Part_8 Flashcards

1
Q

Question 1
Which protocol is used to encrypt control plane traffic between SD-WAN controllers and SD-WAN endpoints?

A. DTLS

B. IPsec

C. PGP

D. HTTPS

A

Answer:A

Explanation

DTLS protocol is used to encrypt control plane traffic between vSmart (controllers) and other SD-WAN endpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Question 2
Which network devices secure API platform?

A. next-generation intrusion detection systems

B. Layer 3 transit network devices

C. content switches

D. web application firewalls

A

Answer:D

Explanation

Cisco Secure Web Application Firewall (WAF) and bot protection defends your online presence and ensures that website, mobile applications, and APIs are secure, protected, and “always on.”
Reference:https://www.cisco.com/c/en/us/products/collateral/security/advanced-waf-bot-aag.pdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Question 3
An engineer must configure the strongest password authentication to locally authenticate on a router. Which configuration must be used?

A. username netadmin secret 5 $1$bfjk$kdiSiDKKdkXksufZ2

B. username netadmin secret $1$bfjk$kdiSiDKKdkXksufZ2

C. line console 0
password $1$bfjk$k

D. username netadmin secret 9 $9$vFpMf83kdDJ9kdjDdjdu/dkfhZiz

A

Answer:D

Explanation

Best Practices
+ The enable password command should no longer be used. Use enable secret instead.
username joeblow password mypass command should no longer be used. Use username joeblow secret mypass instead.
+ Type 4 Passwords should never be used!
+Use Type 6, Type 8 and Type 9 wherever possible.
+ Type 0, Type 5 and Type 7 should be migrated to other stronger methods.
Reference:https://community.cisco.com/t5/networking-documents/understanding-the-differences-between-the-cisco-password-secret/ta-p/3163238

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question 4

Refer to the exhibit.

Device#configure terminal
Device(config)#netconf ssh acl 1
Device(config)#netconf lock-time 100
Device(config)#netconf max-sessions 1
Device(config)#netconf max-message 10

A network engineer must configure NETCONF. After creating the configuration, the engineer gets output from the command show line, but not from show running-config. Which command completes the configuration?

A. Device(config)# no netconf ssh acl 1

B. Device(config)# netconf max-sessions 100

C. Device(config)# netconf lock-time 500

D. Device(config)# netconf max-message 1000

A

Answer:D

Explanation

If we use the “no netconf ssh acl 1” then the whole NETCONF function will be disabled so the best answer should be “netconf max-message 1000” as it will increase the maximum size of messages received in a NETCONF session to 1000KB (~1MB).
Note:
+ The valid range for thenetconf lock-timesecondsis 1 to 300 so 500 is not a valid value.
+ The valid range for thenetconf max-sessionsnumberis 4 to 16 so 100 is not a valid value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Question 5
An engineer is configuring a new SSID to present users with a splash page for authentication. Which WLAN Layer 3 setting must be configured to provide this functionally?

A. CCKM

B. WPA2 Policy

C. Local Policy

D. Web Policy

A

Answer:D

Explanation

In the figure below, we have to tick on “Web Policy” to enable “Splash Page Web Redirect”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question 9
An engineer is implementing a route map to support redistribution within BGP. The route map must configured to permit all unmatched routes. Which action must the engineer perform to complete this task?

A. Include a permit statement as the first entry

B. Include at least one explicit deny statement

C. Remove the implicit deny entry

D. Include a permit statement as the last entry

A

Answer:D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Question 12
Which threat defense mechanism, when deployed at the network perimeter, protects against zero-day attacks?

A. intrusion prevention

B. stateful inspection

C. sandbox

D. SSL decryption

A

Answer:A

Explanation

A zero-day (or 0-day) vulnerability is a software vulnerability that is discovered by attackers before the vendor has become aware of it. By definition, no patch exists for zero-day vulnerabilities and user systems have no defenses in place, making attacks highly likely to succeed. The name “zero-day” is designed to imply how long since the vulnerability was discovered. The term also indicates that system developers have had zero days to fix it.
Intrusion Protection
While the precise methods of a zero-day exploit can’t be known in advance, a network intrusion protection system (NIPS) can monitor the firms’ network for unusual activity.
The advantage of NIPS over a traditional antivirus only system is it does not rely on checking software against a known database of threats. This means it does not need updates or patches to learn about the latest attacks. NIPS works by monitoring the day-to-day patterns of network activity across the network.
When traffic or events far out of the ordinary are detected action can be taken to alert system administrators and lock down the firewall. Devices such as USB drives and mobile devices can all introduce threats to the network. They can often make it past the firewall because they are physically introduced to the system.
NIPS protects against threats introduced to the network from both external and internal sources.
Reference:https://cybriant.com/how-to-prevent-zero-day-attacks-in-5-steps/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Question 13
What is a Type 2 hypervisor?

