New Questions - Part 10 Flashcards
Which option must be used to support a WLC with an IPv6 management address and 100 Cisco Aironet 2800 Series access points that will use DHCP to register?
A. 43
B. 52
C. 60
D. 82
B. 52
Drag and drop the characteristics from the left onto the switching mechanisms they describe on the right.
Cisco Express Forwarding
+ The forwarding table is created in advance.
+ All packets are switched using hardware
Process Switching
+ All forwarding decisions are made in software
+ The router processor is involved with every forwarding decision
An engineer must create a script to append and modify device entries in a JSON-formatted file. The script must work as follows:
* Until interrupted from the keyboard, the script reads in the hostname of a device, its management IP address, operating system type, and CLI remote access protocol.
* After being interrupted, the script displays the entered entries and adds them to the JSON-formatted file, replacing existing entries whose hostname matches.
The contents of the JSON-formatted file are as follows:
{ "examplerouter": { "ip": "203.0.113.1", "os": ios-xe", "protocol": "ssh" }, ... }
Drag and drop the statements onto the blanks within the code to complete the script. Not all options are used.
- import json
- while True:
- except
- File = open
- File.close()
When using BFD in a network design, which consideration must be made?
A. BFD is used with first hop routing protocols to provide subsecond convergence.
B. BFD is used with NSF and graceful to provide subsecond convergence.
C. BFD is more CPU-intensive than using reduced hold timers with routing protocols.
D. BFD is used with dynamic routing protocols to provide subsecond convergence.
D. BFD is used with dynamic routing protocols to provide subsecond convergence.
In which two ways does the routing protocol OSPF differ from EIGRP? (Choose two)
A. OSPF supports only equal-cost load balancing. EIGRP supports unequal-cost load balancing
B. OSPF supports an unlimited number of hops. EIGRP supports a maximum of 255 hops
C. OSPF is distance vector protocol. EIGRP is a link-state protocol
D. OSPF provides shorter convergence time than EIGRP
E. OSPF supports unequal-cost load balancing. EIGRP supports only equal-cost load balancing
A. OSPF supports only equal-cost load balancing. EIGRP supports unequal-cost load balancing
B. OSPF supports an unlimited number of hops. EIGRP supports a maximum of 255 hops
A customer wants to connect a device to an autonomous Cisco AP configured as a WGB. The WGB is configured property; however, it fails to associate to a CAPWAP-enabled AP. Which change must be applied in the advanced WLAN settings to resolve this issue?
A. Disable FlexConnect local switching
B. Enable Aironet IE
C. Disable AAA override
D. Enable passive client
B. Enable Aironet IE
A customer deploys a new wireless network to perform location-based services using Cisco DNA Spaces. The customer has a single WLC located on-premises in a secure data center. The security team does not want to expose the WLC to the public Internet. Which solution allows the customer to securely send RSSI updates to Cisco DNA Spaces?
A. Replace the WLC with a cloud-based controller
B. Deploy a Cisco DNA Spaces connector as a VM
C. Implement Cisco Mobility Services Engine
D. Perform tethering with Cisco DNA Center
B. Deploy a Cisco DNA Spaces connector as a VM
Drag and drop the characteristics from the left onto the switching architectures on the right.
Process Switching
+ It is referred to as “software switching.”
+ The general-purpose CPU is in charge of packet switching.
Cisco Express Forwarding
+ It optimizes the switching process to handle larger packet volumes.
By default, which virtual MAC address does HSRP group 32 use?
A. 05:5e:5c:ac:0c:32
B. 00:00:0c:07:ac:20
C. 00:5e:0c:07:ac:20
D. 04:19:20:96:7e:32
B. 00:00:0c:07:ac:20
Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right.
Chef:
+ uses Ruby
+ procedural
SaltStack:
+ declarative
+ uses Python
In Cisco DNA Center, what is the integration API?
