New Questions - Part 5 Flashcards

1
A

+ detects suspicious web activity: Web Security Appliance

+ analyzes network behavior and detects anomalies: StealthWatch

+ uses pxGrid to remediate security threats: Identity Services Engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are two characteristics of Cisco SD-Access elements? (Choose two)

A. Fabric endpoints are connected directly to the border node

B. The border node is required for communication between fabric and nonfabric devices

C. The control plane node has the full RLOC-to-EID mapping database

D. Traffic within the fabric always goes through the control plane node

E. The border node has the full RLOC-to-EID mapping database

A

B. The border node is required for communication between fabric and nonfabric devices

C. The control plane node has the full RLOC-to-EID mapping database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Refer to the exhibit.

Current configuration: 142 bytes
vrf definition STAFF
!
!
interface GigabitEthernet1
 vrf forwarding STAFF
 no ip address
 negotiation auto
 no mop enabled
 no mop sysid
end

An engineer must assign an IP address of 192.168.1.1/24 to the GigabitEthemet1 interface. Which two commands must be added to the existing configuration to accomplish this task? (Choose two)

A. Router(config-vrf)#address-family ipv6
B. Router(config-if)#ip address 192.168.1.1 255.255.255.0
C. Router(config-vrf)#ip address 192.168.1.1 255.255.255.0
D. Router(config-if)#address-family ipv4
E. Router(config-vrf)#address-family ipv4

A

B. Router(config-if)#ip address 192.168.1.1 255.255.255.0

E. Router(config-vrf)#address-family ipv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the data policy in a Cisco SD-WAN deployment?

A. list of ordered statements that define node configurations and authentication used within the SD-WAN overlay

B. Set of statements that defines how data is forwarded based on IP packet information and specific VPNs

C. detailed database mapping several kinds of addresses with their corresponding location

D. group of services tested to guarantee devices and links liveliness within the SD-WAN overlay

A

B. Set of statements that defines how data is forwarded based on IP packet information and specific VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Refer to the exhibit.

Image

Which action resolves the EtherChannel issue between SW2 and SW3?

A. Configure switchport mode trunk on SW2
B. Configure switchport nonegotiate on SW3
C. Configure channel-group 1 mode desirable on both interfaces
D. Configure channel-group 5 mode active on both interfaces

A

C. Configure channel-group 1 mode desirable on both interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Refer to the exhibit.

show_ip_ospf_interface.jpg

A network engineer configures OSPF and reviews the router configuration. Which interface or interfaces are able to establish OSPF adjacency?

A. GigabitEthemet0/1 and GigabitEthernet0/1.40
B. Gigabit Ethernet0/0 and GigabitEthemet0/1
C. only GigabitEthernet0/0
D. only GigabitEthernet0/1

A

C. only GigabitEthernet0/0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Refer to the exhibit.

Postman_error_show_control_connections.jpg
Postman_error.jpg

What step resolves the authentication issue?

A. restart the vsmart host
B. target 192.168.100.82 in the URI
C. change the port to 12446
D. use basic authentication

A

B. target 192.168.100.82 in the URI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Refer to the exhibit.

GRE_Simplify_Config.jpg

A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Which two configuration changes accomplish this? (Choose two)

A. Apply the crypto map to the tunnel interface and change the tunnel mode to tunnel mode ipsec ipv4

B. Remove all configuration related to crypto map from R1 and R2 and eliminate the ACL 100

C. Remove the crypto map and modify the ACL to allow traffic between 10.10.0.0/24 to 10.20.0.0/24

D. Create an IPsec profile, associate the transform-set, and apply the profile to the tunnel interface

A

B. Remove all configuration related to crypto map from R1 and R2 and eliminate the ACL 100

D. Create an IPsec profile, associate the transform-set, and apply the profile to the tunnel interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which encryption hashing algorithm does NTP use for authentication?

A. SSL
B. AES256
C. AES128
D. MD5

A

D. MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a VPN in a Cisco SD-WAN deployment?

A. virtual channel used to carry control plane information
B. attribute to identify a set of services offered in specific places in the SD-WAN fabric
C. common exchange point between two different services
D. virtualized environment that provides traffic isolation and segmentation in the SD-WAN fabric

A

D. virtualized environment that provides traffic isolation and segmentation in the SD-WAN fabric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
A

Ansible:
+ uses playbooks
+ procedural

Puppet:
+ uses a pull model
+ declarative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Refer to the exhibit.

trunking_mode_mismatch.jpg

Communication between London and New York is down. Which command set must be applied to resolve this issue?

