Which resource is able to be shared among virtual machines deployed on the same physical server?
Refer to the exhibit. Which command set must be added to permit and log all traffic that comes from 172.20.10.1 in interface GigabitEthernet0/1 without impacting the functionality of the access list?
Which type of tunnel Is required between two WLCs to enable Intercontroller roaming?
An engineer is configuring a GRE tunnel interface in the default mode. The engineer has assigned an IPv4 address on the tunnel and sourced the tunnel from an Ethernet interface. Which option also is required on the tunnel interface before it is operational?
Drag and drop the characteristics from the left onto the technology types on the right.
Refer to the exhibit.
What is the effect of introducing the sampler feature into the Flexible NetFlow configuration on the router?
Drag anti drop the characteristics from the ten onto the configuration models on the right.
A large campus network has deployed two wireless LAN controllers to manage the wireless network. WLC1 and WLC2 have been configured as mobility peers. A client device roams from AP1 on WLC1 to AP2 on WLC2, but the controller's client interfaces are on different VLANs. How do the wireless LAN controllers handle the inter-subnet roaming?
Refer to the exhibit.
The administrator troubleshoots an EtherChannel that keeps moving to err-disabled. Which two actions must be taken to resolve the issue? (Choose two.)
Refer to the exhibit.
An engineer configures routing between all routers and must build a configuration to connect R1 to R3 via a GRE tunnel Which configuration must be applied?
A)
B)
C)
D)
Refer to the exhibit.
An engineer is designing a guest portal on Cisco ISE using the default configuration. During the testing phase, the engineer receives a warning when displaying the guest portal. Which issue is occurring?
An engineer must protect their company against ransom ware attacks. Which solution allows the engineer to block the execution stage and prevent file encryption?
Refer to the exhibit.
After configuring the BGP network, an engineer verifies that the path between Servers and Server2 Is functional. Why did RouterSF choose the route from RouterDAL instead of the route from RouterCHI?
What is an emulated machine that has dedicated compute memory, and storage resources and a fully installed operating system?
Refer to the exhibit. An engineer is reaching network 172.16.10.0/24 via the R1-R2-R4 path. Which configuration forces the traffic to fake a path of R1-R3-R4?
A)
B)
C)
D)
In a Cisco SD-Access wireless environment, which device is responsible for hosting the anycast gateway?
Which TLV value must be added to Option 43 when DHCP is used to ensure that APs join the WLC?
Which tunnel type al'ows clients to perform a seamless Layer 3 roam between a Cisco AireOS WLC and a Cisco IOS XE WLC?
Which OSPF networks types are compatible and allow communication through the two peering devices?
Refer to the exhibit.
After an engineer configures an EtherChannel between switch SW1 and switch SW2, this error message is logged on switch SW2.
Based on the output from SW1 and the log message received on Switch SW2, what action should the engineer take to resolve this issue?
What NTP Stratum level is a server that is connected directly to an authoritative time source?
Drag and drop the descriptions of the VSS technology from the left to the right. Not all options are used.
Refer to the exhibit.
Object tracking has been configured for VRRP-enabled routers Edge-01 and Edge-02 Which commands cause Edge-02 to preempt Edge-01 in the event that interface G0/0 goes down on Edge-01?
A)
B)
C)
D)
Refer to the exhibit. An attacker can advertise OSPF fake routes from 172.16.20.0 network to the OSPF domain and black hole traffic. Which action must be taken to avoid this attack and still be able to advertise this subnet into OSPF?
What is a characteristic of the overlay network in the Cisco SD-Access architecture?
Refer to the exhibit. A network engineer must block Telnet traffic from hosts in the range of 10.100 2.248 to 10.100.2 255 to the network 10.100.3.0 and permit everything else. Which configuration must the engineer apply'?
A)
B)
C)
D)
Which cisco DNA center application is responsible for group-based accesss control permissions?
