Encor Questions Flashcards

1
Q
An engineer must export the contents of the devices object in JSON format. Which statement must be use?
A. json.print(Devices) 
B. json.loads(Devices) 
C. json.dumps(Devices) 
D. json.repr(Devices)
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An engineer troubleshoots connectivity issues with an application. Testing is performed from the server gateway, and traffic with the DF bit set is dropped along the path after increasing packet size. Removing the DF bit setting at the gateway prevents the packets from being dropped. What is the cause of this issue?
A. PMTUD does not work due to ICMP Packet Too Big messages being dropped by an ACL
B. The remote router drops the traffic due to high CPU load
C. The server should not set the DF bit in any type of traffic that is sent toward the network
D. There is a CoPP policy in place protecting the WAN router CPU from this type of traffic

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the function of Cisco DNA Center in a Cisco SD-Access deployment?
A. It is responsible for routing decisions inside the fabric
B. It is responsible for the design, management, provisioning, and assurance of the fabric network devices
C. It possesses information about all endpoints, nodes, and external networks related to the fabric
D. It provides integration and automation for all nonfabric nodes and their fabric counterparts

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network engineer must configure a password expiry mechanism on the gateway router for all local passwords to expire after 60 days. What is required to complete this task?
A. Add the username admin privilege 15 common-criteria-policy Administrators password 0 Cisco013579! command
B. No further action is required. The configuration is complete
C. Add the aaa authentication enable default Administrators command
D. The password expiry mechanism is on the AAA server and must be configured there

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An engineer configures VRRP and issues the show commands to verify operation. What does the engineer confirm about VRRP group 1 from the output?
A. There is no route to 10.10.1.1/32 in R2’s routing table
B. If R1 reboots, R2 becomes the master virtual router until R2 reboots
C. Communication between VRRP members is encrypted using MD5
D. R1 is master if 10.10.1.1/32 is in its routing table

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are two benefits of YANG? (Choose two)
A. It collects statistical constraint analysis information
B. In enforces the use of specific encoding format for NETCONF
C. In enforces configuration semantics
D. It enables multiple leaf statements to exist within a leaf list E. It enforces configuration constraints

A

Answer: B E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An engineer configures VRRP and issues the show commands to verify operation. What does the engineer confirm about VRRP group 1 from the output?
A. There is no route to 10.10.1.1/32 in R2’s routing table
B. If R1 reboots, R2 becomes the master virtual router until R2 reboots
C. Communication between VRRP members is encrypted using MD5
D. R1 is master if 10.10.1.1/32 is in its routing table

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
An engineer must add the SNMP interface table to the NetFlow protocol flow records. Where should the SNMP table option be added?
A. under the interface 
B. under the flow record 
C. under the flow monitor 
D. under the flow exporter
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the effect of these commands on the BR and HQ tunnel interfaces?
A. The tunnel line protocol goes down when the keepalive counter reaches 6
B. The keepalives are sent every 5 seconds and 3 retries
C. The keepalives are sent every 3 seconds and 5 retries.
D. The tunnel line protocol goes down when the keepalive counter reaches 5

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
In Cisco SD-WAN, which protocol is used to measure link quality?
A. OMP 
B. BFD 
C. RSVP 
D. IPsec
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is used to perform QoS packet classification?
A. the Options field in the Layer 3 header
B. the Type field in the Layer 2 frame
C. the Flags field in the Layer 3 header
D. the ToS field in the Layer 3 header

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which HTTP code must be returned to prevent the script from exiting?
A. 200 
B. 201
C. 300 
D. 301
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which LISP component is required for a LISP site to communicate with a non-LISP site?
A. ETR 
B. ITR 
C. Proxy ETR 
D. Proxy ITR
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a characteristic of a next-generation firewall?
A. only required at the network perimeter
B. required in each layer of the network
C. filters traffic using Layer 3 and Layer 4 information only
D. provides intrusion prevention

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which technology is used as the basis for the Cisco SD-Access data plane?
A. IPsec 
B. LISP 
C. VXLAN 
D. 802.1Q
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

“HTTP/1.1 204 content” is returned when cur -l -x DELETE command is issued. Which situation has occurred?
A. The object could not be located at the URI path
B. The command succeeded in deleting the object
C. The object was located at the URI, but it could not be deleted
D. The URI was invalid

