New Questions - Part 6 Flashcards

1
Q

An engineer must create an EEM applet that sends a syslog message in the event a change happens in the network due to trouble with an OSPF process. Which action should the engineer use?

A. action 1 syslog msg “OSPF ROUTING ERROR”
B. action 1 syslog send “OSPF ROUTING ERROR”
C. action 1 syslog pattern “OSPF ROUTING ERROR”
D. action 1 syslog write “OSPF ROUTING ERROR”

A

A. action 1 syslog msg “OSPF ROUTING ERROR”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Refer to the exhibit.

Image

Which action completes the configuration to achieve a dynamic continuous mapped NAT for all users?

A. Increase the NAT pool size to support 254 usable addresses
B. Reconfigure the pool to use the 192.168.1.0 address range
C. Configure a match-host type NAT pool
D. Configure a one-to-one type NAT pool

A

A. Increase the NAT pool size to support 254 usable addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A customer has 20 stores located throughout a city. Each store has a single Cisco AP managed by a central WLC. The customer wants to gather analytics for users in each store. Which technique supports these requirements?

A. hyperlocation
B. angle of arrival
C. presence
D. trilateration

A

C. presence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a characteristic of a WLC that is in master controller mode?

A. The master controller is responsible for load balancing all connecting clients to other controllers.
B. Configuration on the master controller is executed on all wireless LAN controllers.
C. All wireless LAN controllers are managed by the master controller.
D. All new APs that join the WLAN are assigned to the master controller.

A

D. All new APs that join the WLAN are assigned to the master controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A customer has a pair of Cisco 5520 WLCs set up in an SSO cluster to manage all APs. Guest traffic is anchored to a Cisco 3504 WLC located in a DM2. Which action is needed to ensure that the EoIP tunnel remains in an UP state in the event of failover on the SSO cluster?

A. Configure back-to-back connectivity on the RP ports
B. Use the mobility MAC when the mobility peer is configured
C. Enable default gateway reachability check
D. Use the same mobility domain on all WLCs

A

B. Use the mobility MAC when the mobility peer is configured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In a Cisco DNA Center Plug and Play environment, why would a device be labeled unclaimed?

A. The device has not been assigned a workflow.
B. The device could not be added to the fabric.
C. The device had an error and could not be provisioned.
D. The device is from a third-party vendor.

A

A. The device has not been assigned a workflow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Refer to the exhibit.

Image1
Image2

The connection between SW1 and SW2 is not operational. Which two actions resolve the issue? (Choose two)

A. configure switchport mode access on SW2
B. configure switchport nonegotiate on SW2
C. configure switchport mode trunk on SW2
D. configure switchport mode dynamic desirable on SW2
E. configure no switchport nonegotiate on SW1

A

C. configure switchport mode trunk on SW2

D. configure switchport mode dynamic desirable on SW2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Refer to the exhibit.

R1#show access-list 100
Extended IP access list 100
 10 deny ip any any
 20 permit ip 192.168.0.0 0.0.255.255 any
 30 permit ip any 192.168.0.0 0.0.255.255

Extended access-list 100 is configured on interface GigabitEthernet0/0 in an inbound direction, but it does not have the expected behavior of allowing only packets to or from 192.168.0.0/16. Which command set properly configures the access list?

A.

R1(config)#no access-list 100 deny ip any any

B.

R1(config)#ip access-list extended 100
R1(config-ext-nacl)#5 permit ip any any

C.

R1(config)#ip access-list extended 100
R1(config-ext-nacl)#no 10

D.

R1(config)#no access-list 100 seq 10
R1(config-ext-nacl)#access-list 100 seq 40 deny ip any any
A

C.

R1(config)#ip access-list extended 100
R1(config-ext-nacl)#no 10
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do cloud deployments differ from on-prem deployments?

A. Cloud deployments require longer implementation times than on-premises deployments
B. Cloud deployments are more customizable than on-premises deployments.
C. Cloud deployments have lower upfront costs than on-premises deployments.
D. Cloud deployments require less frequent upgrades than on-premises deployments.