Refer to the exhibit. A network engineer must configure NETCONF. After creating the configuration, the engineer gets output from the command show line, but not from show running-config. Which command completes the configuration?
What does the LAP send when multiple WLCs respond to the CISCO_CAPWAP-CONTROLLER.localdomain hostname during the CAPWAP discovery and join process?
Refer to the exhibit.
An engineer attempts to establish BGP peering between router CORP and two ISP routers. What is the root cause for the failure between CORP and ISP#2?
Refer to the exhibit.
A network engineer is enabling logging to a local buffer, to the terminal and to a syslog server for all debugging level logs filtered by facility code 7. Which command is needed to complete this configuration snippet?
Which DHCP option provides the CAPWAP APs with the address of the wireless controller(s)?
Refer to the exhibit.
After configuring HSRP an engineer enters the show standby command. Which two facts are derived from the output? (Choose two.)
Refer to the exhibit.
Cisco DNA Center has obtained the username of the client and the multiple devices that the client is using on the network. How is Cisco DNA Center getting these context details?
Refer to the exhibit.
An engineer is troubleshooting an application running on Apple phones. The application Is receiving incorrect QoS markings. The systems administrator confirmed that ail configuration profiles are correct on the Apple devices. Which change on the WLC optimizes QoS for these devices?
Which technology does VXLAN use to provide segmentation for Layer 2 and Layer 3 traffic?
An engineer must configure AAA on a Cisco 9800 WLC for central web authentication Which two commands are needed to accomplish this task? (Choose two.)
Refer to the exhibit.
CR2 and CR3 ate configured with OSPF. Which configuration, when applied to CR1. allows CR1 to exchange OSPF Information with CR2 and CR3 but not with other network devices or on new Interfaces that are added to CR1?
A)
B)
C)
D)
Refer to the exhibit:
An engineer configures VRRP and issues the show commands to verify operation. What does the engineer confirm about VRRP group 1 from the output?
Refer to the exhibit.
Which command set must be added to the configuration to analyze 50 packets out of every 100?
A)
B)
C)
D)
The login method is configured on the VTY lines of a router with these parameters
Which configuration accomplishes this task?
An engineer is implementing a Cisco MPLS TE tunnel to improve the streaming experience for the clients of a video-on-demand server. Which action must the engineer perform to configure extended discovery to support the MPLS LDP session between the headend and tailend routers?
An engineer must export the contents of the devices object in JSON format. Which statement must be used?
When firewall capabilities are considered, which feature is found only in Cisco next-generation firewalls?
Refer to the exhibit.
After the code is run on a Cisco IOS-XE router, the response code is 204.
What is the result of the script?
Refer to the exhibit.
An engineer must configure static NAT on R1 lo allow users HTTP access to the web server on TCP port 80. The web server must be reachable through ISP 1 and ISP 2. Which command set should be applied to R1 to fulfill these requirements?
The login method is configured on the VTY lines of a router with these parameters.
Which configuration accomplishes this task?
Refer to the exhibit.
After implementing the configuration 172.20.20.2 stops replaying to ICMP echoes, but the default route fails to be removed. What is the reason for this behavior?
Refer to the exhibit.
The IP SLA is configured in a router. An engineer must configure an EEM applet to shut down the interface and bring it back up when there is a problem with the IP SLA. Which configuration should the engineer use?
Drag and drop the virtual components from the left onto their deceptions on the right.
Refer to the exhibit.
Which configuration allows Customer2 hosts to access the FTP server of Customer1 that has the IP address of 192.168.1.200?
What does Call Admission Control require the client to send in order to reserve the bandwidth?
Refer to the exhibit. A network engineer troubleshoots an issue with the port channel between SW1 and SW2. which command resolves the issue?
A)
B)
C)
D)
Refer to the exhibit.
SwitchC connects HR and Sales to the Core switch However, business needs require that no traffic from the Finance VLAN traverse this switch Which command meets this requirement?
