonfabric-enabled environments

Buy Now
Questions 139

Which two methods are used to interconnect two Cisco SD-Access Fabric sites? (Choose two.)

Options:

A.

SD-Access transit

B.

fabric interconnect

C.

wireless transit

D.

IP-based transit

E.

SAN transit

Buy Now
Questions 140

What does the destination MAC on the outer MAC header identify in a VXLAN packet?

Options:

A.

thee emote spine

B.

the next hop

C.

the leaf switch

D.

the remote switch

Buy Now
Questions 141

Refer to the exhibit.

What is output by this code?

Options:

A.

8 7 6 5

B.

-4 -5 -6 -7

C.

-1 -2-3-4

D.

4 5 6 7

Buy Now
Questions 142

Which authorization framework gives third-party applications limited access to HTTP services?

Options:

A.

iPsec

B.

Basic Auth

C.

GRE

D.

OAuth 2.0

Buy Now
Questions 143

What is a command-line tool for consuming REST APIs?

Options:

A.

Postman

B.

CURL

C.

Firefox

D.

Python requests

Buy Now
Questions 144

An engineer must protect the password for the VTY lines against over-the-shoulder attacks. Which configuration should be applied?

Options:

A.

service password-encryption

B.

username netadmin secret 9 $9$vFpMf8elb4RVV8$seZ/bDA

C.

username netadmin secret 7$1$42J36k33008Pyh4QzwXyZ4

D.

line vty 0 15 p3ssword XD822j

Buy Now
Questions 145

Drag and drop the characteristics from the left onto the deployment model on the right.

Options:

Buy Now
Questions 146

If AP power level is increased from 25 mW to 100 mW. what is the power difference in dBm?

Options:

A.

6 dBm

B.

14 dBm

C.

17 dBm

D.

20 dBm

Buy Now
Questions 147

Refer to the exhibit.

Why does the OSPF neighborship fail between the two interfaces?

Options:

A.

The IP subnet mask is not the same.

B.

There is a mismatch in the OSPF interface network type.

C.

The OSPF timers are different.

D.

The MTU is nor the same.

Buy Now
Questions 148

High bandwidth utilization is occurring on interface Gig0/1 of a router. An engineer must identify the flows that are consuming the most bandwidth. Cisco DNA Center is used as a flow exporter and is configured with the IP address 192.168.23.1 and UDP port 23000. Which configuration must be applied to set NetFlow data export and capture on the router?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 149

What mechanism does PIM use to forward multicast traffic?

Options:

A.

PIM sparse mode uses a pull model to deliver multicast traffic.

B.

PIM dense mode uses a pull model to deliver multicast traffic.

C.

PIM sparse mode uses receivers to register with the RP.

D.

PIM sparse mode uses a flood and prune model to deliver multicast traffic.

Buy Now
Questions 150

How do OSPF and EIGKP compare?

Options:

A.

OSPF and EIGRP us© the same administrative distance.

B.

Both OSPF and EIGRP use the concept of areas.

C.

EIGRP shows an known routes, and OSPF shows successor and feasible successor routes.

D.

EIGRP shows successor and feasible successor routes, and OSPF shows all known routes.

Buy Now
Questions 151

Refer to the exhibit. A network engineer Is troubleshooting an Issue with the file server based on reports of slow file transmissions. Which two commands or command sets are required. In switch SW1 to analyze the traffic from the file server with a packet analyzer? (Choose two.)

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 152

A script contains the statement "while loop != 999:" Which value terminates the loop?

Options:

A.

A value equal to 999.

B.

A value less than or equal to 999.

C.

A value not equal to 999.

D.

A value greater than or equal to 999.

Buy Now
Questions 153

Relet lo Ibe exhibit.

An ertgineer must modify the existing configuration so that R2 can take over as the primary router when serial interface 0/0.1 on R1 goes down. Whtch command must the engineer apply''

Options:

A.

R2W standby 100 track 26 decrement 10

B.

R2# standby 100 preempt

C.

R2# track 26 interface SerialWO.1 line-protocol

D.

R2# standby 100 priority 100

Buy Now
Questions 154

Witch two actions provide controlled Layer 2 network connectivity between virtual machines running on the same hypervisor? (Choose two.)

Options:

A.

Use a single trunk link to an external Layer2 switch.

B.

Use a virtual switch provided by the hypervisor.

C.

Use a virtual switch running as a separate virtual machine.

D.

Use a single routed link to an external router on stick.

E.

Use VXLAN fabric after installing VXLAN tunneling drivers on the virtual machines.

