Refer to the exhibit.
After running the code in the exhibit. Which step reduces the amount of data that NETCONF server returns to the NETCONF client, to only the interface’s configuration?
What does the LAP send when multiple WLCs respond to the CISCO_CAPWAP-CONTROLLER.localdomain hostname during the CAPWAP discovery and join process?
What are two benefits of implementing a Cisco SD-WAN architecture? (Choose two)
Refer to the exhibit.
Which command must be applied to Router 1 to bring the GRE tunnel to an up/up state?
Which LISP device is responsible for publishing EID-to-RLOC mappings for a site?
In a Cisco StackWise Virtual environment, which planes are virtually combined in the common logical switch?
AN engineer is implementing MPLS OAM to monitor traffic within the MPLS domain. Which action must the engineer perform to prevent from being forwarded beyond the service provider domain when the LSP is down?
Refer to the exhibit.
An engineer is troubleshooting an application running on Apple phones. The application Is receiving incorrect QoS markings. The systems administrator confirmed that ail configuration profiles are correct on the Apple devices. Which change on the WLC optimizes QoS for these devices?
Refer to the exhibit.
A GRE tunnel has been created between HO and BR routers. What is the tunnel IP on the HQ router?
What are two considerations when using SSO as a network redundancy feature? (Choose two)
Drag and drop the descriptions from the left onto the QoS components they describe on the right.
What is the function of cisco DNA center in a cisco SD-access deployment?
AN engineer is implementing a route map to support redistribution within BGP. The route map must configured to permit all unmatched routes. Which action must the engineer perform to complete this task?
Which antenna type should be used for a site-to-site wireless connection?
Why would a log file contain a * next to the date?
An engineer must configure the strongest password authentication to locally authenticate on a router. Which configuration must be used?
Which Python code snippet must be added to the script to save the returned configuration as a JSON-formatted file?
A)
B)
C)
D)
What is the function of a control-plane node In a Cisco SD-Access solution?
Refer to the exhibit.
An engineer must configure a SPAN session. What is the effect of the configuration?
Refer to the exhibit.
What is the result when a technician adds the monitor session 1 destination remote vlan 223 command1?
Refer to the exhibit. PC-1 must access the web server on port 8080. To allow this traffic, which statement must be added to an access control list that is applied on SW2 port G0/0 in the inbound direction?
Refer to the exhibit. An engineer attempts to configure a router on a stick to route packets between Clients, Servers, and Printers; however, initial tests show that this configuration is not working. Which command set resolves this issue?
A)
B)
C)
D)
If a client's radio device receives a signal strength of -67 dBm and the noise floor is -85 dBm, what is the SNR value?
Which two items are found in YANG data models? (Choose two.)
Refer to the exhibit.
What does the output confirm about the switch's spanning tree configuration?
An engineer creates the configuration below. Drag and drop the authentication methods from the left into the order of priority on the right. Not all options are used.
What is the wireless received signal strength indicator?
Refer the exhibit.
Which router is the designated router on the segment 192.168.0.0/24?
Refer to the exhibit.
Which command set changes the neighbor state from Idle (Admin) to Active?
A)
B)
C)
D)
Which action is performed by Link Management Protocol in a Cisco StackWise Virtual domain?
Refer to the exhibit.
An engineer must configure and validate a CoPP policy that allows the network management server to monitor router R1 via SNMP while protecting the control plane. Which two commands or command sets must be used? (Choose two.)
An engineer must create an EEM script to enable OSPF debugging in the event the OSPF neighborship goes down. Which script must the engineer apply?
Which OSPF networks types are compatible and allow communication through the two peering devices?
Which feature does Cisco TrustSec use to provide scalable, secure communication throughout a network?
Refer to the exhibit.
An engineer must add the SNMP interface table to the NetFlow protocol flow records. Where should the SNMP table option be added?
Refer to the exhibit.
After the code is run on a Cisco IOS-XE router, the response code is 204.
What is the result of the script?
Drag and drop the descriptions from the left onto the routing protocol they describe on the right.