A. also referred to as a “bare metal hypervisor” because it sits directly on the physical server

B. runs directly on a physical server and includes its own operating system

C. supports over-allocation of physical resources

D. installed as an application on an already installed operating system

A

Answer:D

Explanation

There are two types of hypervisors: type 1 and type 2 hypervisor.
In type 1 hypervisor (or native hypervisor), the hypervisor is installed directly on the physical server. Then instances of an operating system (OS) are installed on the hypervisor. Type 1 hypervisor has direct access to the hardware resources. Therefore they are more efficient than hosted architectures. Some examples of type 1 hypervisor are VMware vSphere/ESXi, Oracle VM Server, KVM and Microsoft Hyper-V.
In contrast to type 1 hypervisor, a type 2 hypervisor (or hosted hypervisor) runs on top of an operating system and not the physical hardware directly. A big advantage of Type 2 hypervisors is that management console software is not required. Examples of type 2 hypervisor are VMware Workstation (which can run on Windows, Mac and Linux) or Microsoft Virtual PC (only runs on Windows).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question 14
Which two items are found in YANG data models? (Choose two)

A. HTTP return codes

B. rpc statements

C. JSON schema

D. container statements

E. XML schema

A

Answer:B D

Explanation

The following YANG example uses a container statement to define a timeout mechanism for a request to a server. The timeout has two components: access-timeout, which represents the maximum time without server response, and retries, which represents the number of request attempts before giving up.
container timeout {
leaf access-timeout {
type uint32;
}
leaf retries {
type uint8;
}
}
Reference:https://www.tail-f.com/wordpress/wp-content/uploads/2014/02/Tail-f-Instant-YANG.pdf
IOS XR actions areRPC statementsthat trigger an operation or execute a command on the router. Theses actions are defined as YANG models using RPC statements. An action is executed when the router receives the corresponding NETCONF RPC request. Once the router executes an action, it replies with a NETCONF RPC response.
Reference:https://www.cisco.com/c/en/us/td/docs/iosxr/ncs5000/DataModels/b-data-models-config-guide-ncs5000/b-data-models-config-guide-ncs5000_chapter_010.html
Note: A data model is simply a well understood and agreed upon method to describe “something”. As an example, consider this simple “data model” for a person.
Person
Gender-male, female, other
Height-Feet/Inches or Meters
Weight-Pounds or Kilos
Hair Color-Brown, Blond, Black, Red, other
*Eye Color-Brown, Blue, Green, Hazel, other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Question 15
What is a characteristic of Cisco DNA Northbound APIs?

A. They utilize RESTCONF

B. They enable automation of network infrastructure based on intent

C. They simplify the management of network infrastructure devices

D. They utilize multivendor support APIs

A

Answer:B

Explanation

Software-Defined Access (SDA) uses the software-defined architectural model, with a controller and various APIs. At the center sits the Digital Network Architecture (DNA) Center controller. DNA Center is the controller for SDA networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Question 16
What is required for intercontroller Layer 3 roaming?

A. Mobility groups are established between wireless controllers.

B. WLCs have the same IP addresses configured on their interfaces.

C. WLCs use separate DHCP servers.

D. The management VLAN is present as a dynamic VLAN on the second WLC.

A

Answer:A

Explanation

If the management VLAN of one controller is present as a dynamic VLAN on another controller, the mobility feature is not supported -> Answer D is not correct.
Cisco Wireless Controllers (that are mobility peers) must use the same DHCP server to have an updated client mobility move count on intra-VLAN -> Answer C is not correct.
The figure below shows intercontroller Layer 3 roaming, which occurs when the wireless LAN interfaces of the controllers are on different IP subnets… -> Answer B is not correct.
Reference:https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-5/config-guide/b_cg85/overview.html
Therefore answer A is the only answer left.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Question 17
What is required for a virtual machine to run?