A)
B)
C)
D)
When a wireless client roams between two different wireless controllers, a network connectivity outage is experience for a period of time. Which configuration issue would cause this problem?
Refer to the exhibit. An engineer is investigating why guest users are able to access other guest user devices when the users are connected to the customer guest WLAN. What action resolves this issue?
Wireless users report frequent disconnections from the wireless network. While troubleshooting a network engineer finds that after the user a disconnect, the connection re-establishes automatically without any input required. The engineer also notices these message logs .
Which action reduces the user impact?
Drag and drop the characteristics from the left onto the appropriate infrastructure deployment types on the right.
Which method creates an EEM applet policy that is registered with EEM and runs on demand or manually?
Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel?
If the noise floor is -90 dBm and wireless client is receiving a signal of -75 dBm, what is the SNR?
Which congestion queuing method on Cisco IOS based routers uses four static queues?
Refer to the exhibit.
Based on the configuration in this WLAN security setting, Which method can a client use to authenticate to the network?
A network engineer configures a new GRE tunnel and enters the show run command. What does the output verify?
Refer to exhibit.
VLANs 50 and 60 exist on the trunk links between all switches All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server Which command ensures that SW3 receives frames only from VLAN 50?
Refer to the exhibit.
A network engineer must configure the router to use the ISE-Servers group for authentication. If both ISE servers are unavailable, the local username database must be used. If no usernames are defined in the configuration, then the enable password must be the last resort to log in. Which configuration must be applied to achieve this result?
Which Python snippet should be used to store the devices data structure in a JSON file?
A)
B)
C)
D)
Drag and drop the characteristics from the left to the table types on the right.
Which two characteristics apply to the endpoint security aspect of the Cisco Threat Defense architecture? (Choose two.)
Refer to the exhibit. Which configuration must be added to enable GigabitEthemet 0/1 to participate in OSPF?
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
An engineer must create an EEM script to enable OSPF debugging in the event the OSPF neighborship goes down. Which script must the engineer apply?
Which method is used by an AP to join HA controllers and is configured in NVRAM?
If a client's radio device receives a signal strength of -67 dBm and the noise floor is -85 dBm, what is the SNR value?
Drag and drop the snippets onto the blanks within the code to construct a script that configures BGP according to the topology. Not all options are used, and some options may be used twice.
Drag and drop the characteristics from the left onto the routing protocols they describe on the right
A network engineer must configure a router to send logging messages to a syslog server based on these requirements:
Which configuration must be used?
An engineer must create an EEM applet that sends a syslog message in the event a change happens in the network due to trouble with an OSPF process. Which action should the engineer use?
Refer to the exhibit. Which command is required to verify NETCONF capability reply messages?
Refer to the exhibit.
An engineer reconfigures the pot-channel between SW1 and SW2 from an access port to a trunk and immediately notices this error in SW1's log.
Which command set resolves this error?
A)
B)
C)
D)
Refer to the exhibit.
The EtherChannel between SW2 and SW3 is not operational which action resolves this issue?
Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial?
Running the script causes the output in the exhibit. Which change to the first line of the script resolves the error?
Which command set configures RSPAN to capture outgoing traffic from VLAN 3 on interface GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface?
A)
B)
C)
D)
Where is radio resource management performed in a cisco SD-access wireless solution?
A customer has recently implemented a new wireless infrastructure using WLC-5520 at a site directly next to a large commercial airport. Users report that they intermittently lose WI-FI connectivity, and troubleshooting reveals it is due to frequent channel changes. Which two actions fix this issue? (Choose two)
Refer to the exhibit. After configurating an IPsec VPN, an engineer enters the show command to verify the ISAKMP SA status. What does the status show?
Which measure is used by an NTP server to indicate its closeness to the authoritative time source?
Which action is the vSmart controller responsible for in an SD-WAN deployment?
Refer to Exhibit.
MTU has been configured on the underlying physical topology, and no MTU command has been configured on the tunnel interfaces. What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared?
