All Questions Flashcards
In a Cisco SD-WAN solution, which two functions are performed by OMP? (Choose two)
A. gathering of underlay infrastructure data
B. delivery of crypto keys
C. advertisement of network prefixes and their attributes
D. segmentation and differentiation of traffic
E. configuration of control and data policies
B. delivery of crypto keys
C. advertisement of network prefixes and their attributes
When is an external antenna used inside a building?
A. when it provides the required coverage
B. only when using 2.4 GHz
C. only when using 5 GHz
D. only when using Mobility Express
A. when it provides the required coverage
Which QoS feature uses the IP Precedence bits in the ToS field of the IP packet header to partition traffic into different priority levels?
A. marking
B. policing
C. classification
D. shaping
C. classification
Which two statements about EIGRP load balancing are true? (Choose two)
A. Any path in the EIGRP topology table can be used for unequal-cost load balancing
B. A path can be used for load balancing only if it is a feasible successor
C. EIGRP supports 6 unequal-cost paths
D. EIGRP supports unequal-cost paths by default
E. Cisco Express Forwarding is required to load-balance across interfaces
B. A path can be used for load balancing only if it is a feasible successor
C. EIGRP supports 6 unequal-cost paths
The network provides client access, location-based services, and is monitored using Cisco DNA Center. The security department wants to locate and track malicious devices based on threat signatures. Which feature is required for this solution?
A. malicious rogue rules on the WLC
B. Cisco aWIPS policies on Cisco DNA Center
C. malicious rogue rules on Cisco DNA Center
D. Cisco aWIPS policies on the WLC
B. Cisco aWIPS policies on Cisco DNA Center
Which feature does Cisco TrustSec use to provide scalable, secure communication throughout a network?
A. security group tag number assigned to each port on a network
B. security group tag ACL assigned to each router on a network
C. security group tag ACL assigned to each port on a switch
D. security group tag number assigned to each user on a switch
D. security group tag number assigned to each user on a switch
Configuration Management
mutable infrastructure
designed to install and manage software on existing servers
Orchestration
immutable infrastructure
designed to provision the servers
In a Cisco SD-Access fabric, which control plane protocol is used for mapping and resolving endpoints?
A. VXLAN
B. LISP
C. SXP
D. DHCP
B. LISP
How are the Cisco Express Forwarding table and the FIB related to each other?
A. The Cisco Express Forwarding table allows route lookups to be forwarded to the route processor for processing before they are sent to the FIB
B. There can be only one FIB but multiple Cisco Express Forwarding tables on IOS devices
C. Cisco Express Forwarding uses a FIB to make IP destination prefix-based switching decisions
D. The FIB is used to populate the Cisco Express Forwarding table
C. Cisco Express Forwarding uses a FIB to make IP destination prefix-based switching decisions
two commands ensure that a switch becomes root bridge in MST
spanning-tree mst 1 priority 4096
spanning-tree mst 1 root primary
Which two components are supported by LISP? (Choose two)
A. HMAC algorithm
B. proxy ETR
C. spoke
D. route reflector
E. egress tunnel router
B. proxy ETR
E. egress tunnel router
What is used to measure the total output energy of a Wi-Fi device?
A. dBi
B. dBm
C. mW
D. EIRP
C. mW
Which EtherChannel mode must be configured on the switch to allow the WLC to connect with LAG?
A. On
B. Passive
C. Auto
D. Active
A. On
What is a characteristic of a WLC that is in master controller mode?
A. All wireless LAN controllers are managed by the master controller.
B. All new APs that join the WLAN are assigned to the master controller.
C. The master controller is responsible for load balancing all connecting clients to other controllers.
D. Configuration on the master controller is executed on all wireless LAN controllers.
B. All new APs that join the WLAN are assigned to the master controller.
An engineer must configure a new WLAN that allows a user to enter a passphrase and provides forward secrecy as a security measure. Which Layer 2 WLAN configuration is required on the Cisco WLC?
A. WPA3 Personal
B. WPA2 Personal
C. WPA3 Enterprise
D. WPA2 Enterprise
A. WPA3 Personal
What are two device roles in Cisco SD-Access fabric? (Choose two)
A. border node
B. edge node
C. core switch
D. access switch
E. vBond controller
A. border node
B. edge node
Why would a log file contain a * next to the date?
A. The network device is not configured to use NTP
B. The network device was unable to reach the NTP server when the log messages were recorded.
C. The network device is not configured to use NTP time stamps for logging.
D. The network device was receiving NTP time when the log messages were recorded
A. The network device is not configured to use NTP
An engineer reviews a router’s logs and discovers the following entry. What is the event’s logging severity level?
Router# *Feb 03 11:13:44 334: %LINK-3-UPDOWN: Interface GigabitEthernet0/1, changed state to up
A. informational
B. error
C. warning
D. notification
B. error
Refer to the exhibit.
Which python code parses the response and prints “18:32:21.474 UTC sun Mar 10 2019?
A. print(response[‘result’][‘body’][‘simple_time’])
B. print(response[‘result’][0][‘simple_time’]
C. print(response[result’][‘body’][‘simple_time’])
D. print(response[‘body’][‘simple_time’])
A. print(response[‘result’][‘body’][‘simple_time’])
An engineer is configuring a new SSID to present users with a splash page for authentication. Which WLAN Layer 3 setting must be configured to provide this functionally?
A. CCKM
B. WPA2 Policy
C. Web Policy
D. Local Policy
C. Web Policy
What is the calculation that is used to measure the radiated power of a signal after it has gone through the radio, antenna cable, and antenna?
A. EIRP
B. dBm
C. mW
D. dBi
A. EIRP
Which statement about LISP encapsulation in an EIGRP OTP implementation is true?
A. LISP learns the next hop
B. OTP uses LISP encapsulation for dynamic multipoint tunneling
C. OTP uses LISP encapsulation to obtain routes from neighbors
D. OTP maintains the LISP control plane
B. OTP uses LISP encapsulation for dynamic multipoint tunneling
What is the difference in dBm when an AP power increases from 25 mW to 100mW?
A. 150dBm
B. 6dBm
C. 125dBm
D. 75dBm
B. 6dBm