Where in Cisco DNA Center is documentation of each API call, organized by its functional area?
Which of the following attacks becomes more effective because of global leakages of users' passwords?
Simulation 04
Configure OSPF on both routers according to the topology to achieve these goals:
Refer to the exhibit.
A company has an internal wireless network with a hidden SSID and RADIUS-based client authentication for increased security. An employee attempts to manually add the company network to a laptop, but the laptop does not attempt to connect to the network. The regulatory domains of the access points and the laptop are identical. Which action resolves this issue?
Which Cisco DNA Center application is responsible for group-based access control permissions?
Which two features are available only in next-generation firewalls? (Choose two.)
Drag and drop the characteristics from the left onto the orchestration tool classifications on the right.
An engineer must configure router R1 to validate user logins via RADIUS and fall back to the local user database if the RADIUS server is not available. Which configuration must be applied?
Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right.
Which tool is used in Cisco DNA Center to build generic configurations that are able to be applied on device with similar network settings?
Which technology enables a redundant supervisor engine to take over when the primary supervisor engine fails?
Refer to the exhibit. An engineer builds an EEM script to apply an access list. Which statement must be added to complete the script?
When is GLBP preferred over HSRP?
Where is the wireless LAN controller located in a mobility express deployment?
When does a Cisco StackWise primary switch lose its role?
Which function does a Cisco SD-Access extended node perform?
What is difference between TCAM and the MAC address table?
Refer to the exhibit.
An LACP port channel is configured between Switch-1 and Switch-2, but It falls to come up. Which action will resolve the issue?
How do the RIB and the FIB differ?
Which TLV value must be added to Option 43 when DHCP is used to ensure that APs join the WLC?
Refer to the exhibit.
What happens to access interfaces where VLAN 222 is assigned?
Refer to the exhibit.
An engineer configures a trunk between SW1 and SW2 but tagged packets are not passing. Which action fixes the issue?
Simulation 02
Configure HSRP between DISTRO-SW1 and DISTRO-SW2 on VLAN 100 for hosts connected to ACCESS-SW1 to achieve these goals:
1. Configure group number 1 using the virtual IP address of 192.168.1.1/24.
2. Configure DlSTRO-SW1 as the active router using a priority value of 110 and DISTRO-SW2 as the standby router.
3. Ensure that DISTRO-SW2 will take over the active role when DISTRO-SW1 goes down, and when DISTRO-SW1 recovers, it automatically resumes the active role.
DISTRO-SW2
By default, which virtual MAC address does HSRP group 12 use?
Which function is performed by vSmart in the Cisco SD-WAN architecture?
In Cisco DNA Center, what is the integration API?
Which access control feature does MAB provide?
Based on the router's API output in JSON format below, which Python code will display the value of the “hostname" key?
By default, which virtual MAC address does HSRP group 30 use?
A company recently decided to use RESTCONF instead of NETCONF and many of their NETCONF scripts contain the operation
What is the function of vBond in a Cisco SD-WAN deployment?
Users have reported an issue connecting to a server over the network. A workstation was recently added to the network and configured with a shared USB printer. Which of the following is most likely causing the issue?
Refer to the exhibit Users cannot reach the web server at 192.168 100 1. What is the root cause for the failure?
How do stratum levels relate to the distance from a time source?
Which two results occur if Cisco DNA Center loses connectivity to devices in the SD-Access fabric? (Choose two)
Drag and drop the code snippets from the bottom onto the blanks in the Python script to print the device model to the screen and write JSON data to a file Not all options are used
What is a benefit of Cisco TrustSec in a multilayered LAN network design?
What is the recommended minimum SNR for Voice applications for networks?
What is a characteristic of the Cisco DMA Center Template Editor feature?
Which configuration filters out DOT1X messages in the format shown below from being sent toward Syslog server 10.15.20.33?
A)
B)
C)
D)
Which NTP mode must be activated when using a Cisco router as an NTP authoritative server?