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
An engineer must provide wireless converge in a square office. The engineer has only one AP and believes that it should be placed it in the middle of the room. Which antenna type should the engineer use?
A. directional 
B. polarized 
C. Yagi 
D. omnidirectional
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

While configuring an IOS router for HSRP with a virtual IP of 10.1.1.1, an engineer sees this log message:
Which configuration change must the engineer make?
A. Change the HSRP group configuration on the remote router to 1
B. Change the HSRP virtual address on the local router to 10.1.1.1
C. Change the HSRP virtual address on the remote router to 10.1.1.1
D. Change the HSRP group configuration on the local router to 1

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a characteristic of YANG?
A. It is a Cisco proprietary language that models NETCONF data
B. It allows model developers to create custom data types
C. It structures data in an object-oriented fashion to promote model reuse
D. It provides loops and conditionals to control now within models

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the function of the LISP map resolver?
A. to send traffic to non-LISP sites when connected to a service provider that does not accept nonroutable EIDs as packet sources
B. to connect a site to the LISP-capable part of a core network, publish the EID-to-RLOC mappings for the site and respond to map-request messages
C. to decapsulate map-request messages from ITRs and forward the messages to the MS
D. to advertise routable non-USP traffic from one address family to LISP sites in a different address family

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Drag and drop the snippets onto the blanks within the code construct a script that configure a loopback interface with an IP address. Not all options are used.

A

1 – E
2 – F
3 – D
4 – C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Drag and drop the characteristics from the left onto the orchestration tools they describe on the right.

A

Ansible
+ utilizes a push model
+ primary/secondary architecture

Puppet
+ utilizes a pull model
+ multimaster architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How was spanning-tree configured on this interface?
A. By entering the command spanning-tree portfast trunk in the interface configuration mode.
B. By entering the command spanning-tree portfast in the interface configuration mode
C. By entering the command spanning-tree mst1 vlan 10,20,30,40 in the global configuration mode
D. By entering the command spanning-tree vlan 10,20,30,40 root primary in the interface configuration mode

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
An engineer is troubleshooting the AP join process using DNS. Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?
A. cisco-capwap-controller.domain.com 
B. wlchostname.domain.com 
C. ap-manager.domain.com 
D. primary-wlc.domain.com
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

How is Layer 3 roaming accomplished in a unified wireless deployment?
A. An EoIP tunnel is created between the client and the anchor controller to provide seamless connectivity as the client is associated with the new AP
B. The client entry on the original controller is passed to the database on the new controller C. The new controller assigns an IP address from the new subnet to the client
D. The client database on the original controller is updated the anchor entry, and the new controller database is updated with the foreign entry.

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
A network administrator has designed a network with two multilayer switches on the distribution layer, which act as default gateways for the end hosts. Which two technologies allow every end host in a VLAN to use both gateways? (Choose two)
A. HSRP
B. GLBP 
C. MHSRP 
D. VRRP 
E. VSS
A

Answer: B C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
Which measurement is used from a post wireless survey to depict the cell edge of the access points?
A. CCI 
B. Noise 
C. SNR 
D. RSSI
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

While troubleshooting a routing issue, an engineer issues a ping from S1 to S2. Which two actions from the initial value of the TTL? (Choose two)
A. The packet reaches R3, and the TTL expires
B. R2 replies with a TTL exceeded message C. R1 replies with a TTL exceeded message
D. The packet reaches R2 and the TTL expires
E. R3 replies with a TTL exceeded message
F. The packet reaches R1 and the TTL expires

A

Answer: B D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
Which command set must be added to permit and log all traffic that comes from 172.20.10.1 in interface GigabitEthernet0/1 without impacting the functionality of the access list?
A. Option A 
B. Option B
C. Option C 
D. Option D
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the function of a fabric border node in a Cisco SD-Access environment?
A. To connect the Cisco SD-Access fabric to another fabric or external Layer 3 networks
B. To collect traffic flow information toward external networks
C. To attach and register clients to the fabric D. To handle an ordered list of IP addresses and locations for endpoints in the fabric.