A.
NewYork(config)#int f0/1
NewYork(config)#switchport nonegotiate
NewYork(config)#end
NewYork#

B.
NewYork(config)#int f0/1
NewYork(config)#switchport trunk encap dot1q
NewYork(config)#end
NewYork#

C.
NewYork(config)#int f0/1
NewYork(config)#switchport mode dynamic desirable
NewYork(config)#end
NewYork#

D.
NewYork(config)#int f0/1
NewYork(config)#switchport mode trunk
NewYork(config)#end
NewYork#

A

B.
NewYork(config)#int f0/1
NewYork(config)#switchport trunk encap dot1q
NewYork(config)#end
NewYork#

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Refer to the exhibit.

trunking_mode_mismatch.jpg

Communication between London and New York is down. Which command set must be applied to resolve this issue?

A.
NewYork(config)#int f0/1
NewYork(config)#switchport nonegotiate
NewYork(config)#end
NewYork#

B.
NewYork(config)#int f0/1
NewYork(config)#switchport trunk encap dot1q
NewYork(config)#end
NewYork#

C.
NewYork(config)#int f0/1
NewYork(config)#switchport mode dynamic desirable
NewYork(config)#end
NewYork#

D.
NewYork(config)#int f0/1
NewYork(config)#switchport mode trunk
NewYork(config)#end
NewYork#

A

B.
NewYork(config)#int f0/1
NewYork(config)#switchport trunk encap dot1q
NewYork(config)#end
NewYork#

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an emulated machine that has dedicated compute, memory, and storage resources and a fully installed operating system?

A. host
B. virtual machine
C. container
D. mainframe

A

B. virtual machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which two methods are used to reduce the AP coverage area? (Choose two)

A. Reduce AP transmit power
B. Increase minimum mandatory data rate
C. Reduce channel width from 40 MHz to 20 MHz
D. Enable Fastlane
E. Disable 2.4 GHz and use only 5 GHz

A

A. Reduce AP transmit power

B. Increase minimum mandatory data rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which data is properly formatted with JSON?

A. Option A
B. Option B
C. Option C
D. Option D

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
A

VSS:
+ supported on the Cisco 4500 and 6500 series
+ combines exactly two devices
+ supports devices that are geographically separated

Explanation
The following characteristics are correct for StackWise (but not VSS):
+ can be connected in up to 9 devices
+ is supported only on line 3750 and (2960/3650/3850/3750+)
+ uses proprietary cable for connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Refer to the exhibit.

Root_Bridge.jpg

All switches are configured with the default port priority value. Which two commands ensure that traffic from PC1 is forwarded over Gi1/3 trunk port between DSW1 and DSW2? (Choose two)

A. DWS1(config-if)#spanning-tree port-priority 0
B. DSW2(config-if)#spanning-tree port-priority 16
C. DSW1(config-if)#interface gi1/3
D. DSW2(config-if)#interface gi1/3
E. DSW2(config-if)#spanning-tree port-priority 128

A

B. DSW2(config-if)#spanning-tree port-priority 16

D. DSW2(config-if)#interface gi1/3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In a three-tier hierarchical campus network design, which action is a design best-practice for the core layer?

A. provide QoS prioritization services such as marking, queueing, and classification for critical network traffic

B. provide advanced network security features such as 802. IX, DHCP snooping, VACLs, and port security

C. provide redundant Layer 3 point-to-point links between the core devices for more predictable and faster convergence

D. provide redundant aggregation for access layer devices and first-hop redundancy protocols such as VRRP

A

C. provide redundant Layer 3 point-to-point links between the core devices for more predictable and faster convergence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which two network problems indicate a need to implement QoS in a campus network? (Choose two)

A. port flapping
B. misrouted network packets
C. excess jitter
D. bandwidth-related packet loss
E. duplicate IP addresses

A

C. excess jitter
D. bandwidth-related packet loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In a Cisco SD-Access solution, what is the role of the Identity Services Engine?