A. southbound consumer-facing RESTful API, which enables network discovery and configuration management
B. westbound interface, which allows the exchange of data to be used by ITSM, IPAM and reporting
C. an interface between the controller and the network devices, which enables network discovery and configuration management
D. northbound consumer-facing RESTful API, which enables network discovery and configuration management
B. westbound interface, which allows the exchange of data to be used by ITSM, IPAM and reporting
Which function does a Cisco SD-Access extended node perform?
A. provides fabric extension to nonfabric devices through remote registration and configuration
B. performs tunneling between fabric and nonfabric devices to route traffic over unknown networks
C. used to extend the fabric connecting to downstream nonfabric enabled Layer 2 switches
D. in charge of establishing Layer 3 adjacencies with nonfabric unmanaged node
C. used to extend the fabric connecting to downstream nonfabric enabled Layer 2 switches
An engineer is configuring Local WebAuth on a Cisco Wireless LAN Controller. According to RFC 5737, which virtual IP address must be used in this configuration?
A. 1.1.1.1
B. 192.168.0.1
C. 192.0.2.1
D. 172.20.10.1
C. 192.0.2.1
Refer to the exhibit.
Which configuration must be implemented to establish EBGP peering between R1 and R2?
A.
R2 router bgp 300 neighbor 131.108.1.1 remote-as 300
R1 router bgp 320 neighbor 131.108.1.2 remote-as 300
B.
R2 router bgp 320 neighbor 1.1.1.1 remote-as 300
R1 router bgp 300 neighbor 2.2.2.2 remote-as 320
C.
R2 router bgp 320 neighbor 131.108.1.1 remote-as 300
R1 router bgp 300 neighbor 131.108.1.2 remote-as 320
D.
R2 router bgp 320 neighbor 131.108.1.11 remote-as 300
R1 router bgp 300 neighbor 131.108.1.2 remote-as 320
C.
R2
router bgp 320
neighbor 131.108.1.1 remote-as 300
R1
router bgp 300
neighbor 131.108.1.2 remote-as 320
An engineer must configure an EXEC authorization list that first checks a AAA server then a local username. If both methods fail, the user is denied. Which configuration should be applied?
A. aaa authorization exec default local group tacacs+
B. aaa authorization exec default local group radius none
C. aaa authorization exec default group radius local none
D. aaa authorization exec default group radius local
D. aaa authorization exec default group radius local
Refer to the exhibit.
Router#sh access-list Extended IP access list 100 10 permit tcp any any eq telnet Extended IP access list 101 10 permit tcp any any eq 22
Which configuration set implements Control plane Policing for SSH and Telnet?
Option A
Router(config)#class-map type inspect match-all Router(config-cmap)#match access-group 100 Router(config-cmap)#match access-group 101 Router(config)#policy-map CoPP Router(config-pmap)#class class-control Router(config-pmap-c)#police 1000000 conform-action transmit Router(config)#control-plane Router(config-cp)#service-policy output CoPP
Option B
Router(config)#class-map class-telnet Router(config-cmap)#match access-group 100 Router(config)#class-map class-ssh Router(config-cmap)#match access-group 101 Router(config)#policy-map CoPP Router(config-pmap)#class class-telnet-ssh Router(config-pmap-c)#police 1000000 conform-action transmit Router(config)#control-plane Router(config-cp)#service-policy input CoPP
Option C
Router(config)#class-map match-all class-control Router(config-cmap)#match access-group 100 Router(config-cmap)#match access-group 101 Router(config)#policy-map CoPP Router(config-pmap)#class class-control Router(config-pmap-c)#pollce 1000000 conform-action transmit Router(config)#control-plane Router(config-cp)#service-policy output CoPP
Option D
Router(config)#class-map match-any class-control Router(config-cmap)#match access-group 100 Router(config-cmap)#match access-group 101 Router(config)#policy-map CoPP Router(config-pmap)#class class-control Router(config-pmap-c)#police 1000000 conform-action transmit Router(config)#control-plane Router(config-cp)#service-policy input CoPP
Option D
Router(config)#class-map match-any class-control
Router(config-cmap)#match access-group 100
Router(config-cmap)#match access-group 101
Router(config)#policy-map CoPP
Router(config-pmap)#class class-control
Router(config-pmap-c)#police 1000000 conform-action transmit
Router(config)#control-plane
Router(config-cp)#service-policy input CoPP
What is one characteristic of VXLAN?