Questions 155

Company policy restricts VLAN 10 to be allowed only on SW1 and SW2. All other VLANs can be on all three switches. An administrator has noticed that VLAN 10 has propagated to SW3. Which configuration corrects the issue?

Options:

A.

SW1(config)#intgi1/1

SW1(config)#switchport trunk allowed vlan 1-9,11-4094

B.

SW2(config)#intgi1/2

SW2(config)#switchport trunk allowed vlan 10

C.

SW2(config)#int gi1/2

SW2(config)#switchport trunk allowed vlan 1-9,11-4094

D.

SWl(config)#intgi1/1

SW1(config)#switchport trunk allowed vlan 10

Buy Now
Questions 156

How does SSO work with HSRP to minimize network disruptions?

Options:

A.

It enables HSRP to elect another switch in the group as the active HSRP switch.

B.

It ensures fast failover in the case of link failure.

C.

It enables data forwarding along known routes following a switchover, white the routing protocol reconverges.

D.

It enables HSRP to failover to the standby RP on the same device.

Buy Now
Questions 157

Refer to the exhibit.

The server in DC2 is expecting traffic from the database in DC1 to use the source network of 10.50.250.0/24. The server sends the initial request. The inside global IP is configured for 10.50.250.1. What is the result of this configuration?

Options:

A.

Only the server can initiate communication.

B.

The server and the database cannot communicate.

C.

The server and the database can initiate communication.

D.

Only the database can initiate communication

Buy Now
Questions 158

What is a characteristics of traffic shaping?

Options:

A.

can be applied in both traffic direction

B.

queues out-of-profile packets until the buffer is full

C.

drops out-of-profile packets

D.

causes TCP retransmits when packet are dropped

Buy Now
Questions 159

Based on the router's API output In JSON format below, which Python code will display the value of the 'role' key?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 160

Drag and drop the characteristics from the left onto the architectures on the right.

Options:

Buy Now
Questions 161

Refer to the exhibit.

Which two commands ensure that DSW1 becomes root bridge for VLAN 10 and 20?

Options:

A.

spanning-tree mst 1 priority 1

B.

spanning-tree mst 1 root primary

C.

spanning-tree mstp vlan 10,20 root primary

D.

spanning-tree mst vlan 10,20 priority root

E.

spanning-tree mst 1 priority 4096

Buy Now
Questions 162

Refer to the exhibit.

An engineer must send the 172.16.2.0 /24 user traffic to a packet capture tool to troubleshoot an issue. Which action completes the configuration?

Options:

A.

Encrypt the traffic between the users and the monitoring servers.

B.

Disable the spanning tree protocol on the monitoring server VLAN.

C.

Enable the Cisco Discovery Protocol on the server interfaces.

D.

Define the remote span VLAN on SW1 and SW2.

Buy Now
Questions 163

What is one characteristic of VXLAN?

Options:

A.

It supports a maximum of 4096 VLANs.

B.

It supports multitenant segments.

C.

It uses STP to prevent loops in the underlay network.

D.

It uses the Layer 2 header to transfer packets through the network underlay.

Buy Now
Questions 164

Refer to the exhibit.

What happens to access interfaces where VLAN 222 is assigned?

Options:

A.

STP BPDU guard is enabled

B.

A description "RSPAN" is added.

C.

They are placed into an inactive state.

D.

They cannot provide PoE.

Buy Now
Questions 165

Which two results occur if Cisco DNA Center loses connectivity to devices in the SD-Access fabric? (Choose two)

Options:

A.

Cisco DNA Center is unable to collect monitoring data in Assurance.

B.

All devices reload after detecting loss of connection to Cisco DNA Center.

C.

Already connected users are unaffected, but new users cannot connect

D.

Users lose connectivity.

E.

User connectivity is unaffected.

Buy Now
Questions 166

Refer to the exhibit. Which two configurations enable R1 and R2 to advertise routes into OSPF? (Choose two)

A)

B)

C)

D)

E)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E) Option E

Buy Now
Questions 167

An engineer must implement a configuration to allow a network administrator to connect to the console port of a router and authenticate over the network. Which command set should the engineer use?

Options:

A.

aaa new-model

aaa authentication login default enable

B.

aaa new-model

aaa authentication login console local

C.

aaa new-model aaa authentication login console group radius

D.

aaa new-model

aaa authentication enable default

Buy Now
Questions 168

Refer to the exhibit. Clients report that they cannot connect to this SSID using the provided PSK. Which action will resolve this issue?

Options:

A.

Apply the correct interface to this WLAN.

B.

Apply the changes this SSID.

C.

Select the PSK under authentication key management.

D.

Define the correct Radio Policy.