Which solution do laaS service providers use to extend a Layer 2 segment across a Layer 3 network?
An engineer must protect their company against ransom ware attacks. Which solution allows the engineer to block the execution stage and prevent file encryption?
A customer wants to provide wireless access to contractors using a guest portal on Cisco ISE. The portal Is also used by employees A solution is implemented, but contractors receive a certificate error when they attempt to access the portal Employees can access the portal without any errors. Which change must be implemented to allow the contractors and employees to access the portal?
Which function does a fabric edge node perform in an SD-Access deployment?
When are multicast RPs required?
Refer to the exhibit. Router BRDR-1 is configured to receive the 0.0.0.0/0 and 172.17.1.0/24 network via BGP and advertise them into OSPF are 0. An engineer has noticed that the OSPF domain is receiving only the 172.17.1.0/24 route and default route 0.0.0.0/0 is still missing. Which configurating must engineer apply to resolve the problem?
Drag and drop the characteristics from the left onto the routing protocols they describe on the right
Refer to the exhibit.
An engineer is designing a guest portal on Cisco ISE using the default configuration. During the testing phase, the engineer receives a warning when displaying the guest portal. Which issue is occurring?
How cloud deployments differ from on-prem deployments?
Which method is used by an AP to join HA controllers and is configured in NVRAM?
Which technology uses network traffic telemetry, contextual information, and file reputation to provide insight into cyber threats?
Refer to the exhibit.
An engineer attempts to establish BGP peering between router CORP and two ISP routers. What is the root cause for the failure between CORP and ISP#2?
Which technology is used as the basis for the cisco sd-access data plane?
An engineer configures GigabitEthernet 0/1 for VRRP group 115. The router must assume the primary role when it has the highest priority in the group. Which command set is required to complete this task?
Refer to the exhibit.
An engineer must create a configuration that prevents R3from receiving the LSA about 172.16.1.4/32.Which configuration set achieves this goal?
Drag and drop the characteristics from the left onto the infrastructure deployment models on the right.
A network engineer is enabling HTTPS access to the core switch, which requires a certificate to be installed on the switch signed by the corporate certificate authority Which configuration commands are required to issue a certificate signing request from the core switch?
A)
B)
C)
D)
An engineer is configuring a GRE tunnel interface in the default mode. The engineer has assigned an IPv4 address on the tunnel and sourced the tunnel from an Ethernet interface. Which option also is required on the tunnel interface before it is operational?
In which two ways does TCAM differ from CAM? (Choose two.)
A network engineer must configure a router to send logging messages to a syslog server based on these requirements:
Which configuration must be used?
Refer to the exhibit.
An engineer must configure static NAT on R1 lo allow users HTTP access to the web server on TCP port 80. The web server must be reachable through ISP 1 and ISP 2. Which command set should be applied to R1 to fulfill these requirements?
Which NGFW mode block flows crossing the firewall?
An engineer must create an EEM applet that sends a syslog message in the event a change happens in the network due to trouble with an OSPF process. Which action should the engineer use?
The login method is configured on the VTY lines of a router with these parameters
Which configuration accomplishes this task?
Refer to the exhibit.
An engineer configures OSPF and wants to verify the configuration Which configuration is applied to this device?
A)
B)
C)
D)
Refer to the exhibit.
An engineer must establish eBGP peering between router R3 and router R4. Both routers should use their loopback interfaces as the BGP router ID. Which configuration set accomplishes this task?
Drag and drop the snippets onto the blanks within the code to construct a script that advertises the network prefix 192.168.5.0/24 into a BGP session. Not all options are used
How does Cisco Express Forwarding switching differ from process switching on Cisco devices?
In lhe Cisco DNA Center Image Repository, what is a golden image?
Refer to the exhibit.
The OSPF neighborship fails between two routers. What is the cause of this issue?
Refer to the exhibit. An engineer must configure an ERSPAN tunnel that mirrors traffic from linux1 on Switch1 to Linux2 on Switch2. Which command must be added to the destination configuration to enable the ERSPAN tunnel?
What is stateful switchover?
Refer to the exhibit. What is the cause of the communication failure between R1 and R4?
