Part_6 Flashcards

1
Q

Question 1
An engineer must create an EEM applet that sends a syslog message in the event a change happens in the network due to trouble with an OSPF process. Which action should the engineer use?

A. action 1 syslog msg “OSPF ROUTING ERROR”
B. action 1 syslog send “OSPF ROUTING ERROR”
C. action 1 syslog pattern “OSPF ROUTING ERROR”
D. action 1 syslog write “OSPF ROUTING ERROR”

A

Answer:A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Question 3
A customer has 20 stores located throughout a city. Each store has a single Cisco AP managed by a central WLC. The customer wants to gather analytics for users in each store. Which technique supports these requirements?

A. hyperlocation

B. angle of arrival

C. presence

D. trilateration

A

Answer:C

Explanation

We only have one AP in each store so we can only use “Presence”, which is the most basic form of location tracking.
Reference:https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2016/pdf/BRKEWN-2012.pdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Question 4
What is a characteristic of a WLC that is in master controller mode?

A. The master controller is responsible for load balancing all connecting clients to other controllers.

B. Configuration on the master controller is executed on all wireless LAN controllers.

C. All wireless LAN controllers are managed by the master controller.

D. All new APs that join the WLAN are assigned to the master controller.

A

Answer:D

Explanation

When should I use the master controller mode on a WLC?
– When there is a master controller enabled, all newly added access points with no primary, secondary, or tertiary controllers assigned associate with the master controller on the same subnet.
Reference:https://www.cisco.com/c/en/us/support/docs/wireless/4400-series-wireless-lan-controllers/69561-wlc-faq.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question 5
A customer has a pair of Cisco 5520 WLCs set up in an SSO cluster to manage all APs. Guest traffic is anchored to a Cisco 3504 WLC located in a DMZ. Which action is needed to ensure that the EoIP tunnel remains in an UP state in the event of failover on the SSO cluster?

A. Configure back-to-back connectivity on the RP ports

B. Use the mobility MAC when the mobility peer is configured

C. Enable default gateway reachability check

D. Use the same mobility domain on all WLCs

A

Answer:B

Explanation

In order to keep the mobility network stable without any manual intervention and in the event of failure or switchover, the back-and-forth concept of Mobility MAC has been introduced.
Reference:https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/7-5/High_Availability_DG.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Question 6
In a Cisco DNA Center Plug and Play environment, why would a device be labeled unclaimed?

A. The device has not been assigned a workflow.

B. The device could not be added to the fabric.

C. The device had an error and could not be provisioned.

D. The device is from a third-party vendor.

A

Answer:A

Explanation

The Network Plug and Play application provides a way to automatically and remotely provision and onboard new network devices with minimal network administrator and field personnel involvement.
From the “Network Plug and Play Dashboard Elements” table:
Pie chart showing the number of devices in each of the following states:
+ Error – Device had an error and could not be provisioned.
+Unclaimed– Device has not been assigned a workflow.
+ Planned – Device is added to Network Plug and Play and has been assigned a workflow, but has not yet contacted the server.
+ Provisioned – Device is successfully onboarded and added to inventory.
Reference:https://www.cisco.com/c/en/us/td/docs/cloud-systems-management/network-automation-and-management/dna-center/1-2-5/user_guide/b_dnac_ug_1_2_5/b_dnac_ug_1_2_4_chapter_010.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question 9
How do cloud deployments differ from on-prem deployments?

A. Cloud deployments require longer implementation times than on-premises deployments

B. Cloud deployments are more customizable than on-premises deployments.

C. Cloud deployments have lower upfront costs than on-premises deployments.

D. Cloud deployments require less frequent upgrades than on-premises deployments.

A

Answer:C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Question 12
An engineer is concerned with the deployment of a new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements?