Buy Now
Questions 169

Refer to the exhibit. An engineer attempts to configure standby group 512 on interface GigabitEthernet0/1, but the configuration is not accepted. Which command resolves this problem?

Options:

A.

standby version 2

B.

standby 512 preempt

C.

standby redirects

D.

standby 512 priority 100

Buy Now
Questions 170

A technician needs to find the MAC address of a connecting router. Which of the following commands should the technician use?

Options:

A.

arp

B.

traceroute

C.

nslookup

D.

ping

Buy Now
Questions 171

Which two new security capabilities are introduced by using a next-generation firewall at the Internet edge? (Choose two.)

Options:

A.

DVPN

B.

NAT

C.

stateful packet inspection

D.

application-level inspection

E.

integrated intrusion prevention

Buy Now
Questions 172

A network administrator is designing a new network for a company that has frequent power spikes. The company wants to ensure that employees can the best solution for the administrator to recommend?

Options:

A.

Generator

B.

Cold site

C.

Redundant power supplies

D.

Uninterruptible power supply

Buy Now
Questions 173

Which Python library is used to work with YANG data models via NETCONF?

Options:

A.

Postman

B.

requests

C.

nccllent

D.

cURL

Buy Now
Questions 174

Simulation 06

Options:

Buy Now
Questions 175

the following system log message is presented after a network administrator configures a GRE tunnel:

%TUN-5-RECURDOWN Interface Tunnel 0 temporarily disabled due to recursive routing

Why is tunnel 0 disabled?

Options:

A.

Because dynamic routing is not enabled

B.

Because the tunnel cannot reach its tunnel destination

C.

Because the best path to the tunnel destination is through the tunnel itself

D.

Because the router cannot recursively identify its egress forwarding interface

Buy Now
Questions 176

Which entity is responsible for maintaining Layer 2 isolation between segments In a VXLAN environment?

Options:

A.

switch fabric

B.

VTEP

C.

VNID

D.

host switch

Buy Now
Questions 177

Refer to the exhibit.

An engineer must deny HTTP traffic from host A to host B while allowing all other communication between the hosts, drag and drop the commands into the configuration to achieve these results. Some commands may be used more than once. Not all commands are used.

Options:

Buy Now
Questions 178

An engineer configures HSRP group 37. The configuration does not modify the default virtual MAC address. Which virtual MAC address does the group use?

Options:

A.

C0:00:00:25:00:00

B.

00:00:0c:07:ac:37

C.

C0:39:83:25:258:5

D.

00:00:0c:07:ac:25

Buy Now
Questions 179

What is the function of a fabric border node in a Cisco SD-Access environment?

Options:

A.

To collect traffic flow information toward external networks

B.

To connect the Cisco SD-Access fabric to another fabric or external Layer 3 networks

C.

To attach and register clients to the fabric

D.

To handle an ordered list of IP addresses and locations for endpoints in the fabric.

Buy Now
Questions 180

A network engineer is configuring Flexible Netflow and enters these commands

Sampler Netflow1

Mode random one-out-of 100

Interface fastethernet 1/0

Flow-sampler netflow1

Which are two results of implementing this feature instead of traditional Netflow? (Choose two.)

Options:

A.

CPU and memory utilization are reduced.

B.

Only the flows of top 100 talkers are exported

C.

The data export flow is more secure.

D.

The number of packets to be analyzed are reduced

E.

The accuracy of the data to be analyzed is improved

Buy Now
Questions 181

Refer to exhibit.

VLANs 50 and 60 exist on the trunk links between all switches All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server Which command ensures that SW3 receives frames only from VLAN 50?

Options:

A.

SW1 (config)#vtp pruning

B.

SW3(config)#vtp mode transparent

C.

SW2(config)=vtp pruning

D.

SW1 (config >»vtp mode transparent

Buy Now
Questions 182

Refer to the exhibit.

An engineer is troubleshooting a connectivity issue and executes a traceoute. What does the result confirm?

Options:

A.

The destination server reported it is too busy

B.

The protocol is unreachable

C.

The destination port is unreachable

D.

The probe timed out

Buy Now
Questions 183

Which protocol does REST API rely on to secure the communication channel?

Options:

A.

TCP

B.

HTTPS

C.

SSH

D.

HTTP

Buy Now
Questions 184

Which AP mode allows an engineer to scan configured channels for rogue access points?

Options:

A.

sniffer

B.

monitor

C.

bridge

D.

local

Buy Now
Questions 185

Drag and drop the threat defense solutions from the left onto their descriptions on the right.

Options:

Buy Now
Questions 186

What is the data policy in a Cisco SD-WAN deployment?

