Test 1 Flashcards

1
Q

What are structured data forms that are possible for use with RESTCONF as defined by YANG?

A

XML
JSON
Explanation
RESTCONF uses structured data (XML or JSON) and YANG to provide a REST-like APIs, enabling you to programmatically access different network devices. RESTCONF APIs use HTTPs methods.

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/prog/configuration/169/b_169_programmability_cg/restconf_programmable_interface.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your enterprise has invested in six Firepower NGFWs to help protect the network and end systems. What is the most powerful method of managing these systems?

A

FMC
The Firepower Management Center (FMC) is the recommended tool, especially when multiple devices are to be managed. Local management of a single system is possible using the FDM, if desired.

Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp1010/firepower-1010-gsg/ftd-fmc.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What decimal value is used for EF traffic marking in DSCP?

A

46
Explanation
101 110 are the markings for DSCP for EF traffic. This has a value of 46.

REFERENCE: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus1000/sw/4_0/qos/configuration/guide/nexus1000v_qos/qos_6dscp_val.pdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

statements regarding Access Control Lists in Cisco networking

A

Explanation
There are two incorrect statements here that you should not have chosen. The entry at the “end” of an ACL is an implicit DENY ALL, not a PERMIT ALL. You do not typically place a standard ACL close to the source of traffic as your only criteria is source address. You are most likely going to prevent the node from communicating with a wide variety of services. Extended ACLs can go close to the source of traffic more easily as they can be very precise in what they are filtering.

REFERENCE: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_data_acl/configuration/xe-3s/sec-data-acl-xe-3s-book/sec-create-ip-apply.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is is a core post-infection detection technology of Cisco AMP?

A

Explanation
There are four post-infection technologies - Cognitive Threat Analytics, Device Flow Correlation, Cloud Indication of Compromise, and Endpoint IOC.

Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/amp-for-endpoints/white-paper-c11-740980.pdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cisco’s approach to location services in wireless LANs is to call upon a mapping of different areas that includes information on signal attenuation in the actual areas of the enterprise. What is this approach called?

A

Cisco RF Fingerprinting refers to a new and innovative approach that significantly improves the accuracy and precision available with traditional signal strength lateration techniques. Cisco RF Fingerprinting offers the simplicity of an RSSI-based lateration approach with customized calibration capabilities and improved indoor performance.”

Reference: https://www.cisco.com/en/US/docs/solutions/Enterprise/Mobility/emob30dg/Locatn.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If you want to incorporate the status of an interface in HSRP, what keyword is critical?

A

track
You can use object tracking to incorporate the status of an interface in the HSRP calculations. For example: standby 10 track 1 decrement 20 In this configuration, there could be an object tracker (ID 1) that is tracking the interface status. Downing of the interface decrements priority by 20.

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp/configuration/15-mt/iap-15-mt-book/iap-eot.pdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does NETCONF use for the transport stack?

A

SSH/TCP
NETCONF uses SSH/TCP as the transport stack. SNMP uses UDP as transport.

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/cns/configuration/15-mt/cns-15-mt-book/netconf-sshv2.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In Layer 3 roaming, what markings are used in order to facilitate successful communications following the wireless client roam?

A

ANCHOR
FOREIGN
In layer 3 roaming, the original controller marks the client with an “Anchor” entry in its own client database. The database entry is copied to the new controller client database and marked with a “Foreign” entry in the new controller.

Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-5/config-guide/b_cg85/overview.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following FHRPs offers the lowest administrative overhead in a configuration that supports both HA and high performance?

A

GLBP
The Gateway Load Balancing Protocol features a simple configuration that can take advantage of load balancing using a variety of approaches and optimizations.

REFERENCE: https://www.cisco.com/en/US/docs/ios/12_2t/12_2t15/feature/guide/ft_glbp.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are having issues with the BGP routing in your Enterprise. What is the second component of the BGP Best Path Selection Algorithm?

A

Highest Local_pref
The first attribute analyzed is WEIGHT. Larger is better. The second step is the largest LOCAL_PREF.

REFERENCE: https://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/13753-25.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What component of the SD-WAN solution from Cisco Systems distributes routes and policy information via OMP?

A

vSmart - “This software-based component is responsible for the centralized control plane of the SD-WAN network. It maintains a secure connection to each WAN Edge router and distributes routes and policy information via the Overlay Management Protocol (OMP), acting as a route reflector. It also orchestrates the secure data plane connectivity between the WAN Edge routers by reflecting crypto key information originating from WAN Edge routers, allowing for a very scalable, IKE-less architecture.”