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How are the different versions of IGMP compatible?
A. IGMPv2 is compatible only with IGMPv1 B. IGMPv2 is compatible only with IGMPv2 C. IGMPv3 is compatible only with IGMPv3 D. IGMPv3 is compatible only with IGMPv1

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is one benefit of implementing a VSS architecture?
A. It provides multiple points of management for redundancy and improved support.
B. It provides a single point of management for improved efficiency
C. It uses GLBP to balance traffic between gateways
D. It uses a single database to manage configuration for multiple switches

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

When is an external antenna used inside a building?
A. only when using 5 GHz
B. only when using 2.4 GHz
C. when it provides the required coverage
D. only when using Mobility Express

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which entity is a Type 1 hypervisor?

A. Oracle VM VirtualBox B. VMware server C. Citrix XenServer D. Microsoft Virtual PC

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

An engineer runs the code against an API of Cisco DNA Center, and the platform returns this output.
What does the response indicate?
A. The authentication credentials are incorrect
B. The URI string is incorrect
C. The Cisco DNA Center API port is incorrect D. The HTTP method is incorrect

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is a consideration when designing a Cisco SD-Access underlay network?
A. End user subnets and endpoints are part of the underlay network
B. The underlay switches provide endpoint physical connectivity for users
C. Static routing is a requirement
D. It must support IPv4 and IPv6 underlay networks

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is one difference between Saltstack and Ansible?
A. SaltStack uses an API proxy agent to program Cisco boxes on agent mode, whereas Ansible uses a Telnet connection
B. SaltStack uses the Ansible agent on the box, whereas Ansible uses a Telnet server on the box
C. SaltStack is constructed with minion, whereas Ansible is constructed with YAML
D. SaltStack uses SSH to interact with Cisco devices, whereas Ansible uses an event bus

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the centralized control policy in a Cisco SD-WAN deployment?
A. list of ordered statements that define user access policies
B. list of enabled services for all nodes within the cloud
C. set of rules that governs nodes authentication within the cloud
D. set of statements that defines how routing is performed

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which command set configures RSPAN to capture outgoing traffic from VLAN 3 on interface GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface?

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

After configurating an IPsec VPN, an engineer enters the show command to verify the ISAKMP SA status. What does the status show?
A. Peers have exchanged keys, but ISAKMP SA remains unauthenticated.
B. ISAKMP SA is authenticated and can be used for Quick Mode.
C. VPN peers agreed on parameters for the ISAKMP SA
D. ISAKMP SA has been created, but it has not continued to form.

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

An engineer attempts to create a configuration to allow the Blue VRF to leak into the global routing table, but the configuration does not function as expected. Which action resolves this issue?
A. Change the access-list number in the route map
B. Change the source network that is specified in access-list 101
C. Change the route-map configuration to VRF_BLUE
D. Change the access-list destination mask to a wildcard

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

POSTMAN is showing an attempt to retrieve network device information from Cisco DNA Center API. What is the issue?
A. The token has expired
B. The URI string is incorrect
C. Authentication has failed
D. The JSON payload contains the incorrect UUID

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q
Running the script causes the output in the exhibit. Which change to the first line of the script resolves the error?
A. from ncclient import
B. import manager 
C. from ncclient import 
D. import ncclient manager
A

Answer: A

44
Q
An engineer configures HSRP group 37. The configuration does not modify the default virtual MAC address. Which virtual MAC address does the group use?
A. 00:00:0c:07:ac:25 
B. 00:00:0c:07:ac:37 
C. C0:39:83:25:258:5 
D. C0.00:00:25:00:00
A

Answer: A

45
Q
Which Cisco DNA center application is responsible for group-based access control permissions?
A. Design 
B. Provision 
C. Assurance 
D. Policy
A

Answer: D

46
Q
An engineer attempts to configure a trunk between switch SW1 and switch SW2 using DTP, but the trunk does not form. Which command should the engineer apply to switch SW2 to resolve this issue?
A. switchport mode access 
B. switchport nonegotiate
C. no switchport 
D. switchport mode dynamic desirable
A

Answer: D

47
Q

Which set of commands on router R1 allow deterministic translation of private hosts PC1, PC2, and PC3 to addresses in the public space?

A

Answer: C

48
Q
Question 49
A client device roams between wireless LAN controllers that are mobility peers. Both controllers have dynamic interface on the same client VLAN. Which type of roam is described?
A. intra-VLAN 
B. intra-controller 
C. inter-controller 
D. inter-subnet
A

Answer: C

49
Q

Which line must be added in the Python function to return the JSON object {“cat_9k”:”FXS193202SE”)?