Options:

A.

list of ordered statements that define node configurations and authentication used within the SD-WAN overlay

B.

Set of statements that defines how data is forwarded based on IP packet information and specific VPNs

C.

detailed database mapping several kinds of addresses with their corresponding location

D.

group of services tested to guarantee devices and links liveliness within the SD-WAN overlay

Buy Now
Questions 187

What is the differences between TCAM and the MAC address table?

Options:

A.

The MAC address table is contained in TCAM ACL and QoS information is stored in TCAM

B.

The MAC address table supports partial matches. TCAM requires an exact match

C.

Router prefix lookups happens in CAM. MAC address table lookups happen in TCAM.

D.

TCAM is used to make Layer 2 forwarding decisions CAM is used to build routing tables

Buy Now
Questions 188

What are two benefits of YANG? (Choose two.)

Options:

A.

It enforces the use of a specific encoding format for NETCONF.

B.

It collects statistical constraint analysis information.

C.

It enables multiple leaf statements to exist within a leaf list.

D.

It enforces configuration semantics.

E.

It enforces configuration constraints.

Buy Now
Questions 189

Which configuration restricts the amount of SSH that a router accepts 100 kbps?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 190

What NTP Stratum level is a server that is connected directly to an authoritative time source?

Options:

A.

Stratum 0

B.

Stratum 1

C.

Stratum 14

D.

Stratum 15

Buy Now
Questions 191

Refer to the exhibit.

Which command set changes the neighbor state from Idle (Admin) to Active?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 192

A network engineer configures a WLAN controller with increased security for web access. There is IP connectivity with the WLAN controller, but the engineer cannot start a management session from a web browser. Which action resolves the issued

Options:

A.

Disable JavaScript on the web browser

B.

Disable Adobe Flash Player

C.

Use a browser that supports 128-bit or larger ciphers.

D.

Use a private or incognito session.

Buy Now
Questions 193

Which solution do laaS service providers use to extend a Layer 2 segment across a Layer 3 network?

Options:

A.

VLAN

B.

VTEP

C.

VXLAN

D.

VRF

Buy Now
Questions 194

Refer to the exhibit.

How does the router handle traffic after the CoPP policy is configured on the router?

Options:

A.

Traffic coming to R1 that does not match access list SNMP is dropped.

B.

Traffic coming to R1 that matches access list SNMP is policed.

C.

Traffic passing through R1 that matches access list SNMP is policed.

D.

Traffic generated by R1 that matches access list SNMP is policed.

Buy Now
Questions 195

Drag and drop the characteristics from the left onto the routing protocols they describe on the right

Options:

Buy Now
Questions 196

Refer to the exhibit.

Which privilege level is assigned to VTY users?

Options:

A.

1

B.

7

C.

13

D.

15

Buy Now
Questions 197

Refer to the exhibit.

An engineer must establish eBGP peering between router R3 and router R4. Both routers should use their loopback interfaces as the BGP router ID. Which configuration set accomplishes this task?

Options:

A.

R3(config)#router bgp 200

R3(config-router)#neighbor 10.4.4.4 remote-as 100

R3(config-router)# neighbor 10.4.4.4 update-source Loopback0

R4(config)#router bgp 100

R4(config-router)#neighbor 10.3.3.3 remote-as 200

R4(config-router)#network 10.3.3.3 update-source Loopback0

B.

R3(config)#router bgp 200

R3(config-router)#neighbor 10.24.24.4 remote-as 100

R3(config-router)#neighbor 10.24.24.4 update-source Loopback0

R4(config)#router bgp 100

R4(config-router)#neighbor 10.24.24.3 remote-as 200

R4(config-router)#neighbor 10.24.24.3 update-source Loopback0

C.

R3(config)#router bgp 200

R3(config-router)#neighbor 10.4.4.4 remote-as 100

R3(config-router)#bgp router-id 10.3.3.3

R4(config)#router bgp 100

R4(config-router)#neighbor 10.3.3.3 remote-as 200

R4(config-router)#bgp router-id 10.4.4.4

D.

R3(config)#router bgp 200

R3(config-router)#neighbor 10.24.24.4 remote-as 100

R3(config-router)#bgp router-id 10.3.3.3

R4(config)#router bgp 100

R4(config-router)#neighbor 10.24.24.3 remote-as 200

R4(config-router)#bgp router-id 10.4.4.4

Buy Now
Questions 198

A customer requests a design that includes GLBP as the FHRP The network architect discovers that the members of the GLBP group have different throughput capabilities Which GLBP load balancing method supports this environment?

Options:

A.

host dependent

B.

least connection

C.

round robin

D.

weighted

Buy Now
Questions 199

What is the function of cisco DNA center in a cisco SD-access deployment?

