A. only required at the network perimeter
B. required in each layer of the network
C. filters traffic using Layer 3 and Layer 4 information only
D. provides intrusion prevention
Correct Answer: D
A. stratum
B. hop count
C. time zone
D. latency
Correct Answer: A
A. All devices reload after detecting loss of connection to Cisco DNA Center
B. Already connected users are unaffected, but new users cannot connect
C. User connectivity is unaffected.
D. Cisco DNA Center is unable to collect monitoring data in Assurance.
E. Users lose connectivity
Correct Answer: CD
A. proxy ETR
B. egress tunnel router
C. route reflector
D. HMAC algorithm
E. spoke
Correct Answer: AB
A. The spanning-tree mode stp ieee command was entered on this switch
B. The spanning-tree operation mode for this switch is PVST
C. The spanning-tree operation mode for this switch is IEEE
D. The spanning-tree operation mode for this switch is PVST+
Correct Answer: D
A. Remove UNII-2 and Extended UNII-2 channels from the 5 Ghz channel list
B. Restore the OCA default settings because this automatically avoids channel interference
C. Disable DFS channels to prevent interference writ) Doppler radar
D. Enable DFS channels because they are immune to radar interference
E. Configure channels on the UNII-2 and the Extended UNII-2 sub-bands of the 5 Ghz band only
Correct Answer: AC
A. Para-virtualization guest servers are unaware of one another
B. Para-virtualization allows direct access between the guest OS and the hypervisor
C. Para-virtualization allows the host hardware to be directly accessed
D. Para-virtualization lacks support for containers
Correct Answer: C
A. GLBP
B. VRRP version 2
C. VRRP version 3
D. HSRP version 2
Correct Answer: C
A. VXLAN
B. VTEP
C. VLAN
D. VRF
Correct Answer: A
A. dBw
B. dBi
C. mW
D. dBm
Correct Answer: D
A. high availability
B. disaster recovery
C. live migration
D. multisite replication
Correct Answer: C
A. Copies all ingress flow information to an interface
B. Include the flow record and the flow importer
C. Can track ingress and egress information
D. Can be used to track multicast, MPLS, or bridged traffic.
E. Does not required packet sampling on interfaces
Correct Answer: CD
A. The value given to the strength of the wireless signal received compared to the noise level
B. The value of how strong the wireless signal Is leaving the antenna using transmit power, cable loss, and antenna gain
C. The value of how much wireless signal is lost over a defined amount of distance
D. The value of how strong a tireless signal is receded, measured in dBm
Correct Answer: D
A. Adjust the resource reservation limits
B. Live migrate the VM to another host
C. Reset the VM
D. Reset the host
Correct Answer: A
A. IKE
B. DTIS
C. IPsec
D. ESP
Correct Answer: C
A. The source-interface is configured incorrectly.
B. The destination must be 172.30.30.2 for icmp-echo
C. The default route is missing the track feature
D. The threshold value is wrong.
Correct Answer: C
A. vBond
B. vSmart
C. vManage
D. PNP server
Correct Answer: A
A. When the priority value of a stack member is changed to a higher value
B. when a switch with a higher priority is added to the stack
C. when the stack master is reset
D. when a stack member fails
Correct Answer: C
A. BFD is supported by OSPF, EIGRP, BGP, and IS-IS.
B. BFD detects link failures in less than one second.
C. BFD can bypass a failed peer without relying on a routing protocol.
D. BFD creates one session per routing protocol per interface.
E. BFD is supported only on physical interfaces.
F. BFD consumes more CPU resources than routing protocol timers do.
Correct Answer: AB
A. The signl strength at location B is 10 dB better than location
C.