A. It supports a maximum of 4096 VLANs.
B. It supports multitenant segments.
C. It uses STP to prevent loops in the underlay network.
D. It uses the Layer 2 header to transfer packets through the network underlay.
B. It supports multitenant segments.
What is one benefit of adopting a data modeling language?
A. augmenting management process using vendor centric actions around models
B. refactoring vendor and platform specific configurations with widely compatible configurations
C. augmenting the use of management protocols like SNMP for status subscriptions
D. deploying machine-friendly codes to manage a high number of devices
B. refactoring vendor and platform specific configurations with widely compatible configurations
Refer to the exhibit.
R2# *Feb 28 14:33:59.640: OSPF-1 ADJ Gi1: Send DBD to 192.168.201.137 seq 0xDE7 opt 0x52 flag 0x7 len 32 *Feb 28 14:33:59.640: OSPF-1 ADJ Gi1: Retransmitting DBD to 192.168.201.137 [15] *Feb 28 14:33:59.645: OSPF-1 ADJ Gi1: Rcv DBD from 192.168.201.137 seq 0xDE7 opt 0x52 flag 0x2 len 112 mtu 9100
The OSPF neighborship fails between two routers. What is the cause of this issue?
A. The OSPF router ID is missing on this router.
B. The OSPF process is stopped on the neighbor router.
C. There is an MTU mismatch between the two routers.
D. The OSPF router ID is missing on the neighbor router.
C. There is an MTU mismatch between the two routers.
Refer to the exhibit.
interface GigabitEthernet1 ip address 10.10.10.1 255.255.255.0 ! access-list 10 permit 10.10.10.1 ! monitor session 10 type erspan-source source interface Gi1 destination erspan-id 10 ip address 192.168.1.1
Which command filters the ERSPAN session packets only to interface GigabitEthernet1?
A. source ip 10.10.10.1
B. source interface gigabitethernet1 ip 10.10.10.1
C. filter access-group 10
D. destination ip 10.10.10.1
B. source interface gigabitethernet1 ip 10.10.10.1
Refer to the exhibit.
etherchannel_show_etherchannel_summary.jpg
Traffic is not passing between SW1 and SW2. Which action fixes the issue?
A. Configure LACP mode on S1 to passive.
B. Configure switch port mode to ISL on S2.
C. Configure PAgP mode on S1 to desirable.
D. Configure LACP mode on S1 to active.
C. Configure PAgP mode on S1 to desirable.
Refer to the exhibit.
An engineer configures HSRP and enters the show standby command. Which two facts about the network environment are derived from the output? (Choose two)
A. The local device has a higher priority than the active router
B. The virtual IP address of the HSRP group is 10.1.1.1
C. If the local device fails to receive a hello from the active router for more than 5 seconds, it becomes the active router
D. The hello and hold timers are set to custom values
E. If a router with a higher IP address and same HSRP priority as the active router becomes available, that router becomes the new active router 5 seconds later
B. The virtual IP address of the HSRP group is 10.1.1.1
E. If a router with a higher IP address and same HSRP priority as the active router becomes available, that router becomes the new active router 5 seconds later
An engineer must configure a new WLAN that allows a user to enter a passphrase and provides forward secrecy as a security measure. Which Layer 2 WLAN configuration is required on the Cisco WLC?
A. WPA2 Personal
B. WPA3 Enterprise
C. WPA3 Personal
D. WPA2 Enterprise
C. WPA3 Personal
Which Python code snippet must be added to the script to store the changed interface configuration to a local JSON-formatted file?