Options:

A.

It is responsible for routing decisions inside the fabric

B.

It is responsible for the design, management, deployment, provisioning and assurance of the fabric network devices.

C.

It possesses information about all endpoints, nodes and external networks related to the fabric

D.

It provides integration and automation for all nonfabric nodes and their fabric counterparts.

Buy Now
Questions 200

An engineer is implementing a Cisco MPLS TE tunnel to improve the streaming experience for the clients of a video-on-demand server. Which action must the engineer perform to configure extended discovery to support the MPLS LDP session between the headend and tailend routers?

Options:

A.

Configure the interface bandwidth to handle TCP and UDP traffic between the LDP peers

B.

Configure a Cisco MPLS TE tunnel on both ends of the session

C.

Configure an access list on the interface to permit TCP and UDP traffic

D.

Configure a targeted neighbor session.

Buy Now
Questions 201

AN engineer is implementing MPLS OAM to monitor traffic within the MPLS domain. Which action must the engineer perform to prevent from being forwarded beyond the service provider domain when the LSP is down?

Options:

A.

Disable IP redirects only on outbound interfaces

B.

Implement the destination address for the LSP echo request packet in the 127.x.y.z/8 network

C.

Disable IP redirects on all ingress interfaces

D.

Configure a private IP address as the destination address of the headend router of Cisco MPLS TE.

Buy Now
Questions 202

What are two benefits of implementing a Cisco SD-WAN architecture? (Choose two)

Options:

A.

It provides resilient and effective traffic flow using MPLS.

B.

It improves endpoint protection by integrating embedded and cloud security features.

C.

It allows configuration of application-aware policies with real time enforcement.

D.

It simplifies endpoint provisioning through standalone router management

E.

It enforces a single. scalable. hub-and-spoke topology.

Buy Now
Questions 203

An engineer must create a new SSID on a Cisco 9800 wireless LAN controller. The client has asked to use a pre-shared key for authentication Which profile must the engineer edit to achieve this requirement?

Options:

A.

RF

B.

Policy

C.

WLAN

D.

Flex

Questions 204

Refer to the exhibit. PC-1 must access the web server on port 8080. To allow this traffic, which statement must be added to an access control list that is applied on SW2 port G0/0 in the inbound direction?

Options:

A.

permit host 172.16.0.2 host 192.168.0.5 eq 8080

B.

permit host 192.168.0.5 host 172.16.0.2 eq 8080

C.

permit host 192.168.0.5 eq 8080 host 172.16.0.2

D.

permit host 192.168.0.5 it 8080 host 172.16.0.2

Buy Now
Questions 205

Refer to the exhibit.

An engineer reconfigures the pot-channel between SW1 and SW2 from an access port to a trunk and immediately notices this error in SW1's log.

Which command set resolves this error?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 206

How does a fabric AP fit in the network?

Options:

A.

It is in local mode and must be connected directly to the fabric border node

B.

It is in FlexConnect mode and must be connected directly to the fabric edge switch.

C.

It is in FlexConnect mode and must be connected directly to the fabric border node

D.

It is in local mode and must be connected directly to the fabric edge switch.

Buy Now
Questions 207

Refer to the exhibit.

On which interfaces should VRRP commands be applied to provide first hop redundancy to PC-01 and PC-02?

Options:

A.

G0/0 and G0/1 on Core

B.

G0/0 on Edge-01 and G0/0 on Edge-02

C.

G0/1on Edge-01 and G0/1 on Edge-02

D.

G0/0 and G0/1 on ASW-01

Buy Now
Questions 208

Refer to the exhibit.

An engineer must create a configuration that prevents R3from receiving the LSA about 172.16.1.4/32.Which configuration set achieves this goal?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 209

In a Cisco SD-WAN solution, how Is the health of a data plane tunnel monitored?

Options:

A.

with IP SLA

B.

ARP probing

C.

using BFD

D.

with OMP

Buy Now
Questions 210

Refer to the exhibit.

An engineer is designing a guest portal on Cisco ISE using the default configuration. During the testing phase, the engineer receives a warning when displaying the guest portal. Which issue is occurring?

Options:

A.

The server that is providing the portal has an expired certificate

B.

The server that is providing the portal has a self-signed certificate

C.

The connection is using an unsupported protocol

D.

The connection is using an unsupported browser

Buy Now
Questions 211

An engineer must configure AAA on a Cisco 9800 WLC for central web authentication Which two commands are needed to accomplish this task? (Choose two.)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Buy Now
Questions 212

How can an engineer prevent basic replay attacks from people who try to brute force a system via REST API?