Which configuration restricts the amount of SSH traffic that a router accepts to 100 kbps?
A)
B)
C)
D)
Refer to the exhibit. Clients report that they cannot connect to this SSID using the provided PSK. Which action will resolve this issue?
A customer has 20 stores located throughout a city. Each store has a single Cisco access point managed by a central WLC. The customer wants to gather analysis for users in each store. Which technique supports these requirements?
Refer to the exhibit Users cannot reach the web server at 192.168 100 1. What is the root cause for the failure?
Which configuration enables a device to be configured via NETCONF over SSHv2?
A)
B)
C)
D)
What is one method for achieving REST API security?
A customer has a pair of Cisco 5520 WLCs set up in an SSO cluster to manage all APs. Guest traffic is anchored to a Cisco 3504 WLC located in a DMZ. Which action is needed to ensure that the EolP tunnel remains in an UP state in the event of failover on the SSO cluster?
A network administrator for a small office is adding a passive IDS to its network switch for the purpose of inspecting network traffic. Which of the following should the administrator use?
By default, which virtual MAC address does HSRP group 12 use?
What is an advantage of utilizing data models in a multivendor environment?
Refer to the exhibit. Which configuration is required to summarize the Area 2 networks that are advertised to Area 0?
What is the function of the fabric control plane node in a Cisco SD-Access deployment?
Refer to the exhibit.
An engineer deploys a script to retrieve the running configuration from a NETCONF-capable Cisco IOS XE device that is configured with default settings. The script fails. Which configuration must be applied to retrieve the configurauon using NETCONF?
What is a characteristics of Cisco SD-WAN?
When a DNS host record is configured for a new Cisco AireOS WLC, which hostname must be added to allow APs to successfully discover the WLC?
An engineer is configuring RADIUS-Based Authentication with EAP. MS-CHAPv2 is configured on a client device. Which outer method protocol must be configured on the ISE to support this authentication type?
Refer to the exhibit. Cisco IOS routers R1 and R2 are interconnected using interface Gi0/0. Which configuration allows R1 and R2 to form an OSPF neighborship on interface Gi0/0?
An engineer is configuring RADIUS-Based Authentication with EAP MS-CHAPv2 is configured on a client device.
Which outer method protocol must be configured on the ISE to support this
authentication type?
Which LISP component decapsulates messages and forwards them to the map server responsible for the egress tunnel routers?
A switch is attached to router R1 on its gig 0/0 interface. Fort security reasons, you want to prevent R1 from sending OSPF hellos to the switch. Which command should be enabled to accomplish this?
Refer to the exhibit. A network engineer configures NAT on R1 and enters me show command to verity me configuration What toes the output confirm?
Drag and drop the characteristics from the left onto the orchestration tool classifications on the right.
How does a Type 1 hypervisor function?
Which two new security capabilities are introduced by using a next-generation firewall at the Internet edge? (Choose two.)
Which of the following attacks becomes more effective because of global leakages of users' passwords?
Drag and drop the code snippets from the bottom onto the blanks in the script to convert a Python object into a JSON string. Not all options are used.
Which TLV value must be added to Option 43 when DHCP is used to ensure that APs join the WLC?
Refer to the exhibit. An engineer must protect the CPU of the router from high rates of NTP, SNMP, and SSH traffic. Which two configurations must be applied to drop these types of traffic when it continuously exceeds 320 kbps? (Choose two)
Drag and drop the characteristics from the left onto the deployment model on the right.
Which device, in a LISP routing architecture, receives and de-encapsulates LISP traffic for endpoints within a LISP-capable site?
Which function does a Cisco SD-Access extended node perform?
Refer to the exhibit.
An LACP port channel is configured between Switch-1 and Switch-2, but It falls to come up. Which action will resolve the issue?
What is one role of the VTEP in a VXLAN environment?
Drag and drop the characteristics from the left onto the switching architectures on the right.
Refer to the exhibit.
Only administrators from the subnet 10.10.10.0/24 are permitted to have access to the router. A secure protocol must be used for the remote access and management of the router instead of clear-text protocols. Which configuration achieves this goal?