Python_save_local_json_file.jpg
A.
OutFile = open(“ifaces.json”, “w”)
OutFile.write(UpdatedConfig)
OutFile.close()
B.
OutFile = open(“ifaces.json”, “w”)
json.dump(UpdatedConfig,OutFile)
OutFile.close()
C.
OutFile = open(“ifaces.json”, “w”)
OutFile.write(Response.json())
OutFile.close()
D.
OutFile = open(“ifaces.json”, “w”)
OutFile.write(Response.text)
OutFile.close()
A.
OutFile = open(“ifaces.json”, “w”)
OutFile.write(UpdatedConfig)
OutFile.close()
C.
OutFile = open(“ifaces.json”, “w”)
OutFile.write(Response.json())
OutFile.close()
OutFile.write(Response.json()) IS WRONG!
- write() function expects a STRING not a DICT.
- json() converts text (Response) to DICT (Response.json()).
Finally, dictionary type is not supported by write() function.
Refer to the exhibit.
Cisco IOS routers R1 and R2 are interconnected using interface Gi0/0. Which configuration allows R1 and R2 to form an OSPF neighborship on interface Gi0/0?
A.
R2(config)#router ospf 1 R2(config-router)#passive-interface Gi0/0
B.
R2(config)#interface Gi0/0 R2(config-if)#ip ospf cost 1
C.
R1(config)#router ospf 1 R1(config-router)#no passive-interface Gi0/0
D.
R1(config)#router ospf 1 R1(config-if)#network 172.20.0.0 0.0.0.255 area 1
C.
R1(config)#router ospf 1 R1(config-router)#no passive-interface Gi0/0
A customer has a wireless network deployed within a multi-tenant building. The network provides client access, location-based services, and is monitored using Cisco DNA Center. The security department wants to locate and track malicious devices based on threat signatures. Which feature is required for this solution?
A. Cisco aWIPS policies on Cisco DNA Center
B. Cisco aWIPS policies on the WLC
C. malicious rogue rules on Cisco DNA Center
D. malicious rogue rules on the WLC
A. Cisco aWIPS policies on Cisco DNA Center
Refer to the exhibit.
An engineer configures a trunk between SW1 and SW2 but tagged packets are not passing. Which action fixes the issue?
A. Configure SW2 with encapsulation dot1q on interface FastEthernet0/1.
B. Configure SW1 with dynamic auto mode on interface FastEthernet0/1
C. Configure FastEthernet0/1 on both switches for static trunking.
D. Configure the native VLAN to be the same VLAN on both switches on interface FastEthernet0/1
A. Configure SW2 with encapsulation dot1q on interface FastEthernet0/1.
In a Cisco SD-Access wireless environment, which device is responsible for hosting the anycast gateway?
A. fabric border node
B. fusion router
C. fabrice edge node
D. control plance node
C. fabrice edge node
Drag and drop the characteristics from the left onto the switching architectures on the right.
Process Switching
+ low switching performance
Cisco Express Forwarding
+ proprietary switching mechanism
+ supports the centralized and distributed modes of operation
Refer to the exhibit.
monitor session 11 type erspan-source source interface GigabitEthernet3 destination erspan-id 12 ip address 10.10.10.10 origin ip address 10.100.10.10
Which command set completes the ERSPAN session configuration?
A.
monitor session 12 type erspan-destination destination interface GigabitEthernet4 source erspan-id 12 ip address 10.10.10.10
B.
monitor session 11 type erspan-destination destination interface GigabitEthernet4 source erspan-id 11 ip address 10.10.10.10
C.
monitor session 12 type erspan-destination destination interface GigabitEthernet4 source erspan-id 11 ip address 10.10.10.10
D.
monitor session 11 type erspan-destination destination interface GigabitEthernet4 source erspan-id 12 ip address 10.100.10.10
A.
monitor session 12 type erspan-destination
destination interface GigabitEthernet4
source
erspan-id 12
ip address 10.10.10.10
Based on the router’s API output in JSON format below, which Python code will display the value of the “role” key?