A

C. Cloud deployments have lower upfront costs than on-premises deployments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Refer to the exhibit.

Image

An engineer runs the sample code, and the terminal returns this output. Which change to the sample code corrects this issue?

A. Change the JSON method from load() to loads().

B. Enclose null in the test_json string in double quotes

C. Use a single set of double quotes and condense test_json to a single line

D. Call the read() method explicitly on the test_json string

A

A. Change the JSON method from load() to loads().

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Refer to the exhibit.

Image

An engineer is configuring an EtherChannel between Switch1 and Switch2 and notices the console message on Switch2. Based on the output, which action resolves this issue?

A. Configure the same port channel interface number on both switches
B. Configure less member ports on Switch2
C. Configure more member ports on Switch1
D. Configure the same EtherChannel protocol on both switches

A

D. Configure the same EtherChannel protocol on both switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An engineer is concerned with the deployment of a new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements?

A. Router(config)# ip sla responder udp-connect 172.29.139.134 5000
B. Router(config)# ip sla responder tcp-connect 172.29.139.134 5000
C. Router(config)# ip sla responder udp-echo 172.29.139.134 5000
D. Router(config)# ip sla responder tcp-echo 172.29.139.134 5000

A

C. Router(config)# ip sla responder udp-echo 172.29.139.134 5000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which resource is able to be shared among virtual machines deployed on the same physical server?

A. VM configuration file
B. operating system
C. disk
D. applications

A

C. disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which function is handled by vManage in the Cisco SD-WAN fabric?

A. Establishes IPsec tunnels with nodes
B. Distributes policies that govern data forwarding
C. Performs remote software upgrades for WAN Edge, vSmart and vBond
D. Establishes BFD sessions to test liveliness of links and nodes

A

C. Performs remote software upgrades for WAN Edge, vSmart and vBond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Refer to the exhibit.

Image

A network administrator configured RSPAN to troubleshoot an issue between switch1 and switch2. The switches are connected using interface GigabitEthernet 1/1. An external packet capture device is connected to switch2 interface GigabitEthernet1/2. Which two commands must be added to complete this configuration? (Choose two)

A.
switch1(config)# interface GigabitEthernet 1/1
switch1(config-if)# switchport mode access
switch1(config-if)# switchport access vlan 10

switch2(config)# interface GigabitEthernet 1/1
switch2(config-if)# switchport mode access
switch2(config-if)# switchport access vlan 10

B.
switch2(config-if)# switchport trunk allowed vlan 10,20,30,40,50,60,70-80

C.
switch2(config)# monitor session 1 source remote vlan 70
switch2(config)# monitor session 1 destination interface GigabitEthernet1/1

D.
switch2(config)# monitor session 2 destination vlan 10

E.
switch2(config)# monitor session 1 source remote vlan 70
switch2(config)# monitor session 1 destination interface GigabitEthernet1/2

A

B.
switch2(config-if)# switchport trunk allowed vlan 10,20,30,40,50,60,70-80

E.
switch2(config)# monitor session 1 source remote vlan 70
switch2(config)# monitor session 1 destination interface GigabitEthernet1/2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Refer to the exhibit.

event snmp oid 1.3.6.1.4.1.9.9.109.1.1.1.1.3 get-type next entry-op gt entry-val 80 poll-interval 5
!
action 1.0 cli command “enable”
action 2.0 syslog msg “high cpu”
action 3.0 cli command “term length 0”

An engineer must create a script that appends the output of the show process cpu sorted command to a file. Which action completes the configuration?

A. action 4.0 syslog command “show process cpu sorted | append flash:high-cpu-file”

B. action 4.0 publish-event “show process cpu sorted | append flash:high-cpu-file”

C. action 4.0 ens-event “show process cpu sorted | append flash:high-cpu-file”

D. action 4.0 cli command “show process cpu sorted | append flash:high-cpu-file”

A

D. action 4.0 cli command “show process cpu sorted | append flash:high-cpu-file”

17
Q

Refer to the exhibit.

Image

Which Python code snippet prints the descriptions of disabled interfaces only?

A. Option A
B. Option B
C. Option C
D. Option D

A
18
Q

Refer to the exhibit.

Image1

An engineer must deny HTTP traffic from host A to host B while allowing all other communication between the hosts. Drag and drop the commands into the configuration to achieve these results. Some commands may be used more than once. Not all commands are used.

Image2

A

permit, permit, action drop, action forward

19
Q

Which of the following statements regarding BFD are correct? (Choose two)

A. BFD is supported by OSPF, EIGRP, BGP, and IS-IS.
B. BFD detects link failures in less than one second.
C. BFD can bypass a failed peer without relying on a routing protocol.
D. BFD creates one session per routing protocol per interface.
E. BFD is supported only on physical interfaces.
F. BFD consumes more CPU resources than routing protocol timers do.

A

A. BFD is supported by OSPF, EIGRP, BGP, and IS-IS.
B. BFD detects link failures in less than one second.

20
Q

What is an advantage of using BFD?

A. It detects local link failure at layer 1 and updates routing table
B. It detects local link failure at layer 3 and updates routing protocols
C. It has sub-second failure detection for layer 1 and layer 3 problems.
D. It has sub-second failure detection for layer 1 and layer 2 problems.

A

B. It detects local link failure at layer 3 and updates routing protocols

21
Q

An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:

Location A: -72 dBm
Location B: -75 dBm
Location C: -65 dBm
Location D: -80 dBm

Which two statements does the engineer use to explain these values to the customer? (Choose two)

A. The signal strength at location C is too weak to support web surfing
B. Location D has the strongest RF signal strength
C. The RF signal strength at location B is 50% weaker than location A
D. The signal strength at location B is 10 dB better than location C
E. The RF signal strength at location C is 10 times stronger than location B

A

C. The RF signal strength at location B is 50% weaker than location A

E. The RF signal strength at location C is 10 times stronger than location B

22
Q

Which three resources must the hypervisor make available to the virtual machines? (Choose three)

A. memory
B. IP address
C. processor
D. bandwidth
E. secure access
F. storage

A

A. memory

C. processor

F. storage

23
Q

Which unit is used to express the signal-to-noise ratio?

A. dBm
B. dB
C. amp
D. mW

A

B. dB

24
Q

Refer to the exhibit.

Image

An engineer is investigating why guest users are able to access other guest devices when the users are connected to the customer guest WLAN. What action resolves this issue?

A. implement P2P blocking
B. implement MFP client protection
C. implement split tunneling
D. implement Wi-Fi direct policy

A

A. implement P2P blocking

25
Q

Which function does a fabric AP perform in a Cisco SD-Access deployment?

A. It manages wireless clients’ membership information in the fabric
B. It connects wireless clients to the fabric.
C. It updates wireless clients’ locations in the fabric
D. It configures security policies down to wireless clients in the fabric

A

B. It connects wireless clients to the fabric.

26
Q

Which design principle should be followed in a Cisco SD-Access wireless network deployment?

A. The WLC is part of the fabric overlay
B. The WLC is part of the fabric underlay
C. The WLC is connected outside of the fabric
D. The access point is connected outside of the fabric

A

C. The WLC is connected outside of the fabric

27
Q

Refer to the exhibit.

Which code results in the working python script displaying a list of network devices from the Cisco DNA center?

A. Option A
B. Option B
C. Option C
D. Option D

A
28
Q

An engineer is configuring a GRE tunnel interface in the default mode. The engineer has assigned an IPv4 address on the tunnel and sourced the tunnel from an Ethernet interface. Which option also is required on the tunnel interface before it is operational?

A. (config-if)#tunnel destination {ip address}
B. (config-if)#keepalive {seconds retries}
C. (config-if)#ip mtu {value}
D. (config-if)#ip tcp adjust-mss {value}

A

A. (config-if)#tunnel destination {ip address}