Part 13 Flashcards

1
Q

An engineer is concerned with the deployment of a new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements?

A. Router(config)# ip sla responder udp-connect 172.29.139.134 5000

B. Router(config)# ip sla responder tcp-connect 172.29.139.134 5000

C. Router(config)# ip sla responder udp-echo 172.29.139.134 5000

D. Router(config)# ip sla responder tcp-echo 172.29.139.134 5000

A

C. Router(config)# ip sla responder udp-echo 172.29.139.134 5000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which IP SLA operation requires the IP SLA responder to be configured on the remote end?

A. UDP jitter

B. ICMP jitter

C. TCP connect

D. ICMP echo

A

A. UDP jitter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which three methods does Cisco DNA Center use to discover devices? (Choose three.)

A. CDP

B. SNMP

C. LLDP

D. ping

E. NETCONF

F. a specified range of IP addresses

A

A. CDP

C. LLDP

F. a specified range of IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which statement about TLS is accurate when using RESTCONF to write configurations on network devices?

A. It is used for HTTP and HTTPS requests.

B. It requires certificates for authentication.

C. It is provided using NGINX acting as a proxy web server.

D. It is not supported on Cisco devices.

A

C. It is provided using NGINX acting as a proxy web server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do Cisco DNA southbound APIs provide?

A. interface between the controller and the consumer

B. RESTful API interface for orchestrator communication

C. interface between the controller and the network devices

D. NETCONF API interface for orchestrator communication

A

C. interface between the controller and the network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which statement about an RSPAN session configuration is true?

A. Only one session can be configured at a time.

B. A special VLAN type must be used as the RSPAN destination.

C. A filter must be configured for RSPAN sessions.

D. Only incoming traffic can be monitored.

A

B. A special VLAN type must be used as the RSPAN destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which feature must be configured to allow packet capture over Layer 3 infrastructure?

A. RSPAN

B. ERSPAN

C. VSPAN

D. IPSPAN

A

B. ERSPAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A network is being migrated from IPv4 to IPv6 using a dual-stack approach. Network management is already 100% IPv6 enabled. In a dual-stack network with two dual-stack NetFlow collectors, how many flow exporters are needed per network device in the flexible NetFlow configuration?

A. 1

B. 2

C. 4

D. 8

A

B. 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A network engineer is configuring Flexible NetFlow and enters these commands. sampler NetFlow1 mode random one-out-of 100 interface fastethernet 1/0 flow-sampler NetFlow1 What are two results of implementing this feature instead of traditional NetFlow? (Choose two.)

A. Only the flows of top 100 talkers are exported.

B. CPU and memory utilization are reduced.

C. The number of packets to be analyzed are reduced.

D. The data export flow is more secure.

E. The accuracy of the data to be analyzed is improved.

A

B. CPU and memory utilization are reduced.

C. The number of packets to be analyzed are reduced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network administrator is implementing a routing configuration change and enables routing debugs to track routing behavior during the change. The logging output on the terminal is interrupting the command typing process. Which two actions can the network administrator take to minimize the possibility of typing commands incorrectly? (Choose two.)

A. Configure the logging synchronous global configuration command.

B. Configure the logging synchronous command under the vty.

C. Increase the number of lines on the screen using the terminal length command.

D. Configure the logging delimiter feature.

E. Press the TAB key to reprint the command in a new line.

A

B. Configure the logging synchronous command under the vty.

E. Press the TAB key to reprint the command in a new line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?

A. logging host 10.2.3.4 vrf mgmt transport tcp port 514

B. logging host 10.2.3.4 vrf mgmt transport udp port 514

C. logging host 10.2.3.4 vrf mgmt transport tcp port 6514

D. logging host 10.2.3.4 vrf mgmt transport udp port 6514

A

C. logging host 10.2.3.4 vrf mgmt transport tcp port 6514

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Refer to this output. R1# *Feb 14 37:09:53.129: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1, changed state to up What is the logging severity level?

A. notification

B. emergency

C. critical

D. alert

A

A. notification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An engineer reviews a routerג€™s logs and discovers the following entry. What is the eventג€™s logging severity level? Router# *Jan 01 38:24:04.401: %LINK-3-UPDOWN: Interface GigabitEthernet0/1, changed state to up

A. error

B. warning

C. informational

D. notification

A

A. error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which method does Cisco DNA Center use to allow management of non-Cisco devices through southbound protocols?

A. It creates device packs through the use of an SDK.

B. It uses an API call to interrogate the devices and register the returned data.

C. It obtains MIBs from each vendor that details the APIs available.

D. It imports available APIs for the non-Cisco device in a CSV format.

A

A. It creates device packs through the use of an SDK.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which command set configures RSPAN to capture outgoing traffic from VLAN 3 on interface GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface?

A. monitor session 2 source interface gigabitethernet0/3 rx monitor session 2 filter vlan 3

B. monitor session 2 source interface gigabitethernet0/3 rx monitor session 2 filter vlan 1 - 2, 4 - 4094

C. monitor session 2 source interface gigabitethernet0/3 tx monitor session 2 filter vlan 3

D. monitor session 2 source interface gigabitethernet0/3 tx monitor session 2 filter vlan 1- 2, 4 - 4094

A

C. monitor session 2 source interface gigabitethernet0/3 tx monitor session 2 filter vlan 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which NGFW mode blocks flows crossing the firewall?

A. tap

B. inline

C. passive

D. inline tap

A

B. inline

17
Q

How does Cisco TrustSec enable more flexible access controls for dynamic networking environments and data centers?

A. uses flexible NetFlow

B. assigns a VLAN to the endpoint

C. classifies traffic based on advanced application recognition

D. classifies traffic based on the contextual identity of the endpoint rather than its IP address

A

D. classifies traffic based on the contextual identity of the endpoint rather than its IP address

18
Q

Which feature does Cisco TrustSec use to provide scalable, secure communication throughout a network?

A. security group tag ACL assigned to each port on a switch

B. security group tag number assigned to each user on a switch

C. security group tag number assigned to each port on a network

D. security group tag ACL assigned to each router on a network

A

B. security group tag number assigned to each user on a switch

19
Q

Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?

A. SSL

B. Cisco TrustSec

C. MACsec

D. IPsec

A

C. MACsec

20
Q

An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy. Which device presents the web authentication for the WLAN?

A. ISE server

B. RADIUS server

C. anchor WLC

D. local WLC

A

D. local WLC