In a campus network design, what ate two benefits of using BFD tor failure detection? (Choose two.)
Refer to the exhibit. An engineer configures HSRP and enters the show standby command. Which two facts about the network environment are derived from the output? (Choose two.)
What is a characteristic of a traditional WAN?
An engineer must create a script to append and modify device entries in a JSON-formatted file. The script must work as follows:
The contents of the JSON-formatted file are as follows:
Drag and drop the statements onto the blanks within the code to complete the script. Not all options are used.
What is a characteristics of Cisco SD-WAN?
Which router is elected the IGMP Querier when more than one router is in the same LAN segment?
Relet lo Ibe exhibit.
An ertgineer must modify the existing configuration so that R2 can take over as the primary router when serial interface 0/0.1 on R1 goes down. Whtch command must the engineer apply''
Which Python library is used to work with YANG data models via NETCONF?
In a Cisco SD-Access wireless environment, which device is responsible for hosting the anycast gateway?
Drag and drop the characteristics from the left onto the switching mechanisms they describe on the right.
What is one role of the VTEP in a VXLAN environment?
What are two characteristics of vManage APIs? (Choose two.)
Which of the following security methods uses physical characteristics of a person to authorize access to a location?
Refer to the exhibit.
Both controllers are in the same mobility group. Which result occurs when client 1 roams between APs that are registered to different controllers in the same WLAN?
Which technology reduces the implementation of STP and leverages both unicast and multicast?
Which mobility role is assigned to a client in the client table of the new controller after a Layer 3 roam?
How is traffic classified when using Cisco TrustSec technology?
What is the purpose of the weight attribute in an EID-lo-RLOC mapping?
Refer to the exhibit. Clients report that they cannot connect to this SSID using the provided PSK. Which action will resolve this issue?
How do cloud deployments compare to on-premises deployments?
Company policy restricts VLAN 10 to be allowed only on SW1 and SW2. All other VLANs can be on all three switches. An administrator has noticed that VLAN 10 has propagated to SW3. Which configuration corrects the issue?
What is stateful switchover?
Drag and drop the characteristics from the left onto the orchestration tools they describe on the right.
Drag and drop the characteristics from the left onto the appropriate infrastructure deployment types on the right.
What are two characteristics of VXLAN? (Choose two)
A network engineer configures BGP between R1 and R2. Both routers use BGP peer group CORP and are set up to use MD5 authentication. This message is logged to the console of router R1:
Which two configuration allow peering session to from between R1 and R2? Choose two.)
Refer to the exhibit.
Router 1 is currently operating as the HSRP primary with a priority of 110 router1 fails and router2 take over the forwarding role. Which command on router1 causes it to take over the forwarding role when it return to service?
Refer to the exhibit. A network engineer troubleshoots an issue with the port channel between SW1 and SW2. which command resolves the issue?
A)
B)
C)
D)
Which outbound access list, applied to the WAN interface of a router, permits all traffic except for http traffic sourced from the workstation with IP address 10.10.10.1?
A)
B)
C)
D)
which entity is a Type 1 hypervisor?
Which command set configures RSPAN to capture outgoing traffic from VLAN 3 on interface GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface?
A)
B)
C)
D)
An engineer is concerned with the deployment of new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements?
Which configuration restricts the amount of SSH that a router accepts 100 kbps?
A)
B)
C)
D)
Refer to the exhibit How was spanning-tree configured on this interface?
Which two components are supported by LISP? (Choose two.)
What is one benefit of implementing a VSS architecture?
A customer has recently implemented a new wireless infrastructure using WLC-5520 at a site directly next to a large commercial airport. Users report that they intermittently lose WI-FI connectivity, and troubleshooting reveals it is due to frequent channel changes. Which two actions fix this issue? (Choose two)
Refer to the exhibit.
An engineer configures monitoring on SW1 and enters the show command to verify operation. What does the output confirm?
