New Questions - Part 5 Flashcards

1
A

+ detects suspicious web activity: Web Security Appliance

+ analyzes network behavior and detects anomalies: StealthWatch

+ uses pxGrid to remediate security threats: Identity Services Engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are two characteristics of Cisco SD-Access elements? (Choose two)

A. Fabric endpoints are connected directly to the border node

B. The border node is required for communication between fabric and nonfabric devices

C. The control plane node has the full RLOC-to-EID mapping database

D. Traffic within the fabric always goes through the control plane node

E. The border node has the full RLOC-to-EID mapping database

A

B. The border node is required for communication between fabric and nonfabric devices

C. The control plane node has the full RLOC-to-EID mapping database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Refer to the exhibit.

Current configuration: 142 bytes
vrf definition STAFF
!
!
interface GigabitEthernet1
 vrf forwarding STAFF
 no ip address
 negotiation auto
 no mop enabled
 no mop sysid
end

An engineer must assign an IP address of 192.168.1.1/24 to the GigabitEthemet1 interface. Which two commands must be added to the existing configuration to accomplish this task? (Choose two)

A. Router(config-vrf)#address-family ipv6
B. Router(config-if)#ip address 192.168.1.1 255.255.255.0
C. Router(config-vrf)#ip address 192.168.1.1 255.255.255.0
D. Router(config-if)#address-family ipv4
E. Router(config-vrf)#address-family ipv4

A

B. Router(config-if)#ip address 192.168.1.1 255.255.255.0

E. Router(config-vrf)#address-family ipv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the data policy in a Cisco SD-WAN deployment?

A. list of ordered statements that define node configurations and authentication used within the SD-WAN overlay

B. Set of statements that defines how data is forwarded based on IP packet information and specific VPNs

C. detailed database mapping several kinds of addresses with their corresponding location

D. group of services tested to guarantee devices and links liveliness within the SD-WAN overlay

A

B. Set of statements that defines how data is forwarded based on IP packet information and specific VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Refer to the exhibit.

Image

Which action resolves the EtherChannel issue between SW2 and SW3?

A. Configure switchport mode trunk on SW2
B. Configure switchport nonegotiate on SW3
C. Configure channel-group 1 mode desirable on both interfaces
D. Configure channel-group 5 mode active on both interfaces

A

C. Configure channel-group 1 mode desirable on both interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Refer to the exhibit.

show_ip_ospf_interface.jpg

A network engineer configures OSPF and reviews the router configuration. Which interface or interfaces are able to establish OSPF adjacency?

A. GigabitEthemet0/1 and GigabitEthernet0/1.40
B. Gigabit Ethernet0/0 and GigabitEthemet0/1
C. only GigabitEthernet0/0
D. only GigabitEthernet0/1

A

C. only GigabitEthernet0/0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Refer to the exhibit.

Postman_error_show_control_connections.jpg
Postman_error.jpg

What step resolves the authentication issue?

A. restart the vsmart host
B. target 192.168.100.82 in the URI
C. change the port to 12446
D. use basic authentication

A

B. target 192.168.100.82 in the URI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Refer to the exhibit.

GRE_Simplify_Config.jpg

A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Which two configuration changes accomplish this? (Choose two)

A. Apply the crypto map to the tunnel interface and change the tunnel mode to tunnel mode ipsec ipv4

B. Remove all configuration related to crypto map from R1 and R2 and eliminate the ACL 100

C. Remove the crypto map and modify the ACL to allow traffic between 10.10.0.0/24 to 10.20.0.0/24

D. Create an IPsec profile, associate the transform-set, and apply the profile to the tunnel interface

A

B. Remove all configuration related to crypto map from R1 and R2 and eliminate the ACL 100

D. Create an IPsec profile, associate the transform-set, and apply the profile to the tunnel interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which encryption hashing algorithm does NTP use for authentication?

A. SSL
B. AES256
C. AES128
D. MD5

A

D. MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a VPN in a Cisco SD-WAN deployment?

A. virtual channel used to carry control plane information
B. attribute to identify a set of services offered in specific places in the SD-WAN fabric
C. common exchange point between two different services
D. virtualized environment that provides traffic isolation and segmentation in the SD-WAN fabric

A

D. virtualized environment that provides traffic isolation and segmentation in the SD-WAN fabric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
A

Ansible:
+ uses playbooks
+ procedural

Puppet:
+ uses a pull model
+ declarative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Refer to the exhibit.

trunking_mode_mismatch.jpg

Communication between London and New York is down. Which command set must be applied to resolve this issue?

A.
NewYork(config)#int f0/1
NewYork(config)#switchport nonegotiate
NewYork(config)#end
NewYork#

B.
NewYork(config)#int f0/1
NewYork(config)#switchport trunk encap dot1q
NewYork(config)#end
NewYork#

C.
NewYork(config)#int f0/1
NewYork(config)#switchport mode dynamic desirable
NewYork(config)#end
NewYork#

D.
NewYork(config)#int f0/1
NewYork(config)#switchport mode trunk
NewYork(config)#end
NewYork#

A

B.
NewYork(config)#int f0/1
NewYork(config)#switchport trunk encap dot1q
NewYork(config)#end
NewYork#

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Refer to the exhibit.

trunking_mode_mismatch.jpg

Communication between London and New York is down. Which command set must be applied to resolve this issue?