A.
json_data = json.loads(response.text) print(json_data[response][0][role])
B.
json_data = response.json() print(json_data[‘response’][family][‘role’])
C.
json_data = response.json() print(json_data[‘response’][0][‘role’])
D.
json_data = json.loads(response.text) print(json_data[‘response’][‘family’][‘role’])
Answer
C.
json_data = response.json() print(json_data[‘response’][0][‘role’])
Refer to the exhibit.
Clients report that they cannot connect to this SSID using the provided PSK. Which action will resolve this issue?
A. Select the PSK under authentication key management.
B. Define the correct Radio Policy.
C. Apply the changes this SSID.
D. Apply the correct interface to this WLAN.
A. Select the PSK under authentication key management.
Refer to the exhibit.
Which configuration is required to summarize Area 2 networks that are advertised to Area 0?
A. RouterB(config)# router ospf 1
RouterB(config-router)# network 192.168.38.0 255.255.252.0
B. RouterB(config)# router ospf 1
RouterB(config-router)# area 2 range 192.168.36.0 255.255.255.0
C. RouterB(config)# router ospf 1
RouterB(config-router)# network 192.168.38.0 255.255.255.0
D. RouterB(config)# router ospf 1
RouterB(config-router)# area 2 range 192.168.36.0 255.255.252.0
D. RouterB(config)# router ospf 1
RouterB(config-router)# area 2 range 192.168.36.0 255.255.252.0
Refer to the exhibit.
ip access-list extended ACL-CoPP-Management permit udp any eq ntp any permit udp any any eq snmp permit tcp any any eq 22 permit tcp any eq 22 any established class-map match-all CLASS-CoPP-Management match access-group name ACL-CoPP-Management
An engineer must protect the CPU of the router from high rates of NTP, SNMP, and SSH traffic. Which two configurations must be applied to drop these types of traffic when it continuously exceeds 320 kbps? (Choose two)
A.
R1 (config)#policy-map POLICY-CoPP R1(config-pmap)#class CLASS-CoPP-Management R1(config-pmap-c)#police 320000 conform-action transmit exceed-action drop violate-action drop B. R1(config)#control-plane R1(config-cp)# service-policy output POLICY-CoPP
C.
R1(config-pmap)#class CLASS-CoPP-Management R1(config-pmap-c)#police 32 conform-action transmit exceed-action drop violate-action transmit
D.
R1(config)#policy-map POLICY-CoPP R1(config-pmap)#class CLASS-CoPP-Management R1(config-pmap-c)#police 320000 conform-action transmit exceed-action transmit violate-action drop
E.
R1(config)#control-plane R1(config-cp)# service-policy input POLICY-CoPP
D. R1(config)#policy-map POLICY-CoPP
R1(config-pmap)#class CLASS-CoPP-Management
R1(config-pmap-c)#police 320000 conform-action transmit exceed-action transmit violate-action drop
E. R1(config)#control-plane
R1(config-cp)# service-policy input POLICY-CoPP
Refer to the exhibit.
What are two results of the NAT configuration? (Choose two)
A. R1 is performing NAT for inside addresses and outside address
B. R1 looks at the destination IP address of packets entering S0/0 and destined for inside hosts
C. Packets with a destination of 200.1.1.1 are translated to 10.1.1.1 or .2, respectively
D. A packet that is sent to 200.1.1.1 from 10.1.1.1 is translated to 209.165.201.1 on R1
E. R1 processes packets entering E0/0 and S0/0 by examining the source IP address
B. R1 looks at the destination IP address of packets entering S0/0 and destined for inside hosts
D. A packet that is sent to 200.1.1.1 from 10.1.1.1 is translated to 209.165.201.1 on R1
Refer to the exhibit.
Which set of commands is required to configure and verify the VRF for Site 1 Network A on router R1?
A.
