By default, which virtual MAC address does HSRP group 16 use?
Which two items are found in YANG data models? (Choose two.)
What is a benefit of Type 1 hypervisors?
Which method is used by an AP to join HA controllers and is configured in NVRAM?
Refer to the exhibit.
What is the effect of these commands on the BR and HQ tunnel interfaces?
What is one difference between EIGRP and OSPF?
Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right.
Drag and drop the snippets onto the blanks within the code to construct a script that shows all logging that occurred on the appliance from Sunday until 9:00 p.m Thursday Not all options are used.
What is the function of a control-plane node In a Cisco SD-Access solution?
Refer to the exhibit.
An engineer reconfigures the pot-channel between SW1 and SW2 from an access port to a trunk and immediately notices this error in SW1's log.
Which command set resolves this error?
A)
B)
C)
D)
What is the structure of a JSON web token?
What is the difference between a RIB and a FIB?
What NTP Stratum level is a server that is connected directly to an authoritative time source?
Refer to the exhibit.
An engineer configures the BGP adjacency between R1 and R2, however, it fails to establish Which action resolves the issue?
Refer to the exhibit.
Cisco DNA Center has obtained the username of the client and the multiple devices that the client is using on the network. How is Cisco DNA Center getting these context details?
A network engineer must configure a router to send logging messages to a syslog server based on these requirements:
uses syslog IP address: 10.10.10.1
uses a reliable protocol
must not use any well-known TCP/UDP ports
Which configuration must be used?
Which cisco DNA center application is responsible for group-based accesss control permissions?
What is required for a virtual machine to run?
Refer to the exhibit:
An engineer configures VRRP and issues the show commands to verify operation. What does the engineer confirm about VRRP group 1 from the output?
When are multicast RPs required?
How are map-register messages sent in a LISP deployment?
Refer to the exhibit. Which command is required to verify NETCONF capability reply messages?
In a three-tier hierarchical campus network design, which action is a design best-practice for the core layer?
An engineer must create a new SSID on a Cisco 9800 wireless LAN controller. The client has asked to use a pre-shared key for authentication Which profile must the engineer edit to achieve this requirement?
An engineer must configure AAA on a Cisco 9800 WLC for central web authentication Which two commands are needed to accomplish this task? (Choose two.)
Drag and drop the descriptions of the VSS technology from the left to the right. Not all options are used.
A network administrator is implementing a routing configuration change and enables routing debugs to track routing behavior during the change. The logging output on the terminal is interrupting the command typing process. Which two actions can the network administrator take to minimize the possibility of typing commands incorrectly? (Choose two.)
Refer to the exhibit.
Which JSON syntax is derived from this data?
A)
B)
C)
D)
An engineer must create an EEM applet that sends a syslog message in the event a change happens in the network due to trouble with an OSPF process. Which action should the engineer use?
AN engineer is implementing a route map to support redistribution within BGP. The route map must configured to permit all unmatched routes. Which action must the engineer perform to complete this task?
Drag and drop characteristics of PIM dense mode from the left to the right.
Refer to the exhibit.
An engineer attempts to establish BGP peering between router CORP and two ISP routers. What is the root cause for the failure between CORP and ISP#2?
Why is an AP joining a different WLC than the one specified through option 43?
An engineer configures a WLAN with fast transition enabled Some legacy clients fail to connect to this WLAN Which feature allows the legacy clients to connect while still allowing other clients to use fast transition based on then OLTIs?
In a Cisco SD-Access solution, which protocol is used by an extended node to connect to a single edge node?
Refer to the exhibit.
Which two facts does the device output confirm? (Choose two.)
What does the LAP send when multiple WLCs respond to the CISCO_CAPWAP-CONTROLLER.localdomain hostname during the CAPWAP discovery and join process?
Refer to the exhibit.
Which command set changes the neighbor state from Idle (Admin) to Active?
A)
B)
C)
D)
Refer to the exhibit.
What is the result when a technician adds the monitor session 1 destination remote vlan 223 command1?
When firewall capabilities are considered, which feature is found only in Cisco next-generation firewalls?