Reference: https://www.cisco.com/c/en/us/td/docs/solutions/CVD/SDWAN/cisco-sdwan-design-guide.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What component of the SD-WAN solution from Cisco Systems distributes routes and policy information via OMP?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You have a Cisco AP set to bridge mode. You have just performed a factory reset of the device. What mode is the AP in after the reset?

A

Bridge
“If the AP is in Bridge mode, then the same Bridge mode is retained after the factory reset of the AP; if the AP is in FlexConnect, Local, Sniffer, or any other mode, then the AP mode is set to Local mode after the factory reset of the AP. If you press the Reset button on the AP and perform a true factory reset, then the AP moves to a cookie configured mode.”

Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-10/config-guide/b_cg810/managing_aps.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You are examining the configuration of a AAA method list on your Cisco router. You notice that the method list ends with the keyword none. What does this indicate?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When configuring a route map that modifies the MED value of a BGP prefix, what keyword is used for MED in the set statement?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You have configured a stub area in your OSPF network. What OSPF LSAs are dynamically filtered from appearing in the stub area? (Choose 2)

A

The stub area filters Type 4 and Type 5 LSAs. Remember, the Type 4 LSA defines the ASBR in the network, and the Type 5 LSAs are for the external prefixes.

REFERENCE: https://www.ajsnetworking.com/ospf-lsa-types/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You have client systems in the 10.10.10.0/24 subnet that need to be permitted access to an internal webserver at 10.20.20.100. Which permit entry for an ACL correctly defines this?

A

Permit tcp 10.10.10.0. 0.0.0.0.255 host 10.20.100 eq443

Here the traffic to filter is TCP. The source of the traffic is the subnet 10.10.10.0/24. Note the use of the host keyword to simplify the destination definition. Here we specify the 443 (HTTPS) port on the webserver to be granular with the permissions.

REFERENCE: https://www.cisco.com/c/en/us/support/docs/ip/access-lists/26448-ACLsamples.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In order to virtualize a workload recently, you had to install software on your Mac OS, and then install the virtual machine. What type of hypervisor is in use here?

A

Type 2

Type 1 hypervisors do not need to be installed within an OS. They can install on top of the “bare metal”. Type 2 hypervisors must be installed in an OS.

REFERENCE: https://searchservervirtualization.techtarget.com/definition/hosted-hypervisor-Type-2-hypervisor#:~:text=A%20Type%202%20hypervisor%2C%20also,Type%201%20and%20Type%202.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Several tests in the IP SLA feature require specialized software on the IP target system. What is this software called?

A

IP SLA responder
Some tests require the target to feature the IP SLA Responder feature. Note that many tests do not require this and the target can be any IP host on the network.

REFERENCE: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipsla/configuration/15-mt/sla-15-mt-book/sla_overview-0.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which are valid reasons your OSPF speakers are stuck in the Exstart/Exchange state? (Choose 3)

A

Access list blocking the unicast packet
Both routers have the same RID
Mismatched MTU settings

A stub flag mismatch or an authentication failure would not result in a stuck state. REFERENCE: https://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/13684-12.html#neighbors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

You are curious about how Ansible is able to access and configure a remote node. What protocol is used for this?

A

SSH
Ansible is agentless. It does not need to install special software on the managed node. SSH is required to access and configure the remote device. REFERENCE: https://docs.ansible.com/ansible/latest/user_guide/connection_details.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following syslog severity levels are considered more severe than WARNINGS? (Choose 2)

A

Errors
Warnings
Debugging are level 7 and are considered the least severe. Emergencies are level 0 and are the most severe.

REFERENCE: https://www.cisco.com/c/en/us/td/docs/routers/access/wireless/software/guide/SysMsgLogging.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

When you are engaging in traffic engineering in BGP, you use the following regular expression syntax in your route map:

^65000$

What does this match?

A

Prefixes that have originated in the AS 65000

This regular expression matches those AS paths that begin (far right) with AS 65000. This position in the AS path indicates the prefix originated from that AS.

REFERENCE: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bgp/configuration/15-mt/irg-15-mt-book/irg-external-sp.html#GUID-BDECC44A-630D-4E5B-9FEC-7FC4ACE6130F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What technology permits the Cisco ISE to share key information (such as TrustSec data) with other Cisco and non-Cisco devices in your Enterprise solutions?