A. a hypervisor and physical server hardware

B. a Type 1 hypervisor and a host operating system

C. only a Type 1 hypervisor

D. only a Type 2 hypervisor

A

Answer:A

Explanation

In order to run VM, we need a Physical Server and a hypervisor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Question 18
Which technology uses network traffic telemetry, contextual information, and file reputation to provide insight into cyber threats?

A. threat defense

B. security services

C. security intelligence

D. segmentation

A

Answer:A

Explanation

According to the CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert Guide Book inChapter 25: Secure Network
Access Control:
Threat defense:It is important to have visibility into the most dangerous cyber threats. Threat defense provides this visibility throughnetwork traffic telemetry, file reputation, and contextual information(such as device types, locations, users, identities, roles, privileges levels, login status, posture status, and so on). It enables assessment of the nature and the potential risk of suspicious activity so that the correct next steps for cyber threats can be taken.
Note:
Security intelligence:Security intelligence provides detection of emerging malware and cyber threats. It enables an infrastructure to enforce policy dynamically, as reputations are augmented by thecontext of new threats. This enables accurate and timely security protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Question 19
An engineer must configure AAA on a Cisco 9800 WLC for central web authentication. Which two commands are needed to accomplish this task? (Choose two)

A. (Cisco Controller)> config radius acct add 10.10.10.12 1812 SECRET
B. (Cisco Controller)> config wlan aaa-override enable <wlan-id>
C. (Cisco Controller)> config wlan aaa-override disable <wlan-id>
D. Device(config-locsvr-da-radius)#client 10.10.10.12 server-key 0 SECRET
E. Device(config)# aaa server radius dynamic-author</wlan-id></wlan-id>

A

Answer:D E

Explanation

Answer B and answer C are used to enable/disable AAA Override option but it is just optional so they are not the correct answers. AAA Override enables you to apply VLAN tagging, Quality of Service, and Access Control Lists to individual clients based on the returned RADIUS attributes from the AAA server.
According to thisCisco link(under AAA Configuration on 9800 WLCs) section, we need the following commands:
# aaa new-model
# radius server <radius-server-name>
# address ipv4 <radius-server-ip> auth-port 1812 acct-port 1813
# timeout 300
# retransmit 3
# key <shared-key>
# exit
# aaa group server radius <radius-grp-name>
# server name <radius-server-name>
# exit
#aaa server radius dynamic-author
#client <radius-server-ip> server-key <shared-key>
# aaa authentication dot1x <dot1x-list-name> group <radius-grp-name>
Therefore answer D and answer E are correct.</radius-grp-name></dot1x-list-name></shared-key></radius-server-ip></radius-server-name></radius-grp-name></shared-key></radius-server-ip></radius-server-name>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Question 21
What is a benefit of Type 1 hypervisors?

A. Network engineers are able to create virtual networks of interconnected virtual machines in Layer 2 topologies

B. Storage engineers are able to leverage VMDK files to provide storage to virtual machine.

C. Operators are able to leverage orchestrators to manage workloads that run on multiple Type 1 hypervisors

D. Administrators are able to load portable virtual machine packages in OVA or QCOW2 formats.

A

Answer:A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Question 23
What are two benefits of implementing a Cisco SD-WAN architecture? (Choose two)

A. It provides resilient and effective traffic flow using MPLS

B. It improves endpoint protection by integrating embedded and cloud security features

C. It allows configuration of application-aware policies with real time enforcement

D. It simplifies endpoint provisioning through standalone router management

E. It enforces a single, scalable, hub-and-spoke topology

A

Answer:B C

Explanation

The top SD-WAN benefits are:
+ Increased bandwidth at a lower cost
+Centralized management across branch networks
+ Full visibility into the network
+ Providing organizations with more connection type options and vendor selection when building a network.
Reference:https://www.sdxcentral.com/networking/sd-wan/definitions/sd-wan-technology/
-> We can provision endpoints (vEdges) through a centralized router vManage, but not standalone router management -> Answer D is not correct.
Answer A is not correct as we can use different kind of connections on SD-WAN: MPLS, LTE, 4G, xDSL, Internet connections…
Application-Aware Routing policyis configured in vManage as a centralized data policy that maps the service-side application(s) to specific SLA requirements. The centralized policies provisioned in vSmart controller is pushed to relevant WAN Edge devices for enforcement. The defined policy consists of match-action pairs, where the match statement defines the application-list or the type of traffic to match, and the action statement defines the SLA action the WAN Edge devices must enforce for the specified traffic.
Reference:https://www.cisco.com/c/en/us/td/docs/solutions/CVD/SDWAN/cisco-sdwan-application-aware-routing-deploy-guide.html
-> Therefore answer C is correct.
Answer E is not correct as it is not a benefit of SD-WAN.
Cisco SD-WAN is fully integrated with cloud-delivered Cisco Umbrella, which offers protection against security blind spots and cyberthreats. Powered by the Umbrella global network and Cisco Talos threat intelligence, it’s the easiest way to deliver protection to users anywhere they access the internet and cloud apps -> Answer B is correct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Question 25
Which component does Cisco Threat Defense use to measure bandwidth, application performance, and utilization?