Options:

A.

Add a timestamp to the request In the API header.

B.

Use a password hash

C.

Add OAuth to the request in the API header.

D.

UseHTTPS

Buy Now
Questions 213

How is a data modeling language used?

Options:

A.

To enable data lo be easily structured, grouped, validated, and replicated

B.

To represent finite and well-defined network elements that cannot be changed

C.

To model the flows of unstructured data within the infrastructure

D.

To provide human readability to scripting languages

Buy Now
Questions 214

When firewall capabilities are considered, which feature is found only in Cisco next-generation firewalls?

Options:

A.

malware protection

B.

stateful inspection

C.

traffic filtering

D.

active/standby high availability

Buy Now
Questions 215

Refer to the exhibit. Router BRDR-1 is configured to receive the 0.0.0.0/0 and 172.17.1.0/24 network via BGP and advertise them into OSPF are 0. An engineer has noticed that the OSPF domain is receiving only the 172.17.1.0/24 route and default route 0.0.0.0/0 is still missing. Which configurating must engineer apply to resolve the problem?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 216

What is the wireless received signal strength indicator?

Options:

A.

The value given to the strength of the wireless signal received compared to the noise level

B.

The value of how strong the wireless signal Is leaving the antenna using transmit power, cable loss, and antenna gain

C.

The value of how much wireless signal is lost over a defined amount of distance

D.

The value of how strong a tireless signal is receded, measured in dBm

Buy Now
Questions 217

Refer to the exhibit.

A GRE tunnel has been created between HO and BR routers. What is the tunnel IP on the HQ router?

Options:

A.

10.111.111.1

B.

10.111.111.2

C.

209.165.202.130

D.

209.165.202.134

Buy Now
Questions 218

When are multicast RPs required?

Options:

A.

RPs are required only when using protocol independent multicast dense mode.

B.

By default, the RP is needed penodically to maintain sessions with sources and receivers.

C.

RPs are required for protocol Independent multicast sparse mode and dense mode.

D.

By default, the RP Is needed only start new sessions with sources and receivers.

Buy Now
Questions 219

Refer to the exhibit. Which result does the python code achieve?

Options:

A.

The code encrypts a base64 decrypted password.

B.

The code converts time to the "year/month/day" time format.

C.

The code converts time to the yyyymmdd representation.

D.

The code converts time to the Epoch LINUX time format.

Buy Now
Questions 220

An engineer must export the contents of the devices object in JSON format. Which statement must be used?

Options:

A.

json.repr(Devices)

B.

json.dumps(Devices)

C.

json.prints(Devices)

D.

json.loads(Devices)

Buy Now
Questions 221

A customer wants to provide wireless access to contractors using a guest portal on Cisco ISE. The portal Is also used by employees A solution is implemented, but contractors receive a certificate error when they attempt to access the portal Employees can access the portal without any errors. Which change must be implemented to allow the contractors and employees to access the portal?

Options:

A.

Install a trusted third-party certificate on the Cisco ISE.

B.

Install an Internal CA signed certificate on the contractor devices

C.

Install an internal CA signed certificate on the Cisco ISE

D.

install a trusted third-party certificate on the contractor devices.

Buy Now
Questions 222

Which element enables communication between guest VMs within a virtualized environment?

Options:

A.

hypervisor

B.

vSwitch

C.

virtual router

D.

pNIC

Buy Now
Questions 223

In which two ways does TCAM differ from CAM? (Choose two.)

Options:

A.

CAM is used to make Layer 2 forwarding decisions, and TCAM is used for Layer 3 address lookups.

B.

The MAC address table is contained in CAM, and ACL and QoS Information Is stored in TCAM.

C.

CAM Is used by routers for IP address lookups, and TCAM is used to make Layer 2 forwarding decisions.

D.

CAM is used for software switching mechanisms, and TCAM is used for hardware switching mechanisms.

E.

The MAC address table Is contained in TCAM, and ACL and QoS information is stored in CAM.

Buy Now
Questions 224

Refer the exhibit.

Which router is the designated router on the segment 192.168.0.0/24?

Options:

A.

This segment has no designated router because it is a nonbroadcast network type.

B.

This segment has no designated router because it is a p2p network type.

C.

Router Chicago because it has a lower router ID

D.

Router NewYork because it has a higher router ID

Buy Now
Questions 225

Refer to the Exhibit.

An engineer is installing a new pair of routers in a redundant configuration. When checking on the standby status of each router the engineer notices that the routers are not functioning as expected. Which action will resolve the configuration error?