What is a VPN in a Cisco SD-WAN deployment?
A network engineer is enabling HTTPS access to the core switch, which requires a certificate to be installed on the switch signed by the corporate certificate authority Which configuration commands are required to issue a certificate signing request from the core switch?
A)
B)
C)
D)
A network engineer is adding an additional 10Gps link to an exiting 2x10Gps LACP-based LAG to augment its capacity. Network standards require a bundle interface to be taken out of service if one of its member links goes down, and the new link must be added with minimal impact to the production network. Drag and drop the tasks that the engineer must perform from the left into the sequence on the right. Not all options are used.
Refer to the exhibit. PC-1 must access the web server on port 8080. To allow this traffic, which statement must be added to an access control list that is applied on SW2 port G0/0 in the inbound direction?
What is the responsibility of a secondary WLC?
Dragand drop the snippets onto the blanks within the code toconstruct a script that adds a prefix list to a route map and sets the local preference. Not all options are used
Which method does Cisco DNA Center use to allow management of non-Cisco devices through southbound protocols?
Refer to the exhibit.
An engineers reaching network 172 16 10 0/24 via the R1-R2-R4 path. Which configuration forces the traffic to take a path of R1-R3-R4?
A)
B)
C)
D)
Refer to the exhibit. A network engineer must configure NETCONF. After creating the configuration, the engineer gets output from the command show line, but not from show running-config. Which command completes the configuration?
OR
OR
OR
OR
What is one difference between the RIB and the FIB?
An engineer must contigure a rou'.er to allow users to run specHic configuration commands by validating the user against the router database. Which configuration must be applied?
Why would an architect use an OSPF virtual link?
What are two benefits of using Cisco TrustSec? (Choose two.)
A technician is assisting a user who cannot connect to a website. The technician attempts to ping the default gateway and DNS server of the workstation. According to troubleshooting methodology, this is an example of:
Refer to the exhibit. An administrator writes a script to fetch the list of devices that are registered with Cisco DNA Center. Why does the execution abort?
Which JSON script is properly formatted?
A)
B)
C)
D)
Refer to the exhibit. An engineer must update the existing configuration to achieve these results
Only administrators from the 192.168.1.0/24 subnet can access the vty lines.
Access to the vty lines using dear-text protocols is prohibited.
Which command set should be applied?
Where is the wireless LAN controller located in a mobility express deployment?
Simulation 04
Refer to the exhibit. What does the Python code accomplish?
Refer to the exhibit. What is the value of the variable list after the code is run?
A company hires a network architect to design a new OTT wireless solution within a Cisco SD-Access Fabric wired network. The architect wants to register access points to the WLC to centrally switch the traffic. Which AP mode must the design include?
Refer to the exhibit.
Which command « required to validate that an IP SLA configuration matches the traffic between the branch office and the central site?
How does the Cisco SD-Access control plane simplify traditional routing environments?
Refer to the exhibit. Which two configurations enable R1 and R2 to advertise routes into OSPF? (Choose two)
A)
B)
C)
D)
E)
Drag and drop the automation characteristics from the left to the corresponding tools on the right.
Which unit of measure is used to measure wireless RF SNR?
An engineer must configure router R1 to validate user logins via RADIUS and fall back to the local user database if the RADIUS server is not available. Which configuration must be applied?
Which method ensures the confidentiality ot data exchanged over a REST API?
Refer to the exhibit.
Which statement is needed to complete the EEM applet and use the Tel script to store the backup file?
What is a benefit of yang?
What is a characteristics of Cisco SD-WAN?
Which of the following security methods uses physical characteristics of a person to authorize access to a location?
Which JSON script is properly formatted?
A)
B)
C)
D)
Refer to the exhibit.
Which result Is achieved by the CoPP configuration?
Which line must be added in the Python function to return the JSON object {"cat_9k": “FXS193202SE")?
A)
B)
C)
D)
Refer to the exhibit.