A. It provides GUI management and abstraction via apps that share context.

B. It is leveraged for dynamic endpoint to group mapping and policy definition.

C. It is used to analyze endpoint to app flows and monitor fabric status.

D. It manages the LISP EID database.

A

B. It is leveraged for dynamic endpoint to group mapping and policy definition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A customer has completed the installation of a Wi-Fi 6 greenfield deployment at their new campus. They want to leverage Wi-Fi 6 enhanced speeds on the trusted employee WLAN. To configure the employee WLAN, which two Layer 2 security policies should be used? (Choose two)

A. WPA (AES)
B. WPA2 (AES) + WEP
C. 802.1X
D. OPEN

A

C. 802.1X
D. OPEN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which outcome is achieved with this Python code?

client.connect (ip, port=22,username=usr,password=pswd)
stdin,stdout,stderr = client.exec_command('show ip bgp 192.168.10100 bestpath\n')
print(stdout)

A. displays the output of the show command in a formatted way

B. connects to a Cisco device using SSH and exports the routing table information

C. connects to a Cisco device using Telnet and exports the routing table information

D. connects to a Cisco device using SSH and exports the BGP table for the prefix

A

D. connects to a Cisco device using SSH and exports the BGP table for the prefix

23
Q

What is YANG used for?

A. scraping data via CLI
B. providing a transport for network configuration data between client and server
C. processing SNMP read-only polls
D. describing data models

A

D. describing data models

24
Q

Refer to the exhibit.

HSRP_preempt.jpg

Which configuration change ensures that R1 is the active gateway whenever it is in a functional state for the 172.30.110.0/24 network?

Option A
R1
standby 1 preempt
R2
standby 1 priority 90

Option B
R1
standby 1 preempt
R2
standby 1 priority 100

Option C
R2
standby 1 priority 100
standby 1 preempt

Option D
R2
standby 1 priority 110
standby 1 preempt

A

Option A
R1
standby 1 preempt
R2
standby 1 priority 90

25
Q

Refer to the exhibit.

Person#1:
First Name is Johnny
Last Name is Table
Hobbies are:
* Running
* Video games
Person#2
First Name is Billy
Last Name is Smith
Hobbies are:
* Napping
* Reading

Which JSON syntax is derived from this data?

Option A
{‘Person’: [{‘First Name’: ‘Johnny’, ‘Last Name’: ‘Table’, ‘Hobbies’: [‘Running’, ‘Video games’]}, {‘First Name’: ‘Billy’, ‘Last Name’: ‘Smith’, ‘Hobbies’: [‘Napping’, ‘Reading’]}]}

Option B
{[{‘First Name’: ‘Johnny’, ‘Last Name’: ‘Table’, ‘Hobbies’: ‘Running’,’Hobbies’: ‘Video games’}, {‘First Name’: ‘Billy’, ‘Last Name’: ‘Smith’, ‘Hobbies’: ‘Napping’, ‘Hobbies’: Reading’}]}

Option C
{‘Person’: [{‘First Name’:’Johnny’, ‘Last Name’: ‘Table’, ‘Hobbies’: ‘Running’, ‘Video games’}, {‘First Name’: ‘Billy’, ‘Last Name’: ‘Smith’, ‘Hobbies’: ‘Napping’, ‘Reading’}]}

Option D
{[{‘First Name’: ‘Johnny’, ‘Last Name’: ‘Table’, ‘Hobbies’: [‘Running’, ‘Video games’]}, {‘First Name’: ‘Billy’, ‘Last Name’: ‘Smith’, ‘Hobbies’: [‘Napping’,’Reading’]}]}

A

Option A
{‘Person’: [{‘First Name’: ‘Johnny’, ‘Last Name’: ‘Table’, ‘Hobbies’: [‘Running’, ‘Video games’]}, {‘First Name’: ‘Billy’, ‘Last Name’: ‘Smith’, ‘Hobbies’: [‘Napping’, ‘Reading’]}]}

26
Q

An engineer creates the configuration below. Drag and drop the authentication methods from the left into the order of priority on the right. Not all options are used.

R1#sh run | i aaa
aaa new-model
aaa authentication login default group ACE group AAA_RADIUS local-case
aaa session-id common
R1#

AAA_Radius_procedure.jpg

A

Step 1: AAA servers of ACE group
Step 2: AAA servers of AAA_RADIUS group
Step 3: local configured username in case-sensitive format
Step 4: If no method works, then deny login

27
Q

Refer to the exhibit.