A. return (json.dumps({d[‘hostname’]: d[‘serialNumber’] for d in json.loads(test_json)[‘response’]}))
B. return (json.loads({for d in json.dumps(test_json)[‘response’]: d[‘hostname’]: d[‘serialNumber’]}))
C. return (json.loads({d[‘hostname’]: d[‘serialNumber’] for d in json.dumps(test_json)[‘response’]}))
D. return (json.dumps({for d in json.loads(test_json)[‘response’]: d[‘hostname’]: d[‘serialNumber’]}))

A

Answer: D

50
Q
Which two operational models enable an AP to scan one or more wireless channels for rouge access points and at the same time provide wireless services to clients? (Choose two)
A. Sniffer 
B. Rouge detector 
C. Local 
D. FlexConnect 
E. Monitor
A

Answer: C D

51
Q

An engineer configures a new HSRP group. While reviewing the HSRP status, the engineer sees the logging message generated on R2. Which is the cause of the message?
A. A PC is on the network using the IP address 10.10.1.1
B. The HSRP configuration has caused a spanning-tree loop
C. The HSRP configuration has caused a routing loop
D. The same virtual IP address has been configured for two HSRP groups

A

Answer: D

52
Q

Refer to the exhibit. A network engineer troubleshoots an issue with the port channel between SW1 and SW2. Which command resolves the issue?
*
A. SW1(config-if)#channel-group 10 mode active
B. SW1(config-if)#channel-group 10 mode desirable
C. SW2(config-if)#channel-group 10 mode on D. SW2(config-if)#switchport mode trunk

A

Answer: A

53
Q

Which new enhancement was implemented in Wi-Fi 6?
A. Wi-Fi Protected Access 3
B. 4096 Quadrature Amplitude Modulation Mode
C. Uplink and Downlink Orthogonal Frequency Division Multiple Access
D. Channel bonding

A

Answer: C

54
Q

How is MSDP used to interconnect multiple PIM-SM domains?
A. MSDP depends on BGP or multiprotocol BGP for interdomain operation
B. MSDP allows a rendezvous point to dynamically discover active sources outside of its domain
C. MSDP SA request messages are used to request a list of active sources for a specific group
D. MSDP messages are used to advertise active sources in a domain

A

Answer: D

55
Q

Drag and drop the characteristics from the left onto the routing protocols they describe on the right.

A

EIGRP
+ can automatically summarize networks at the boundary
OSPF
+ supports virtual links
+ requires manual configuration of network summarization

56
Q

Drag and drop the characteristics from the left onto the protocols they apply to on the right.

A

OSPF
+ uses Dijkstra’s Shortest Path First algorithm + uses an election process

EIGRP
+ uses Diffused Update Algorithm
+ uses bandwidth, delay, reliability and load for routing metric

57
Q

How is 802.11 traffic handled in a fabric-enabled SSID?
A. converted by the AP into 802.3 and encapsulated into a VLAN
B. centrally switched back to WLC where the user traffic is mapped to a VXLAN on the WLC C. centrally switched back to WLC where the user traffic is mapped to a VLAN on the WLC
D. converted by the AP into 802.3 and encapsulated into VXLAN

A

Answer: D

58
Q

Drag and drop the wireless elements on the left to their definitions on the right.

A

+ the relative increase in signal strength of an antenna in a given direction: gain

+ a graph that shows the relative intensity of the signal strength of an antenna within its space: radiation patterns

+ measures the angle of an antenna pattern in which the relative signal strength is half-power below the maximum value: beamwidth

+ radiated electromagnetic waves that influence the orientation of an antenna within its electromagnetic field: polarization

59
Q

A network engineer configures NAT on R1 and enters the show command to verify the configuration. What does the output confirm?
A. R1 is configured with NAT overload parameters
B. The first packet triggered NAT to add on entry to NAT table
C. A Telnet from 160.1.1.1 to 10.1.1.10 has been initiated
D. R1 to configured with PAT overload parameters

A

Answer: B

60
Q
Which congestion queuing method on Cisco IOS based routers uses four static queues?
A. low latency 
B. custom 
C. weighted fair 
D. Priority
A

Answer: D

61
Q

What does the Cisco DNA REST response indicate?
A. Cisco DNA Center has the incorrect credentials for cat9000-1
B. Cisco DNA Center is unable to communicate with cat9000-1
C. Cisco DNA Center has the incorrect credentials for RouterASR-1
D. Cisco DNA Center has the incorrect credentials for cat3850-1