A network engineer is configuring OSPF between router R1 and router R2. The engineer must ensure that a DR/BDR election does not occur on the Gigabit Ethernet interfaces in area 0. Which configuration set accomplishes this goal?
A)
B)
C)
D)
What does Call Admission Control require the client to send in order to reserve the bandwidth?
Refer to the exhibit. An engineer attempts to create a configuration to allow the Blue VRF to leak into the global routing table, but the configuration does not function as expected. Which action resolves this issue?
Which three methods does Cisco DNA Centre use to discover devices? (Choose three)
Refer to the exhibit. What does the error message relay to the administrator who is trying to configure a Cisco IOS device?
How does EIGRP differ from OSPF?
Refer to the exhibit.
An engineer configures monitoring on SW1 and enters the show command to verify operation. What does the output confirm?
Which command set configures RSPAN to capture outgoing traffic from VLAN 3 on interface GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface?
A)
B)
C)
D)
A network engineer is configuring Flexible Netflow and enters these commands
Sampler Netflow1
Mode random one-out-of 100
Interface fastethernet 1/0
Flow-sampler netflow1
Which are two results of implementing this feature instead of traditional Netflow? (Choose two.)
What is the function of the LISP map resolver?
A network administrator applies the following configuration to an IOS device.
What is the process of password checks when a login attempt is made to the device?
Refer to the exhibit. After configurating an IPsec VPN, an engineer enters the show command to verify the ISAKMP SA status. What does the status show?
which entity is a Type 1 hypervisor?
Refer to the exhibit.
An engineer must modify the access control list EGRESS to allow all IP traffic from subnet 10.1.10.0/24 to 10.1.2.0/24. The access control list is applied in the outbound direction on router interface GigabitEthemet 0/1. Which configuration commands can the engineer use to allow this traffic without disrupting existing traffic flows?
A)
B)
C)
D)
Refer to the exhibit.
Router 1 is currently operating as the HSRP primary with a priority of 110 router1 fails and router2 take over the forwarding role. Which command on router1 causes it to take over the forwarding role when it return to service?
Which exhibit displays a valid JSON file?
Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?
A network administrator has designed a network with two multilayer switches on the distribution layer, which act as default gateways for the end hosts. Which two technologies allow every end host in a VLAN to use both gateways? (Choose two)
What is the function of a fabric border node in a Cisco SD-Access environment?
Refer to the exhibit.
An engineer must deny HTTP traffic from host A to host B while allowing all other communication between the hosts, drag and drop the commands into the configuration to achieve these results. Some commands may be used more than once. Not all commands are used.
What is the data policy in a Cisco SD-WAN deployment?
Refer to the exhibit.
Security policy requires all idle-exec sessions to be terminated in 600 seconds. Which configuration achieves this goal?
Refer to the exhibit.
Based on the configuration in this WLAN security setting, Which method can a client use to authenticate to the network?
Refer to the exhibit.
A network engineer configures a GRE tunnel and enters the show Interface tunnel command. What does the output confirm about the configuration?
Which entity is responsible for maintaining Layer 2 isolation between segments In a VXLAN environment?
Refer to the exhibit. An engineer must create a script that appends the output of the show process cpu sorted command to a file.
When is an external antenna used inside a building?
Refer to the exhibit. Communication between London and New York is down. Which command set must be applied to the NewYork switch to resolve the issue?
A)
B)
C)
D)
Refer to the exhibit.
A network engineer configures OSPF and reviews the router configuration. Which interface or interface or interface are able to establish OSPF adjacency?
Which command must be applied to R2 for an OSPF neighborship to form?
Running the script causes the output in the exhibit. Which change to the first line of the script resolves the error?
Refer to the exhibit. Which configuration change will force BR2 to reach 209 165 201 0/27 via BR1?
Wireless users report frequent disconnections from the wireless network. While troubleshooting a network engineer finds that after the user a disconnect, the connection re-establishes automatically without any input required. The engineer also notices these message logs .
Which action reduces the user impact?
How are the different versions of IGMP compatible?
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
Refer to the exhibit How was spanning-tree configured on this interface?
Refer to the exhibit.