Refer to the exhibit.
A network engineer configures a GRE tunnel and enters the show Interface tunnel command. What does the output confirm about the configuration?
Drag and drop the Qos mechanisms from the left to the correct descriptions on the right
Which line must be added in the Python function to return the JSON object {"cat_9k": “FXS193202SE")?
A)
B)
C)
D)
Refer to the exhibit.
An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as an entry point. Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplish task?
After a redundant route processor failure occurs on a Layer 3 device, which mechanism allows for packets to be forwarded from a neighboring router based on the most recent tables?
An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:
Which two statements does the engineer use to explain these values to the customer? (Choose two)
Which outbound access list, applied to the WAN interface of a router, permits all traffic except for http traffic sourced from the workstation with IP address 10.10.10.1?
A)
B)
C)
D)
Refer to the exhibit. An engineer configures CoPP and enters the show command to verify the implementation. What is the result of the configuration?
Drag and drop the code snippets from the bottom onto the blanks in the script to convert a Python object into a JSON string. Not all options are used.
Which DNS lookup does an access point perform when attempting CAPWAP discovery?
An engineer must configure a multicast UDP jitter operation. Which configuration should be applied?
A)
B)
C)
D)
Refer to the exhibit. Which command set completes the ERSPAN session configuration?
Which hypervisor requires a host OS to run and is not allowed to directly access the hosts hardware and resources?
Which of the following security methods uses physical characteristics of a person to authorize access to a location?
Refer to the exhibit.
Which action must be taken to configure a WLAN for WPA2-AES with PSK and allow only 802.l1r-capable clients to connect?
Refer to the exhibit. Traffic is not passing between SW1 and SW2. Which action fixes the issue?
Refer to the exhibit. An engineer must save the configuration of router R2 using the NETCONF protocol. Which script must be used?
Refer to the exhibit. An engines configured TACACS^ to authenticate remote users but the configuration is not working as expected Which configuration must be applied to enable access?
A)
B)
C)
D)
Which QoS feature uses the IP Precedence bits in the ToS field of the IP packet header to partition traffic into different priority levels?
Which action limits the total amount of memory and CPU that is used by a collection of VMs?
Which two security features are available when implementing NTP? (Choose two.)
What does the destination MAC on the outer MAC header identify in a VXLAN packet?
A customer has a wireless network deployed within a multi-tenant building. The network provides client access, location-based services, and is monitored using Cisco DNA Center. The security department wants to locate and track malicious devices based on threat signatures. Which feature is required for this solution?
Drag and drop the characteristics from the left onto the deployment model on the right.
Which language defines the structure or modelling of data for NETCONF and RESTCONF?
Which two new security capabilities are introduced by using a next-generation firewall at the Internet edge? (Choose two.)
Which technology enables a redundant supervisor engine to take over when the primary supervisor engine fails?
An engineer receives a report that an application exhibits poor performance. On the switch where the server is connected, this syslog message is visible:
SW_MATM4-MACFLAP_N0HF: Host 0054.3831.8253 in vlan 14 is flapping between port GUAM and port Gi1/0/2.
What is causing the problem?
Simulation 04
Configure OSPF on both routers according to the topology to achieve these goals:
Drag and drop the characteristics from the left onto the deployment models on the right.
Refer to the exhibit Which configuration enables password checking on the console line, using only a password?
A)
B)
C)
D)
Refer to the exhibit. An engineer must allow the FTP traffic from users on 172.16.1.0 /24 to 172.16.2.0 /24 and block all other traffic. Which configuration must be applied?
A)
B)
C)
D)
Reter to the exhibit.
A client requests a new SSID that will use web-based authentication and external RADIUS servers. Which Layer 2 security mode must be selected?
When a branch location loses connectivity, which Cisco FlexConnect state rejects new users but allows existing users to function normally?