A

Answer: A

62
Q
Which AP mode allows an engineer to scan configured channels for rogue access points?
A. local 
B. sniffer
C. bridge
D. monitor
A

Answer: D

63
Q
Where is radio resource management performed in a Cisco SD-access wireless solution?
A. control plane node 
B. DNA Center 
C. Cisco CMX 
D. wireless controller
A

Answer: D

64
Q

Rapid PVST+ is enabled on all switches. Which command set must be configured on Switch1 to achieve the following results on port fa0/1? + When a device is connected, the port transitions immediately to a forwarding state + The interface should not send or receive BPDUs. + If a BPDU is received, it continues operating normally.
A. Switch1(config)# interface f0/1 Switch1(config-if)# spanning-tree portfast Switch1(config-if)# spanning-tree bpduguard enable
B. Switch1(config)# spanning-tree portfast bpduguard default Switch1(config)# interface f0/1 Switch1(config-if)# spanning-tree portfast
C. Switch1(config)#interface f0/1 Switch1(config-if)# spanning-tree portfast
D. Switch1(config)#spanning-tree portfast bpdufilter default Switch1(config)# interface f0/1 Switch1(config-if)# spanning-tree portfast

A

Answer: D

65
Q

After running the code in the exhibit. Which step reduces the amount of data that NETCONF server returns to the NETCONF client, to only the interface’s configuration?
A. Create an XML filter as a string and pass it to get_config() method as an argument
B. Use the txml library to parse the data returned by the NETCONF server for the interface’s configuration
C. Create a JSON filter as a string and pass it to the get_config() method as an argument
D. Use the JSON library to parse the data returned by the NETCONF server for the interface’s configuration

A

Answer: A

66
Q

A network engineer configures BGP between R1 and R2. Both routers use BGP peer group CORP and are set up to use MD5 authentication. This message is logged to the console of router R1:
*Jun 5 33:34:33.033: %TCP-6-BADAUTH: Invalid MD5 digest from 10.10.10.1 (29832) to 10.120.10.1 (179) tableid -0
Which two configurations allow a peering session to form between R1 and R2? (Choose two)
A. R2(config-router)#neighbor 10.10.10.1 peer-group CORP R2(config-router)#neighbor CORP password Cisco
B. R2(config-router)#neighbor 10.10.10.1 peer-group CORP R2(Config-router)#neighbor PEER password Cisco
C. R1(config-router)#neighbor 10.10.10.1 peer-group CORP R1(config-router)#neighbor CORP password Cisco
D. R1(config-router)#neighbor 10.120.10.1 peer-group CORP R1(config-router)#neighbor CORP password Cisco
E. R2(config-router)#neighbor 10.120.10.1 peer-group CORP R2(config-router)#neighbor CORP password Cisco

A

Answer: C E

67
Q
Which device makes the decision for a wireless client to roam?
A. wireless client 
B. access point 
C. wireless LAN controller 
D. WCS location server
A

Answer: A

68
Q

External users require HTTP connectivity to an internal company web server that is listening on TCP port 8080. Which command set accomplishes this requirement?

A

Answer: D

69
Q

Question 70
Which three elements determine Air Time efficiency? (Choose three)
A. evert-driven RRM
B. data rate (modulation density) or QAM
C. channel bandwidth
D. number of spatial streams and spatial reuse
E. RF group leader
F. dynamic channel assignment

A

Answer: B C D

70
Q

Which features does Cisco EDR use to provide threat detection and response protection?
A. containment, threat intelligence, and machine learning
B. firewalling and intrusion prevention
C. container-based agents
D. cloud analysis and endpoint firewall controls

A

Answer: A

71
Q
def get_credentials():
creds={'username':'cisco','password':'c339348dc30e3fbig3kjr93godke333'}
return(creds.get('username'))
print(get_credentials())
What is the output of this code?
A. username Cisco 
B. get_credentials 
C. username 
D. cisco
A

Answer: D

72
Q
Which two threats does AMP4E have the ability to block? (Choose two)
A. DDoS 
B. ransomware 
C. SQL injection 
D. Microsoft Word macro attack 
E. email phishing
A