A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Which two configuration changes accomplish this? (Choose two).
What is a characteristic of a next-generation firewall?
Drag and drop the wireless elements on the left to their definitions on the right.
Refer to the exhibit. An engineer attempts to configure a trunk between switch sw1 and switch SW2 using DTP, but the trunk does not form. Which command should the engineer apply to switch SW2 to resolve this issue?
Refer to the exhibit.Anetwork engineer configuresNATon R1 and enters theshowcommand to verity the configuration What does the output confirm?
When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?
Which two operations are valid for RESTCONF? (Choose two.)
In a Cisco SD-Access solution, what is the role of the Identity Services Engine?
Refer to the exhibit. What is the effect of this configuration?
In cisco SD_WAN, which protocol is used to measure link quality?
An engineer must configure HSRP group 300 on a Cisco IOS router. When the router is functional, it must be the must be the active HSRP router. The peer router has been configured using the default priority value. Which command set is required?
A)
B)
C)
D)
Refer to the exhibit.
The EtherChannel between SW2 and SW3 is not operational which action resolves this issue?
A firewall address of 192 166.1.101 can be pinged from a router but, when running a traceroute to It, this output is received
What is the cause of this issue?
What is the rose of the vSmart controller in a Cisco SD-WN environment?
Refer to the exhibit.
These commands have been added to the configuration of a switch Which command flags an error if it is added to this configuration?
By default, which virtual MAC address does HSRP group 30 use?
In lhe CiscoDNACenter Image Repository, what is a golden image?
Which two steps are required for a complete Cisco DNA Center upgrade? (Choose two.)
Which LISP component decapsulates messages and forwards them to the map server responsible for the egress tunnel routers?
Refer to the exhibit. An engineer builds an EEM script to apply an access list. Which statement must be added to complete the script?
Refer to the exhibit.
Which GRE tunnel configuration command is missing on R2?
Which IP SLA operation requires the IP SLA responder to be configured on the remote end?
A customer has 20 stores located throughout a city. Each store has a single Cisco access point managed by a central WLC. The customer wants to gather analysis for users in each store. Which technique supports these requirements?
How does Protocol Independent Multicast function?
Refer to the exhibit.
A company has an internal wireless network with a hidden SSID and RADIUS-based client authentication for increased security. An employee attempts to manually add the company network to a laptop, but the laptop does not attempt to connect to the network. The regulatory domains of the access points and the laptop are identical. Which action resolves this issue?
By default, which virtual MAC address does HSRP group 15 use?
How is a data modelling language used?
In which two ways does the routing protocol OSPF differ from EIGRP? (Choose two.)
Which configuration restricts the amount of SSH traffic that a router accepts to 100 kbps?
A)
B)
C)
D)
Based ontherouter's API output In JSON format below, which Python code will display the value of the 'role' key?
Drag and drop the characteristics from the left onto the switching architectures on the right.
Refer to the exhibit.
Which two commands ensure that DSW1 becomes the root bridge for VLAN 10 and 20? (Choose two.)
A customer has a wireless network deployed within a multi-tenant building. The network provides client access, location-based services, and is monitored using Cisco DNA Center. The security departmentwants to locate and track malicious devices based on threat signatures. Which feature is required for this solution?
Refer to the exhibit. What are two results of the NAT configuration? (Choose two.)
An engineer is connected to a Cisco router through a Telnet session. Which command must be issued to view the logging messages from the current session as soon as they are generated by the router?
What is the result of applying this access control list?
What does a YANG model provide?
Company policy restricts VLAN 10 to be allowed only on SW1 and SW2. All other VLANs can be on all three switches. An administrator has noticed that VLAN 10 has propagated to SW3. Which configuration corrects the issue?
Refer to the exhibit.
Only administrators from the subnet 10.10.10.0/24 are permitted to have access to the router. A secure protocol must be used for the remote access and management of the router instead of clear-text protocols. Which configuration achieves this goal?
What is one characteristic of Cisco DNA Center and vManage northbound APIs?