A. NetFlow

B. Cisco Umbrella

C. TrustSec

D. Advanced Malware Protection for Endpoints

A

Answer:A

Explanation

NetFlow was initially created to measure network traffic characteristics such as bandwidth, application performance, and utilization.
Reference:https://www.cisco.com/c/dam/en/us/td/docs/security/network_security/ctd/ctd2-0/design_guides/ctd_2-0_cvd_guide_jul15.pdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Question 26
A customer has two Cisco WLCs that manage separate APs throughout a building. Each WLC advertises the same SSID but terminates on different interfaces. Users report that they drop their connections and change IP addresses when roaming. Which action resolves this issue?

A. Configure high availability.

B. Enable test roaming.

C. Enable client load balancing.

D. Configure mobility groups.

A

Answer:D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Question 28
A script contains the statement “while loop != 999:”. Which value terminates the loop?

A. A value less then or equal to 999

B. A value greater then or equal to 999

C. A value not equal to 999

D. A value equal to 999

A

Answer:D

Explanation

The “while {expression}” loop exits when the expression is false. Therefore only the expression “999 != 999” is false so this is the correct answer.
Note: “!=” means “is not equal to”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Question 29
Which CISCO SD-WAN component authenticates the routers and the vSmart controllers?

A. vAnalytics

B. vBond orchestrator

C. vEdge

D. vManage NMS

A

Answer:B

21
Q

Question 30
When voice services are deployed over a wireless environment, which service must be disabled to ensure the quality of calls?

A. Aggressive load balancing

B. Dynamic transmit power control

C. Priority queuing

D. Fastlane

A

Answer:A

Explanation

To have a successful voice deployment with 792x phones, not only do you need a professional site survey, you also need to make sure that the controller and the switched network are properly configured for voice.
The controller has several settings for a proper voice configuration:
…
Aggressive Load Balancing should be disabled.
…
Reference:http://what-when-how.com/deploying-and-troubleshooting-cisco-wireless-lan-controllers/configuration-cisco-wireless-lan-controllers/

22
Q

Question 31
What is a characteristic of an AP operating in FlexConnect Mode?

A. All traffic traverses the WLC to ensure policy enforcement on client traffic

B. Forwarding continues when the AP loses connectivity to the WLC

C. APs connect in a mesh topology and elect a root AP

D. FlexConnect enables an AP to connect to multiple WLCs

A

Answer:B

Explanation

The AP can locally switch traffic between a VLAN and SSID when the CAPWAP tunnel to the WLC is down.
Reference:https://networklessons.com/cisco/ccna-200-301/cisco-wireless-ap-modes

23
Q

Question 37
A vulnerability assessment highlighted that remote access to the switches is permitted using unsecure and unencrypted protocols Which configuration must be applied to allow only secure and reliable remote access for device administration?

A. line vty 0 15
login local
transport input none

B. line vty 0 15
login local
transport input ssh

C. line vty 0 15
login local
transport input telnet ssh

D. line vty 0 15
login local
transport input all

A

Answer:B

24
Q

Question 38

How can an engineer prevent basic replay attacks from people who try to brute force a system via REST API?

A. Use HTTPS

B. Use a password hash

C. Add OAuth to the request in the API header

D. Add a timestamp to the request in the API header

A

Answer:D

Explanation

Consider Adding Timestamp in Request
Along with other request parameters, you may add a request timestamp as an HTTP custom header in API requests.
The server will compare the current timestamp to the request timestamp and only accepts the request if it is after a reasonable timeframe (30 seconds, perhaps).
This will prevent very basic replay attacks from people who are trying to brute force your system without changing this timestamp.
Reference:https://restfulapi.net/security-essentials/

25
Q

Question 39
A network monitoring system uses SNMP polling to record the statistics of router interfaces. The SNMP queries work as expected until an engineer installs a new interface and reloads the router. After this action, all SNMP queries for the router fail. What is the cause of this issue?