Which three elements determine Air Time efficiency? (Choose three)
Which two threats does AMP4E have the ability to block? (Choose two.)
Drag and drop the Qos mechanisms from the left to the correct descriptions on the right
Refer to the exhibit.
An engineer must modify the access control list EGRESS to allow all IP traffic from subnet 10.1.10.0/24 to 10.1.2.0/24. The access control list is applied in the outbound direction on router interface GigabitEthemet 0/1. Which configuration commands can the engineer use to allow this traffic without disrupting existing traffic flows?
A)
B)
C)
D)
Refer to the exhibit. Rapid PVST+ is enabled on all switches. Which command set must be configured on switch1 to achieve the following results on port fa0/1?
A)
B)
C)
D)
Refer to the exhibit Drag and drop the snippets into the RESTCONF request to form the request that returns this response Not all options are used
What are two differences between the RIB and the FIB? (Choose two.)
Which DHCP option helps lightweight APs find the IP address of a wireless LAN controller?
Refer to the exhibit.
An engineer must deny HTTP traffic from host A to host B while allowing all other communication between the hosts, drag and drop the commands into the configuration to achieve these results. Some commands may be used more than once. Not all commands are used.
Refer to the exhibit. Which configuration must be applied to R to enable R to reach the server at 172.16.0.1?
A)
B)
C)
D)
Which protocol does REST API rely on to secure the communication channel?
Refer to the exhibit.
An engineer must create a configuration that executes the show run command and then terminates the session when user CCNP legs in. Which configuration change is required?
Refer to the exhibit. Which two commands are needed to allow for full reachability between AS 1000 and AS 2000? (Choose two)
An engineer must configure HSRP group 300 on a Cisco IOS router. When the router is functional, it must be the must be the active HSRP router. The peer router has been configured using the default priority value. Which command set is required?
A)
B)
C)
D)
A server running Linux is providing support for virtual machines along with DNS and DHCP services for a small business. Which technology does this represent?
Refer to the exhibit.
A network engineer configures OSPF and reviews the router configuration. Which interface or interface or interface are able to establish OSPF adjacency?
How does an on-premises infrastructure compare to a cloud infrastructure?
Refer to the exhibit. An engineer is configuring an EtherChannel between Switch1 and Switch2 and notices the console message on switch2. Based on the output, which action resolves this issue?
Running the script causes the output in the exhibit. Which change to the first line of the script resolves the error?
Which statement about TLS is accurate when using RESTCONF to write configurations on network devices?
Refer to the exhibit.
An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as an entry point. Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplish task?
Refer to the exhibit. A network engineer must configure a password expiry mechanism on the gateway router for all local passwords to expire after 60 days. What is required to complete this task?
Which measurement is used from a post wireless survey to depict the cell edge of the access points?
Refer to the exhibit.
SwitchC connects HR and Sales to the Core switch However, business needs require that no traffic from the Finance VLAN traverse this switch Which command meets this requirement?
A)
B)
C)
D)
Refer to the exhibit.
An engineer is troubleshooting a connectivity issue and executes a traceoute. What does the result confirm?
A company has an existing Cisco 5520 HA cluster using SSO. An engineer deploys a new single Cisco Catalyst 9800 WLC to test new features. The engineer successfully configures a mobility tunnel between the 5520 cluster and 9800 WLC. Client connected to the corporate WLAN roam seamlessly between access points on the 5520 and 9800 WLC. After a failure on the primary 5520 WLC, all WLAN services remain functional; however, Client roam between the 5520 and 9800 controllers without dropping their connection. Which feature must be configured to remedy the issue?
Refer to the exhibit. External users require HTTP connectivity to an internal company web server that is listening on TCP port 8080. Which command set accomplishes this requirement?
A)
B)
C)
D)
E)
Refer to the exhibit.
An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24. The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router However, the router can still ping hosts on the 209.165.200.0/24 subnet. Which explanation of this behavior is true?
Refer the exhibit.