An engineer must create a script to append and modify device entries in a JSON-formatted file. The script must work as follows:
Until interrupted from the keyboard, the script reads in the hostname of a device, its management IP address, operating system type, and CLI remote access protocol.
After being interrupted, the script displays the entered entries and adds them to the JSON-formatted file, replacing existing entries whose hostname matches.
The contents of the JSON-formatted file are as follows:
Drag and drop the statements onto the blanks within the code to complete the script. Not all options are used.
Using the EIRP formula,what parameter is subtracted to determine the EIRP value?
Drag the characteristics from the left onto the routing protocols they describe on the right.
Refer to the exhibit.
Extended access-list 100 is configured on interface GigabitEthernet 0/0 in an inbound direction, but it does not have the expected behavior of allowing only packets to or from 192.168.0.0/16. Which command set properly configures the access list?
How does SSO work with HSRP to minimize network disruptions?
Simulation 02
Configure HSRPbetweenDISTRO-SW1andDISTRO-SW2on VLAN 100 for hosts connected to ACCESS-SW1 to achieve these goals:
1. Configure group number 1 using the virtual IP address of 192.168.1.1/24.
2. Configure DlSTRO-SW1 as the active router using a priority value of 110 and DISTRO-SW2 as the standby router.
3. Ensure that DISTRO-SW2 will take over the active role when DISTRO-SW1 goes down, and when DISTRO-SW1 recovers, it automatically resumes the active role.
DISTRO-SW2
In a Cisco SD-Access fabric, which control plane protocol is used for mapping and resolving endpoints?
If AP power level is increased from 25 mW to 100 mW. what is the power difference in dBm?
What is an advantage of utilizing data models in a multivendor environment?
Which two features are available only in next-generation firewalls? (Choose two.)
Refer to the exhibit.
What is output by this code?
Drag and drop the characteristics from the left onto the switching architectures on the right.
How do the RIB and the FIB differ?
What is one characteristic of VXLAN?
What is one role of the VTEP in a VXLAN environment?
the following system log message ispresented after a network administrator configures a GRE tunnel:
%TUN-5-RECURDOWN Interface Tunnel 0 temporarily disabled due to recursive routing
Why is tunnel 0 disabled?
Refer to the exhibit.
Both controllers are in the same mobility group. Which result occurs when client 1 roams between APs that are registered to different controllers in the same WLAN?
Refer to the exhibit.
Why does the OSPF neighborship fail between the two interfaces?
Which QoS feature uses the IP Precedence bits in the ToS field of the IP packet header to partition traffic into different priority levels?
Witch two actions provide controlled Layer 2 network connectivity between virtual machines running on the same hypervisor? (Choose two.)
Which Python library is used to work with YANG data models via NETCONF?
Refer to the exhibit.
The administrator troubleshoots an EtherChannel that keeps moving to err-disabled. Which two actions must be taken to resolve the issue? (Choose two.)
By default, which virtual MAC address does HSRP group 32 use?
Refer to the exhibit. An engineer must configure an eBGP neighborship to Router B on Router A. The network that is connected to GO/1 on Router A must be advertised to Router B. Which configuration should be applied?
A)
B)
C)
D)
What is the purpose of an RP in PIM?
Which configuration creates a CoPP policy that provides unlimited SSH access from dient 10.0.0.5 and denies access from all other SSH clients'?
A)
B)
C)
D)
Which two solutions are used for backing up a Cisco DNA Center Assurance database? (Choose two)
Refer to the exhibit. A network engineer checks connectivity between two routers. The engineer can ping the remote endpoint but cannot see an ARP entry. Why is there no ARP entry?
An engineer must configure a router to leak routes between two VRFs Which configuration must the engineer apply?
What is a characteristic of the overlay network in the Cisco SD-Access architecture?
Refer to the exhibit.
What is the effect of introducing the sampler feature into the Flexible NetFlow configuration on the router?
Refer to the exhibit .
Which command must be configured for RESTCONF to operate on port 8888?
What is one benefit of adopting a data modeling language?
What is a characteristic of a type 2 hypervisor?