HSRP_default.jpg

Which two facts does the device output confirm? (Choose two)

A. The device is using the default HSRP hello timer
B. The standby device is configured with the default HSRP priority
C. The device’s HSRP group uses the virtual IP address 10.0.3.242
D. The device is configured with the default HSRP priority
E. The device sends unicast messages to its peers

A

A. The device is using the default HSRP hello timer

B. The standby device is configured with the default HSRP priority

28
Q

Based on the output below, which Python code shows the value of the “upTime” key?

{
“response”: [{
“family”: “Routers”,
“type”: “Cisco ASR 1001-X Router”,
“errorCode”: null,
“location”: null,
“macAddress”: “00:c8:8b:80:bb:00”,
“hostname”: “asr1001-x.abc.inc”,
“role”: “BORDER ROUTER”,
“lastUpdateTime”: 1577391299537,
“serialNumber”: “FXS1932Q1SE”,
“softwareVersion”: “16.3.2”,
“locationName”: null,
“upTime”: “49 days, 13:43:44:13”,
“lastUpdated”: “2019-12-22 16:35:21”
}]
}

Option A

json_data = response.json()
print(json_data[response][0][upTime])

Option B

json_data = response_json()
print(json_data[‘response’][‘family’][‘upTime’])

Option C

json_data = response.json()
print(json_data[‘response’][0][‘upTime’])

Option D

json_data = json.loads(response.text)
print(json_data[‘response’][‘family’][‘upTime’])
A

Option C

json_data = response.json()
print(json_data[‘response’][0][‘upTime’])
29
Q

Which two actions, when applied in the LAN network segment, will facilitate Layer 3 CAPWAP discovery for lightweight AP? (Choose two)

A. Utilize DHCP option 17
B. Utilize DHCP option 43
C. Configure WLC IP address on LAN switch
D. Enable port security on the switch port
E. Configure an ip helper-address on the router interface

A

B. Utilize DHCP option 43

E. Configure an ip helper-address on the router interface

30
Q

Refer to the exhibit.

VRF_ospf.jpg

R2:
vrf definition hotel
 address-family ipv4
 exit-address-family

vrf definition bank
 address-family ipv4
 exit-address-family

interface Ethernet0/0
 vrf forwarding bank
 ip address 172.16.0.4 255.255.0.0

interface Ethernet0/1
 vrf forwarding hotel
 ip address 172.1.0.5 255.255.0.0

router ospf 42 vrf bank
 router-id 1.1.1.1
 network 172.16.0.0 0.0.255.255 area 0

router ospf 43 vrf hotel
 router-id 3.3.3.3
 network 172.16.0.0 0.0.255.255 area 0

R1:
vrf definition bank
!
 address-family ipv4
 exit-address-family

Which configuration must be applied to R1 to enable R1 to reach the server at 172.16.0.1?

Option A

interface Ethernet0/0
ip address 172.16.0.7 255.255.0.0
!
router ospf 44 vrf hotel
network 172.16.0.0 0.0.255.255

Option B

interface Ethernet0/0
vrf forwarding bank
ip address 172.16.0.7 255.255.0.0
!
router ospf 44 vrf bank
network 172.16.0.0 0.0.255.255 area 0

Option C

interface Ethernet0/0
vrf forwarding hotel
ip address 172.16.0.7 255.255.0.0
!
router ospf 44 vrf hotel
network 172.16.0.0 0.0.255.255 area 0

Option D

interface Ethernet0/0
ip address 172.16.0.7 255.255.0.0
!
router ospf 44 vrf bank
network 172.16.0.0 255.255.0.0
A

Option B

interface Ethernet0/0
vrf forwarding bank
ip address 172.16.0.7 255.255.0.0
!
router ospf 44 vrf bank
network 172.16.0.0 0.0.255.255 area 0
31
Q

The following system log message is presented after a network administrator configures a GRE tunnel:

%TUN-RECURDOWN: Interface Tunnel 0 temporarily disabled due to recursive routing.

Why is Tunnel 0 disabled?

A. Because the tunnel cannot reach its tunnel destination

B. Because the best path to the tunnel destination is through the tunnel itself

C. Because dynamic routing is not enabled

D. Because the router cannot recursively identify its egress forwarding interface

A

B. Because the best path to the tunnel destination is through the tunnel itself

32
Q

What is provided by the Stealthwatch component of the Cisco Cyber Threat Defense solution?

A. real-time threat management to stop DDoS attacks to the core and access networks
B. real-time awareness of users, devices and traffic on the network
C. malware control
D. dynamic threat control for web traffic

A

B. real-time awareness of users, devices and traffic on the network

33
Q

How does Protocol Independent Multicast function?