Which router is the designated router on the segment 192.168.0.0/24?
Which design principle slates that a user has no access by default to any resource, and unless a resource is explicitly granted, it should be denied?
What is a consideration when designing a Cisco SD-Access underlay network?
Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial?
Drag and drop the DHCP messages that are exchanged between a client and an AP into the order they are exchanged on the right.
A customer has several small branches and wants to deploy a WI-FI solution with local management using CAPWAP. Which deployment model meets this requirement?
Drag and drop the virtual components from the left onto their deceptions on the right.
Which two mechanisms are available to secure NTP? (Choose two.)
Refer to the exhibit.
Which HTTP JSON response does the python code output give?
In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC?
Refer to the exhibit.
Which action resolves the EtherChannel issue between SW2 and SW3?
An engineer is troubleshooting the Ap join process using DNS. Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?
Refer to the exhibit.
Which configuration establishes EBGP neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP?
A)
B)
C)
D)
What are two benefits of YANG? (Choose two.)
Refer to the exhibit.
Security policy requires all idle-exec sessions to be terminated in 600 seconds. Which configuration achieves this goal?
Which method should an engineer use to deal with a long-standing contention issue between any two VMs on the same host?
When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?
Refer to the exhibit. After configurating an IPsec VPN, an engineer enters the show command to verify the ISAKMP SA status. What does the status show?
Which AP mode allows an engineer to scan configured channels for rogue access points?
Drag and drop the snippets onto the blanks within the code to construct a script that advertises the network prefix 192.168.5.0/24 into a BGP session. Not all options are used
Refer to the exhibit.
An engineer attempts to establish BGP peering between router CORP and two ISP routers. What is the root cause for the failure between CORP and ISP#2?
Which deployment option of Cisco NGFW provides scalability?
How must network management traffic be treated when defining QoS policies?
Refer to the exhibit.
After an engineer configures an EtherChannel between switch SW1 and switch SW2, this error message is logged on switch SW2.
Based on the output from SW1 and the log message received on Switch SW2, what action should the engineer take to resolve this issue?
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
Drag and drop the descriptions of the VSS technology from the left to the right. Not all options are used.
Which method does Cisco DNA Center use to allow management of non-Cisco devices through southbound protocols?
Refer to the exhibit.
An engineer configures OSPF and wants to verify the configuration Which configuration is applied to this device?
A)
B)
C)
D)
Drag and drop the snippets onto the blanks within the code to construct a script that adds a prefix list to a route map and sets the local preference. Not all options are used
Refer to the exhibit.
Which configuration change ensures that R1 is the active gateway whenever it is in a functional state for the 172.30.110.0724 network?
A)
B)
C)
D)
Refer to the exhibit. A network engineer must configure NETCONF. After creating the configuration, the engineer gets output from the command show line, but not from show running-config. Which command completes the configuration?
Refer to the exhibit.
An engineer configures the BGP adjacency between R1 and R2, however, it fails to establish Which action resolves the issue?
How are map-register messages sent in a LISP deployment?
Refer to the exhibit.
A company requires that all wireless users authenticate using dynamic key generation. Which configuration must be applied?
AN engineer is implementing a route map to support redistribution within BGP. The route map must configured to permit all unmatched routes. Which action must the engineer perform to complete this task?
When are multicast RPs required?
Refer to the exhibit.
An engineer must configure static NAT on R1 lo allow users HTTP access to the web server on TCP port 80. The web server must be reachable through ISP 1 and ISP 2. Which command set should be applied to R1 to fulfill these requirements?
Refer to the exhibit.
What are two reasons for IP SLA tracking failure? (Choose two )
Refer to the exhibit. Which configuration must be applied to R1 to enable R1 to reach the server at 172.16.0.1?
In a Cisco SD-Access solution, which protocol is used by an extended node to connect to a single edge node?
Which two parameters are examples of a QoS traffic descriptor? (Choose two)
Which protocol is used to encrypt control plane traffic between SD-WAN controllers and SD-WAN endpoints?