Refer to the exhibit. Link 1 uses a copper connection and link 2 uses a fiber connection. The fiber port must be the primary port for all forwarding. The output of the show spanning-tree command on SW2 shows that the fiber port is blocked by Spanning Tree. After entering the spanning-tree port-priority 32 command on G0/1 on SW2, the port remains blocked. Which command should be entered on the ports connected to Link 2 is resolve the issue?
A network administrator is preparing a Python scrip to configure a Cisco IOS XE-based device on the network. The administrator is worried that colleagues will make changes to the device while the script is running. Which operation of he in client manager prevent colleague making changes to the device while the scrip is running?
Refer to the exhibit. What are two results of the NAT configuration? (Choose two.)
Refer to the exhibit Which command must be applied to complete the configuration and enable RESTCONF?
Refer to the exhibit.
Refer to the exhibit. An engineer must implement HSRP between two WAN routers. In the event R1 tails and then regains operational status, it must allow 100 seconds for the routing protocol to converge before preemption takes effect. Which configuration is required?
A)
B)
C)
D)
Which device is responsible for finding EID-to-RLOC mappings when traffic is sent to a LISP-capable site?
Based on the router's API output In JSON format below, which Python code will display the value of the 'role' key?
Which A record type should be configured for access points to resolve the IP address of a wireless LAN controller using DNS?
: 262 DRAG DROP
Drag and drop the snippets onto the blanks within the code to construct a script that brings up the failover Ethernet port if the primary port goes down and also shuts down the failover port when the primary returns to service. Not all options are used.
An engineer must protect the password for the VTY lines against over-the-shoulder attacks. Which configuration should be applied?
Refer to the exhibit. R1 and R2 are directly connected, but the BGP session does not establish. Which action must be taken to build an eBGP session?
An engineer must contigure a rou'.er to allow users to run specHic configuration commands by validating the user against the router database. Which configuration must be applied?
Refer to the exhibit. A network engineer Is troubleshooting an Issue with the file server based on reports of slow file transmissions. Which two commands or command sets are required. In switch SW1 to analyze the traffic from the file server with a packet analyzer? (Choose two.)
A)
B)
C)
D)
Which technology is used to provide Layer 2 and Layer 3 logical networks in the Cisco SD-Access architecture?
Refer to the exhibit.
An engineer must allow all users in the 10.2.2.0/24 subnet to access the Internet. To conserve address space the public Interface address of 209 165 201.1 must be used for all external communication. Which command set accomplishes these requirements?
A)
B)
C)
D)
Refer to the exhibit. A network engineer must load balance traffic that comes from the NAT Router and is destined to 10.10.110.10, to several FTP servers. Which two commands sets should be applied? (Choose two).
A)
B)
C)
D)
E)
A system must validate access rights to all its resources and must not rely on a cached permission matrix. If the access level to a given resource is revoked but is not reflected in the permission matrix, the security is violated. Which term refers to this REST security design principle?
Reter to the exhibit.
An administrator troubleshoots intermittent connectivity from internal hosts to an external public server. Some internal hosts can connect to the server while others receive an ICMP Host Unreachable message and these hosts change over time. What is the cause of this issue?
An engineer must configure an EXEC authorization list that first checks a AAA server then a local username. If both methods fail, the user is denied. Which configuration should be applied?
Refer to the exhibit.
On which interfaces should VRRP commands be applied to provide first hop redundancy to PC-01 and PC-02?
What is provided by the Stealthwatch component of the Cisco Cyber Threat Defense solution?
In a Cisco SD-WAN solution, how Is the health of a data plane tunnel monitored?
Refer to the exhibit.
An engineer must add the SNMP interface table to the NetFlow protocol flow records. Where should the SNMP table option be added?
In a Cisco StackWise Virtual environment, which planes are virtually combined in the common logical switch?
Refer to the exhibit.
What is the result when a switch that is running PVST+ is added to this network?
Refer the exhibit.
Which router is the designated router on the segment 192.168.0.0/24?