A. It uses unicast routing information to perform the multicast forwarding function.

B. It uses the multicast routing table to perform the multicast forwarding function.

C. In sparse mode it establishes neighbor adjacencies and sends hello messages at 5-second intervals.

D. It uses broadcast routing information to perform the multicast forwarding function.

A

A. It uses unicast routing information to perform the multicast forwarding function.

34
Q

Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial?

A. under all network conditions
B. under network convergence conditions
C. under interface saturation conditions
D. under traffic classification and marking conditions

A

C. under interface saturation conditions

35
Q

Which technology does VXLAN use to provide segmentation for Layer 2 and Layer 3 traffic?

A. bridge domain
B. VLAN
C. VRF
D. VNI

A

D. VNI

36
Q

A company has an existing Cisco 5520 HA cluster using SSO. An engineer deploys a new single Cisco Catalyst 9800 WLC to test new features. The engineer successfully configures a mobility tunnel between the 5520 cluster and 9800 WLC. Clients connected to the corporate WLAN roam seamlessly between access points on the 5520 and 9800 WLC. After a failure on the primary 5520 WLC, all WLAN services remain functional; however clients cannot roam between the 5520 and 9800 controllers without dropping their connection. Which feature must be configured to remedy the issue?

A. mobility MAC on the 5520 cluster
B. mobility MAC on the 9800 WLC
C. new mobility on the 5520 cluster
D. new mobility on the 9800 WLC

A

B. mobility MAC on the 9800 WLC

37
Q

What are two methods of ensuring that the multicast RPF check passes without changing the unicast routing table? (Choose two)

A. disabling BGP routing protocol
B. implementing static mroutes
C. disabling the interface of the router back to the multicast source
D. implementing MBGP
E. implementing OSPF routing protocol

A

B. implementing static mroutes

D. implementing MBGP

38
Q

What is the result when an active route processor fails in a design that combines NSF with SSO?

A. An NSF-aware device immediately updates the standby route processor RIB without churning the network

B. The standby route processor temporarily forwards packets until route convergence is complete

C. An NSF-capable device immediately updates the standby route processor RIB without churning the network

D. The standby route processor immediately takes control and forwards packets along known routes

A

D. The standby route processor immediately takes control and forwards packets along known routes

39
Q

What is a benefit of a virtual machine when compared with a physical server?

A. Deploying a virtual machine is technically less complex than deploying a physical server.

B. Virtual machines increase server processing performance.

C. The CPU and RAM resources on a virtual machine cannot be affected by other virtual machines.

D. Multiple virtual servers can be deployed on the same physical server without having to buy additional hardware.

A

D. Multiple virtual servers can be deployed on the same physical server without having to buy additional hardware.

40
Q

What is the wireless received signal strength indicator?

A. The value of how strong the wireless signal is leaving the antenna using transmit power, cable loss, and antenna gain

B. The value given to the strength of the wireless signal received compared to the noise level

C. The value of how much wireless signal is lost over a defined amount of distance

D. The value of how strong a wireless signal is received, measured in dBm

A

D. The value of how strong a wireless signal is received, measured in dBm

41
Q

Which controller is capable of acting as a STUN server during the onboarding process of Edge devices?

A. vManage
B. vSmart
C. vBond
D. PNP server

A

C. vBond

42
Q

What is the process for moving a virtual machine from one host machine to another with no downtime?

A. live migration
B. disaster recovery
C. high availability
D. multisite replication

A

A. live migration

43
Q

What are two features of NetFlow flow monitoring? (Choose two)

A. Can track ingress and egress information
B. Include the flow record and the flow importer
C. Copies all ingress flow information to an interface
D. Does not required packet sampling on interfaces
E. Can be used to track multicast, MPLS, or bridged traffic

A

A. Can track ingress and egress information

E. Can be used to track multicast, MPLS, or bridged traffic

44
Q

Which method should an engineer use to deal with a long-standing contention issue between any two VMs on the same host?

A. Adjust the resource reservation limits
B. Reset the host
C. Reset the VM
D. Live migrate the VM to another host

A

A. Adjust the resource reservation limits

45
Q

What is the recommended MTU size for a Cisco SD-Access Fabric?

A. 4464
B. 9100
C. 1500
D. 17914

A

B. 9100

46
Q

What does the number in an NTP stratum level represent?