What is the process for moving a virtual machine from one host machine to another with no downtime?
Refer to the exhibit.
An engineer is installing a new pair of routers in a redundant configuration. Which protocol ensures that traffic is not disrupted in the event of a hardware failure?
Drag and drop the characteristics from the left onto the routing protocols they describe on the right
Refer to the exhibit.
All switches are configured with the default port priority value. Which two commands ensure that traffic from PC1 is forwarded over Gi1/3 trunk port between DWS1 and DSW2? (Choose two)
A network administrator is implementing a routing configuration change and enables routing debugs to track routing behavior during the change. The logging output on the terminal is interrupting the command typing process. Which two actions can the network administrator take to minimize the possibility of typing commands incorrectly? (Choose two.)
What is one difference between EIGRP and OSPF?
Refer to the exhibit. Which command is required to verify NETCONF capability reply messages?
Which solution do laaS service providers use to extend a Layer 2 segment across a Layer 3 network?
Refer to the exhibit.
Which IP address becomes the active next hop for 192.168.102 0/24 when 192.168.101.2 fails?
In a three-tier hierarchical campus network design, which action is a design best-practice for the core layer?
Why would a log file contain a * next to the date?
Which two items are found in YANG data models? (Choose two.)
Which technology uses network traffic telemetry, contextual information, and file reputation to provide insight into cyber threats?
A network engineer must configure a router to send logging messages to a syslog server based on these requirements:
Which configuration must be used?
Which action is performed by Link Management Protocol in a Cisco StackWise Virtual domain?
An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy. Which device presents the web authentication for the WLAN?
Refer to the exhibit.
What is required to configure a second export destination for IP address 192.168.10.1?
An administrator must enable Telnet access to Router X using the router username and password database for authentication. Which configuration should be applied?
A)
B)
C)
D)
An engineer must create an EEM applet that sends a syslog message in the event a change happens in the network due to trouble with an OSPF process. Which action should the engineer use?
Refer to the exhibit.
An engineer must permit traffic from these networks and block all other traffic An informational log message should be triggered when traffic enters from these prefixes Which access list must be used?
Refer to the exhibit.
What is the result when a switch that is running PVST+ is added to this network?
A network is being migrated from IPV4 to IPV6 using a dual-stack approach. Network management is already 100% IPV6 enabled. In a dual-stack network with two dual-stack NetFlow collections, how many flow exporters are needed per network device in the flexible NetFlow configuration?
Refer to the exhibit.
Which Python code snippet prints the descriptions of disabled interfaces only?
A)
B)
C)
D)
An engineer configures a WLAN with fast transition enabled Some legacy clients fail to connect to this WLAN Which feature allows the legacy clients to connect while still allowing other clients to use fast transition based on then OLTIs?
Drag and drop the descriptions from the left onto the QoS components they describe on the right.
Which HHTP status code is the correct response for a request with an incorrect password applied to a REST API session?
A customer transitions a wired environment to a Cisco SD-Access solution. The customer does not want to integrate the wireless network with the fabric. Which wireless deployment approach enables the two systems to coexist and meets the customer requirement?
An engineer configures GigabitEthernet 0/1 for VRRP group 115. The router must assume the primary role when it has the highest priority in the group. Which command set is required to complete this task?
Refer to the exhibit.
Which type of antenna does the radiation pattern represent?
Refer to the exhibit.
How does the router handle traffic after the CoPP policy is configured on the router?
Which two actions, when applied in the LAN network segment, will facilitate Layer 3 CAPWAP discovery for lightweight AP? (Choose two.)
An engineer must enable a login authentication method that allows a user to log in by using local authentication if all other defined authentication methods fail Which configuration should be applied?
Drag and drop characteristics of PIM dense mode from the left to the right.
If a client's radio device receives a signal strength of -67 dBm and the noise floor is -85 dBm, what is the SNR value?
