Part 6 Flashcards

1
Q

Which NTP Stratum level is a server that is connected directly to an authoritative time source?

A. Stratum 0

B. Stratum 1

C. Stratum 14

D. Stratum 15

A

B. Stratum 1

Reference: https://www.cisco.com/c/en/us/td/docs/routers/asr920/configuration/guide/bsm/16-6-1/b-bsm-xe-16-6-1-asr920/bsm-time-calendar-set.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the function of a VTEP in VXLAN?

A. provide the routing underlay and overlay for VXLAN headers

B. dynamically discover the location of end hosts in a VXLAN fabric

C. encapsulate and de-encapsulate traffic into and out of the VXLAN fabric

D. statically point to end host locations of the VXLAN fabric

A

C. encapsulate and de-encapsulate traffic into and out of the VXLAN fabric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the responsibility of a secondary WLC?

A. It enables Layer 2 and Layer 3 roaming between itself and the primary controller.

B. It registers the LAPs if the primary controller fails.

C. It avoids congestion on the primary controller by sharing the registration load on the LAPs.

D. It shares the traffic load of the LAPs with the primary controller.

A

A. It enables Layer 2 and Layer 3 roaming between itself and the primary controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are two common sources of interference for Wi-Fi networks? (Choose two.)

A. LED lights

B. radar

C. fire alarm

D. conventional oven

E. rogue AP

A

A. LED lights

E. rogue AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If a VRRP master router fails, which router is selected as the new master router?

A. router with the lowest priority

B. router with the highest priority

C. router with the highest loopback address

D. router with the lowest loopback address

A

B. router with the highest priority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An engineer is describing QoS to a client. Which two facts apply to traffic policing? (Choose two.)

A. Policing should be performed as close to the source as possible.

B. Policing adapts to network congestion by queuing excess traffic.

C. Policing should be performed as close to the destination as possible.

D. Policing drops traffic that exceeds the defined rate. E. Policing typically delays the traffic, rather than drops it.

A

A. Policing should be performed as close to the source as possible. D. Policing drops traffic that exceeds the defined rate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which component handles the orchestration plane of the Cisco SD-WAN?

A. vBond

B. vSmart

C. vManage

D. WAN Edge

A

A. vBond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are two device roles in Cisco SD-Access fabric? (Choose two.)

A. edge node

B. vBond controller

C. access switch

D. core switch

E. border node

A

A. edge node

E. border node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the role of the vSmart controller in a Cisco SD-WAN environment?

A. It performs authentication and authorization.

B. It manages the control plane.

C. It is the centralized network management system.

D. It manages the data plane.

A

B. It manages the control plane.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When a wired client connects to an edge switch in a Cisco SD-Access fabric, which component decides whether the client has access to the network?

A. edge node

B. Identity Services Engine

C. RADIUS server

D. control-plane node

A

C. RADIUS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which benefit is offered by a cloud infrastructure deployment but is lacking in an on-premises deployment?

A. virtualization

B. supported systems

C. storage capacity

D. efficient scalability

A

D. efficient scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which action is the vSmart controller responsible for in a Cisco SD-WAN deployment?

A. onboard WAN Edge nodes into the Cisco SD-WAN fabric

B. gather telemetry data from WAN Edge routers

C. distribute policies that govern data forwarding performed within the Cisco SD-WAN fabric

D. handle, maintain, and gather configuration and status for nodes within the Cisco SD-WAN fabric

A

C. distribute policies that govern data forwarding performed within the Cisco SD-WAN fabric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Where is radio resource management performed in a Cisco SD-Access wireless solution?

A. DNA Center

B. control plane node

C. wireless controller

D. Cisco CMX

A

C. wireless controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does the RIB differ from the FIB?

A. The FIB maintains network topologies and routing tables. The RIB is a list of routes to particular network destinations.

B. The FIB includes many routes to a single destination. The RIB is the best route to a single destination.

C. The RIB is used to create network topologies and routing tables. The FIB is a list of routes to particular network destinations.

D. The RIB includes many routes to the same destination prefix. The FIB contains only the best route.

A

C. The RIB is used to create network topologies and routing tables. The FIB is a list of routes to particular network destinations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which technology is used to provide Layer 2 and Layer 3 logical networks in the Cisco SD-Access architecture?

A. underlay network

B. VPN routing/forwarding

C. easy virtual network

D. overlay network

A

D. overlay network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the difference between CEF and process switching?

A. CEF processes packets that are too complex for process switching to manage.

B. Process switching is faster than CEF.

C. CEF uses the FIB and the adjacency table to make forwarding decisions, whereas process switching punts each packet.

D. CEF is more CPU-intensive than process switching.

A

C. CEF uses the FIB and the adjacency table to make forwarding decisions, whereas process switching punts each packet.

17
Q

What are two considerations when using SSO as a network redundancy feature? (Choose two.)

A. requires synchronization between supervisors in order to guarantee continuous connectivity

B. the multicast state is preserved during switchover

C. must be combined with NSF to support uninterrupted Layer 3 operations

D. both supervisors must be configured separately E. must be combined with NSF to support uninterrupted Layer 2 operations

A

A. requires synchronization between supervisors in order to guarantee continuous connectivity

C. must be combined with NSF to support uninterrupted Layer 3 operations

18
Q

In a Cisco SD-Access fabric, which control plane protocol is used for mapping and resolving endpoints?

A. DHCP

B. VXLAN

C. SXP

D. LISP

A

D. LISP

19
Q

What are two differences between the RIB and the FIB? (Choose two.)

A. FIB is a database of routing prefixes, and the RIB is the information used to choose the egress interface for each packet.

B. The FIB is derived from the data plane, and the RIB is derived from the FIB.

C. The RIB is a database of routing prefixes, and the FIB is the information used to choose the egress interface for each packet.

D. The RIB is derived from the control plane, and the FIB is derived from the RIB. E. The FIB is derived from the control plane, and the RIB is derived from the FIB.

A

C. The RIB is a database of routing prefixes, and the FIB is the information used to choose the egress interface for each packet.

D. The RIB is derived from the control plane, and the FIB is derived from the RIB.

20
Q

Which two network problems indicate a need to implement QoS in a campus network? (Choose two.)

A. port flapping

B. excess jitter

C. misrouted network packets

D. duplicate IP addresses E. bandwidth-related packet loss

A

B. excess jitter

E. bandwidth-related packet loss