What does the statement print(format(0.8, '.0%')) display?
What are two characteristics of Cisco SD-Access elements? (Choose two.)
In which way are EIGRP and OSPF similar?
When a wired client connects to an edge switch in a Cisco SD-Access fabric, which component decides whether the client has access to the network?
Based on the router's API output In JSON format below, which Python code will display the value of the 'role' key?
Refer to the exhibit.
An engineer configures a new WLAN that will be used for secure communications; however, wireless clients report that they are able to communicate with each other. Which action resolves this issue?
What is a characteristics of traffic shaping?
A network administrator is preparing a Python scrip to configure a Cisco IOS XE-based device on the network. The administrator is worried that colleagues will make changes to the device while the script is running. Which operation of he in client manager prevent colleague making changes to the device while the scrip is running?
the following system log message is presented after a network administrator configures a GRE tunnel:
%TUN-5-RECURDOWN Interface Tunnel 0 temporarily disabled due to recursive routing
Why is tunnel 0 disabled?
Drag and drop the LISP components on the left to the correct description on the right.
An engineer must configure GigabitEthernet 0/0 for VRRP group 65. The rouler must assume the primary rote when it has the highest priority in the group. Which command set must be applied?
A)
B)
C)
D)
Refer to Ihe exhibit. An engineer must update the existing configuation to achieve these resu ts:
• Only administrators from the 192.168 1.0.'?4 subnet can access the vty lines.
* Access to the vty lines using clear-text protocols is prohibited.
Which command set should be appled?
A)
B)
C)
D)
Which JSON script is properly formatted?
A)
B)
C)
D)
A firewall address of 192 166.1.101 can be pinged from a router but, when running a traceroute to It, this output is received
What is the cause of this issue?
Company policy restricts VLAN 10 to be allowed only on SW1 and SW2. All other VLANs can be on all three switches. An administrator has noticed that VLAN 10 has propagated to SW3. Which configuration corrects the issue?
How does Protocol Independent Multicast function?
Refer to the exhibit. An engineer must allow the FTP traffic from users on 172.16.1.0 /24 to 172.16.2.0 /24 and block all other traffic. Which configuration must be applied?
A)
B)
C)
D)
What is a characteristics of VXLAN?
Refer to the exhibit.
Which two commands ensure that DSW1 becomes root bridge for VLAN 10 and 20?
Refer to the exhibit. Which two commands ensure that DSW1 becomes root bridge for VLAN 10? (Choose two)
Which of the following should a junior security administrator recommend implementing to mitigate malicious network activity?
What does the destination MAC on the outer MAC header identify in a VXLAN packet?
Which two results occur if Cisco DNA Center loses connectivity to devices in the SD-Access fabric? (Choose two)
Drag and drop the Cisco SD-Access solution areas from the left onto the protocols they use on the right.
An engineer must configure a router to leak routes between two VRFs Which configuration must the engineer apply?
Refer io me exhibit.
An engineer configures the trunk and proceeds to configure an ESPAN session to monitor VLANs10. 20. and 30. Which command must be added to complete this configuration?
Refer the exhibit.
Which configuration elects SW4 as the root bridge for VLAN 1 and puts G0/2 on SW2 into a blocking state?
A)
B)
C)
D)
What is the API keys option for REST API authentication?
Refer to the exhibit.
After configuring the BGP network, an engineer verifies that the path between Servers and Server2 Is functional. Why did RouterSF choose the route from RouterDAL instead of the route from RouterCHI?
A system must validate access rights to all its resources and must not rely on a cached permission matrix. If the access level to a given resource is revoked but is not reflected in the permission matrix, the security is violated. Which term refers to this REST security design principle?
Which configuration creates a CoPP policy that provides unlimited SSH access from dient 10.0.0.5 and denies access from all other SSH clients'?
A)
B)
C)
D)
What Is the difference between the MAC address table and TCAM?
Which two Cisco SD-WAN components exchange OMP information?
Which VXLAN component is used to encapsulate and decapsulate Ethernet frames?