In a Cisco SD-Access solution, which protocol is used by an extended node to connect to a single edge node?
Which Python code snippet must be added to the script to save the returned configuration as a JSON-formatted file?
A)
B)
C)
D)
What occurs when a high bandwidth multicast stream is sent over an MVPN using Cisco hardware?
AN engineer is implementing a route map to support redistribution within BGP. The route map must configured to permit all unmatched routes. Which action must the engineer perform to complete this task?
Refer to the exhibit.
The trunk does not work over the back-to-back link between Switch1 interface Giq1/0/20 and Switch2 interface Gig1/0/20. Which configuration fixes the problem?
A)
B)
C)
D)
An engineer is concerned with the deployment of new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements?
When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?
Which three resources must the hypervisor make available to the virtual machines? (Choose three)
In a Cisco Catalyst switch equipped with two supervisor modules an administrator must temporally remove the active supervisor from the chassis to perform hardware maintenance on it. Which mechanism ensure that the active supervisor removal is not disruptive to the network operation?
Refer to the exhibit.
A network engineer must log in to the router via the console, but the RADIUS servers are not reachable Which credentials allow console access1?
An engineer is configuring Local WebAuth on a Cisco Wireless LAN Controller. According to RFC 5737, WHICH VIRTUAL IP address must be used in this configuration?
Drag and drop the snippets onto the blanks within the code to construct a script that shows all logging that occurred on the appliance from Sunday until 9:00 p.m Thursday Not all options are used.
Refer to the exhibit. Which two commands are needed to allow for full reachability between AS 1000 and AS 2000? (Choose two)
Which design principle slates that a user has no access by default to any resource, and unless a resource is explicitly granted, it should be denied?
A network engineer is configuring Flexible Netflow and enters these commands
Sampler Netflow1
Mode random one-out-of 100
Interface fastethernet 1/0
Flow-sampler netflow1
Which are two results of implementing this feature instead of traditional Netflow? (Choose two.)
Refer to the exhibit.
A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Which two configuration changes accomplish this? (Choose two).
Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?
Refer to the exhibit. What does the error message relay to the administrator who is trying to configure a Cisco IOS device?
Refer to the exhibit. A network engineer configures NAT on R1 and enters the show command to verity the configuration What does the output confirm?
An engineer must configure an ACL that permits packets which include an ACK in the TCP header Which entry must be included in the ACL?
Refer to the exhibit.
Which configuration must be applied to the HQ router to set up a GRE tunnel between the HQ and BR routers?
A)
B)
C)
D)
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
Which Cisco FlexConnect state allows wireless users that are connected to the network to continue working after the connection to the WLC has been lost?
Which two Cisco SD-Access components provide communication between traditional network elements and controller layer? (choose two)
Which configuration creates a CoPP policy that provides unlimited SSH access from dient 10.0.0.5 and denies access from all other SSH clients'?
A)
B)
C)
D)
Refer to the exhibit. A network engineer checks connectivity between two routers. The engineer can ping the remote endpoint but cannot see an ARP entry. Why is there no ARP entry?
Refer to the exhibit .
Which command must be configured for RESTCONF to operate on port 8888?
Which method displays text directly into the active console with a synchronous EEM applet policy?
Which option must be used to support a WLC with an IPv6 management address and 100 Cisco Aironet 2800 Series access points that will use DHCP to register?
Refer to the exhibit.
An engineer must set up connectivity between a campus aggregation layer and a branch office access layer. The engineer uses dynamic trunking protocol to establish this connection, however, management traffic on VLAN1 is not passing. Which action resolves the issue and allow communication for all configured VLANs?
Refer to the exhibit. A network engineer must be notified when a user switches to configuration mode. Which script should be applied to receive an SNMP trap and a critical-level log message?
A)
B)
C)
D)
Refer to the exhibit. An engineer has configured an IP SLA for UDP echo’s. Which command is needed to start the IP SLA to test every 30 seconds and continue until stopped?