A. The SNMP community is configured incorrectly

B. The SNMP interface index changed after reboot

C. The SNMP server traps are disabled for the interface index

D. The SNMP server traps are disabled for the link state

A

Answer:B

Explanation

In order to tell IOS to keep ifindex value unchanged even after reboot, use the “snmp-server ifindex persist” command.

26
Q

Question 40
If a client’s radio device receives a signal strength of -67 dBm and the noise floor is -85 dBm, what is the SNR value?

A. 15 dB

B. 16 dB

C. 18 dB

D. 20 dB

A

Answer:C

Explanation

If your SNR measurements are already in decibel form, then you can subtract the noise quantity from the desired signal: SNR = S – N. This is because when you subtract logarithms, it is the equivalent of dividing normal numbers. Also, the difference in the numbers equals the SNR. In this question, SNR = -67 – (-85) =

27
Q

Question 42
An engineer must create a new SSID on a Cisco 9800 wireless LAN controller. The client has asked to use a pre-shared key for authentication. Which profile must the engineer edit to achieve this requirement?

A. RF

B. Policy

C. WLAN

D. Flex

A

Answer:C

Explanation

If you are familiar with AireOS, you are used to configure all characteristics for an SSID under WLAN configuration. On 9800 WLCs, these settings are split between WLAN Profile and Policy Profile. Also, some of the configuration seen under the Global AP Configuration Page on AireOS GUI has been moved to the AP Join Profile. Here you can find the list of all the settings that you can configure under each profile.
WLAN Profile
…
Security Settings (i.e. PSK, 802.1x, WebAuth)
Reference:https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/213911-understand-catalyst-9800-wireless-contro.html#anc5

28
Q

Question 44
A customer requests a design that includes GLBP as the FHRP. The network architect discovers that the members of the GLBP group have different throughput capabilities. Which GLBP load balancing method supports this environment?

A. host dependent

B. weighted

C. round robin

D. least connection

A

Answer:B

Explanation

Host Dependent is required when an application requires traffic flows to be tracked (for example when using NAT). Round Robin is recommended as the default, it is suitable for all other requirements.Weighted can be used if there are disparities in the capabilities of gateways in the GLBP group.
Reference:https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ip-services/product_data_sheet0900aecd803a546c.html

29
Q

Question 45
What is one primary REST security design principle?

A. password hash

B. fail-safe defaults

C. adding a timestamp in requests

D. OAuth

A

Answer:B

Explanation

The paper “The Protection of Information in Computer Systems” by Jerome Saltzer and Michael Schroeder, put forth eight design principles for securing information in computer systems, as described in the following sections:
+ Least Privilege: An entity should only have the required set of permissions to perform the actions for which they are authorized, and no more. Permissions can be added as needed and should be revoked when no longer in use.
+Fail-Safe Defaults: A user’s default access level to any resource in the system should be “denied” unless they’ve been granted a “permit” explicitly.
+ The economy of Mechanism: The design should be as simple as possible. All the component interfaces and the interactions between them should be simple enough to understand.
+ Complete Mediation: A system should validate access rights to all its resources to ensure that they’re allowed and should not rely on the cached permission matrix. If the access level to a given resource is being revoked, but that isn’t reflected in the permission matrix, it would violate the security.
+ Open Design: This principle highlights the importance of building a system in an open manner—with no secret, confidential algorithms.
+ Separation of Privilege: Granting permissions to an entity should not be purely based on a single condition, a combination of conditions based on the type of resource is a better idea.
+ Least Common Mechanism: It concerns the risk of sharing state among different components. If one can corrupt the shared state, it can then corrupt all the other components that depend on it.
+ Psychological Acceptability: It states that security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present. In short, security should not make worse the user experience.
Reference:https://restfulapi.net/security-essentials/

30
Q

Question 46

An engineer must enable a login authentication method that allows a user to log in by using local authentication if all other defined authentication methods fail. Which configuration should be applied?