Which Python snippet should be used to store the devices data structure in a JSON file?
A)
B)
C)
D)
By default, which virtual MAC address does HSRP group 14 use?
Which method displays text directly into the active console with a synchronous EEM applet policy?
An engineer must configure an EXEC authorization list that first checks a AAA server then a local username. If both methods fail, the user is denied. Which configuration should be applied?
An engineer is configuring Local WebAuth on a Cisco Wireless LAN Controller. According to RFC 5737, WHICH VIRTUAL IP address must be used in this configuration?
A network engineer is configuring OSPF on a router. The engineer wants to prevent having a route to 177.16.0.0/16 learned via OSPF. In the routing table and configures a prefix list using the command ip prefix-list OFFICE seq S deny 172.16.0.0/16. Winch two identical configuration commands must be applied to accomplish the goal? (Choose two.)
What is the recommended minimum SNR for data applications on wireless networks?
If the maximum power level assignment for global TPC 802.11a/n/ac is configured to 10 dBm, which power level effectively doubles the transmit power?
Refer to the exhibit. Which python code parses the response and prints “18:32:21.474 UTC sun Mar 10 2019?
Refer to the exhibit.
An engineer entered the command no spanning-tree bpduguard enable on interface Fa 1/0/7. What is the effect of this command on Fa 1/0/7?
Refer to the exhibit.
What are two effect of this configuration? (Choose two.)
A large campus network has deployed two wireless LAN controllers to manage the wireless network. WLC1 and WLC2 have been configured as mobility peers. A client device roams from AP1 on WLC1 to AP2 on WLC2, but the controller's client interfaces are on different VLANs. How do the wireless LAN controllers handle the inter-subnet roaming?
Refer to the exhibit.
R1 is able to ping the R3 fa0/1 Interface. Why do the extended pings fail?
Refer to the exhibit. Which configuration must be implemented to establish EBGP peering between R1 and R2?
Which protocol is implemented to establish secure control plane adjacencies between Cisco SD-WAN nodes?
A Cisco DNA Center REST API sends a PUT to the /dna/intent/api/v1/network-device endpoint A response code of 504 is received What does the code indicate?
what is a benefit of using a Type 2 hypervisor instead of a Type 1 hypervisor?
Drag and drop the automation characteristics from the left onto the appropriate tools on the right.
Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right.
Which protocol is responsible for data plane forwarding in a Cisco SD-Access deployment?
Refer to the exhibit.
How should the script be completed so that each device configuration is saved into a JSON-formatted file under the device name?
A)
B)
C)
D)
Which Cisco FlexConnect state allows wireless users that are connected to the network to continue working after the connection to the WLC has been lost?
What is an OVF?
Refer to the exhibit. Which command set must be added to permit and log all traffic that comes from 172.20.10.1 in interface GigabitEthernet0/1 without impacting the functionality of the access list?
An engineer must configure a new loopback Interface on a router and advertise the interface as a fa4 in OSPF. Which command set accomplishes this task?
A)
B)
C)
D)
Refer to the exhibit. Which EEM script generates a critical-level syslog message and saves a copy of the running configuration to the bootflash when an administrator saves the running configuration to the startup configuration?
Refer to the exhibit.
Which command set must be applied on R1 to establish a BGP neighborship with R2 and to allow communication from R1 to reach the networks?
A)
B)
C)
D)
Refer to the exhibit. What is achieved by this code?
Refer to the exhibit. A network administrator configured RSPAN to troubleshoot an issue between switch1 and switch2. The switches are connected using interface GigabitEthernet 1/1. An external packet capture device is connected is switch2 interface GigabitEthernet 1/2. Which two commands must be added to complete this configuration? (Choose two)
What does the number in an NTP stratum level represent?
Refer to the exhibit.
A network engineer must configure the router to use the ISE-Servers group for authentication. If both ISE servers are unavailable, the local username database must be used. If no usernames are defined in the configuration, then the enable password must be the last resort to log in. Which configuration must be applied to achieve this result?
What is a characteristics of traffic policing?