A.
NewYork(config)#int f0/1
NewYork(config)#switchport nonegotiate
NewYork(config)#end
NewYork#

B.
NewYork(config)#int f0/1
NewYork(config)#switchport trunk encap dot1q
NewYork(config)#end
NewYork#

C.
NewYork(config)#int f0/1
NewYork(config)#switchport mode dynamic desirable
NewYork(config)#end
NewYork#

D.
NewYork(config)#int f0/1
NewYork(config)#switchport mode trunk
NewYork(config)#end
NewYork#

A

B.
NewYork(config)#int f0/1
NewYork(config)#switchport trunk encap dot1q
NewYork(config)#end
NewYork#

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an emulated machine that has dedicated compute, memory, and storage resources and a fully installed operating system?

A. host
B. virtual machine
C. container
D. mainframe

A

B. virtual machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which two methods are used to reduce the AP coverage area? (Choose two)

A. Reduce AP transmit power
B. Increase minimum mandatory data rate
C. Reduce channel width from 40 MHz to 20 MHz
D. Enable Fastlane
E. Disable 2.4 GHz and use only 5 GHz

A

A. Reduce AP transmit power

B. Increase minimum mandatory data rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which data is properly formatted with JSON?

A. Option A
B. Option B
C. Option C
D. Option D

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
A

VSS:
+ supported on the Cisco 4500 and 6500 series
+ combines exactly two devices
+ supports devices that are geographically separated

Explanation
The following characteristics are correct for StackWise (but not VSS):
+ can be connected in up to 9 devices
+ is supported only on line 3750 and (2960/3650/3850/3750+)
+ uses proprietary cable for connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Refer to the exhibit.

Root_Bridge.jpg

All switches are configured with the default port priority value. Which two commands ensure that traffic from PC1 is forwarded over Gi1/3 trunk port between DSW1 and DSW2? (Choose two)

A. DWS1(config-if)#spanning-tree port-priority 0
B. DSW2(config-if)#spanning-tree port-priority 16
C. DSW1(config-if)#interface gi1/3
D. DSW2(config-if)#interface gi1/3
E. DSW2(config-if)#spanning-tree port-priority 128

A

B. DSW2(config-if)#spanning-tree port-priority 16

D. DSW2(config-if)#interface gi1/3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In a three-tier hierarchical campus network design, which action is a design best-practice for the core layer?

A. provide QoS prioritization services such as marking, queueing, and classification for critical network traffic

B. provide advanced network security features such as 802. IX, DHCP snooping, VACLs, and port security

C. provide redundant Layer 3 point-to-point links between the core devices for more predictable and faster convergence

D. provide redundant aggregation for access layer devices and first-hop redundancy protocols such as VRRP

A

C. provide redundant Layer 3 point-to-point links between the core devices for more predictable and faster convergence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which two network problems indicate a need to implement QoS in a campus network? (Choose two)

A. port flapping
B. misrouted network packets
C. excess jitter
D. bandwidth-related packet loss
E. duplicate IP addresses

A

C. excess jitter
D. bandwidth-related packet loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In a Cisco SD-Access solution, what is the role of the Identity Services Engine?

A. It provides GUI management and abstraction via apps that share context.

B. It is leveraged for dynamic endpoint to group mapping and policy definition.

C. It is used to analyze endpoint to app flows and monitor fabric status.

D. It manages the LISP EID database.

A

B. It is leveraged for dynamic endpoint to group mapping and policy definition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A customer has completed the installation of a Wi-Fi 6 greenfield deployment at their new campus. They want to leverage Wi-Fi 6 enhanced speeds on the trusted employee WLAN. To configure the employee WLAN, which two Layer 2 security policies should be used? (Choose two)

A. WPA (AES)
B. WPA2 (AES) + WEP
C. 802.1X
D. OPEN

A

C. 802.1X
D. OPEN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which outcome is achieved with this Python code?

client.connect (ip, port=22,username=usr,password=pswd)
stdin,stdout,stderr = client.exec_command('show ip bgp 192.168.10100 bestpath\n')
print(stdout)

A. displays the output of the show command in a formatted way

B. connects to a Cisco device using SSH and exports the routing table information

C. connects to a Cisco device using Telnet and exports the routing table information

D. connects to a Cisco device using SSH and exports the BGP table for the prefix

A

D. connects to a Cisco device using SSH and exports the BGP table for the prefix

23
Q

What is YANG used for?

