When is the Design workflow used In Cisco DNA Center?
Refer to the exhibit.
Which command when applied to the Atlanta router reduces type 3 LSA flooding into the backbone area and summarizes the inter-area routes on the Dallas router?
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
Refer to the exhibit.
An engineer is troubleshooting an application running on Apple phones. The application Is receiving incorrect QoS markings. The systems administrator confirmed that ail configuration profiles are correct on the Apple devices. Which change on the WLC optimizes QoS for these devices?
Why is an AP joining a different WLC than the one specified through option 43?
Refer to the exhibit.
An engineer must establish eBGP peering between router R3 and router R4. Both routers should use their loopback interfaces as the BGP router ID. Which configuration set accomplishes this task?
Refer to the exhibit.
What is the result when a technician adds the monitor session 1 destination remote vlan 223 command1?
Refer to the exhibit.
An engineer reconfigures the pot-channel between SW1 and SW2 from an access port to a trunk and immediately notices this error in SW1's log.
Which command set resolves this error?
A)
B)
C)
D)
Refer to the exhibit.
How does the router handle traffic after the CoPP policy is configured on the router?
Refer to the exhibit.
Which Python code snippet prints the descriptions of disabled interfaces only?
A)
B)
C)
D)
How is a data modeling language used?
Which technology is used as the basis for the cisco sd-access data plane?
What is provided by the Stealthwatch component of the Cisco Cyber Threat Defense solution?
Refer to the exhibit.
An engineer attempts to bundle interface Gi0/0 into the port channel, but it does not function as expected. Which action resolves the issue?
Which threat defence mechanism, when deployed at the network perimeter, protects against zero-day attacks?
An engineer must configure the strongest password authentication to locally authenticate on a router. Which configuration must be used?
Refer to the exhibit. A network operator is attempting to configure an IS-IS adjacency between two routers, but the adjacency cannot be established. To troubleshoot the problem, the operator collects this debugging output. Which interfaces are misconfigured on these routers?
Which OSPF networks types are compatible and allow communication through the two peering devices?
An engineer must create an EEM applet that sends a syslog message in the event a change happens in the network due to trouble with an OSPF process. Which action should the engineer use?
Drag and drop characteristics of PIM dense mode from the left to the right.
Drag and drop the descriptions from the left onto the routing protocol they describe on the right.
When firewall capabilities are considered, which feature is found only in Cisco next-generation firewalls?
An engineer creates the configuration below. Drag and drop the authentication methods from the left into the order of priority on the right. Not all options are used.
Refer to the exhibit.
Which command set must be added to the configuration to analyze 50 packets out of every 100?
A)
B)
C)
D)
Which two items are found in YANG data models? (Choose two.)
Refer to the exhibit.
After configuring HSRP an engineer enters the show standby command. Which two facts are derived from the output? (Choose two.)
Refer to the exhibit.
An engineer is installing a new pair of routers in a redundant configuration. Which protocol ensures that traffic is not disrupted in the event of a hardware failure?
Refer to the exhibit .
Which command must be configured for RESTCONF to operate on port 8888?
Which benefit is realized by implementing SSO?
What is an emulated machine that has dedicated compute memory, and storage resources and a fully installed operating system?
Drag and drop the characteristics from the left onto the infrastructure deployment models on the right.
What is the JSON syntax that is formed the data?
Which two characteristics apply to the endpoint security aspect of the Cisco Threat Defense architecture? (Choose two.)
A company requires a wireless solution to support its mam office and multiple branch locations. All sites have local Internet connections and a link to the main office lor corporate connectivity. The branch offices are managed centrally. Which solution should the company choose?
Refer to the exhibit. A network engineer checks connectivity between two routers. The engineer can ping the remote endpoint but cannot see an ARP entry. Why is there no ARP entry?
Which method displays text directly into the active console with a synchronous EEM applet policy?
Drag and drop the characteristics from the left onto the deployment types on the right.
Refer to the exhibit.
Which command set must be applied on R1 to establish a BGP neighborship with R2 and to allow communication from R1 to reach the networks?
A)
B)
C)
D)
Refer to the exhibit.
Object tracking has been configured for VRRP-enabled routers Edge-01 and Edge-02 Which commands cause Edge-02 to preempt Edge-01 in the event that interface G0/0 goes down on Edge-01?
A)
B)
C)
D)
Refer to the exhibit.
What are two effect of this configuration? (Choose two.)
An administrator is configuring NETCONF using the following XML string. What must the administrator end the request with?
Which protocol is implemented to establish secure control plane adjacencies between Cisco SD-WAN nodes?
Refer to the exhibit.
Which configuration must be applied to the HQ router to set up a GRE tunnel between the HQ and BR routers?
A)
B)
C)
D)
Refer to the exhibit. Which python code parses the response and prints “18:32:21.474 UTC sun Mar 10 2019?
Drag and drop the LISP components on the left to their descriptions on the right. Not all options are used.
What is used to validate the authenticity of the client and is sent in HTTP requests as a JSON object?
Reter to the exhibit.
An administrator troubleshoots intermittent connectivity from internal hosts to an external public server. Some internal hosts can connect to the server while others receive an ICMP Host Unreachable message and these hosts change over time. What is the cause of this issue?
Which resource is able to be shared among virtual machines deployed on the same physical server?
What is the purpose of an RP in PIM?
What is a characteristics of traffic policing?
Refer to the exhibit.
An engineer must configure an ERSPAN session with the remote end of the session 10.10.0.1. Which commands must be added to complete the configuration?
A)
B)
C)
D)
What are the main components of Cisco TrustSec?
Refer to the exhibit.
How should the script be completed so that each device configuration is saved into a JSON-formatted file under the device name?