What is a TLOC in a Cisco SD-WAN deployment?
Refer to the exhibit. A network engineer must be notified when a user switches to configuration mode. Which script should be applied to receive an SNMP trap and a critical-level log message?
A)
B)
C)
D)
Drag and drop the characteristics from the left to the table types on the right.
Which protocol is responsible for data plane forwarding in a Cisco SD-Access deployment?
Refer to the exhibit.
An engineer must allow all users in the 10.2.2.0/24 subnet to access the Internet. To conserve address space the public Interface address of 209 165 201.1 must be usedfor all external communication. Which command set accomplishes these requirements?
A)
B)
C)
D)
What is the calculation that is used to measure the radiated power of a signal after it has gone through the radio, antenna cable, and antenna?
Refer to the exhibit. What is generated by the script?
Refer to the exhibit. An engineer has configured an IP SLA for UDP echo’s. Which command is needed to start the IP SLA to test every 30 seconds and continue until stopped?
By default, which virtual MAC address does HSRP group 14 use?
What Is a characteristic of a WLC that is in master controller mode?
Which protocol is implemented to establish secure control plane adjacencies between Cisco SD-WAN nodes?
Drag and drop the characteristics from the left onto the infrastructure deployment models on the right.
Refer to the exhibit.
Object tracking has been configured for VRRP-enabled routers Edge-01 and Edge-02 Which commands cause Edge-02 to preempt Edge-01 in the event that interface G0/0 goes down on Edge-01?
A)
B)
C)
D)
What Is the difference between the MAC address table and TCAM?
Drag and drop the characteristics from the left onto the deployment types on the right.
Refer to the exhibit.
Which command set must be applied on R1 to establish a BGP neighborship with R2 and to allow communication from R1 to reach the networks?
A)
B)
C)
D)
An engineer is configuring Local WebAuth on a Cisco Wireless LAN Controller. According to RFC 5737, WHICH VIRTUAL IP address must be used in this configuration?
Which method displays text directly into the active console with a synchronous EEM applet policy?
Which function does a fabric AP perform in a cisco SD-access deployment?
Drag and drop the LIPS components on the left to the correct description on the right.
Refer to the exhibit. Which EEM script generates a critical-level syslog message and saves a copy of the running configuration to the bootflash when an administrator saves the running configuration to the startup configuration?
Refer to the exhibit. An engineer tries to log in to router R1. Which configuration enables a successful login?
A)
B)
C)
D)
Refer to the exhibit. Which python code parses the response and prints “18:32:21.474 UTC sun Mar 10 2019?
An engineer must configure an ACL that permits packets which include an ACK in the TCP header Which entry must be included in the ACL?
Refer to the exhibit. What is achieved by this code?
What is one characteristic of the Cisco SD-Access control plane?
How do EIGRP metrics compare to OSPF metrics?
Refer to the exhibit. Which command set must be added to permit and log all traffic that comes from 172.20.10.1 in interface GigabitEthernet0/1 without impacting the functionality of the access list?
Refer to the exhibit.
R1 is able to ping the R3 fa0/1 Interface. Why do the extended pings fail?
Which function does a fabric wireless LAN controller perform In a Cisco SD-Access deployment?
A network engineer is configuring OSPF on a router. The engineer wants to prevent having a route to 177.16.0.0/16 learned via OSPF. In the routing table and configures a prefix list using the command ip prefix-list OFFICE seq S deny 172.16.0.0/16. Winch two identical configuration commands must be applied to accomplish the goal? (Choose two.)
In a Cisco Catalyst switch equipped with two supervisor modules an administrator must temporally remove the active supervisor from the chassis to perform hardware maintenance on it. Which mechanism ensure that the active supervisor removal is not disruptive to the network operation?
Drag and drop the LISP components on the left to their descriptions on the right. Not all options are used.
Refer to the exhibit.
What is the result of the API request?
Which definition describes JWT in regard to REST API security?
Which option must be used to support a WLC with an IPv6 management address and 100 Cisco Aironet 2800 Series access points that will use DHCP to register?