What does the LAP send when multiple WLCs respond to the CISCO_CAPWAP-CONTROLLER.localdomain hostname during the CAPWAP discovery and join process?
What is the responsibility of a secondary WLC?
Which NGFW mode block flows crossing the firewall?
Which protocol infers that a YANG data model is being used?
Refer to the exhibit.
An engineer is designing a guest portal on Cisco ISE using the default configuration. During the testing phase, the engineer receives a warning when displaying the guest portal. Which issue is occurring?
How does CEF switching differ from process switching on Cisco devices?
What is a characteristic of a Type I hypervisor?
An engineer is configuring Local WebAuth on a Cisco Wireless LAN Controller. According to RFC 5737, WHICH VIRTUAL IP address must be used in this configuration?
Refer to the exhibit.
An engineer must configure an ERSPAN session with the remote end of the session 10.10.0.1. Which commands must be added to complete the configuration?
A)
B)
C)
D)
Drag anti drop the characteristics from the ten onto the configuration models on the right.
A Cisco DNA Center REST API sends a PUT to the /dna/intent/api/v1/network-device endpoint A response code of 504 is received What does the code indicate?
Refer to the exhibit.
Which commands are required to allow SSH connection to the router?
A)
B)
C)
D)
Drag and drop the characteristics from the left onto the infrastructure deployment models on the right.
What Is the difference between the MAC address table and TCAM?
What is an emulated machine that has dedicated compute memory, and storage resources and a fully installed operating system?
Which two Cisco SD-Access components provide communication between traditional network elements and controller layer? (choose two)
What is a TLOC in a Cisco SD-WAN deployment?
What are the main components of Cisco TrustSec?
If the maximum power level assignment for global TPC 802.11a/n/ac is configured to 10 dBm, which power level effectively doubles the transmit power?
Refer to the exhibit.
What is the effect of introducing the sampler feature into the Flexible NetFlow configuration on the router?
Which benefit is provided by the Cisco DNA Center telemetry feature?
Drag and drop the characteristics from the left onto the deployment types on the right.
Which two Cisco SD-WAN components exchange OMP information?
In a Cisco Catalyst switch equipped with two supervisor modules an administrator must temporally remove the active supervisor from the chassis to perform hardware maintenance on it. Which mechanism ensure that the active supervisor removal is not disruptive to the network operation?
Which two features does the Cisco SD-Access architecture add to a traditional campus network? (Choose two.)
How do EIGRP metrics compare to OSPF metrics?
Which protocol is implemented to establish secure control plane adjacencies between Cisco SD-WAN nodes?
Which two characteristics apply to the endpoint security aspect of the Cisco Threat Defense architecture? (Choose two.)
Which two solutions are used for backing up a Cisco DNA Center Assurance database? (Choose two)
An engineer must configure an ACL that permits packets which include an ACK in the TCP header Which entry must be included in the ACL?
Drag and drop the LIPS components on the left to the correct description on the right.
Refer to the exhibit. An engineer has configured an IP SLA for UDP echo’s. Which command is needed to start the IP SLA to test every 30 seconds and continue until stopped?
Refer to the exhibit.
A network engineer must log in to the router via the console, but the RADIUS servers are not reachable Which credentials allow console access1?
Which VXLAN component is used to encapsulate and decapsulate Ethernet frames?
Refer to the exhibit. What is achieved by this code?
A system must validate access rights to all its resources and must not rely on a cached permission matrix. If the access level to a given resource is revoked but is not reflected in the permission matrix, the security is violated. Which term refers to this REST security design principle?
Which function does a fabric AP perform in a cisco SD-access deployment?
Refer to the exhibit. Which python code parses the response and prints “18:32:21.474 UTC sun Mar 10 2019?
Refer to the exhibit.
An engineer must allow all users in the 10.2.2.0/24 subnet to access the Internet. To conserve address space the public Interface address of 209 165 201.1 must be used for all external communication. Which command set accomplishes these requirements?