A

PxGrid

“A Cisco ISE node with pxGrid persona shares the context-sensitive information from Cisco ISE session directory with other network systems such as ISE ecosystem partner systems and Cisco platforms. The pxGrid framework can also be used to exchange policy and configuration data between nodes like sharing tags and policy objects. TrustSec information like tag definition, value, and description can be passed from Cisco ISE to other Cisco management platforms such as Cisco DNA Center and Cisco Stealthwatch.”

Reference: https://www.cisco.com/c/en/us/td/docs/solutions/CVD/Campus/cisco-sda-design-guide.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

valid considering fabric-mode access points in the SD-Access solution

A

They must connect directly to the fabic edge node or the extended node switch
The AP is in Local mode

These APs will still use CAPWAP tunnels to the WLC. They will be in local mode. They will directly connect to the fabric edge node. These APs can still honor the access and QoS policies like normal.

REFERENCE: https://www.cisco.com/c/en/us/td/docs/solutions/CVD/Campus/cisco-sda-design-guide.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Python commands are often used in exception handling

A

Except
Try

The try and except commands are used together in a clause in order to help with exception handling. The commands work as follows: if no exception occurs, the except clause is skipped and execution of the try statement is finished.

REFERENCE: https://docs.python.org/3/tutorial/errors.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

You are interested in providing your WLC address to your Lightweight Access Point using DHCP. What option is used for this?

A

Option 43 in DHCP can carry the WLC IP address for the lightweight APs to call upon.

REFERENCE: https://www.cisco.com/c/en/us/td/docs/wireless/access_point/1000/installation/guide/1000hig4/1000h_f.pdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

commands would be the most useful for monitoring CoPP

A

Show Policy-map control-plane
Remember, like policing under DiffServ, you use a class-map, policy-map, and service-policy approach to the configuration. Here, we use the show policy-map control-plane command to review the CoPP configuration.

Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-0SY/configuration/guide/15_0_sy_swcg/control_plane_policing_copp.pdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Examine the configuration shown:

switch(config)# ntp access-group peer accesslist1

What keyword can you use in this command in order for the local device to receive time requests and NTP control queries from the servers specified in the access list but not to synchronize itself to the specified servers?

A

Serve

The serve keyword enables the device to receive time requests and NTP control queries from the servers specified in the access list but not to synchronize itself to the specified servers.

REFERENCE: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx-os/system_management/configuration/guide/sm_nx_os_cg/sm_3ntp.html#93976

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

In which OSPF router state does the DBD packet play a key role?

A

Exchange

In the exchange state, OSPF routers exchange database descriptor (DBD) packets. The contents of the DBD received are compared to the information contained in the routers link-state database to check if new or more current link-state information is available with the neighbor.

REFERENCE: https://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/13685-13.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What keyword indicates PAT is in use with a NAT configuration on a Cisco router?

A

Overload
The overload keyword is an easy indicator for the presence of PAT in the NAT configuration. For example:

ip nat inside source list 1 interface gi0/0 overload
Reference: https://www.cisco.com/c/en/us/support/docs/long-reach-ethernet-lre-digital-subscriber-line-xdsl/asymmetric-digital-subscriber-line-adsl/12905-827spat.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What REST API response code would you expect to see if there was a problem with authorization during the REST API usage?

A

401
Remember, the 200 codes are for various successes. The 400 codes involve client issues, while the 500 codes involve server-side issues. Here, the most likely code would be 401 - UNAUTHORIZED.

REFERENCE: https://restfulapi.net/http-status-codes/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

three statements about FlexConnect are true

A

It is used with wireless and branch offices
This was formerly called H-REAP
The AP can operate with a controller or without a controller (if necessary)

This tech was called H-REAP before. It is used with poor links to branch offices. It permits the WLC to not be available and have the APs still be able to accommodate clients.

REFERENCE: https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_flexconnect.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

two of the following statements about wireless SSIDs

A

The SSID is typically broadcast throughout the Enterprise by default
The SSID must be manually configured if not broadcated

Most devices will default to a broadcast of the SSID for all clients to see.

REFERENCE: https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-7/config-guide/b_cg87/wlans.html#ID72

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which type of WiFi antenna is not directional?

A

Dipole
The Yagi, Dish, and Patch antenna types are all considered directional. REFERENCE: https://www.cisco.com/c/en/us/products/collateral/wireless/aironet-antennas-accessories/prod_white_paper0900aecd806a1a3e.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What defines the data structures used by NETCONF and RESTCONF?

