Part 6 Flashcards
Which NTP Stratum level is a server that is connected directly to an authoritative time source?
A. Stratum 0
B. Stratum 1
C. Stratum 14
D. Stratum 15
B. Stratum 1
Reference: https://www.cisco.com/c/en/us/td/docs/routers/asr920/configuration/guide/bsm/16-6-1/b-bsm-xe-16-6-1-asr920/bsm-time-calendar-set.html
What is the function of a VTEP in VXLAN?
A. provide the routing underlay and overlay for VXLAN headers
B. dynamically discover the location of end hosts in a VXLAN fabric
C. encapsulate and de-encapsulate traffic into and out of the VXLAN fabric
D. statically point to end host locations of the VXLAN fabric
C. encapsulate and de-encapsulate traffic into and out of the VXLAN fabric
What is the responsibility of a secondary WLC?
A. It enables Layer 2 and Layer 3 roaming between itself and the primary controller.
B. It registers the LAPs if the primary controller fails.
C. It avoids congestion on the primary controller by sharing the registration load on the LAPs.
D. It shares the traffic load of the LAPs with the primary controller.
A. It enables Layer 2 and Layer 3 roaming between itself and the primary controller.
What are two common sources of interference for Wi-Fi networks? (Choose two.)
A. LED lights
B. radar
C. fire alarm
D. conventional oven
E. rogue AP
A. LED lights
E. rogue AP
If a VRRP master router fails, which router is selected as the new master router?
A. router with the lowest priority
B. router with the highest priority
C. router with the highest loopback address
D. router with the lowest loopback address
B. router with the highest priority
An engineer is describing QoS to a client. Which two facts apply to traffic policing? (Choose two.)
A. Policing should be performed as close to the source as possible.
B. Policing adapts to network congestion by queuing excess traffic.
C. Policing should be performed as close to the destination as possible.
D. Policing drops traffic that exceeds the defined rate. E. Policing typically delays the traffic, rather than drops it.
A. Policing should be performed as close to the source as possible. D. Policing drops traffic that exceeds the defined rate.
Which component handles the orchestration plane of the Cisco SD-WAN?
A. vBond
B. vSmart
C. vManage
D. WAN Edge
A. vBond
What are two device roles in Cisco SD-Access fabric? (Choose two.)
A. edge node
B. vBond controller
C. access switch
D. core switch
E. border node
A. edge node
E. border node
What is the role of the vSmart controller in a Cisco SD-WAN environment?
A. It performs authentication and authorization.
B. It manages the control plane.
C. It is the centralized network management system.
D. It manages the data plane.
B. It manages the control plane.
When a wired client connects to an edge switch in a Cisco SD-Access fabric, which component decides whether the client has access to the network?
A. edge node
B. Identity Services Engine
C. RADIUS server
D. control-plane node
C. RADIUS server
Which benefit is offered by a cloud infrastructure deployment but is lacking in an on-premises deployment?
A. virtualization
B. supported systems
C. storage capacity
D. efficient scalability
D. efficient scalability
Which action is the vSmart controller responsible for in a Cisco SD-WAN deployment?
A. onboard WAN Edge nodes into the Cisco SD-WAN fabric
B. gather telemetry data from WAN Edge routers
C. distribute policies that govern data forwarding performed within the Cisco SD-WAN fabric
D. handle, maintain, and gather configuration and status for nodes within the Cisco SD-WAN fabric
C. distribute policies that govern data forwarding performed within the Cisco SD-WAN fabric
Where is radio resource management performed in a Cisco SD-Access wireless solution?
A. DNA Center
B. control plane node
C. wireless controller
D. Cisco CMX
C. wireless controller
How does the RIB differ from the FIB?
A. The FIB maintains network topologies and routing tables. The RIB is a list of routes to particular network destinations.
B. The FIB includes many routes to a single destination. The RIB is the best route to a single destination.
C. The RIB is used to create network topologies and routing tables. The FIB is a list of routes to particular network destinations.
D. The RIB includes many routes to the same destination prefix. The FIB contains only the best route.
C. The RIB is used to create network topologies and routing tables. The FIB is a list of routes to particular network destinations.
Which technology is used to provide Layer 2 and Layer 3 logical networks in the Cisco SD-Access architecture?
A. underlay network
B. VPN routing/forwarding
C. easy virtual network
D. overlay network
D. overlay network