A)
B)
C)
D)
What is one characteristic of the Cisco SD-Access control plane?
Refer to the exhibit.
Which command set is needed to configure and verify router R3 to measure the response time from router R3 to the file server located in the data center?
A)
B)
C)
D)
Refer to the exhibit.
The port channel between the switches does not work as expected. Which action resolves the issue?
Which resource is able to be shared among virtual machines deployed on the same physical server?
Refer to the exhibit.
An engineer must allow R1 to advertise the 192 168.1 0/24 network to R2 R1 must perform this action without sending OSPF packets to SW1 Which command set should be applied?
A)
B)
C)
D)
Which protocol is responsible for data plane forwarding in a Cisco SD-Access deployment?
Refer to the exhibit. Which command set must be added to permit and log all traffic that comes from 172.20.10.1 in interface GigabitEthernet0/1 without impacting the functionality of the access list?
Which Cisco FlexConnect state allows wireless users that are connected to the network to continue working after the connection to the WLC has been lost?
Drag and drop the Cisco SD-Access solution areas from the left onto the protocols they use on the right.
Refer to the exhibit. An attacker can advertise OSPF fake routes from 172.16.20.0 network to the OSPF domain and black hole traffic. Which action must be taken to avoid this attack and still be able to advertise this subnet into OSPF?
What Is a characteristic of a WLC that is in master controller mode?
Refer to the exhibit.
How should the script be completed so that each device configuration is saved into a JSON-formatted file under the device name?
A)
B)
C)
D)
Refer to the exhibit.
The administrator troubleshoots an EtherChannel that keeps moving to err-disabled. Which two actions must be taken to resolve the issue? (Choose two.)
Refer to the exhibit. A network engineer must block Telnet traffic from hosts in the range of 10.100 2.248 to 10.100.2 255 to the network 10.100.3.0 and permit everything else. Which configuration must the engineer apply'?
A)
B)
C)
D)
Which type of tunnel Is required between two WLCs to enable Intercontroller roaming?
what is a benefit of using a Type 2 hypervisor instead of a Type 1 hypervisor?
Refer to the exhibit. A network engineer must be notified when a user switches to configuration mode. Which script should be applied to receive an SNMP trap and a critical-level log message?
A)
B)
C)
D)
Refer to the exhibit. What is generated by the script?
Which benefit is realized by implementing SSO?
Refer to the exhibit.
A network engineer must configure the router to use the ISE-Servers group for authentication. If both ISE servers are unavailable, the local username database must be used. If no usernames are defined in the configuration, then the enable password must be the last resort to log in. Which configuration must be applied to achieve this result?
Refer to the exhibit.
What is the result of the API request?
A large campus network has deployed two wireless LAN controllers to manage the wireless network. WLC1 and WLC2 have been configured as mobility peers. A client device roams from AP1 on WLC1 to AP2 on WLC2, but the controller's client interfaces are on different VLANs. How do the wireless LAN controllers handle the inter-subnet roaming?
Refer to the exhibit.
What are two effect of this configuration? (Choose two.)
A company requires a wireless solution to support its mam office and multiple branch locations. All sites have local Internet connections and a link to the main office lor corporate connectivity. The branch offices are managed centrally. Which solution should the company choose?
What does the number in an NTP stratum level represent?
An engineer must configure an EXEC authorization list that first checks a AAA server then a local username. If both methods fail, the user is denied. Which configuration should be applied?
Refer to the exhibit.
Which configuration must be applied to the HQ router to set up a GRE tunnel between the HQ and BR routers?
A)
B)
C)
D)
Refer to the exhibit. A network engineer must load balance traffic that comes from the NAT Router and is destined to 10.10.110.10, to several FTP servers. Which two commands sets should be applied? (Choose two).
A)
B)
C)
D)
E)
Refer to the exhibit .
Which command must be configured for RESTCONF to operate on port 8888?