B. Location D has the strongest RF signal strength.
C. The signal strength at location C is too weak to support web surfing.
D. The RF signal strength at location B is 50% weaker than location A
E. The RF signal strength at location C is 10 times stronger than location B
Correct Answer: DE
A. The WLC is connected outside of the fabric
B. The WLC is part of the fabric underlay
C. The access point is connected outside of the fabric.
D. The WLC is part of the fabric overlay.
Correct Answer: D
A. It local link failure at layer 1 and updates routing table
B. It detects local link failure at layer 3 and updates routing protocols
C. It has sub-second failure detection for layer 1 and layer 3 problems
D. It has sub-second failure detection for layer 1 and layer 2 problems.
Correct Answer: D
A. initiating connections with SD-WAN routers automatically
B. pushing of configuration toward SD-WAN routers
C. onboarding of SDWAN routers into the SD-WAN overlay
D. gathering telemetry data from SD-WAN routers
Correct Answer: C
A. memory
B. bandwidth
C. IP address
D. processor
E. storage
F. secure access
Correct Answer: ADE
A. In sparse mode it establishes neighbor adjacencies and sends hello messages at 5-second intervals.
B. It uses the multicast routing table to perform the multicast forwarding function.
C. It uses unicast routing information to perform the multicast forwarding function.
D. It uses broadcast routing information to perform the multicast forwarding function.
Correct Answer: C
A. implementing static mroutes
B. disabling BGP routing protocol
C. implementing MBGP
D. disabling the interface of the router back to the multicast source
E. implementing OSPF routing protocol
Correct Answer: AC
A. RPVST+
B. RP failover
C. BFD
D. NSF
Correct Answer: D
A. UDP 67: DHCP
B. ICMP: Discovery
C. TCP 23: Telnet
D. UDP 162: SNMP
E. UDP 6007: NetFlow
Correct Answer: BD
A. to run a mapping system that manages endpoint to network device relationships
B. to implement policies and communicate with networks outside the fabric
C. to connect external Layer 3 networks to the SD Access fabric.
D. to connect APs and wireless endpoints to the SD-Access fabric
Correct Answer: A
A. DSW2 operates in Rapid PVST+ and the new switch operates in PVST+
B. Both switches operate in the PVST+ mode
C. Spanning tree is disabled automatically on the network
D. Both switches operate in the Rapid PVST+ mode.
Correct Answer: A
A. 239.0.0.2
B. 224.0.0.1
C. 239.0.0.1
D. 224.0.0.2
Correct Answer: B
A. RouterR1(config)#int f0/0 RouterR1 (config-if)#fip nat outside RouterR 1 (confiq-if)#exit RouterR 1(config)#int f0/1 RouterR 1(config-if)#fip nat inside RouterR 1(confiq-if)#exit RouterR1(config)#ip nat inside source static 10.10.10.101 155.1.1.101 RouterR1(config)#ip nat inside source static 10.10.10.102 155.1.1.102 RouterR1(config)#in nat inside squrce static 10.10.10.103 155.1.1.103
B. RouterR1(config)#int f0/0 RouterR1 (config-if)#ip nat inside RouterR1(config-if)#exit RouterR 1(config)#int f0/1 RouterR1 (config-if)#ip nat outside RouterR 1(config-if)#exit RouterR1 (config)#access-list 1 10.10.10.0 0.0.0.255 RouterR1 (config)ip nat pool POOL 155.1.1.101 155.1.1.103 netmask 255.255.255.0 RouterR1(config)ip nat inside source list 1 pool POOL
C. RouterR1 (config)#int f0/0 RouterR 1 (config-if)#ip nat inside RouterR 1(config-if)#exit RouterR 1 (config)#int f0/1 RouterR 1 (config-if)#ip nat outside RouterR 1(config-if)#exit RouterR 1 (config)#access-list 1 10.10.10.0 0.0.0.255 RouterR 1 (config)ip nat inside source list 1 interface f0/1 overload
D. RouterR1 (config)#int f0/0 RouterR1 (config-if)#ip nat inside RouterR 1(config-if)#exit RouterR1 (config)#fint f0/1 RouterR1 (config-if)#ip nat outside RouterR1(config-if)#fexit RouterR1(config)#ip nat inside source static 10.10.10.101 155.1.1.101 RouterR1(config)#ip nat inside source static 10.10.10.102 155.1.1.102 RouterR 1(config)#ip nat inside source static 10.10.10.103 155.1.1.103
