With IGMPv2, which multicast group address does the IGMP querier use to send query messages to all hosts on the LAN?
Drag and drop the command snippets from the right onto the blanks in the configuration to create an EEM applet that will enable interface Loopback0 and log a message when the logging message -Interface Loopback0. changed state to administratively down" is received. Not all commands are used.
Which IEEE standard provides the capability to permit or deny network connectivity based on the user or device identity?
Which AP mode allows administrators to generate pcap files to use for troubleshooting?
Which new security enhancement is introduced by deploying a next-generation firewall at the data center in addition to the Internet edge?
Drag and drop the REST API authentication methods from the left onto their descriptions on the right.
Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right.
A client device roams between wireless LAN controllers that are mobility peers, Both controllers have dynamic interface on the same client VLAN which type of roam is described?
Which DNS record type is needed to allow a Cisco AP to discover a WLC when using IPv4?
In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC?
Which multicast operational mode sends a prune message to the source when there are no connected members or downstream neighbors?
In a high-density AP environment, which feature can be used to reduce the RF cell size and not demodulate radio packets above a given threshold?
A customer requests a design that includes GLBP as the FHRP. The network architect discovers that the members of the GLBP group have different throughput capabilities. Which GLBP load balancing method supports this environment?
An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:
•LocationA -72dBm
• Location B:-75 dBm
• Location C; -65 dBm
• Location D -80 dBm
Which two statements does the engineer use to explain these values to the customer? (Choose two.)
Refer to the exhibit. An engineer must configure a Cisco WLC with WPA2 Enterprise mode and avoid global server lists. Which action is required?
What does a next-generation firewall that is deployed at the data center protect against?
What is the measure of the difference between the received signal and the noise floor in a wireless environment?
Drag and drop the automation characteristics from the left onto the appropriate tools on the right. Not all options are used.
Refer to the exhibit. An engineer must adjust the configuration so that Router A becomes the active router. Which commands should be applied to router A? (Choose two)
In a wireless network environment, which measurement compares the received signal to the background noise?
Which technology collects location information through data packets received by the APs instead of using mobile device probes?
Which two southbound interfaces originate from Cisco Catalyst Center (formerly DNA Center) and terminate at fabric underlay switches'? (Choose two.)
Which method requires a client to authenticate and has the capability to function without encryption?
Drag and drop the snippets onto the blanks within the code to construct a script that blocks a MAC address.
Which technique is used to protect end user devices and data from unknown file behavior?
Drag and drop the configuration management tools from the left onto the configuration styles they use on the right
An engineer must create a script to append and modify device entries in a JSON-formatted file. The script must work as follows:
Until interrupted from the keyboard, the script reads in the hostname of a device, its management IP address, operating system type, and CLI remote access protocol.
After being interrupted, the script displays the entered entries and adds them to the JSON-formatted file, replacing existing entries whose hostname matches.
The contents of the JSON-formatted file are as follows
Drag and drop the statements onto the blanks within the code to complete the script. Not all options are used.
Which type of tunnel is required between two WLCs to enable intercontroller roaming?
Which method displays text directly into the active console with a synchronous EEM applet policy?
To support new clients in the environment, an engineer must enable Fast Transition on the corporate WLAN. Which command must be applied on a Cisco Catalyst 9800 Series WLC?
An engineer is implementing a new SSID on a Cisco Catalyst 9800 Series WLC that must be broadcast on 6 GHz radios. Users will be required to use EAP-TLS to authenticate. Which wireless Layer 2 security method is required?
What does the LAP send when multiple WLCs respond to the CISCO_CAPWAP-CONTROLLER.localdomain hostname during the CAPWAP discovery and join process?
Drag and drop the automation characteristics from the left to the corresponding tools on the right.
A wireless administrator must create a new web authentication corporate SSID that will be using ISE as the external RADIUS server. The guest VLAN must be specified after the authentication completes. Which action must be performed to allow the ISE server to specify the guest VLAN?
Refer to the exhibit. Which configuration causes the traffic from PC-1 to the internet to use the link between CoreSW-1 and CoreSW-2 when both switches are up?