A. aaa authentication login CONSOLE group radius local-case enable aaa

B. authentication login CONSOLE group radius local enable none

C. aaa authentication login CONSOLE group radius local enable

D. aaa authentication login CONSOLE group tacacs+ local enable

A

Answer:C or D

Explanation

In this question there are two correct answers. With the “aaa authentication login CONSOLE group radius local enable” command, the router will authenticate via RADIUS server first, then local username and finally theenablemethod.

31
Q

Question 48
A network engineer configures a WLAN controller with increased security for web access. There is IP connectivity with the WLAN controller, but the engineer cannot start a management session from a web browser. Which action resolves the issue?

A. Use a private or incognito session.

B. Disable Adobe Flash Player

C. Disable JavaScript on the web browser

D. Use a browser that supports 128-bit or larger ciphers.

A

Answer:D

Explanation

Enable or disable secure web mode with increased security by entering this command:
config network secureweb cipher-option high {enable | disable}
This command allows users to access the controller GUI using “https://ip-address” but only from browsers that support 128-bit (or larger) ciphers. With Release 8.10, this command is, by default, in enabled state.
When high ciphers is enabled, SHA1, SHA256, SHA384 keys continue to be listed and TLSv1.0 is disabled. This is applicable to webauth and webadmin but not for NMSP.
Reference:https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-5/config-guide/b_cg85/

32
Q

Question 51
When firewall capabilities are considered, which feature is found only in Cisco next-generation firewalls?

A. malware protection

B. stateful inspection

C. traffic filtering

D. active/standby high availability

A

Answer:A

33
Q

Question 54
A network engineer is enabling HTTPS access to the core switch, which requires a certificate to be installed on the switch signed by the corporate certificate authority. Which configuration commands are required to issue a certificate signing request from the core switch?

A. Core-Switch(config)#crypto pki trustpoint Core-Switch
Core-Switch(ca-trustpoint)#enrollment terminal
Core-Switch(config)#crypto pki enroll Core-Switch

B. Core-Switch(config)#crypto pki enroll Core-Switch
Core-Switch(config)#ip http secure-trustpoint Core-Switch

C. Core-Switch(config)#ip http secure-trustpoint Core-Switch
Core-Switch(config)#crypto pki enroll Core-Switch

D. Core-Switch(config)#crypto pki trustpoint Core-Switch
Core-Switch(ca-trustpoint)#enrollment terminal
Core-Switch(config)#ip http secure-trustpoint Core-Switch

A

Answer:A

Explanation

Certificate authorities (CAs) are responsible for managing certificate requests and issuing certificates to participating IPSec network devices. These services provide centralized security key and certificate management for the participating devices. Specific CA servers are referred to as “trustpoints.”
The command “crypto pki trustpointname” declares the trustpoint and a given name and enters ca-trustpoint configuration mode.
The command “enrollment terminal” specifies manual cut-and-paste certificate enrollment method. The certificate request will be displayed on the console terminal so that you may manually copied (or cut).
The command “crypto pki enrollname” generates certificate request and displays the request for copying and pasting into the certificate server.
The full configuration is shown in the reference below.
Reference:https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/sec_secure_connectivity/configuration/guide/convert/sec_pki_xe_3s_book/sec_cert_enroll_pki_xe.html

34
Q

Question 56
Which two parameters are examples of a QoS traffic descriptor? (Choose two)

A. MPLS EXP bits

B. bandwidth

C. DSCP

D. packet size

E. ToS

A

Answer:A C

Explanation

The following traffic descriptors are used for marking traffic:
– Internal: QoS groups
– Layer 2: 802.1Q/p Class of Service (CoS) bits
– Layer 2.5: MPLS Experimental (EXP) bits
– Layer 3: Differentiated Services Code Points (DSCP) and IP Precedence (IPP)
Reference: CCNP and CCIE Enterprise Core ENCOR 35-401 Official Cert Guide

35
Q

Question 61
Refer to the exhibit.

enable secret cisco
username cisco privilege 15 secret cisco
aaa new-model
aaa authentication login default group radius local
aaa authorization network default group radius

The network administrator must be able to perform configuration changes when all the RADIUS servers are unreachable. Which configuration allows all commands to be authorized if the user has successfully authenticated?

A. aaa authorization exec default group radius none

B. aaa authentication login default group radius local none

C. aaa authorization exec default group radius

D. aaa authorization exec default group radius if-authenticated

A

Answer:D

Explanation

Let’s see the command “aaa authorization exec default group radius if-authenticated”. Notice the “if-authenticated” keyword at the end of this line. This is saying that if we are authenticated we will immediately be dropped into exec (enable) mode.