R1#ip routing R1(config)#ip vrf 100 ! R1(config)#interface Gi0/2 R1(config-if)#ip address 10.0.1.1 255.255.255.0 R1#show ip vrf
B.
R1#ip routing R1(config)#ip vrf 100 ! R1(config)#interface Gi0/2 R1(config-if)#ip address 10.0.1.1 255.255.255.0
C.
R1#ip routing R1(config)#ip vrf 100 ! R1(config)#interface Gi0/2 R1(config-if)#ip vrf forwarding 100 R1(config-if)#ip address 10.0.1.1 255.255.255.0 R1#show ip vrf
D.
R1#ip routing R1(config)#ip vrf 100 R1(config-vrf)#rd 100:1 R1(config-vrf)# address family ipv4 ! R1(config)#interface Gi0/2 R1(config-if)#ip address 10.0.1.1 255.255.255.0 R1#show ip route
C.
R1#ip routing R1(config)#ip vrf 100 ! R1(config)#interface Gi0/2 R1(config-if)#ip vrf forwarding 100 R1(config-if)#ip address 10.0.1.1 255.255.255.0 R1#show ip vrf
Where in Cisco DNA Center is documentation of each API call, organized by its functional area?
A. Developer Toolkit
B. platform management
C. platform bundles
D. Runtime Dashboard
A. Developer Toolkit
How do the RIB and the FIB differ?
A. FIB contains routes learned through a dynamic routing protocol, and the RIB contains routes that are static or directly connected.
B. RIB contains the interface for a destination, and the FIB contains the next hop information.
C. FIB is derived from the control plane, and the RIB is derived from the data plane.
D. RIB is derived from the control plane, and the FIB is derived from the RIB.
D. RIB is derived from the control plane, and the FIB is derived from the RIB.
What does a YANG model provide?
A. standardized data structure independent of the transport protocols
B. creation of transport protocols and their interaction with the OS
C. user access to interact directly with the CLI of the device to receive or modify network configurations
D. standardized data structure that can be used only with NETCONF or RESTCONF transport protocols
A. standardized data structure independent of the transport protocols
A network engineer must configure a switch to allow remote access for all feasible protocols. Only a password must be requested for device authentication and all idle sessions must be terminated in 30 minutes. Which configuration must be applied?
A.
line vty 0 15 password cisco transport input all exec-timeout 0 30
B.
line console 0 password cisco exec-timeout 30 0
C.
line vty 0 15 password cisco transport input telnet ssh exec-timeout 30 0
D.
username cisco privilege 15 cisco line vty 0 15 transport input telnet ssh login local exec-timeout 0 30
C.
line vty 0 15 password cisco transport input telnet ssh exec-timeout 30 0
Refer to the exhibit.
A company has an internal wireless network with a hidden SSID and RADIUS-based client authentication for increased security. An employee attempts to manually add the company network to a laptop, but the laptop does not attempt to connect to the network. The regulatory domains of the access points and the laptop are identical. Which action resolves this issue?
A. Ensure that the “Connect even if this network is not broadcasting” option is selected.
B. Limit the enabled wireless channels on the laptop to the maximum channel range that is supported by the access points.
C. Change the security type to WPA2-Personal AES.
D. Use the empty string as the hidden SSID network name.
A. Ensure that the “Connect even if this network is not broadcasting” option is selected.
What is the recommended minimum SNR for voice applications on wireless networks?
A. 10
B. 25
C. 15
D. 20
B. 25
Drag and drop the tools from the left onto the agent types on the right.
Agentless
+ Terraform
+ Ansible
Agent-Based
+ Chef
Which free application has the ability to make REST cans against Cisco DNA Center?
A. API Explorer
B. REST Explorer
C. Postman
D. Mozilla
C. Postman
If AP power level is increased from 25 mW to 100 mW, what is the power difference in dBm?
A. 6 dBm
B. 14 dBm
C. 17 dBm
D. 20 dBm
A. 6 dBm
When does a Cisco StackWise primary switch lose its role?
