Refer to the exhibit.
The WLC administrator sees that the controller to which a roaming client associates has Mobility Role Anchor configured under Clients > Detail. Which type of roaming is supported?
An engineer is describing QoS to a client. Which two facts apply to traffic policing? (Choose two.)
Refer to the exhibit. Which command filters the ERSPAN session packets only to interface GigabitEthernet1?
Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right.
Refer to the exhibit. An engineer configures HSRP and enters the show standby command. Which two facts about the network environment are derived from the output? (Choose two.)
An engineer must create a script to append and modify device entries in a JSON-formatted file. The script must work as follows:
The contents of the JSON-formatted file are as follows:
Drag and drop the statements onto the blanks within the code to complete the script. Not all options are used.
Refer to the exhibit. An engineer must configure an ERSPAN tunnel that mirrors traffic from linux1 on Switch1 to Linux2 on Switch2. Which command must be added to the destination configuration to enable the ERSPAN tunnel?
Refer to the exhibit. An attacker can advertise OSPF fake routes from 172.16.20.0 network to the OSPF domain and black hole traffic. Which action must be taken to avoid this attack and still be able to advertise this subnet into OSPF?
Drag and drop the characteristics from the left to the table types on the right.
Drag and drop the LIPS components on the left to the correct description on the right.
An engineer is connected to a Cisco router through a Telnet session. Which command must be issued to view the logging messages from the current session as soon as they are generated by the router?
An engineer must configure a new loopback Interface on a router and advertise the interface as a fa4 in OSPF. Which command set accomplishes this task?
A)
B)
C)
D)
Refer to the exhibit. A network engineer must block Telnet traffic from hosts in the range of 10.100 2.248 to 10.100.2 255 to the network 10.100.3.0 and permit everything else. Which configuration must the engineer apply'?
A)
B)
C)
D)
Based on the router's API output in JSON format below, which Python code will display the value of the “hostname" key?
What Is the difference between the MAC address table and TCAM?
A company requires a wireless solution to support its mam office and multiple branch locations. All sites have local Internet connections and a link to the main office lor corporate connectivity. The branch offices are managed centrally. Which solution should the company choose?
What is a characteristic of a type 2 hypervisor?
Refer to the exhibit. Clients report that they cannot connect to this SSID using the provided PSK. Which action will resolve this issue?
What does a YANG model provide?
Which two Cisco SD-WAN components exchange OMP information?
Refer to the exhibit.
A network engineer must configure the router to use the ISE-Servers group for authentication. If both ISE servers are unavailable, the local username database must be used. If no usernames are defined in the configuration, then the enable password must be the last resort to log in. Which configuration must be applied to achieve this result?
Refer to the exhibit. Which command set completes the ERSPAN session configuration?
Refer to the exhibit.
An engineer must configure an ERSPAN session with the remote end of the session 10.10.0.1. Which commands must be added to complete the configuration?
A)
B)
C)
D)
Refer to the exhibit. Cisco IOS routers R1 and R2 are interconnected using interface Gi0/0. Which configuration allows R1 and R2 to form an OSPF neighborship on interface Gi0/0?
An engineer must configure a router to leak routes between two VRFs Which configuration must the engineer apply?
What is an emulated machine that has dedicated compute memory, and storage resources and a fully installed operating system?
Refer to the exhibit.
These commands have been added to the configuration of a switch Which command flags an error if it is added to this configuration?
Which A record type should be configured for access points to resolve the IP address of a wireless LAN controller using DNS?
If AP power level is increased from 25 mW to 100 mW. what is the power difference in dBm?
Refer to the exhibit. R1 and R2 are directly connected, but the BGP session does not establish. Which action must be taken to build an eBGP session?
By default, which virtual MAC address does HSRP group 15 use?
Which two characteristics define the Intent API provided by Cisco DNA Center? (Choose two.)
Refer to the exhibit.
An engineer troubleshoots connectivity issues with an application. Testing is performed from the server gateway, and traffic with the DF bit set is dropped along the path after increasing packet size. Removing the DF bit setting at the gateway prevents the packets from being dropped. What is the cause of this issue?
Which threat defence mechanism, when deployed at the network perimeter, protects against zero-day attacks?
Refer to the exhibit. PC-1 must access the web server on port 8080. To allow this traffic, which statement must be added to an access control list that is applied on SW2 port G0/0 in the inbound direction?
Which element enables communication between guest VMs within a virtualized environment?
Refer to the exhibit.
All switches are configured with the default port priority value. Which two commands ensure that traffic from PC1 is forwarded over Gi1/3 trunk port between DWS1 and DSW2? (Choose two)
How can an engineer prevent basic replay attacks from people who try to brute force a system via REST API?
An engineer must enable a login authentication method that allows a user to log in by using local authentication if all other defined authentication methods fail Which configuration should be applied?
How must network management traffic be treated when defining QoS policies?
Drag and drop the descriptions from the left onto the routing protocol they describe on the right.
Refer to the exhibit.
