Big Cyber Monday Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Cisco 300-540 Dumps Questions Answers

Page: 1 / 5
Total 61 questions

Designing and Implementing Cisco Service Provider Cloud Network Infrastructure (SPCNI v1.0) Questions and Answers

Question 1

An engineer must implement a solution on a Cisco ASR 1000 Series router to protect against DDoS attacks. DDoS traffic must be dropped by transmitting Flowspec attributes to edge routers, instructing them to generate an ACL via class-maps and policy-maps. The engineer already configured BGP neighbors. Which action must be taken next?

Options:

A.

Configure Flowspec for the BGP address-family

B.

Set the BGP routing process

C.

Activate the BGP neighbors

D.

Configure the route reflector

Buy Now
Question 2

Refer to the exhibit. An engineer must configure an IPsec VPN connection between site 1 and site 2. The ISAKMP policy for the phase 1 negotiations of the tunnel must use AES and SHA-256. This configuration was applied to both PE routers; however, the tunnel fails to come up:

crypto isakmp policy 10

encryption 3des

hash md5

authentication pre-share

group 12

Which two commands must be run on router PE1 to resolve the issue? (Choose two.)

Options:

A.

group 10

B.

encryption aes

C.

encryption sha256

D.

hash aes

E.

hash sha256

Question 3

An engineer must configure NTP servers in Cisco Enterprise NFVIS. The primary NTP server has an IP address of 192.168.1.1 and the backup NTP server has an IP address of 192.168.2.1. Which two commands must be run to complete the configuration? (Choose two.)

Options:

A.

system time ntp preferred_server 192.168.1.1

B.

utils ntp server add 192.168.2.1 backup

C.

system set-manual-time 192.168.1.1 192.168.2.1

D.

utils ntp server add 192.168.1.1 primary

E.

system time ntp backup_server 192.168.2.1

Question 4

An engineer must add VNF implementation definitions and VNF service definitions to an OpenStack deployment data model to deploy virtual routers and firewalls to an enterprise network. After the virtual machine resources are prepared, which action must be taken next?

Options:

A.

Specify the operational characteristics.

B.

Create the initial configuration for day zero.

C.

Configure key performance indicator monitoring.

D.

Define the NFV network.

Question 5

What does Cisco Always-On Cloud DDoS use to protect against DDoS attacks?

Options:

A.

Load balancing

B.

Botnet zombies

C.

Traffic mirroring

D.

Scrubbing centers

Question 6

How does SR-IOV move data directly to and from the network adapter?

Options:

A.

Using the STP PortFast

B.

Bypassing the guest operating system

C.

Bypassing the hypervisor

D.

Using the STP VLAN root

Question 7

Refer to the exhibit. An engineer must connect switch TOR1 and switch TOR2 to switch LEAF1 and switch LEAF2 by using double-sided vPCs. LEAF1 and LEAF2 are already configured as vPC peers. Which action must be taken next to complete the configuration?

Options:

A.

Add all the switches to the fabric.

B.

Configure peering between LEAF1 and LEAF2 and TOR1 and TOR2.

C.

Configure MSTP between TOR1 and TOR2.

D.

Configure a vPC between TOR1 and TOR2.

Question 8

An engineer must create a new VPC and deploy several Amazon EC2 instances in AWS. Only SSH connections originating from IP address 20.20.20.20 must be allowed to reach the EC2 instances. What must be configured?

Options:

A.

Access control list

B.

Security group

C.

Web application firewall

D.

Resource group

Question 9

What is a benefit of using VXLANs in a cloud-scale environment?

Options:

A.

extends Layer 2 segments across the underlying Layer 3 infrastructure

B.

extends Layer 3 segments across the underlying Layer 2 infrastructure

C.

reduces spanning-tree complexity across the Layer 2 infrastructure

D.

eliminates the need for a Layer 3 underlay in the service provider infrastructure

Question 10

How does SR-IOV move data directly to and from the network adapter?

Options:

A.

Using the STP PortFast

B.

Bypassing the guest operating system

C.

Bypassing the hypervisor

D.

Using the STP VLAN root

Question 11

Refer to the exhibit. An engineer must configure EVPN port-active multihoming on router R1. Which command must be run against the g1/0 and g1/1 interfaces on R1 to complete the physical Ethernet bundle for multihoming on a host named Host-1?

Options:

A.

evpn ethernet-segment 1

B.

switchport mode trunk

C.

encapsulation dot1q 1

D.

bundle id 1 mode active

Question 12

Refer to the exhibit. An engineer must design a solution that allows a user to choose which private Cisco Catalyst SD-WAN network they want to connect to AWS. The solution must automatically identify the AWS VPC and other cloud services based on the user credentials. What must be used?

Options:

A.

AWS Direct Connect

B.

Transit VPC for AWS

C.

IPsec VPN

D.

Segment routing

Question 13

What is a valid connection method between carrier-neutral facilities within the same metro area?

Options:

A.

OSPF backbone area adjacency

B.

private wireless connection

C.

DWDM ring

D.

CAT6e connection

Question 14

What is a valid connection method between carrier-neutral facilities that are more than 20 miles away from each other?

Options:

A.

Carrier access Ethernet ring

B.

Private wireless connection

C.

CAT6e connection

D.

Multimode fiber connection

Question 15

A network architect must design a solution for implementing virtualization functions. The main goal is to ensure network reliability and reduce downtime by considering the network operational team's requirements:

    The solution must providereal-time network-state visibility.

    The solution must supportautomated rollback in the event of configuration errors.

    The solution must allowefficient troubleshooting and diagnostics.

Which action must the team take to achieve the goal?

Options:

A.

Implement CLI NED to monitor the network state and manually rollback configurations in case of errors.

B.

Implement virtualization service modeling to provide network automation for the service lifecycle and NSO CLI to provide real-time network-state visibility.

C.

Implement service modeling to define network services and NSO CLI for troubleshooting and diagnostics.

D.

Implement CLI NED to define network-virtualization template and package templates to automate the service lifecycle.

Question 16

An engineer must design a high-availability solution that provides path redundancy for IP by allowing redundant gateways to share MAC protocols and addresses. A group of Layer 3 routers must be allowed to share the default gateway on a LAN, load balance, and seamlessly take over the traffic transfer role if a router in the group fails. What must be used?

Options:

A.

GLBP

B.

Load balancer

C.

Routed network core

D.

BFD

Question 17

How does log management assist in meeting the requirements of cloud security regulatory compliance?

Options:

A.

by supporting documentation and reporting processes

B.

by streamlining resource allocation across cloud environments

C.

by providing enhanced interoperability between cloud platforms

D.

by boosting the security of cloud-based applications

Question 18

Refer to the exhibit. An engineer is troubleshooting an issue with switch LEAF-SW-11. The engineer observes that several main servers on the VXLAN BGP EVPN Multi-Site network experience 50–60% packet loss inbound and outbound, and all the DCI tracking interfaces are down. Which two actions must be taken to resolve the issue? (Choose two.)

Options:

A.

On the Nexus switch, run the inner ipv4 dst_ip 172.16.2.200 command against module-1.

B.

On LEAF-SW-11, run the inner ipv4 src_ip 172.16.2.200 command against module-1.

C.

On LEAF-SW-11, run the evpn multisite dci-tracking command against interface Eth1/1.

D.

On LEAF-SW-11, enable the multisite ingress-replication command for the L2VNI of VLAN 11.

E.

On the Nexus switch, run the ip access-list permit ip address 172.16.2.200 command.

Page: 1 / 5
Total 61 questions