A. The number of hops it takes to reach the master time server.
B. The amount of drift between the device clock and true time.
C. The amount of offset between the device clock and true time.
D. The number of hops it takes to reach the authoritative time source.

A

D. The number of hops it takes to reach the authoritative time source.

47
Q

Refer to the exhibit.

IP_SLA_reachability.jpg

R1(config)#ip sla 1
R1(config-ip-sla)#icmp-echo 172.20.20.2 source-interface FastEthernet1/0
R1(config-ip-sla-echo)#timeout 5000
R1(config-ip-sla-echo)#frequency 10
R1(config-ip-sla-echo)#threshold 500
R1(config)#ip sla schedule 1 start-time now life forever
R1(config)#track 10 ip sla 1 reachability
R1(config)#ip route 0.0.0.0 0.0.0.0 172.20.20.2

After implementing the configuration 172.20.20.2 stops replaying to ICMP echoes, but the default route fails to be removed. What is the reason for this behavior?

A. The source-interface is configured incorrectly.
B. The destination must be 172.30.30.2 for icmp-echo
C. The default route is missing the track feature
D. The threshold value is wrong

A

C. The default route is missing the track feature

48
Q

Refer to the exhibit.

Antenna

Which type of antenna is show on the radiation patterns?

A. Dipole
B. Yagi
C. Patch
D. Omnidirectional

A

A. Dipole

49
A

PIM Dense Mode:
+ builds source-based distribution trees
+ uses a push model to distribute multicast traffic
+ uses prune mechanisms to stop unwanted multicast traffic

50
Q

Refer to the exhibit.

VRRP_interfaces.jpg

Edge-01

track 10 interface GigabitEthernet0/0 line-protocol
!
interface GigabitEthernet0/1
ip address 10.104.110.2 255.255.255.0
vrrp 10 ip 10.104.110.100
vrrp 10 priority 120

Edge-02

interface GigabitEthernet0/1
ip address 10.104.110.3 255.255.255.0
vrrp 10 ip 10.104.110.100

Object tracking has been configured for VRRP enabled routers Edge-01 and Edge-02. Which commands cause Edge-02 to preempt Edge-01 in the event that interface G0/0 goes down on Edge-01?

Option A
Edge-01(config)#interface G0/1
Edge-01(config-if)#vrrp 10 track 10 decrement 10

Option B
Edge-02(config)#interface G0/1
Edge-02(config-if)#vrrp 10 track 10 decrement 30

Option C
Edge-02(config)#interface G0/1
Edge-02(config-if)#vrrp 10 track 10 decrement 10

Option D
Edge-01(config)#interface G0/1
Edge-01(config-if)#vrrp 10 track 10 decrement 30

A

Option D
Edge-01(config)#interface G0/1
Edge-01(config-if)#vrrp 10 track 10 decrement 30

51
Q

Which protocol is implemented to establish secure control plane adjacencies between Cisco SD-WAN nodes?

A. IKE
B. DTLS
C. IPsec
D. ESP

A

B. DTLS

52
Q

Refer to the exhibit.

flow monitor FLOW-MONITOR-1
 record netflow ipv6 original-input
 exit
!
sampler SAMPLER-1
 mode deterministic 1 out-of 2
 exit
!
ip cef
ipv6 cef
!
interface GigabitEthernet0/0/0
 ipv6 address 2001:DB8:2:ABCD::2/48
 ipv6 flow monitor FLOW-MONITOR-1 sampler SAMPLER-1 input

What is the effect of introducing the sampler feature into the Flexible NetFlow configuration on the router?

A. NetFlow updates to the collector are sent 50% less frequently.

B. Every second IPv4 packet is forwarded to the collector for inspection.

C. CPU and memory utilization are reduced when compared with what is required for full NetFlow.

D. The resolution of sampling data increases, but it requires more performance from the router.

A

C. CPU and memory utilization are reduced when compared with what is required for full NetFlow.

53
Q

When does a stack master lose its role?

A. When the priority value of a stack member is changed to a higher value
B. When a switch with a higher priority is added to the stack
C. When the stack master is reset
D. When a stack member fails

A

C. When the stack master is reset

54
Q

What is the calculation that is used to measure the radiated power of a signal after it has gone through the radio, antenna cable, and antenna?

A. dBi
B. mW
C. dBm
D. EIRP

A

D. EIRP