Options:

A.

configure matching hold and delay timers

B.

configure matching key-strings

C.

configure matching priority values

D.

configure unique virtual IP addresses

Buy Now
Questions 226

What is a characteristic of Cisco DNA Northbound APIs?

Options:

A.

They simplify the management of network infrastructure devices.

B.

They enable automation of network infrastructure based on intent.

C.

They utilize RESTCONF.

D.

They utilize multivendor support APIs.

Buy Now
Questions 227

Refer to the exhibit.

An engineer must prevent the R6 loopback from getting into Area 2 and Area 3 from Area 0 Which action must the engineer take?

Options:

A.

Apply a fitter list inbound on R2 and R9

B.

Apply a filter list outbound on R3 and R7

C.

Apply a filter list outbound on R7 only.

D.

Apply a filter list inbound on R3 and R7

Buy Now
Questions 228

Which method does Cisco DNA Center use to allow management of non-Cisco devices through southbound protocols?

Options:

A.

It creates device packs through the use of an SDK

B.

It uses an API call to interrogate the devices and register the returned data.

C.

It obtains MIBs from each vendor that details the APIs available.

D.

It imports available APIs for the non-Cisco device in a CSV format.

Buy Now
Questions 229

Based on the router's API output in JSON format below, which Python code will display the value of the "hostname" key?

A)

B)

C)

D)

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Buy Now
Questions 230

What are two common sources of interference for Wi-Fi networks? (Choose two.)

Options:

A.

rogue AP

B.

conventional oven

C.

fire alarm

D.

LED lights

E.

radar

Buy Now
Questions 231

Refer to the exhibit. Which configuration must be applied to R1 to enable R1 to reach the server at 172.16.0.1?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 232

Refer to the exhibit.

What is the result when a switch that is running PVST+ is added to this network?

Options:

A.

DSW2 operates in Rapid PVST+ and the new switch operates in PVST+

B.

Both switches operate in the PVST+ mode

C.

Spanning tree is disabled automatically on the network

D.

Both switches operate in the Rapid PVST+ mode.

Buy Now
Questions 233

Refer to the exhibit. Which command is required to verify NETCONF capability reply messages?

Options:

A.

show netconf | section rpc-reply

B.

show netconf rpc-reply

C.

show netconf xml rpc-reply

D.

show netconf schema | section rpc-reply

Buy Now
Questions 234

An engineer configures a WLAN with fast transition enabled Some legacy clients fail to connect to this WLAN Which feature allows the legacy clients to connect while still allowing other clients to use fast transition based on then OLTIs?

Options:

A.

over the DS

B.

adaptive R

C.

802.11V

D.

802.11k

Buy Now
Questions 235

Refer to the exhibit.

All switches are configured with the default port priority value. Which two commands ensure that traffic from PC1 is forwarded over Gi1/3 trunk port between DWS1 and DSW2? (Choose two)

Options:

A.

DSW2(config-if)#spanning-tree port-priority 16

B.

DSW2(config)#interface gi1/3

C.

DSW1(config-if)#spanning-tree port-priority 0

D.

DSW1(config) #interface gi1/3

E.

DSW2(config-if)#spanning-tree port-priority 128

Buy Now
Questions 236

Refer to the exhibit.

Which two facts does the device output confirm? (Choose two.)

Options:

A.

The device sends unicast messages to its peers

B.

The device's HSRP group uses the virtual IP address 10.0.3.242

C.

The standby device is configured with the default HSRP priority.

D.

The device is using the default HSRP hello timer

E.

The device is configured with the default HSRP priority

Buy Now
Questions 237

Refer to the exhibit.

Which JSON syntax is derived from this data?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 238

Refer to the exhibit.

A network architect has partially configured static NAT. which commands should be asked to complete the configuration?

Options:

A.

R1(config)#interface GigabitEthernet0/0 R1(config)#ip pat outside

R1(config)#interface GigabitEthernet0/1 R1(config)#ip pat inside

B.

R1(config)#interface GigabitEthernet0/0 R1(config)#ip nat outside

R1(config)#interface GigabitEthernet0/1 R1(config)#ip nat inside

C.

R1(config)#interface GigabitEthernet0/0 R1(config)#ip nat inside

R1(config)#interface GigabitEthernet0/1 R1(config)#ip nat outside

D.

R1(config)#interface GigabitEthernet0/0 R1(config)#ip pat inside

R1(config)#interface GigabitEthernet0/1 R1(config)#ip pat outside

Buy Now
Questions 239

Drag and drop the characteristics from the left onto the infrastructure deployment models on the right.

Options:

Buy Now
Questions 240

Refer to the exhibit.

What does the output confirm about the switch's spanning tree configuration?