Which JSON syntax is derived from this data?
A)
B)
C)
D)
A network monitoring system uses SNMP polling to record the statistics of router interfaces The SNMP queries work as expected until an engineer installs a new interface and reloads the router After this action, all SNMP queries for the router fail What is the cause of this issue?
Refer to the exhibit.
What step resolves the authentication issue?
Refer to the exhibit.
An engineer must permit traffic from these networks and block all other traffic An informational log message should be triggered when traffic enters from these prefixes Which access list must be used?
What does the LAP send when multiple WLCs respond to the CISCO_CAPWAP-CONTROLLER.localdomain hostname during the CAPWAP discovery and join process?
Refer to the exhibit.
An engineer attempts to establish BGP peering between router CORP and two ISP routers. What is the root cause for the failure between CORP and ISP#2?
Which OSPF networks types are compatible and allow communication through the two peering devices?
An engineer creates the configuration below. Drag and drop the authentication methods from the left into the order of priority on the right. Not all options are used.
Which NGFW mode block flows crossing the firewall?
An engineer must create an EEM script to enable OSPF debugging in the event the OSPF neighborship goes down. Which script must the engineer apply?
Refer to the exhibit.
After an engineer configures an EtherChannel between switch SW1 and switch SW2, this error message is logged on switch SW2.
Based on the output from SW1 and the log message received on Switch SW2, what action should the engineer take to resolve this issue?
Which two GRE features are configured to prevent fragmentation? (Choose two.)
Refer to the exhibit.
Which type of antenna does the radiation pattern represent?
An engineer is configuring a new SSID to present users with a splash page for authentication. Which WLAN Layer 3 setting must be configured to provide this functionally?
Why would a log file contain a * next to the date?
Which technology uses network traffic telemetry, contextual information, and file reputation to provide insight into cyber threats?
Drag and drop the snippets onto the blanks within the code to construct a script that configures BGP according to the topology. Not all options are used, and some options may be used twice.
An engineer must export the contents of the devices object in JSON format. Which statement must be used?
What is YANG used for?
When are multicast RPs required?
A customer wants to provide wireless access to contractors using a guest portal on Cisco ISE. The portal Is also used by employees A solution is implemented, but contractors receive a certificate error when they attempt to access the portal Employees can access the portal without any errors. Which change must be implemented to allow the contractors and employees to access the portal?
Which entity is responsible for maintaining Layer 2 isolation between segments In a VXLAN environment?
Drag and drop the threat defense solutions from the left onto their descriptions on the right.
Which LISP component is required for a LISP site to communicate with a non-LISP site?
Refer to the exhibit.
What is the Json syntax that is formed from the data?
Drag and drop the characteristics from the left onto the appropriate infrastructure deployment types on the right.
How does an on-premises infrastructure compare to a cloud infrastructure?
Refer to the exhibit. Which set of commands on router r R1 Allow deterministic translation of private hosts PC1, PC2, and PC3 to addresses in the public space?
A)
B)
C)
D)
Running the script causes the output in the exhibit. Which change to the first line of the script resolves the error?
A network engineer configures BGP between R1 and R2. Both routers use BGP peer group CORP and are set up to use MD5 authentication. This message is logged to the console of router R1:
Which two configuration allow peering session to from between R1 and R2? Choose two.)
What is the difference between CEF and process switching?
Which congestion queuing method on Cisco IOS based routers uses four static queues?
What are two characteristics of VXLAN? (Choose two)
Which protocol does REST API rely on to secure the communication channel?
Refer to the exhibit. Rapid PVST+ is enabled on all switches. Which command set must be configured on switch1 to achieve the following results on port fa0/1?
A)
B)
C)
D)
When a wireless client roams between two different wireless controllers, a network connectivity outage is experience for a period of time. Which configuration issue would cause this problem?
What are two differences between the RIB and the FIB? (Choose two.)
Which benefit is offered by a cloud infrastructure deployment but is lacking in an on-premises deployment?
What are two benefits of YANG? (Choose two.)
What is the function of a VTEP in VXLAN?
What is the recommended MTU size for a Cisco SD-Access Fabric?
Refer to the exhibit. External users require HTTP connectivity to an internal company web server that is listening on TCP port 8080. Which command set accomplishes this requirement?
A)
B)
C)
D)
E)
A network administrator applies the following configuration to an IOS device.
What is the process of password checks when a login attempt is made to the device?
Which two operations are valid for RESTCONF? (Choose two.)
What is a fact about Cisco EAP-FAST?
How is MSDP used to interconnect multiple PIM-SM domains?
In cisco SD_WAN, which protocol is used to measure link quality?
An engineer must provide wireless converge in a square office. The engineer has only one AP and believes that it should be placed it in the middle of the room. Which antenna type should the engineer use?
Which measure is used by an NTP server to indicate its closeness to the authoritative time source?
Which line must be added in the Python function to return the JSON object {"cat_9k": “FXS193202SE")?
A)
B)
C)
D)
Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel?