New Questions - Part 8 Flashcards
Which protocol is used to encrypt control plane traffic between SD-WAN controllers and SD-WAN endpoints?
A. DTLS
B. IPsec
C. PGP
D. HTTPS
A. DTLS
Which network devices secure API platform?
A. next-generation intrusion detection systems
B. Layer 3 transit network devices
C. content switches
D. web application firewalls
D. web application firewalls
An engineer must configure the strongest password authentication to locally authenticate on a router. Which configuration must be used?
A. username netadmin secret 5 $1$bfjk$kdiSiDKKdkXksufZ2
B. username netadmin secret $1$bfjk$kdiSiDKKdkXksufZ2
C. line console 0
password $1$bfjk$k
D. username netadmin secret 9 $9$vFpMf83kdDJ9kdjDdjdu/dkfhZiz
D. username netadmin secret 9 $9$vFpMf83kdDJ9kdjDdjdu/dkfhZiz
Refer to the exhibit.
Device#configure terminal Device(config)#netconf ssh acl 1 Device(config)#netconf lock-time 100 Device(config)#netconf max-sessions 1 Device(config)#netconf max-message 10
A network engineer must configure NETCONF. After creating the configuration, the engineer gets output from the command show line, but not from show running-config. Which command completes the configuration?
A. Device(config)# no netconf ssh acl 1
B. Device(config)# netconf max-sessions 100
C. Device(config)# netconf lock-time 500
D. Device(config)# netconf max-message 1000
D. Device(config)# netconf max-message 1000
An engineer is configuring a new SSID to present users with a splash page for authentication. Which WLAN Layer 3 setting must be configured to provide this functionally?
A. CCKM
B. WPA2 Policy
C. Local Policy
D. Web Policy
D. Web Policy
An engineer is working with the Cisco DNA Center API. Drag and drop the methods from the left onto the actions that they are used for on the right.
+ remove an element using the API: DELETE
+ extract information from the API: GET
+ update an element: PUT
+ create an element: POST
An engineer must create an EEM script to enable OSPF debugging in the event the OSPF neighborship goes down. Which script must the engineer apply?
Option A
event manager applet ENABLE_OSPF_DEBUG
event syslog pattern “%OSPF-5-ADJCHG: Process 6, Nbr 1.1.1.1 on Serial0/0 from FULL to DOWN”
action 1.0 cli command “enable”
action 2.0 cli command “debug ip ospf event”
action 3.0 cli command “debug ip ospf adj”
action 4.0 syslog pnonty informational msg “ENABLE_OSPF_DEBUG”
Option B
event manager applet ENABLE OSPF_DEBUG
event syslog pattern “%OSPF-5-ADJCHG: Process 5, Nbr 1.1.1.1 on Serial0/0 from LOADING to FULL”
action 1.0 cli command “debug ip ospf event”
action 2.0 cli command “debug ip ospf adj”
action 3.0 syslog priority informational msg “ENABLE_OSPF_DEBUG”
Option C
event manager applet ENABLE_OSPF_DEBUG
event syslog pattern “%OSPF-1-ADJCHG: Process 5, Nbr 1.1.1.1 on Serial0/0 from FULL to DOWN”
action 1.0 cli command “debug ip ospf event”
action 2.0 cli command “debug ip ospf adj”
action 3.0 syslog pnonty informational msg “ENABLE_OSPF_DEBUG
Option D
event manager applet ENABLE_OSPF_DEBUG
event syslog pattern “%OSPF-5-ADJCHG: Process 5, Nbr 1.1.1.1 on Serial0/0 from LOADING to FULL”
action 1.0 cli command “enable”
action 2.0 cli command “debug ip ospf event”
action 3.0 cli command “debug ip ospf adj”
action 4.0 syslog priority informational msg “ENABLE_OSPF_DEBUG”
Option A
event manager applet ENABLE_OSPF_DEBUG
event syslog pattern “%OSPF-5-ADJCHG: Process 6, Nbr 1.1.1.1 on Serial0/0 from FULL to DOWN”
action 1.0 cli command “enable”
action 2.0 cli command “debug ip ospf event”
action 3.0 cli command “debug ip ospf adj”
action 4.0 syslog pnonty informational msg “ENABLE_OSPF_DEBUG”
A network engineer is adding an additional 10Gbps link to an exiting 2x10Gbps LACP-based LAG to augment its capacity. Network standards require a bundle interface to be taken out of service if one of its member links goes down, and the new link must be added with minimal impact to the production network. Drag and drop the tasks that the engineer must perform from the left into the sequence on the right. Not all options are used.
+ Step 1: Validate the physical and data link layers of the 10Gbps link
+ Step 2: Execute the channel-group number mode active command to add the 10Gbps link to the existing bundle
+ Step 3: Execute the lacp min-bundle 3 command to set the minimum of ports threshold
+ Step 4: Validate the network layer of the 10Gbps link
An engineer is implementing a route map to support redistribution within BGP. The route map must configured to permit all unmatched routes. Which action must the engineer perform to complete this task?
A. Include a permit statement as the first entry
B. Include at least one explicit deny statement
C. Remove the implicit deny entry
D. Include a permit statement as the last entry
D. Include a permit statement as the last entry
Drag and drop the snippets onto the blanks within the code to construct a script that configures BGP according to the topology. Not all options are used, and some options may be used twice.
65001
192.168.1.1
65000
192.168.1.1
Refer to the exhibit.
wireless_radius_authentication.jpg
AP(config)# aaa group server radius rad_auth AP(config-sg-radius)# server 10.0.0.3 auth-port 1645 acct-port 1646 AP(config)# aaa new-model AP(config)# aaa authentication login eap_methods group rad_auth AP(config)# radius-server host 10.0.0.3 auth-port 1645 acct-port 1646 key labapl200 AP(config)# interface dot11radio 0 AP(config-if)# ssid labap1200 AP(config-if-ssid)# encryption mode wep mandatory
A company requires that all wireless users authenticate using dynamic key generation. Which configuration must be applied?
A. AP(config-if-ssid)# authentication open wep wep_methods
B. AP(config-if-ssid)# authentication dynamic wep wep_methods
C. AP(config-if-ssid)# authentication dynamic open wep_dynamic
D. AP(config-if-ssid)# authentication open eap eap_methods
D. AP(config-if-ssid)# authentication open eap eap_methods
Which threat defense mechanism, when deployed at the network perimeter, protects against zero-day attacks?
A. intrusion prevention
B. stateful inspection
C. sandbox
D. SSL decryption
A. intrusion prevention
What is a Type 2 hypervisor?
A. also referred to as a “bare metal hypervisor” because it sits directly on the physical server
B. runs directly on a physical server and includes its own operating system
C. supports over-allocation of physical resources
D. installed as an application on an already installed operating system
D. installed as an application on an already installed operating system
Which two items are found in YANG data models? (Choose two)
A. HTTP return codes
B. rpc statements
C. JSON schema
D. container statements
E. XML schema
B. rpc statements
D. container statements
What is a characteristic of Cisco DNA Northbound APIs?
A. They utilize RESTCONF
B. They enable automation of network infrastructure based on intent
C. They simplify the management of network infrastructure devices
D. They utilize multivendor support APIs
B. They enable automation of network infrastructure based on intent
What is required for intercontroller Layer 3 roaming?
A. Mobility groups are established between wireless controllers.
B. WLCs have the same IP addresses configured on their interfaces.
C. WLCs use separate DHCP servers.
D. The management VLAN is present as a dynamic VLAN on the second WLC.
A. Mobility groups are established between wireless controllers.
What is required for a virtual machine to run?
A. a hypervisor and physical server hardware
B. a Type 1 hypervisor and a host operating system
C. only a Type 1 hypervisor
D. only a Type 2 hypervisor
A. a hypervisor and physical server hardware
Which technology uses network traffic telemetry, contextual information, and file reputation to provide insight into cyber threats?
A. threat defense
B. security services
C. security intelligence
D. segmentation
A. threat defense
An engineer must configure AAA on a Cisco 9800 WLC for central web authentication. Which two commands are needed to accomplish this task? (Choose two)
A. (Cisco Controller)> config radius acct add 10.10.10.12 1812 SECRET
B. (Cisco Controller)> config wlan aaa-override enable <wlan-id>
C. (Cisco Controller)> config wlan aaa-override disable <wlan-id>
D. Device(config-locsvr-da-radius)#client 10.10.10.12 server-key 0 SECRET
E. Device(config)# aaa server radius dynamic-author
D. Device(config-locsvr-da-radius)#client 10.10.10.12 server-key 0 SECRET
E. Device(config)# aaa server radius dynamic-author
Refer to the exhibit.
An engineer is troubleshooting an application running on Apple phones. The application is receiving incorrect QoS markings. The systems administrator confirmed that all configuration profiles are correct on the Apple devices. Which change on the WLC optimizes QoS for these devices?
A. Enable Fastlane
B. Set WMM to required
C. Change the QoS level to Platinum
D. Configure AVC Profiles
A. Enable Fastlane
What is a benefit of Type 1 hypervisors?
A. Network engineers are able to create virtual networks of interconnect virtual machines in Layer 2 topologies
B. Storage engineers are able to leverage VMDK files to provide storage to virtual machine.
C. Operators are able to leverage orchestrators to manage workloads that run on multiple Type 1 hypervisors
D. Administrators are able to load portable virtual machine packages in OVA or QCOW2 formats.
A. Network engineers are able to create virtual networks of interconnect virtual machines in Layer 2 topologies
Drag and drop the characteristics from the left onto the deployment models on the right.
Cloud:
+ on-demand self-service
On-Premises:
+ long implementation timeframe
+ offers complex customization
What are two benefits of implementing a Cisco SD-WAN architecture? (Choose two)
A. It provides resilient and effective traffic flow using MPLS
B. It improves endpoint protection by integrating embedded and cloud security features
C. It allows configuration of application-aware policies with real time enforcement
D. It simplifies endpoint provisioning through standalone router management
E. It enforces a single, scalable, hub-and-spoke topology
B. It improves endpoint protection by integrating embedded and cloud security features
C. It allows configuration of application-aware policies with real time enforcement
An engineer configures GigabitEthernet 0/1 for VRRP group 115. The router must assume the primary role when it has the highest priority in the group. Which command set is required to complete this task?
interface GigabitEthernet0/1 ip address 10.10.10.2 255.255.255.0 vrrp 115 ip 10.10.10.1 vrrp 115 authentication 406630697
A.
Router(config-if)#vrrp 116 priority 100
B.
Router(config-if)#standby 115 priority 100
Router(config-if)#standby 115 prompt
C.
Router(config-if)#vrrp 115 track 1 decrement 10
Router(config-if)#vrrp 115 preempt
D.
Router(config-if)#vrrp 115 track 1 decrement 100
Router(config-if)#vrrp 115 preempt
C.
Router(config-if)#vrrp 115 track 1 decrement 10
Router(config-if)#vrrp 115 preempt
Which component does Cisco Threat Defense use to measure bandwidth, application performance, and utilization?
A. NetFlow
B. Cisco Umbrella
C. TrustSec
D. Advanced Malware Protection for Endpoints
A. NetFlow
A customer has two Cisco WLCs that manage separate APs throughout a building. Each WLC advertises the same SSID but terminates on different interfaces. Users report that they drop their connections and change IP addresses when roaming. Which action resolves this issue?
A. Configure high availability.
B. Enable test roaming.
C. Enable client load balancing.
D. Configure mobility groups.
D. Configure mobility groups.
Refer to the exhibit. What is displayed when the code is run?
A. The answer is 25
B. The answer is 70
C. The answer is 5
D. The answer is 100
A. The answer is 25
A script contains the statement “while loop != 999:”. Which value terminates the loop?
A. A value less then or equal to 999
B. A value greater then or equal to 999
C. A value not equal to 999
D. A value equal to 999
D. A value equal to 999
Which CISCO SD-WAN component authenticates the routers and the vSmart controllers?
A. vAnalytics
B. vBond orchestrator
C. vEdge
D. vManage NMS
B. vBond orchestrator
When voice services are deployed over a wireless environment, which service must be disabled to ensure the quality of calls?
A. Aggressive load balancing
B. Dynamic transmit power control
C. Priority queuing
D. Fastlane
A. Aggressive load balancing
What is a characteristic of an AP operating in FlexConnect Mode?
A. All traffic traverses the WLC to ensure policy enforcement on client traffic
B. Forwarding continues when the AP loses connectivity to the WLC
C. APs connect in a mesh topology and elect a root AP
D. FlexConnect enables an AP to connect to multiple WLCs
B. Forwarding continues when the AP loses connectivity to the WLC
Drag and drop the characteristics from the left onto the routing protocol types on the right.
OSPF:
+ The path metric is simple and based on interface cost
+ The route summary is not interface based
EIGRP:
+ The path metrics are complex
+ The summary can be interface based
Drag and drop the characteristics from the left onto the correct infrastructure deployment types on the right.
Cloud
+ Quick and scalable deployment
+ Shared ownership and accessibility
On-Prem
+ Complete control and accessibility
+ Longer deployment cycle
Refer to the exhibit.
An engineer must configure an ERSPAN tunnel that mirrors traffic from Linux1 on Switch1 to Linux2 on Switch2. Which command must be added to the source configuration to enable the ERSPAN tunnel?
A. (config-mon-erspan-src-dst)#no shut
B. (config-mon-erspan-src-dst)#monitor session 1 activate
C. (config-mon-erspan-src-dst)#traffic bidirectional
D. (config-mon-erspan-src-dst)#ip address 10.10.10.10
D. (config-mon-erspan-src-dst)#ip address 10.10.10.10