Answer: B D

73
Q
Which single security feature is recommended to provide Network Access Control in the enterprise?
A. 802.1X 
B. MAB 
C. WebAuth 
D. port security sticky MAC
A

Answer: A

74
Q

%OSPF-5-ADJCHG: Process 1, Nbr 10.0.0.2 on FastEthernet0/0 from FULL to DOWN,
Neighbor Down: Interface down or detached
%OSPF-6-AREACHG: 10.0.0.1/32 changed from area 0 to area 1
%OSPF-4-ERRRCV: Received invalid packet: mismatch area ID, from
backbone area must be virtual-link but not found from 10.0.0.2, FastEthernet0/0

What is the cause of the log messages?
A. OSPF area change 
B. hello packet mismatch 
C. MTU mismatch 
D. IP address mismatch
A

Answer: A

75
Q
Question 76
What are two benefits of virtual switching when compared to hardware switching? (Choose two)
A. increased MTU size 
B. hardware independence 
C. VM-level isolation 
D. increased flexibility 
E. extended 802.1Q VLAN range
A

Answer: C D

76
Q

What are two characteristics of VXLAN? (Choose two)
A. It uses VTEPs to encapsulate and decapsulate frames.
B. It has a 12-bit network identifier
C. It extends Layer 2 and Layer 3 overlay networks over a Layer 2 underlay.
D. It lacks support for host mobility E. It allows for up to 16 million VXLAN segments

A

Answer: A E

77
Q
Refer to the exhibit.
Router# traceroute 10.10.10.1
Type escape sequence to abort.
Tracing the route to 10.10.10.1
1 10.0.0.1 5 msec 5 msec 5 msec
2 10.5.0.1 15 msec 17 msec 17 msec
3 10.10.10.1 * * *
An engineer is troubleshooting a connectivity issue and executes a traceoute. 
What does the result confirm?

A. The destination server reported it is too busy
B. The probe timed out
C. The destination port is unreachable
D. The protocol is unreachable

A

Answer: B

78
Q

A network engineer configures a new GRE tunnel and enters the show run command. What does the output verify?
A. The tunnel keepalive is configured incorrectly because they must match on both sites
B. The tunnel destination will be known via the tunnel interface
C. The tunnel will be established and work as expected
D. The default MTU of the tunnel interface is 1500 byte.

A

Answer: C

79
Q
An engineer has configured Cisco ISE to assign VLANs to clients based on their method of authentication, but this is not working as expected. Which action will resolve this issue?
A. require a DHCP address assignment 
B. utilize RADIUS profiling 
C. set a NAC state 
D. enable AAA override
A

Answer: D

80
Q

Question 81
What is the function of a VTEP in VXLAN?
A. provide the routing underlay and overlay for VXLAN headers
B. dynamically discover the location of end hosts in a VXLAN fabric
C. encapsulate and de-encapsulate traffic into and out of the VXLAN fabric
D. statically point to end host locations of the VXLAN fabric

A

Answer: C

81
Q
If the noise floor is -90 dBm and the wireless client is receiving a signal of -75 dBm, what is the SNR?
A. -165
B. 83 
C. 15 
D. 1.2
A

Answer: C

82
Q

Drag and drop the snippets onto the blanks within the code to construct a script that advertises the network prefix 192.168.5.0 session. Not all options are used.

A

Answer: 1-A; 2-C;3-B

83
Q

How does an on-premises infrastructure compare to a cloud infrastructure?
A. On-premises can increase compute power faster than cloud
B. On-premises offers faster deployment than cloud
C. On-premises offers lower latency for physically adjacent systems than cloud
D. On-premises requires less power and cooling resources than cloud

A

Answer: C

84
Q
Which design principle states that a user has no access by default to any resource, and unless a resource is explicitly granted, it should be denied?
A. complete mediation 
B. least privilege 
C. economy of mechanism 
D. fail-safe defaults
A

Answer: D

85
Q

Drag and drop the snippets into the RESTCONF request to form the request that returns this response. Not all options are used.