A

YANG
YANG is a standards based data modeling language used to create device configuration requests or the requests for operational (show command) data. It has a structured format similar to a computer program that is human readable. Several applications are available that can be run on a centralized management platform (for example a laptop) to create these configuration and operational data requests.

REFERENCE: https://www.cisco.com/c/en/us/support/docs/storage-networking/management/200933-YANG-NETCONF-Configuration-Validation.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

You want to use an interface on the Firepower NGFW for the exclusive use of syslog monitoring. You want to ensure this interface cannot be used for data traffic and does not support SSH connections. What interface should you use?

A

The diagnostic interface is used for this purpose.

REFERENCE: https://www.cisco.com/c/en/us/td/docs/security/firepower/660/configuration/guide/fpmc-config-guide-v66/interface_overview_for_firepower_threat_defense.html#concept_9C4E970171294952B654154256F1A676

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What STP tuning mechanism allows you to control the alternate port selection and is configured upstream of where you want to make the change?

A

You can use the STP port priority value to influence the alternate port selection. With this command, a lower value is a preferred. The default value is 128.

REFERENCE: https://www.ciscopress.com/articles/article.asp?p=2995351&seqNum=2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What SD-WAN component performs the initial authentication of WAN edge devices?

A

The vBond orchestrator is the central component for authentication of the SD-WAN components. Remember, to ensure security, the connections between the SD-WAN devices are protected with DTLS.

REFERENCE: https://www.cisco.com/c/en/us/td/docs/solutions/CVD/SDWAN/cisco-sdwan-design-guide.html

41
Q

You want to improve the performance of roaming in your FlexConnect infrastructure. Specifically, you want to employ the Fast Transition feature. What technology permits this?

A

“802.11r introduces a new concept of roaming where the initial handshake with the new AP is done even before the client roams to the target AP, which is called Fast Transition (FT). The initial handshake allows the client and APs to do the Pairwise Transient Key (PTK) calculation in advance. These PTK keys are applied to the client and AP after the client does the reassociation request or response exchange with new target AP. In a FlexConnect Deployment scenario, 802.11r BSS FT roaming is supported between APs within the same FlexConnect group. To enable seamless roaming, the 802.11r Key Cache is distributed to all the APs in the same FlexConnect Group. The Key Cache distribution is done by the WLC after the client device does the initial FT association through Central Authentication.”

REFERENCE: https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/80211r-ft/b-80211r-dg.html

42
Q

What is the role played by the default gateway that is responsible for ensuring load balancing in GLBP? This device can be configured for the load balancing technique used.

A

The Active Virtual Gateway (AVG) is responsible for the load balancing, as well as how the load balancing will take place. This system can also simultaneously be an Active Virtual Forwarder (AVF) system.

Reference: https://www.cisco.com/en/US/docs/ios/12_2t/12_2t15/feature/guide/ft_glbp.html

43
Q

What is the top level of the Cisco DNA Center network hierarchy?

A

The network hierarchy consists of Sites, Buildings, and Floors. Sites can contain other sites. Be sure to spend some time with the sandbox DNA center that is available from Cisco DevNet.

Reference: https://www.cisco.com/c/en/us/td/docs/cloud-systems-management/network-automation-and-management/dna-center/1-3/user_guide/b_cisco_dna_center_ug_1_3/b_cisco_dna_center_ug_1_3_chapter_0110.html

44
Q

In which component of Flexible NetFlow would you find the specification of the Flow Record?

A

The main Flexible NetFlow components are the Flow Monitor, the Flow Exporter, the Flow Sampler, and the Flow Record. The Flow Record is referenced in the Flow Monitor. The Flow Monitor is the component that is applied to an interface and be considered the component that is actually doing the network monitoring.

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fnetflow/configuration/xe-16/fnf-xe-16-book.html

45
Q

What technology uses HTTP methods to provide CRUD operations on a conceptual datastore containing YANG-defined data?

A

Note that RESTCONF is not really a replacement for NETCONF. It uses principles of NETCONF and adds the HTTP functionality. REFERENCE: https://tools.ietf.org/html/rfc8040

46
Q

What DiffServ QoS component is a combination of CBWFQ and PQ and is often used today in order to accommodate VoIP in the enterprise?

A

LLQ

Low Latency Queuing is the most modern congestion management approach in DiffServ. It uses a strict PQ for VoIP in a CBWFQ structure. The CBWFQ provides service for the many other forms of traffic.