36
Q

Question 63
In a Cisco SD-Access solution, which protocol is used by an extended node to connect to a single edge node?

A. IS-IS

B. 802.1Q

C. VXLAN

D. CTS

A

Answer:B

Explanation

Extended Node
SD-Access Extended Nodes provide the ability to extend the enterprise network by providing connectivity to non-carpeted spaces of an enterprise – commonly called the Extended Enterprise. This allows network connectivity and management of IoT devices and the deployment of traditional enterprise end devices in outdoor and non-carpeted environments such as distribution centers, warehouses, or Campus parking lots.
This feature extends consistent, policy-based automation to Cisco Industrial Ethernet, Catalyst 3560-CX Compact, and Digital Building Series switches and enables segmentation for user endpoints and IoT devices connected to these nodes. Using Cisco DNA Center automation, switches in the extended node role are onboarded to their connected edge node using an 802.1Q trunk over an EtherChannel with one or multiple physical link members. Extended nodes are discovered using zero-touch Plug-and-Play.
Reference:https://www.cisco.com/c/en/us/td/docs/solutions/CVD/Campus/cisco-sda-design-guide.html#Network_Components

37
Q

Question 64
What is a characteristic of Cisco StackWise technology?

A. It uses proprietary cabling

B. It supports devices that are geographically separated

C. It combines exactly two devices

D. It is supported on the Cisco 4500 series.

A

Answer:A

38
Q

Question 65
In a Cisco SD-WAN solution, which two functions are performed by OMP? (Choose two)

A. advertisement of network prefixes and their attributes

B. segmentation and differentiation of traffic

C. gathering of underlay infrastructure data

D. delivery of crypto keys

E. configuration of control and data policies

A

Answer:A D

Explanation

OMP is the control protocol that is used to exchange routing, policy, and management information between Cisco vSmart Controllers and Cisco IOS XE SD-WAN devices in the overlay network. These devices automatically initiate OMP peering sessions between themselves, and the two IP end points of the OMP session are the system IP addresses of the two devices.
The OMP protocol is responsible for:
– Distribution of Transport Locators (TLOCs) among network sites in the sd-wan domain.
– Distribution of service-side reachability information.
– Distribution of service-chaining information.
– Distribution of data plane security parameters, VPN labels, andcrypto keys.
– Distribution of data and application-aware routing (AAR) policies. (Answer E is not correct as OMP is only distribute, not configure data policies)
Reference:https://www.networkacademy.io/ccie-enterprise/sdwan/omp-overview

39
Q

Question 67
Why would an engineer use YANG?

A. to model data for NETCONF

B. to access data using SNMP

C. to transport data between a controller and a network device

D. to translate JSON into an equivalent XML syntax

A

Answer:A

Explanation

YANG (Yet Another Next Generation) is a data modeling language for the definition of data sent over network management protocols such as the NETCONF and RESTCONF.

40
Q

Question 68
By default, which virtual MAC address does HSRP group 16 use?

A. c0:41:43:64:13:10

B. 00:00:0c:07:ac:10

C. 05:00:0c:07:ac:16

D. 00:05:5c:07:0c:16

A

Answer:B

Explanation

HSRP version 1 uses the MAC address range 0000.0C07.ACxx while HSRP version 2 uses the MAC address range 0000.0C9F.F0xx.
The last two-digit hex value in the MAC address presents the HSRP group number. In this case 16 in decimal is 10 in hexadecimal. -> Answer B is correct.

41
Q

Question 69

How are map-register messages sent in a LISP deployment?

A. egress tunnel routers to map resolvers to determine the appropriate egress tunnel router

B. ingress tunnel routers to map servers to determine the appropriate egress tunnel router

C. egress tunnel routers to map servers to determine the appropriate egress tunnel router

D. ingress tunnel routers to map resolvers to determine the appropriate egress tunnel router

A

Answer:C

Explanation

During operation, an Egress Tunnel Router (ETR) sends periodic Map-Register messages to all its configured map servers.

42
Q

Question 70
Which method is used by an AP to join HA controllers and is configured in NVRAM?