Refer to the exhibit. An engineer has configured an IP SLA for UDP echo’s. Which command is needed to start the IP SLA to test every 30 seconds and continue until stopped?
What is one benefit of adopting a data modeling language?
Refer to the exhibit.
An engineer configures routing between all routers and must build a configuration to connect R1 to R3 via a GRE tunnel Which configuration must be applied?
A)
B)
C)
D)
Which type of tunnel Is required between two WLCs to enable Intercontroller roaming?
Which option works with a DHCP server to return at least one WLAN management interface IP address during the discovery phase and is dependent upon the VCI of the AP?
Refer to the exhibit.
What is the effect of introducing the sampler feature into the Flexible NetFlow configuration on the router?
Refer to the exhibit.
An engineer must configure an ERSPAN session with the remote end of the session 10.10.0.1. Which commands must be added to complete the configuration?
A)
B)
C)
D)
Which function does a fabric wireless LAN controller perform In a Cisco SD-Access deployment?
What is a characteristic of a type 2 hypervisor?
Refer to the exhibit. What is generated by the script?
Refer to the exhibit.
Which commands are required to allow SSH connection to the router?
A)
B)
C)
D)
Which benefit is realized by implementing SSO?
Refer to the exhibit. An attacker can advertise OSPF fake routes from 172.16.20.0 network to the OSPF domain and black hole traffic. Which action must be taken to avoid this attack and still be able to advertise this subnet into OSPF?
Which IPv4 packet field carries the QoS IP classification marking?
Refer to the exhibit.
Which command set is needed to configure and verify router R3 to measure the response time from router R3 to the file server located in the data center?
A)
B)
C)
D)
What is one characteristic of the Cisco SD-Access control plane?
Refer to the exhibit. A network engineer must block Telnet traffic from hosts in the range of 10.100 2.248 to 10.100.2 255 to the network 10.100.3.0 and permit everything else. Which configuration must the engineer apply'?
A)
B)
C)
D)
Refer to the exhibit .
Which command must be configured for RESTCONF to operate on port 8888?
What is an emulated machine that has dedicated compute memory, and storage resources and a fully installed operating system?
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
Refer to the exhibit.
The IP SLA is configured in a router. An engineer must configure an EEM applet to shut down the interface and bring it back up when there is a problem with the IP SLA. Which configuration should the engineer use?
Refer to the exhibit. Which action completes the configuration to achieve a dynamic continuous mapped NAT for all users?
Refer to the exhibit. A network engineer configures NAT on R1 and enters the show command to verity the configuration What does the output confirm?
Refer to the exhibit. An engineer attempts to configure a trunk between switch sw1 and switch SW2 using DTP, but the trunk does not form. Which command should the engineer apply to switch SW2 to resolve this issue?
Refer to the exhibit. An engineer must create a script that appends the output of the show process cpu sorted command to a file.
Refer to the exhibit. Communication between London and New York is down. Which command set must be applied to the NewYork switch to resolve the issue?
A)
B)
C)
D)
Which design principle slates that a user has no access by default to any resource, and unless a resource is explicitly granted, it should be denied?
How does Cisco Trustsec enable more access controls for dynamic networking
environments and data centers?
Refer to the exhibit Which single security feature is recommended to provide Network Access Control in the enterprise?
Refer to the exhibit. The connecting between SW1 and SW2 is not operational. Which two actions resolve the issue? (Choose two)
Wireless users report frequent disconnections from the wireless network. While troubleshooting a network engineer finds that after the user a disconnect, the connection re-establishes automatically without any input required. The engineer also notices these message logs .
Which action reduces the user impact?
What is the output of this code?
Refer to Exhibit.
MTU has been configured on the underlying physical topology, and no MTU command has been configured on the tunnel interfaces. What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared?
A customer requests a network design that supports these requirements:
Which protocol does the design include?
Refer to the exhibit.
An engineer is troubleshooting a connectivity issue and executes a traceoute. What does the result confirm?
At which Layer does Cisco DNA Center support REST controls?
Running the script causes the output in the exhibit. Which change to the first line of the script resolves the error?