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/qos_conmgt/configuration/xe-3s/qos-conmgt-xe-3s-book/qos-conmgt-llq-pps.pdf

47
Q

The SNR in wireless networking is calculated using the transmit power and what other value?

A

NOISE Floor

The SNR is a calculation from the transmit power (or desired signal) and the noise floor. SNR calculations can be either simple or complex, and it depends on the devices in question and your available data.

REFERENCE: https://resources.pcb.cadence.com/blog/2020-what-is-signal-to-noise-ratio-and-how-to-calculate-it

48
Q

You have decided to increase the availability of your WLC by using LAG on this device. The WLC connects to a Cisco Layer 3 switch. What mode should you use on the switch for the LAG with the WLC?

A

ON

You have decided to increase the availability of your WLC by using LAG on this device. The WLC connects to a Cisco Layer 3 switch. What mode should you use on the switch for the LAG with the WLC?

49
Q

What is the size of the SGT field used in CTS?

A

The Cisco TrustSec solution uses security tags in its operation. These SGTs can be assigned in a variety of ways and can help you segment and secure traffic. This tag is 16 bits.

REFERENCE: https://www.cisco.com/c/dam/en/us/solutions/collateral/borderless-networks/trustsec/C07-730151-00_overview_of_trustSec_og.pdf

50
Q

Which of the following protocols are most likely to be used in your REST API security

A

SHA-384
AES
Remember, REST APIs are protected with HTTPS. Two potential protocols, therefore, are AES and SHA-384.

Reference: https://en.wikipedia.org/wiki/Transport_Layer_Security

51
Q

In the configuration of a ZBF in Cisco IOS, what is placed in the default zone?

A

Any interfaces that are not members of any zone

The default zone is for all interfaces that are not assigned to a zone.

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_data_zbf/configuration/15-mt/sec-data-zbf-15-mt-book/sec-zone-pol-fw.html

52
Q

Examine the configuration shown. Which statement regarding this configuration is false?

ip sla 12
udp-jitter 10.10.10.100 5000
frequency 10
exit
ip sla schedule 12 start-time now life forever
end
A

There are actually four data measurements given. There is per-direction jitter, per-direction packet-loss, per-direction delay, and the round-trip delay.

REFERENCE: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipsla/configuration/xe-16/sla-xe-16-book.html

53
Q

statement about traffic policing and shaping is true?

A

Traffic policing can be a single or dual rate. It can also involve three actions or colours. These are dropping, remarking, or sending.

Reference: https://www.cisco.com/c/en/us/support/docs/quality-of-service-qos/qos-policing/19645-policevsshape.html

54
Q

You have discovered that your two VRRP devices are configured with the same priority value of 100. What determines the election of the virtual router master?

A
55
Q

You have discovered that your two VRRP devices are configured with the same priority value of 100. What determines the election of the virtual router master?

A

If both VRRP routers are configured with the priority of 100, the virtual router backup with the higher IP address is elected to become the virtual router master.

REFERENCE: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/xe-3se/3850/fhp-xe-3se-3850-book/fhp-vrrp.pdf

56
Q

example of the Northbound APIs used with Cisco DNA Center?

A

“The Intent API is a Northbound REST API that exposes specific capabilities of the Cisco DNA Center platform. The Intent API provides policy-based abstraction of business intent, allowing focus on an outcome rather than struggling with individual mechanisms steps. The RESTful Cisco DNA Center Intent API uses HTTPS verbs (GET, POST, PUT, and DELETE) with JSON structures to discover and control the network.

Reference: https://developer.cisco.com/docs/dna-center/#!cisco-dna-center-platform-overview/cisco-dna-center-platform-overview

57
Q

What QoS DiffServ component seeks to buffer traffic above a defined threshold?

A

Traffic shaping seeks to buffer traffic above the defined threshold. Traffic policing is similar, but the default action is to drop traffic above the threshold.

REFERENCE: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/qos_dfsrv/configuration/15-mt/qos-dfsrv-15-mt-book/qos-dfsrv.html

58
Q

What QoS DiffServ component seeks to buffer traffic above a defined threshold?

A
59
Q

What is the main function of an alternate port in RSTP?

A

The alternate port can quickly replace the root port in an event of a failure or other type of topology change in the network. This type of functionality had previously been provided to 802.1D thanks to the Cisco invention of UplinkFast.

Reference: https://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/24062-146.html

60
Q

You are experiencing an issue with one of your devices in your Cisco wireless LAN. There is an AP that you have sent Option 43 information to using your DHCP server. You have just discovered that this AP is using a WLC that you did not specify with the Option 43 information. What is the most likely reason that this is happening?