A

1 – interface/GigabitEthernet/1/
2 – GET
3 – Accept

86
Q

An engineer implemented several configuration changes and receives the logging message on Switch1. Which action should the engineer take to resolve this issue?
A. Change Switch1 to switch port mode dynamic desirable
B. Change Switch2 to switch port mode dynamic auto
C. Change Switch1 to switch port mode dynamic auto
D. Change the VTP domain to match on both switches

A

Answer: D

87
Q

The EtherChannel between SW2 and SW3 is not operational. Which action resolves this issue?
A. Configure the channel-group mode on SW2 Gi0/1 and Gi0/1 to on
B. Configure the channel-group mode on SW3 Gi0/1 to active
C. Configure the mode on SW2 Gi0/0 to trunk D. Configure the mode on SW2 Gi0/1 to access

A

Answer: C

88
Q

A network administrator applies the following configuration to an IOS device. What is the process of password checks when a login attempt is made to the device?
aaa new-model aaa authentication login default local group tacacs+
A. A TACACS+server is checked first. If that check fail, a database is checked.
B. A TACACS+server is checked first. If that check fail, a RADIUS server is checked. If that check fail, a local database is checked.
C. A local database is checked first. If that fails, a TACACS+server is checked, if that check fails, a RADIUS server is checked.
D. A local database is checked first. If that check fails, a TACACS+server is checked

A

Answer: D

89
Q
Router 1 is currently operating as the HSRP primary with a priority of 110 router1 fails and Router2 take over the forwarding role. Which command on Router1 causes it to take over the forwarding role when it return to service?
A. standby 2 priority
B. standby 2 preempt 
C. standby 2 track 
D. standby 2 timers
A

Answer: B

90
Q

Answer:
Process Switching:
+ It is referred as “software” switching
+ It uses General Purpose CPU to perform that switching

Cisco Express Forwarding:
+ It is used when you have to perform in high packet volume

A
91
Q

Switch1# show interfaces trunk
! Output omitted for brevity
Port Mode Encapsulation Status Native
Gi1/0/20 auto 802.1q trunking 10
Port Vlans allowed on trunk
Gi1/0/20 1-4094
Switch2# show interfaces trunk
! Output omitted for brevity
Port Mode Encapsulation Status Native
Gi1/0/20 auto 802.1q trunking 10
Port Vlans allowed on trunk
Gi1/0/20 1-4094
The trunk does not work over the back-to-back link between Switch1 interface Gig1/0/20 and Switch2 interface Gig1/0/20. Which configuration fixes the problem?
A. Switch2(config)#interface gig1/0/20 Switch2(config-if)#switchport mode dynamic desirable
B. Switch1(config)#interface gig1/0/20 Switch1(config-if)#switchport mode dynamic auto
C. Switch2(config)#interface gig1/0/20 Switch2(config-if)#switchport mode dynamic auto
D. Switch2(config)#interface gig1/0/20 Switch1(config-if)#switchport trunk native vlan 1 Switch2(config)#interface gig1/0/20 Switch2(config-if)#switchport trunk native vlan 1

A

Answer: A

92
Q

What is the function of vBond in a Cisco SDWAN deployment?
A. onboarding of SDWAN routers into the SD-WAN overlay
B. pushing of configuration toward SD-WAN routers
C. initiating connections with SD-WAN routers automatically
D. gathering telemetry data from SD-WAN routers

A

Answer: A

93
Q
What is the difference in dBm when an AP power increases from 25 mW to 100mW?
A. 75dBm 
B. 150dBm
C. 6dBm 
D. 125dBm
A

Answer: C

94
Q
Which free application make REST call against DNA center?
A. Postman 
B. Ansible 
C. Chef 
D. Puppet
A

Answer: A

95
Q

An engineer must create an EEM applet that sends a syslog message in the event a change happens in the network due to trouble with an OSPF process. Which action should the engineer use?
A. action 1 syslog msg “OSPF ROUTING ERROR”
B. action 1 syslog send “OSPF ROUTING ERROR”
C. action 1 syslog pattern “OSPF ROUTING ERROR”
D. action 1 syslog write “OSPF ROUTING ERROR”

A

Answer: A

96
Q

Which action completes the configuration to achieve a dynamic continuous mapped NAT for all users?
A. Increase the NAT pool size to support 254 usable addresses
B. Reconfigure the pool to use the 192.168.1.0 address range
C. Configure a match-host type NAT pool
D. Configure a one-to-one type NAT pool

A

Answer: A

97
Q
A customer has 20 stores located throughout a city. Each store has a single Cisco AP managed by a central WLC. The customer wants to gather analytics for users in each store. Which technique supports these requirements?
A. hyperlocation 
B. angle of arrival 
C. presence 
D. trilateration
A

Answer: C

98
Q

What is a characteristic of a WLC that is in master controller mode?
A. The master controller is responsible for load balancing all connecting clients to other controllers.
B. Configuration on the master controller is executed on all wireless LAN controllers.
C. All wireless LAN controllers are managed by the master controller.
D. All new APs that join the WLAN are assigned to the master controller.