A. when the priority value of a stack member is changed to a higher value
B. when a switch with a higher priority is added to the stack
C. when the stack primary is reset
D. when a stack member fails
C. when the stack primary is reset
Which activity requires access to Cisco DNA Center CLI?
A. provisioning a wireless LAN controller
B. creating a configuration template
C. upgrading the Cisco DNA Center software
D. graceful shutdown of Cisco DNA Center
D. graceful shutdown of Cisco DNA Center
Which A record type should be configured for access points to resolve the IP address of a wireless LAN controller using DNS?
A. CISCO.CONTROLLER.localdomain
B. CISCO.CAPWAP.CONTROLLER.localdomain
C. CISCO-CONTROLLER.localdomain
D. CISCO-CAPWAP-CONTROLLER.localdomain
D. CISCO-CAPWAP-CONTROLLER.localdomain
Which NTP mode must be activated when using a Cisco router as an NTP authoritative server?
A. primary
B. server
C. broadcast client
D. peer
B. server
Refer to the exhibit. Which router is elected as the VRRP primary virtual router?
Router A
Interface GigabitEthernet 1/0 ip address 192.168.0.1 255.255.255.0 vrrp priority 120
Router B
Interface GigabitEthernet 1/0 ip address 192.168.0.200 255.255.255.0 vrrp priority 100
Router C
Interface GigabitEthernet 1/0 ip address 192.168.0.3 255.255.255.0 vrrp priority 130
Router D
Interface GigabitEthernet 1/0 ip address 192.168.0.4 255.255.255.0 vrrp priority 90
A. Router A
B. Router B
C. Router C
D. Router D
C. Router C
Which signal strength and noise values meet the minimum SNR for voice networks?
A. signal strength -67 dBm, noise 91 dBm
B. signal strength -69 dBm, noise 94 dBm
C. signal strength -68 dBm, noise 89 dBm
D. signal strength -66 dBm, noise 90 dBm
B. signal strength -69 dBm, noise 94 dBm
The recommended minimum SNR for voice applications on wireless networks is 25dB.
An engineer is connected to a Cisco router through a Telnet session. Which command must be issued to view the logging messages from the current session as soon as they are generated by the router?
A. logging buffer
B. service timestamps log uptime
C. logging host
D. terminal monitor
D. terminal monitor
An engineer is configuring RADIUS-Based Authentication with EAP. MS-CHAPv2 is configured on a client device. Which outer method protocol must be configured on the ISE to support this authentication type?
A. EAP-TLS
B. EAP-FAST
C. LDAP
D. PEAP
D. PEAP
Drag and drop the characteristics from the left onto the orchestration tool classifications on the right.
Configuration Management
+ mutable infrastructure
+ designed to install and manage software on existing servers
Orchestration
+ immutable infrastructure
+ designed to provision the servers
An immutable infrastructure is one in which servers are never modified after they’re deployed. If something needs to be updated or changed, new servers are built afresh from a common template with the desired changes.
Refer to the exhibit.
R1 and R2 are directly connected, but the BGP session does not establish. Which action must be taken to build an eBGP session?
A. Configure ip route 1.1.1.1 0.0.0.0 192.168.12.1 on R2.
B. Configure neighbor 192.168.12.1 activate under R2 BGP process.
C. Configure neighbor 2.2.2.2 remote-as 65002 under R1 BGP process.
D. Configure no neighbor 192.168.12.1 shutdown under R2 BGP process.
D. Configure no neighbor 192.168.12.1 shutdown under R2 BGP process.
Refer to the exhibit.
Hosts PC1 PC2 and PC3 must access resources on Server1. An engineer configures NAT on Router R1 to enable the communication and enters the show command to verify operation. Which IP address is used by the hosts when they communicate globally to Server1?
A. 155.1.1.5
B. random addresses in the 155.1.1.0/24 range
C. their own address in the 10.10.10.0/24 range
D. 155.1.1.1
D. 155.1.1.1