A

Remember, the AP will use what it has been primed with first. It will then try Option 43 settings. If this does not work either, it will send broadcasts for its WLC.

Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-5/config-guide/b_cg85/ap_connectivity_to_cisco_wlc.html

61
Q

True / false regarding traffic shaping versus traffic policing?
Traffic shaping is applicable to both inbound and outbound traffic if required

A

False

Only traffic policing can be configured for inbound and outbound traffic flows.

Reference: https://www.cisco.com/c/en/us/support/docs/quality-of-service-qos/qos-policing/19645-policevsshape.html

62
Q

You are preparing to add a new node to your Cisco DNA Center cluster. What command should you run to verify your configuration before adding the new node?

A

maglev packages status

Before adding a new node to the cluster, be sure that all the installed packages are deployed on the primary node. You can check this by using SSH to log in to the primary node’s Cisco DNA Center Management port as the Linux User (maglev) and then running the maglev package status command. All the installed packages should appear in the command output as DEPLOYED.

REFERENCE: https://www.cisco.com/c/en/us/td/docs/cloud-systems-management/network-automation-and-management/dna-center/1-3-3-0/install_guide/2ndGen/b_cisco_dna_center_install_guide_1_3_3_0_2ndGen/b_cisco_dna_center_install_guide_1_3_2_0_M5_chapter_0100.html

63
Q

What form of QoS is most likely to cause TCP retransmissions?

A

Traffic policing will often be set to drop traffic above a defined threshold. The dropped traffic will cause TCP retransmissions. REFERENCE: https://www.cisco.com/c/en/us/support/docs/quality-of-service-qos/qos-policing/19645-policevsshape.html

64
Q

Which of the following OSPF network types each uses a DR and BDR in their operation? (Choose 2)

A

broadcast
Non Broadcast

Note that the broadcast and non-broadcast network types for OSPF are compatible. This is because they each use a DR/BDR in their operation.

REFERENCE: https://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/7039-1.html

65
Q

Examine the JSON sample shown here. What data type is used with the key of Models?

{“Device”: “RGD12”,”Units”: 12,”Inuse”:true,”Models”:[“1250”,”1350”,”1375”]}

A

Array
This is the array data type. An array is an ordered collection of values. They begin with [ (left bracket) and end with ] (right bracket). The values are separated by , (commas).

REFERENCE: https://restfulapi.net/json-data-types/

66
Q

When you issue the command show ip vrf, which of the following is not a column shown?

A
67
Q

Examine the commands shown here. When might this command be most useful?

line con 0
logging synchronous

A
68
Q

What technology available for the LAN today is similar to IPsec but operates at Layer 2?

A

MACsec allows unauthorized LAN connections to be identified and excluded from communication within the network. In common with IPsec and TLS, MACsec defines a security infrastructure to provide data confidentiality, data integrity, and data origin authentication. By assuring that a frame comes from the station that claimed to send it, MACSec can mitigate attacks on Layer 2 protocols.

REFERENCE: https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/identity-based-networking-services/white-paper-c11-737544.html

69
Q

What Cisco security product uses Encrypted Traffic Analytics (ETA) telemetry in order to help with advanced security analytics regarding traffic in your enterprise?

A

Cisco Stealthwatch

Cisco Stealthwatch provides enterprise-wide network visibility and applies advanced security analytics to detect and respond to threats in real-time. Stealthwatch uses a combination of behavioral modeling, machine learning, and global threat intelligence. It also can analyze encrypted data using ETA.

Reference: https://www.cisco.com/c/en/us/products/collateral/security/stealthwatch/datasheet-c78-739398.html

70
Q

When using Cisco DNA Center, templates you create with the Template Editor are associated with what DNA Center component?

A

Network Profiles
“Before provisioning the template, ensure that the templates are associated with a network profile and the profile is assigned to a site.”

Reference: https://www.cisco.com/c/en/us/td/docs/cloud-systems-management/network-automation-and-management/dna-center/1-3/user_guide/b_cisco_dna_center_ug_1_3/b_cisco_dna_center_ug_1_3_chapter_0111.html

71
Q

What value is often used to measure the strength of the WiFi signal?

A

RSSI - Received Signal Strength Indicator

Want to measure the strength of the signal that your client is receiving? The received signal strength indication value seeks to permit this. The greater the number, the stronger the signal.