A

Answer: D

99
Q

A customer has a pair of Cisco 5520 WLCs set up in an SSO cluster to manage all APs. Guest traffic is anchored to a Cisco 3504 WLC located in a DM2. Which action is needed to ensure that the EoIP tunnel remains in an UP state in the event of failover on the SSO cluster?
A. Configure back-to-back connectivity on the RP ports
B. Use the mobility MAC when the mobility peer is configured
C. Enable default gateway reachability check D. Use the same mobility domain on all WLCs

A

Answer: B

100
Q

In a Cisco DNA Center Plug and Play environment, why would a device be labeled unclaimed?
A. The device has not been assigned a workflow.
B. The device could not be added to the fabric.
C. The device had an error and could not be provisioned.
D. The device is from a third-party vendor

A

Answer: A

101
Q

SW1#show interfaces gigabitethernet0/0 switchport
Name:Gi0/0
Switchport: Enabled
Administrative Mode: dynamic auto
Operational Mode: trunk
Administrative Trunking Encapsulation: dot1q
Operational Trunking Encapsulation: dot1q
Negotiation of Trunking: Off
Access Mode VLAN: 1 (default)
Trunking Native Mode VLAN: 99 (NATIVE)
Administrtive Native VLAN tagging: enabled
Voice VLAN: none
—output omitted—
SW2#show interfaces gigabitethernet0/1 switchport
Name:Gi0/1
Switchport: Enabled
Administrative Mode: dynamic auto
Operational Mode: trunk
Administrative Trunking Encapsulation: negotiate
Operational Trunking Encapsulation: dot1q
Negotiation of Trunking: On
Access Mode VLAN: 1 (default)
Trunking Native Mode VLAN: 99 (NATIVE)
Administrtive Native VLAN tagging: enabled
Voice VLAN: none
—output omitted—

The connection between SW1 and SW2 is not operational. Which two actions resolve the issue? (Choose two)
A. configure switchport mode access on SW2
B. configure switchport nonegotiate on SW2
C. configure switchport mode trunk on SW2
D. configure switchport mode dynamic desirable on SW2
E. configure no switchport nonegotiate on SW1

A

Answer: D E

102
Q
R1#show access-list 100
Extended IP access list 100
10 deny ip any any
20 permit ip 192.168.0.0 0.0.255.255 any
30 permit ip any 192.168.0.0 0.0.255.255

Extended access-list 100 is configured on interface GigabitEthernet0/0 in an inbound direction, but it does not have the expected behavior of allowing only packets to or from 192.168.0.0/16. Which command set properly configures the access list?

A

Answer: C

103
Q

How do cloud deployments differ from on-prem deployments?
A. Cloud deployments require longer implementation times than on-premises deployments
B. Cloud deployments are more customizable than on-premises deployments.
C. Cloud deployments have lower upfront costs than on-premises deployments.
D. Cloud deployments require less frequent upgrades than on-premises deployments.

A

Answer: C

104
Q

A. Change the JSON method from load() to loads().
B. Enclose null in the test_json string in double quotes
C. Use a single set of double quotes and condense test_json to a single line
D. Call the read() method explicitly on the test_json string

A

Answer: A

105
Q

An engineer is configuring an EtherChannel between Switch1 and Switch2 and notices the console message on Switch2. Based on the output, which action resolves this issue?
A. Configure the same port channel interface number on both switches
B. Configure less member ports on Switch2
C. Configure more member ports on Switch1 D. Configure the same EtherChannel protocol on both switches

A

Answer: D

106
Q

An engineer is concerned with the deployment of a new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements?
A. Router(config)# ip sla responder udp-connect 172.29.139.134 5000
B. Router(config)# ip sla responder tcp-connect 172.29.139.134 5000
C. Router(config)# ip sla responder udp-echo 172.29.139.134 5000
D. Router(config)# ip sla responder tcp-echo 172.29.139.134 5000

A

nswer: C