A. Router(config)# ip sla responder udp-connect 172.29.139.134 5000

B. Router(config)# ip sla responder tcp-connect 172.29.139.134 5000

C. Router(config)# ip sla responder udp-echo 172.29.139.134 5000

D. Router(config)# ip sla responder tcp-echo 172.29.139.134 5000

A

Answer:C

Explanation

Cisco IOS IP SLA Responder is a Cisco IOS Software component whose functionality is to respond to Cisco IOS IP SLA request packets. The IP SLA source sends control packets before the operation starts to establish a connection to the responder. Once the control packet is acknowledged, test packets are sent to the responder.The responder inserts a time-stamp when it receives a packetand factors out the destination processing timeand adds time-stamps to the sent packets. This feature allows the calculation of unidirectional packet loss, latency, and jitter measurements with the kind of accuracy that is not possible with ping or other dedicated probe testing.
Reference:https://www.cisco.com/en/US/technologies/tk869/tk769/technologies_white_paper0900aecd806bfb52.html
UDP Jitter measures the delay, delay variation (jitter), corruption, misordering and packet loss by generating periodic UDP traffic. This operation always requires IP SLA responder.
Reference:https://www.ciscolive.com/c/dam/r/ciscolive/us/docs/2017/pdf/BRKNMS-3043.pdf
The command to enable UDP Jitter Operation is “ip sla responder udp-echo{destination-ip-address} [destination-port]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Question 13
Which resource is able to be shared among virtual machines deployed on the same physical server?

A. VM configuration file

B. operating system

C. disk

D. applications

A

Answer:C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question 14
Which function is handled by vManage in the Cisco SD-WAN fabric?

A. Establishes IPsec tunnels with nodes

B. Distributes policies that govern data forwarding

C. Performs remote software upgrades for WAN Edge, vSmart and vBond

D. Establishes BFD sessions to test liveliness of links and nodes

A

Answer:C

Explanation

We can remote upgrades WAN Edge, vSmart and vBond in vManage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Question 16

Refer to the exhibit.

event snmp oid 1.3.6.1.4.1.9.9.109.1.1.1.1.3 get-type next entry-op gt entry-val 80 poll-interval 5
!

action 1.0 cli command “enable”

action 2.0 syslog msg “high cpu”

action 3.0 cli command “term length 0”

An engineer must create a script that appends the output of the show process cpu sorted command to a file. Which action completes the configuration?

A. action 4.0 syslog command “show process cpu sorted | append flash:high-cpu-file”

B. action 4.0 publish-event “show process cpu sorted | append flash:high-cpu-file”

C. action 4.0 ens-event “show process cpu sorted | append flash:high-cpu-file”

D. action 4.0 cli command “show process cpu sorted | append flash:high-cpu-file”

A

Answer:D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Question 19
Which of the following statements regarding BFD are correct? (Choose two)

A. BFD is supported by OSPF, EIGRP, BGP, and IS-IS.

B. BFD detects link failures in less than one second.

C. BFD can bypass a failed peer without relying on a routing protocol.

D. BFD creates one session per routing protocol per interface.

E. BFD is supported only on physical interfaces.

F. BFD consumes more CPU resources than routing protocol timers do.

A

Answer:A B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Question 20
What is an advantage of using BFD?

A. It detects local link failure at layer 1 and updates routing table

B. It detects local link failure at layer 3 and updates routing protocols

C. It has sub-second failure detection for layer 1 and layer 3 problems.

D. It has sub-second failure detection for layer 1 and layer 2 problems.

A

Answer:B

Explanation

BFD works only for directly connected neighbors. BFD neighbors must be no more than one IP hop away. Multihop configurations are not supported -> “BFD detects local link failure” is correct.
Typically, BFD can be used at any protocol layer. However, the Cisco implementation of BFD for Cisco IOS Releases 12.2(18)SXE, 12.0(31)S, and 12.4(4)Tsupports only Layer 3 clients, in particular, the BGP, EIGRP, IS-IS, and OSPF routing protocols.
Reference:https://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/fs_bfd.html
According to the reference above, it is a bit weird but answer B is the best choice here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Question 21
An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:

Location A: -72 dBm
Location B: -75 dBm
Location C: -65 dBm
Location D: -80 dBm

Which two statements does the engineer use to explain these values to the customer? (Choose two)

A. The signal strength at location C is too weak to support web surfing

B. Location D has the strongest RF signal strength

C. The RF signal strength at location B is 50% weaker than location A

D. The signal strength at location B is 10 dB better than location C

E. The RF signal strength at location C is 10 times stronger than location B

A

Answer:C E

Explanation

Understanding Signal Strength
The most accurate way to express it is with milliwatts (mW), but you end up with tons of decimal places due to WiFi’s super-low transmit power, making it difficult to read. For example, -40 dBm is 0.0001 mW, and the zeros just get more intense the more the signal strength drops.
Ultimately, the easiest and most consistent way to express signal strength is with dBm, which stands for decibels relative to a milliwatt.
1 mW = 0 dBm
You can convert between mW and dBm using the following formulas:
P(dBm) = 10 · log10(P(mW))
For example, a power of 2.5 mW in dBm is:
P(dBm) = 10log102.5 = 3.979
dBm is that we’re working in negatives. -30 is a higher (stronger) signal than -80.
Signal Strength
Rating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Question 22
Which three resources must the hypervisor make available to the virtual machines? (Choose three)

A. memory

B. IP address

C. processor

D. bandwidth

E. secure access

F. storage

A

Answer:A C F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Question 23
Which unit is used to express the signal-to-noise ratio?

A. dBm

B. dB

C. amp

D. mW

A

Answer:B

Explanation

Signal-to-noise ratio (SNR or S/N) is the ratio of signal power to the noise power, and its unit of expression is typically decibels (dB).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Question 25
Which function does a fabric AP perform in a Cisco SD-Access deployment?

A. It manages wireless clients’ membership information in the fabric

B. It connects wireless clients to the fabric.

C. It updates wireless clients’ locations in the fabric

D. It configures security policies down to wireless clients in the fabric

A

Answer:B

17
Q

Question 26
Which design principle should be followed in a Cisco SD-Access wireless network deployment?

A. The WLC is part of the fabric overlay

B. The WLC is part of the fabric underlay

C. The WLC is connected outside of the fabric

D. The access point is connected outside of the fabric

A

Answer:C

Explanation

This section gives some important considerations for deploying WLC and APs in an SD-Access Wireless network:
Access points must be deployed as follows:
+ Be directly connected to the fabric edge(or to an extended node switch)
+ Be part of the fabric overlay
+ Belong to the INFRA_VN, which is mapped to the global routing table
+ Join the WLC in Local mode
WLCs must be deployed as follows:
+Be connected outside the fabric(optionally directly to border)
+ Reside in the global routing table
+ No need for inter-VRF leaking for an AP to join the WLC
+ Communicate to only one control-plane node (two for redundancy); hence one WLC can belong to only one fabric domain(FD)

18
Q

Question 28
An engineer is configuring a GRE tunnel interface in the default mode. The engineer has assigned an IPv4 address on the tunnel and sourced the tunnel from an Ethernet interface. Which option also is required on the tunnel interface before it is operational?

A. (config-if)#tunnel destination{ip address}

B. (config-if)#keepalive{seconds retries}

C. (config-if)#ip mtu {value}

D. (config-if)#ip tcp adjust-mss {value}

A

Answer:A

Explanation

A GRE interface definition includes:
+ An IPv4 address on the tunnel
+ A tunnel source
+ A tunnel destination
Below is an example of how to configure a basic GRE tunnel:
interface Tunnel 0
ip address 10.10.10.1 255.255.255.0
tunnel source fa0/0
tunnel destination 172.16.0.2
In this case the “IPv4 address on the tunnel” is 10.10.10.1/24 and “sourced the tunnel from an Ethernet interface” is the command “tunnel source fa0/0”. Therefore it only needs a tunnel destination, which is 172.16.0.2.
Note: A multiple GRE (mGRE) interface does not require a tunnel destination address.