Options:

A.

The spanning-tree mode stp ieee command was entered on this switch

B.

The spanning-tree operation mode for this switch is IEEE.

C.

The spanning-tree operation mode for this switch is PVST+.

D.

The spanning-tree operation mode for this switch is PVST

Buy Now
Questions 241

How does Cisco Trustsec enable more flexible access controls for dynamic networking environments and data centers?

Options:

A.

uses flexible NetFlow

B.

assigns a VLAN to the endpoint

C.

classifies traffic based an the contextual identity of the endpoint rather than its IP address

D.

classifies traffic based on advanced application recognition

Buy Now
Questions 242

Refer to the exhibit.

An engineer must permit traffic from these networks and block all other traffic An informational log message should be triggered when traffic enters from these prefixes Which access list must be used?

Options:

A.

access-list acl_subnets permit ip 10.0.32.0 0 0.0.255 log

B.

access-list acl_subnets permit ip 10.0.32.0 0.0.7.255 log

C.

access-list acl_subnets permit ip 10.0.32.0 0.0.7.255 access-list acl_subnets deny ip any log

D.

access-list acl_subnets permit ip 10.0.32.0 255.255.248.0 log

Buy Now
Questions 243

An engineer creates the configuration below. Drag and drop the authentication methods from the left into the order of priority on the right. Not all options are used.

Options:

Buy Now
Questions 244

Which technology does VXLAN use to provide segmentation for Layer 2 and Layer 3 traffic?

Options:

A.

bridge domain

B.

VLAN

C.

VRF

D.

VNI

Buy Now
Questions 245

Refer to the exhibit.

An engineer attempts to bundle interface Gi0/0 into the port channel, but it does not function as expected. Which action resolves the issue?

Options:

A.

Configure channel-group 1 mode active on interface Gi0/0.

B.

Configure no shutdown on interface Gi0/0

C.

Enable fast LACP PDUs on interface Gi0/0.

D.

Set LACP max-bundle to 2 on interface Port-channeM

Buy Now
Questions 246

What is a characteristic of Cisco StackWise technology?

Options:

A.

It uses proprietary cabling

B.

It supports devices that are geographically separated

C.

lt combines exactly two devices

D.

It is supported on the Cisco 4500 series.

Buy Now
Questions 247

Which technology is used as the basis for the cisco sd-access data plane?

Options:

A.

IPsec

B.

LISP

C.

VXLAN

D.

802.1Q

Buy Now
Questions 248

Refer to the exhibit.

Which command when applied to the Atlanta router reduces type 3 LSA flooding into the backbone area and summarizes the inter-area routes on the Dallas router?

Options:

A.

Atlanta(config-route)#area 0 range 192.168.0.0 255.255.248.0

B.

Atlanta(config-route)#area 0 range 192.168.0.0 255.255.252.0

C.

Atlanta(config-route)#area 1 range 192.168.0.0 255.255.252.0

D.

Atlanta(config-route)#area 1 range 192.168.0.0 255.255.248.0

Buy Now
Questions 249

How are map-register messages sent in a LISP deployment?

Options:

A.

egress tunnel routers to map resolvers to determine the appropriate egress tunnel router

B.

ingress tunnel routers to map servers to determine the appropriate egress tunnel router

C.

egress tunnel routers to map servers to determine the appropriate egress tunnel router

D.

ingress tunnel routers to map resolvers to determine the appropnate egress tunnel router

Buy Now
Questions 250

A customer transitions a wired environment to a Cisco SD-Access solution. The customer does not want to integrate the wireless network with the fabric. Which wireless deployment approach enables the two systems to coexist and meets the customer requirement?

Options:

A.

Deploy the APs in autonomous mode

B.

Deploy the wireless network over the top of the fabric

C.

Deploy a separate network for the wireless environment

D.

Implement a Cisco DNA Center to manage the two networks

Buy Now
Questions 251

Which NGFW mode block flows crossing the firewall?

Options:

A.

Passive

B.

Tap

C.

Inline tap

D.

Inline

Buy Now
Questions 252

Refer to the exhibit.

Which command must be applied to Router 1 to bring the GRE tunnel to an up/up state?

Options:

A.

Routed (config if funnel mode gre multipoint

B.

Router1(config-if)&tunnel source Loopback0

C.

Router1(config-if)#tunnel source GigabitEthernet0/1

D.

Router1 (config)#interface tunnel0

Buy Now
Exam Code: 350-401
Exam Name: Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR)
Last Update: Apr 16, 2024
Questions: 843
$76.5  $169.99
$58.5  $129.99
$49.5  $109.99
buy now 350-401