REFERENCE: https://en.wikipedia.org/wiki/Received_signal_strength_indication

72
Q

What SD-Access device is responsible for de-encapsulating LISP traffic for transport to non-LISP sites?

A

PETR

The Proxy Egress Tunnel Router would be responsible for LISP de-encapsulation and transport to a non-LISP site. REFERENCE: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_lisp/configuration/xe-3s/irl-xe-3s-book/irl-cfg-lisp.html

73
Q

What SD-Access device is responsible for Encapsulating LISP traffic for transport to non-LISP sites?

A

PITR

The Proxy Egress Tunnel Router would be responsible for LISP de-encapsulation and transport to a non-LISP site. REFERENCE: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_lisp/configuration/xe-3s/irl-xe-3s-book/irl-cfg-lisp.html

74
Q

What SD-Access device is responsible for de-encapsulating LISP traffic for transport to non-LISP sites?

A
75
Q

Which element of the SD-WAN solution from Cisco Systems represents the controller responsible for the management of the solution?

A

vSmart

The important word here is controller. The SD-WAN uses the vSmart controller for the management of the devices. The vManage tool provides the GUI. REFERENCE: https://www.cisco.com/c/en/us/td/docs/solutions/CVD/SDWAN/cisco-sdwan-design-guide.html

76
Q

Examine the syslog message shown. What does the component of LINEPROTO represent?

00:00:48: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to down

A

The Severity
Beginning with LINEPROTO - we have the facility, the severity, the mnemonic, and the description.

REFERENCE: https://www.cisco.com/c/en/us/td/docs/routers/access/wireless/software/guide/SysMsgLogging.html

77
Q

Which automation tool is agentless and uses a push model?

A

Ansible is known for its simplicity and the fact that it is clientless and uses a push model. Ansible relies on SSH to send automation instructions to remote nodes.

Reference: https://www.ansible.com/resources/get-started

78
Q

Does NTP use TCP port 123 in its operation, True / False?

A

False
NTP relies upon UDP for its operation.

Reference: https://www.cisco.com/c/en/us/td/docs/iosxr/ncs560/timing-and-sync/70x/b-network-sync-70x-ncs560/implementing_ntp.pdf

79
Q

You have a user in your network that has an expired token for use with OAuth and your REST API. What response code is returned from the appliance based on the expired token?

A

401
In this case, the device returns a 401 error - this error indicates that the user is unauthorized.

Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/ftd-api/guide/ftd-rest-api/auth-ftd-rest-api.pdf

80
Q

Is SSH an Authentication Key Management option for WLAN security, True / False?

A

False - SSH is for remote connections that are secure. All the other options listed are valid options for WLAN security.

REFERENCE: https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-7/config-guide/b_cg87/wlan_security.html

Correct answers are PSK, CCKM (Cisco Centralized Key Management) , 802.1x

81
Q

What is the multicast address used by HSRPv2?

A

To match the HSRP group number to the VLAN ID of a subinterface, HSRPv2 can use a group number from 0 to 4095 and a MAC address from 0000.0C9F.F000 to 0000.0C9F.FFFF. HSRPv2 uses the multicast address 224.0.0.102 to send hello packets. HSRPv2 and CGMP leave processing are no longer mutually exclusive, and both can be enabled at the same time. HSRPv2 has a different packet format than HRSPv1.

REFERENCE: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_52_se/configuration/guide/3560scg/swhsrp.html

82
Q

least likely reasons your enterprise might choose to increase virtualization in the data center

A

Increased Security
Reduced MAC and IP address requirements

Virtualization, by itself, will not inherently improve the security of the enterprise. Also, you still require MAC addresses and IP addressing in the virtualized environment.

REFERENCE: https://www.cisco.com/c/en/us/solutions/enterprise-networks/what-is-virtualization.html

83
Q

statements are correct regarding the RP in multicast

A

PIM-SM requires an RP
RP is only needed (by default) to start sessions with sources and receivers

The RP can be configured manually, or with AUTO-RP or BSR. Also, note that PIM-DM did not use a concept of an RP.

REFERENCE: https://www.cisco.com/c/en/us/td/docs/ios/solutions_docs/ip_multicast/White_papers/rps.

84
Q

What command do you use to configure SSH version 2?

A

Using the command ip ssh version 2 forces the router to only accept SSH version 2 connections.

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_ssh/configuration/15-s/sec-usr-ssh-15-s-book/sec-secure-shell-v2.html

85
Q

What is the ACL entry to permit the 172.16.0.0/21 subnet?