Refer to the exhibit. Which two commands are needed to allow for full reachability between AS 1000 and AS 2000? (Choose two)
Drag and drop the characteristics from the left onto the orchestration tools they describe on the right.
How is MSDP used to interconnect multiple PIM-SM domains?
When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required?
Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?
Drag and drop the LISP components from the left onto the function they perform on the right. Not all options are used.
While configuring an IOS router for HSRP with a virtual IP of 10 1.1.1. an engineer sees this log message.
Which configuration change must the engineer make?
Refer to the exhibit.
An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as an entry point. Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplish task?
Which two operations are valid for RESTCONF? (Choose two.)
Which component of the Cisco Cyber Threat Defense solution provides user and flow context analysis?
Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial?
Which AP mode allows an engineer to scan configured channels for rogue access points?
An engineer has deployed a single Cisco 5520 WLC with a management IP address of 172.16.50.5/24. The engineer must register 50 new Cisco AIR-CAP2802I-E-K9 access points to the WLC using DHCP option 43. The access points are connected to a switch in VLAN 100 that uses the 172.16.100.0/24 subnet. The engineer has configured the DHCP scope on the switch as follows:
The access points are failing to join the wireless LAN controller. Which action resolves the issue?
Refer to the exhibit.
SwitchC connects HR and Sales to the Core switch However, business needs require that no traffic from the Finance VLAN traverse this switch Which command meets this requirement?
A)
B)
C)
D)
Refer to the exhibit Drag and drop the snippets into the RESTCONF request to form the request that returns this response Not all options are used
What is a benefit of data modeling languages like YANG?
What is a characteristic of MACsec?
Which two threats does AMP4E have the ability to block? (Choose two.)
Refer to the exhibit.
An engineer configures monitoring on SW1 and enters the show command to verify operation. What does the output confirm?
How does the RIB differ from the FIB?
When is an external antenna used inside a building?
Which two components are supported by LISP? (Choose two.)
Refer to the exhibit.
An engineer must create a configuration that executes the show run command and then terminates the session when user CCNP legs in. Which configuration change is required?
Refer to the exhibit. An engineer configures CoPP and enters the show command to verify the implementation. What is the result of the configuration?
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
What is the centralized control policy in a Cisco SD-WAN deployment?
Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel?
A customer has recently implemented a new wireless infrastructure using WLC-5520 at a site directly next to a large commercial airport. Users report that they intermittently lose WI-FI connectivity, and troubleshooting reveals it is due to frequent channel changes. Which two actions fix this issue? (Choose two)
What does the cisco DNA REST response indicate?
Drag and drop the Qos mechanisms from the left to the correct descriptions on the right
An engineer is concerned with the deployment of new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements?
How does an on-premises infrastructure compare to a cloud infrastructure?
Which devices does Cisco DNA Center configure when deploying an IP-based access control policy?
Which features does Cisco EDR use to provide threat detection and response protection?
Which two operational models enable an AP to scan one or more wireless channels for rouge access points and at the same time provide wireless services to clients? (Choose two.)
Refer to the exhibit. Which configuration change will force BR2 to reach 209 165 201 0/27 via BR1?
What is one benefit of implementing a VSS architecture?
A network administrator has designed a network with two multilayer switches on the distribution layer, which act as default gateways for the end hosts. Which two technologies allow every end host in a VLAN to use both gateways? (Choose two)
Drag and drop the DHCP messages that are exchanged between a client and an AP into the order they are exchanged on the right.
Refer to the exhibit.
An engineer implemented several configuration changes and receives the logging message on switch1. Which action should the engineer take to resolve this issue?
Refer to the exhibit. Which configuration must be applied to R to enable R to reach the server at 172.16.0.1?
A)
B)
C)
D)
In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC?
Refer to the exhibit. Which set of commands on router r R1 Allow deterministic translation of private hosts PC1, PC2, and PC3 to addresses in the public space?
A)
B)
C)
D)
Refer to the exhibit. An engineer is investigating why guest users are able to access other guest user devices when the users are connected to the customer guest WLAN. What action resolves this issue?