A)
B)
C)
D)
What is one main REST security design principle?
Refer to the exhibit.
What does the snippet of code achieve?
Refer to the exhibit.
The IP SLA is configured in a router. An engineer must configure an EEM applet to shut down the interface and bring it back up when there is a problem with the IP SLA. Which configuration should the engineer use?
Refer to the exhibit.
Which troubleshooting a routing issue, an engineer issues a ping from S1 to S2. When two actions from the initial value of the TTL? (Choose two.)
An engineer is concerned with the deployment of new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements?
How does EIGRP differ from OSPF?
How is 802.11 traffic handled in a fabric-enabled SSID?
Which AP mode allows an engineer to scan configured channels for rogue access points?
Refer to the exhibit.
An engineer must modify the access control list EGRESS to allow all IP traffic from subnet 10.1.10.0/24 to 10.1.2.0/24. The access control list is applied in the outbound direction on router interface GigabitEthemet 0/1. Which configuration commands can the engineer use to allow this traffic without disrupting existing traffic flows?
A)
B)
C)
D)
What is a fact about Cisco EAP-FAST?
What are two benefits of virtual switching when compared to hardware switching? (Choose two.)
Refer to the exhibit Drag and drop the snippets into the RESTCONF request to form the request that returns this response Not all options are used
Refer to the exhibit.
An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as the exit point. Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplish task?
Refer to the exhibit.
Which configuration allows Customer2 hosts to access the FTP server of Customer1 that has the IP address of 192.168.1.200?
Refer to the exhibit. An engineer is configuring an EtherChannel between Switch1 and Switch2 and notices the console message on switch2. Based on the output, which action resolves this issue?
Refer to the exhibit. An engineer attempts to create a configuration to allow the Blue VRF to leak into the global routing table, but the configuration does not function as expected. Which action resolves this issue?
What are two differences between the RIB and the FIB? (Choose two.)
What is the centralized control policy in a Cisco SD-WAN deployment?
Which LISP component is required for a LISP site to communicate with a non-LISP site?
Refer to the exhibit.
An engineer is troubleshooting a connectivity issue and executes a traceoute. What does the result confirm?
What is used to perform OoS packet classification?
Which algorithms are used to secure REST API from brute attacks and minimize the impact?
A network engineer is configuring Flexible Netflow and enters these commands
Sampler Netflow1
Mode random one-out-of 100
Interface fastethernet 1/0
Flow-sampler netflow1
Which are two results of implementing this feature instead of traditional Netflow? (Choose two.)
Which controller is capable of acting as a STUN server during the onboarding process of Edge devices?
Where is radio resource management performed in a cisco SD-access wireless solution?
Refer to the exhibit. POSTMAN is showing an attempt to retrieve network device information from Cisco DNA Center API. What is the issue?
When a wireless client roams between two different wireless controllers, a network connectivity outage is experience for a period of time. Which configuration issue would cause this problem?
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
How is traffic classified when using Cisco TrustSec technology?
What is the rose of the vSmart controller in a Cisco SD-WN environment?
When a DNS host record is configured for a new Cisco AireOS WLC, which hostname must be added to allow APs to successfully discover the WLC?
Reler to the exhibit The EtherChannel between SW1 and SW2 is not operational. Which a coon will resolve the issue?
By default, which virtual MAC address does HSRP group 41 use?
A customer wants to connect a device to an autonomous Cisco AP configured as a WGB. The WGB is configured properly: however, it fails to associate to a CAPWAP- enabled AP. Which change must be applied in the advanced WLAN settings to resolve this issue?
Which technology enables a redundant supervisor engine to take over when the primary supervisor engine fails?
An engineer is describing QoS to a client. Which two facts apply to traffic policing? (Choose two.)
: 194
Refer to the exhibit.
Which type of antenna is shown on the radiation patterns?
Refer to the exhibit.
Both controllers are in the same mobility group. Which result occurs when client 1 roams between APs that are registered to different controllers in the same WLAN?
Simulation 07
Which free application has the ability to make REST calls against Cisco DNA Center?
Which two methods are used to interconnect two Cisco SD-Access Fabric sites? (Choose two.)
Refer to the exhibit. A network administrator must configure router B to allow traffic only from network 10.1002.0 to networks outside of router 0. Which configuration must be applied?
A)
B)
C)
D)
If AP power level is increased from 25 mW to 100 mW. what is the power difference in dBm?
Which configuration filters out DOT1X messages in the format shown below from being sent toward Syslog server 10.15.20.33?
A)
B)
C)
D)
Which IP SLA operation requires the IP SLA responder to be configured on the remote end?
What does the statement print(format(0.8, '.0%')) display?
Based on the router's API output in JSON format below, which Python code will display the value of the “hostname" key?
Refer to the exhibit. An engineer must configure an ERSPAN tunnel that mirrors traffic from linux1 on Switch1 to Linux2 on Switch2. Which command must be added to the destination configuration to enable the ERSPAN tunnel?
A switch is attached to router R1 on its gig 0/0 interface. Fort security reasons, you want to prevent R1 from sending OSPF hellos to the switch. Which command should be enabled to accomplish this?
Which two results occur if Cisco DNA Center loses connectivity to devices in the SD-Access fabric? (Choose two)
Which access control feature does MAB provide?
An engineer applies this configuration to router R1. How does R1 respond when the user ‘cisco’ logs in?
Company policy restricts VLAN 10 to be allowed only on SW1 and SW2. All other VLANs can be on all three switches. An administrator has noticed that VLAN 10 has propagated to SW3. Which configuration corrects the issue?
Refer to the exhibit. Which configuration is required to summarize the Area 2 networks that are advertised to Area 0?