A

Permit 172.16.0.0 0.0.7.255

Notice the wildcard mask here for the /21 - in binary it is: 00000000.00000000.00000111.11111111

REFERENCE: http://www.subnet-calculator.com/subnet.php?net_class=B

86
Q

Which of the following EtherChannel mode combinations will form an EtherChannel?

A
87
Q

If you want to do traffic analysis against wireless clients in an area of your Enterprise using Wireshark, what AP mode should you consider using?

A

Sniffer
Explanation
“The access point starts sniffing the air on a given channel. It captures and forwards all the packets from the clients on that channel to a remote machine that runs Airopeek or Wireshark (packet analyzers for IEEE 802.11 wireless LANs). It includes information on the time stamp, signal strength, packet size, and so on.”

Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_lwap.html

88
Q

Which LISP device is responsible for finding EID-to-RLOC mappings for all traffic destined for LISP-capable sites?

A

All of these are valid roles within the LISP architecture. The Ingress Tunnel Router (ITR) has the job of locating the correct mappings when receiving requests that are destined for the LISP site.

REFERENCE: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_lisp/configuration/xe-3s/irl-xe-3s-book/irl-overview.html

89
Q

Which of the following is not a typical traffic flow that is identified in a heavily virtualized, modern, SDN in the modern data center?

A

It is not typical for us to define host to controller traffic flows, or controller to server.

Reference: https://www.optcore.net/do-you-know-the-data-center-network-architecture/

90
Q

examples of directional antenna?

A

Sector
Patch
Yagi
The collinear and dipole are both examples of omnidirectional antenna.

Reference: https://www.cisco.com/c/en/us/products/collateral/wireless/aironet-antennas-accessories/prod_white_paper0900aecd806a1a3e.html

91
Q

You need to create a function in order to script the required automation in your Cisco network solution. How is a function enumerated in Python?

A
def
"The keyword def introduces a function definition. It must be followed by the function name and the parenthesized list of formal parameters. The statements that form the body of the function start at the next line, and must be indented."

Reference: https://docs.python.org/3/tutorial/controlflow.html#defining-functions

92
Q

You are interested in using a new security model in your Enterprise network; one that is not based strictly on Layer 2 or Layer 3 addressing. What component of the SD-Access solution accommodates this?

A

SGTs in CTS
Security Group Tags in Cisco TrustSec offer many flexible methods of categorization and segmentation.

REFERENCE: https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Campus/CVD-Software-Defined-Access-Segmentation-Design-Guide-2018MAY.pdf

93
Q

When configuring a route map that modifies the MED value of a BGP prefix, what keyword is used for MED in the set statement?

A

Metric
REFERENCE: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bgp/configuration/15-mt/irg-15-mt-book/irg-external-sp.html#GUID-C62D6C7A-BE13-493C-9BFB-171CBAE04627

94
Q

statements regarding VRRP are true

A

VRRPv3 adds support of IPv6
VRRP uses 224.0.0.18 for communications

Preemption is the default in VRRP and the priority value ranges from 0 to 255.

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/xe-3s/fhp-xe-3s-book/fhp-vrrp.html

95
Q

VXLAN is the data plane technology chosen for the SD-Access solution. Note that it is actually VXLAN will several modifications to accommodate the components of the SD-Access solution. LISP serves at the control plane, while CTS (Cisco TrustSec) is the policy plane.

Reference: https://www.cisco.com/c/en/us/td/docs/solutions/CVD/Campus/cisco-sda-design-guide.html

A
96
Q

Examine the commands shown here. When might this command be most useful?

line con 0
logging synchronous

A

When debugging

When you are typing commands in at the IOS CLI, you can have debug output interrupt your typing. The logging synchronous commands under the console line permits the integration of those messages with your command work. This command is considered a must have for most administrators.

REFERENCE: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_52_se/configuration/guide/3560scg/swlog.html

97
Q
A

This is an example of the layout of a policy that is calling upon Cisco TrustSec. Remember, you can have CTS as a result of the ISE in your SD-Access solution.

Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/identity-services-engine/at_a_glance_c45-726831.pdf

98
Q

EtherChannel mode combinations will form an EtherChannel?

A

The PAgP modes are auto and desirable. LACP are active and passive. Finally, the static mode is on.

on/on
active/passive
auto/desirable

REFERENCE: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/12-2_55_se/configuration/guide/3750xscg/swethchl.html