Correct Answer: D
A. Change the JSON method from load() to loads().
B. Enclose null in the test json string in double quotes.
C. Use a single set of double quotes and condense test json to a single line.
D. Call the read() method explicitly on the test json string.
Correct Answer: A
A. action 1 syslog msg OSPF ROUTING ERROR
B. action 1 syslog send OSPF ROUTING ERROR
C. action 1 syslog pattern OSPF ROUTING ERROR
D. action 1syslog write OSPF ROUTING ERROR
Correct Answer: A
A. Yagi
B. dipole
C. patch
D. omnidirectional
Correct Answer: A
A. implement P2P blocking
B. implement MFP client protection
C. implement split tunneling
D. implement Wi-Fi direct policy
Correct Answer: D
A. EIGRP has a full map of the topology, and OSPF only knows directly connected neighbors.
B. EIGRP supports equal or unequal path cost, and OSPF supports only equal path cost.
C. EIGRP uses more CPU and memory than OSPF
D. EIGRP is more prone to routing loops than OSPF
Correct Answer: B
A. Enable default gateway reachability check
B. Use the same mobility domain on all WLCs
C. Use the mobility MAC when the mobility peer is configured
D. Configure back-to-back connectivity on the RP ports.
Correct Answer: B
A. SW1(config)# mac access-list extended HOST-A-B SW1(config-ext-macl)# permit host aaaa.bbbb.cccc aaaa.bbbb.dddd SW1(config)# ip access-list extended DENY-HTTP SW1(config-ext-nacl)#deny tcp host 10.1.1.10 host 10.1.1.20 eq www. SW1(config)# vlan access-map DROP-MAC 10 SW1 (config-access-map)# match mac address HOST-A-B SW1 (config-access-map)# action drop SW1(config) vlan access-map HOST-A-B 20 SW1(config-access-map)# match ip address DENY-HTTP SW1(config-access-map)# action drop SW1(config)# vlan filter HOST-A-B vlan 10
B. SW1(config)# mac access-list extended HOST-A-B SW1 (config-ext-macl)# permit host aaaa.bbbb.cccc aaaa.bbbb.dddd SW1 (config)# ip access-list extended DENY-HTTP SW1(config-ext-nacl)#permit tcp host 10.1.1.10 host 10.1.1.20 eq www SW1(config)# vlan access-map DROP-MAC 10 SW1 (config-access-map)# match mac address HOST-A-B SW1 (config-access-map)# action forwarc SW1 (config)# vlan access-map HOST-A-B 20 SW1 (config-access-map)# match ip address DENY-HTTF SW1 (config-access-map)# action drop Sw1(confia ylan filter HOST-A-B vlan 10
C. SW1(config)# ip access-list extended DENY-HTTP SW1 (config-ext-nacl)#deny tcp host 10.1.1.10 host 10.1.1.20 eq www SW1(config)# ip access-list extended MATCH ALL SW1 (config-ext-nacl)# permit ip any any SW1 (config)# vlan access-map HOST-A-B 10 SW1 (config-access-map)# match ip address DENY-HTTP SW1(config-access-map)# action drop SW1(config)# vlan access-map HOST-A-B 20 SW1 (config-access-map)# match ip address MATCH ALL SW1 (config-access-map)# action forward SW1 (config)# vlan filter HOST-A-B vlan 10
D. SW1 (config)# ip access-list extended DENY-HTTP SW1 (config-ext-nacl)#permit tcp host 10.1.1.10 host 10.1.1.20 eq www SW1 (config)# ip access-list extended MATCH ALL SW1 (config-ext-nacl)# permit ip any any SW1 (config)# vlan access-map HOST-A-B 10 SW1 (config-access-map)# match ip address DENY-HTTP SW1 (config-access-map)# action drop SW1 (config)# vlan access-map HOST-A-B 20 SW1 (config-access-map)# match ip address MATCH ALL SW1 (config-access-map)# action forwarc SW1 (config)# vlan filter HOST-A-B vlan 10
Correct Answer: D
A. network_device_list(dnac("host], dnac["username"],dnac["password") login = dnac_login(dnac) for item in dnac_devices: print(dnac_devices.item)
B. login =dnac_login(dnac["host"], dnac["username"], dnac["password") network device_list(dnac, login) for item in dnac_devices: print(dnac_devices.item)
C. network_device_list(dnac["host"], dnac["username"].dnac["password"]) login = dnac_login(dnac) print(dnac_devices)
D. login =dnac_login(dnac["host"], dnac["username"], dnac["password") network device_list(dnac, login) print(dnac_devices)
Correct Answer: D
A. The device has not been assigned a workflow.
B. The device could not be added to the fabric
C. The device had an error and could not be provisioned
D. The device is from a third-party vendor.
Correct Answer: A
A. hyperlocation
B. trilateration
C. angle of arrival
D. presence
Correct Answer: D
A. The amount of offset between the device clock and true time.
B. The amount of drift between the device clock and true time.
C. The number of hops it takes to reach the authoritative time source.
D. The number of hops it takes to reach the master time server
Correct Answer: D
A. Establishes BFD sessions to test liveliness of links and nodes.
B. Distributes policies that govern data forwarding
C. Performs remote software upgrades for WAN Edge, vSmart, and vBond
D. Establishes IPsec tunnels with nodes
Correct Answer: C
A. All wireless LAN controllers are managed by the master controller
B. The master controller is responsible for load balancing all connecting clients to other controllers
C. Configuration on the master controller is executed on all wireless LAN controllers.
D. All new APs that join the WLAN are assigned to the master controller.
Correct Answer: D
A. Increase the NAT pool size to support 254 usable addresses
B. Reconfigure the pool to use the 192.168.1.0 address range.
C. Configure a match-host type NAT pool.
D. Configure a one-to-one type NAT pool.
Correct Answer: C
A. VM configuration file
B. operating system
C. disk
D. applications
Correct Answer: C
A. It remains in err-disabled state until the shutdown/no shutdown command is entered in the interface configuration mode.
B. It remains in err-disabled state until the errdisable recovery cause failed-port-state command is entered in the global configuration mode.
C. It remains in err-disabled state until the no shutdown command is entered in the interface configuration mode.
D. It remains in err-disabled state until the spanning-tree portfast bpduguard disable command is entered in the interface configuration mode
Correct Answer: A
A. Multiple virtual servers can be deployed on the same physical server without having to buy additional hardware.
B. Virtual machines increase server processing performance
C. The CPU and RAM resources on a virtual machine cannot be affected by other virtual machines
D. Deploying a virtual machine is technically less complex than deploying a physical server
Correct Answer: A
A. 1500
B. 9100
C. 4464
D. 17914
Correct Answer: B