A. Primary/Secondary/Tertiary/Backup

B. DNS

C. IP Helper Addresses

D. stored WLC information

A

Answer:D

Explanation

To discover a WLC, an AP sends a unicast CAPWAP Discovery Request to a controller’s IP address or a broadcast to the local subnet. If the controller exists and is working, it returns a CAPWAP Discovery Response to the AP. The exact sequence of discovery steps used in Controller Software Release 7.0 is as follows:
Step 1. Broadcast on the local subnet—The AP will broadcast a CAPWAP
Discovery Request on its local wired subnet. Any WLCs that also exist on the subnet will answer with a CAPWAP Discovery Response.
Step 2.Use locally stored WLCs– An AP can be “primed” with up to three controllers – a primary, a secondary, and a tertiary. These are stored in nonvolatile memory so that the AP can remember them after a reboot or power failure.
Reference: CCNA Wireless 640-722 Official Cert Guide page 227

43
Q

Question 71
In a Cisco StackWise Virtual environment, which planes are virtually combined in the common logical switch?

A. control and management

B. management and data

C. control, and forwarding

D. control and data

A

Answer:A

Explanation

StackWise Virtual (SV) combines two switches into a single logical network entity from the network control plane and management perspectives.
Reference:https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-9000/nb-06-cat-9k-stack-wp-cte-en.html

44
Q

Question 73
When is the Design workflow used in Cisco DNA Center?

A. in a greenfield deployment, with no existing infrastructure

B. in a greenfield or brownfield deployment, to wipe out existing data

C. in a brownfield deployment, to modify configuration of existing devices in the network

D. in a brownfield deployment, to provision and onboard new network devices

A

Answer:A

Explanation

TheDesignarea is where you create the structure and framework of your network, including the physical topology, network settings, and device type profiles that you can apply to devices throughout your network. Use theDesignworkflowif you do not already have an existing infrastructure. If you have an existing infrastructure, use theDiscoveryfeature.
Reference:https://www.cisco.com/c/en/us/td/docs/cloud-systems-management/network-automation-and-management/dna-center/2-1-2/user_guide/b_cisco_dna_center_ug_2_1_2/b_cisco_dna_center_ug_2_1_1_chapter_0110.html

45
Q

Question 74
A customer wants to use a single SSID to authenticate IoT devices using different passwords. Which Layer 2 security type must be configured in conjunction with Cisco ISE to achieve this requirement?

A. Fast Transition

B. Identity PSK

C. Cisco Centralized Key Management

D. Central Web Authentication

A

Answer:B

Explanation

Identity PSKs are unique pre-shared keys created for individuals or groups of users on the same SSID.
Reference:https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-5/b_Identity_PSK_Feature_Deployment_Guide.html

46
Q

Question 75
What does a northbound API accomplish?

A. programmatic control of abstracted network resources through a centralized controller

B. access to controlled network resources from a centralized node

C. communication between SDN controllers and physical switches

D. controlled access to switches from automated security applications

A

Answer:A

47
Q

Question 77
An administrator must enable Telnet access to Router X using the router username and password database for authentication. Which configuration should be applied?

A. RouterX(config)#aaa new-model
RouterX(config)#aaa authentication login auth-list local

B. RouterX(config)#line vty 0 4
RouterX(config-line)#login
RouterX(config-line#end

C. RouterX(config)#line aux 0
RouterX(config-line)#password cisco
RouterX(config-line#login

D. RouterX(config)#line vty 0 4
RouterX(config-line)#login local
RouterX(config-line#end

A

Answer:D

Explanation

“login” command uses only a password while the“login local” command requires the configuration of a username as well as a password.
Login local, means that authentication uses locally configured credentials using the
“username {username} … password … “command in global configuration mode.
-> We configure “login local” to enable Telnet access using username and password in the local database.

48
Q

Question 81

In which two ways does TCAM differ from CAM? (Choose two)

A. CAM is used to make Layer 2 forwarding decisions, and TCAM is used for Layer 3 address lookups.

B. The MAC address table is contained in TCAM, and ACL and QoS information is stored in CAM.

C. CAM is used for software switching mechanisms, and TCAM is used for hardware switching mechanisms.

D. CAM is used by routers for IP address lookups, and TCAM is used to make Layer 2 forwarding decisions.

E. The MAC address table is contained in CAM, and ACL and QoS information is stored in TCAM.

A

Answer:A E

Explanation

When usingTernary Content Addressable Memory(TCAM) inside routers it’s used for faster address lookup that enables fast routing.
In switchesContent Addressable Memory(CAM) is used for building and lookup of mac address table that enables L2 forwarding decisions.