A. scraping data via CLI
B. providing a transport for network configuration data between client and server
C. processing SNMP read-only polls
D. describing data models

A

D. describing data models

24
Refer to the exhibit. [HSRP_preempt.jpg](https://www.digitaltut.com/images/ENCOR/HSRP/HSRP_preempt.jpg) Which configuration change ensures that R1 is the **active gateway** whenever it is in a **functional** state for the 172.30.110.0/24 network? Option A R1 standby 1 preempt R2 standby 1 priority 90 Option B R1 standby 1 preempt R2 standby 1 priority 100 Option C R2 standby 1 priority 100 standby 1 preempt Option D R2 standby 1 priority 110 standby 1 preempt
Option A R1 standby 1 preempt R2 standby 1 priority 90
25
Refer to the exhibit. ``` Person#1: First Name is Johnny Last Name is Table Hobbies are: * Running * Video games Person#2 First Name is Billy Last Name is Smith Hobbies are: * Napping * Reading ``` Which JSON syntax is derived from this data? Option A {‘Person’: [{‘First Name’: ‘Johnny’, ‘Last Name’: ‘Table’, ‘Hobbies’: [‘Running’, ‘Video games’]}, {‘First Name’: ‘Billy’, ‘Last Name’: ‘Smith’, ‘Hobbies’: [‘Napping’, ‘Reading’]}]} Option B {[{‘First Name’: ‘Johnny’, ‘Last Name’: ‘Table’, ‘Hobbies’: ‘Running’,’Hobbies’: ‘Video games’}, {‘First Name’: ‘Billy’, ‘Last Name’: ‘Smith’, ‘Hobbies’: ‘Napping’, ‘Hobbies’: Reading’}]} Option C {‘Person’: [{‘First Name’:’Johnny’, ‘Last Name’: ‘Table’, ‘Hobbies’: ‘Running’, ‘Video games’}, {‘First Name’: ‘Billy’, ‘Last Name’: ‘Smith’, ‘Hobbies’: ‘Napping’, ‘Reading’}]} Option D {[{‘First Name’: ‘Johnny’, ‘Last Name’: ‘Table’, ‘Hobbies’: [‘Running’, ‘Video games’]}, {‘First Name’: ‘Billy’, ‘Last Name’: ‘Smith’, ‘Hobbies’: [‘Napping’,’Reading’]}]}
Option A {‘Person’: [{‘First Name’: ‘Johnny’, ‘Last Name’: ‘Table’, ‘Hobbies’: [‘Running’, ‘Video games’]}, {‘First Name’: ‘Billy’, ‘Last Name’: ‘Smith’, ‘Hobbies’: [‘Napping’, ‘Reading’]}]}
26
An engineer creates the configuration below. Drag and drop the **authentication methods** from the left into the **order of priority** on the right. Not all options are used. R1#sh run | i aaa aaa new-model aaa authentication login default group ACE group AAA_RADIUS local-case aaa session-id common R1# [AAA_Radius_procedure.jpg](https://www.digitaltut.com/images/ENCOR/Drag_Drop/AAA_Radius_procedure.jpg)
Step 1: AAA servers of **ACE group** Step 2: AAA servers of **AAA_RADIUS group** Step 3: **local configured username** in case-sensitive format Step 4: If no method works, then **deny login**
27
Refer to the exhibit. [HSRP_default.jpg](https://www.digitaltut.com/images/ENCOR/HSRP/HSRP_default.jpg) Which two facts does the device output confirm? (Choose two) A. The device is using the default HSRP hello timer B. The standby device is configured with the default HSRP priority C. The device’s HSRP group uses the virtual IP address 10.0.3.242 D. The device is configured with the default HSRP priority E. The device sends unicast messages to its peers
A. The device is using the **default HSRP hello** timer B. The **standby** device is configured with the **default HSRP priority**
28
Based on the output below, which Python code shows the value of the “upTime” key? ``` { “response”: [{ “family”: “Routers”, “type”: “Cisco ASR 1001-X Router”, “errorCode”: null, “location”: null, “macAddress”: “00:c8:8b:80:bb:00”, “hostname”: “asr1001-x.abc.inc”, “role”: “BORDER ROUTER”, “lastUpdateTime”: 1577391299537, “serialNumber”: “FXS1932Q1SE”, “softwareVersion”: “16.3.2”, “locationName”: null, “upTime”: “49 days, 13:43:44:13”, “lastUpdated”: “2019-12-22 16:35:21” }] } ``` Option A ``` json_data = response.json() print(json_data[response][0][upTime]) ``` Option B ``` json_data = response_json() print(json_data[‘response’][‘family’][‘upTime’]) ``` Option C ``` json_data = response.json() print(json_data[‘response’][0][‘upTime’]) ``` Option D ``` json_data = json.loads(response.text) print(json_data[‘response’][‘family’][‘upTime’]) ```
Option C ``` json_data = response.json() print(json_data[‘response’][0][‘upTime’]) ```
29
Which two actions, when applied in the LAN network segment, will **facilitate Layer 3 CAPWAP discovery** for lightweight AP? (Choose two) A. Utilize DHCP option 17 B. Utilize DHCP option 43 C. Configure WLC IP address on LAN switch D. Enable port security on the switch port E. Configure an ip helper-address on the router interface
B. Utilize DHCP **option 43** E. Configure an **ip helper-address** on the router interface
30
Refer to the exhibit. [VRF_ospf.jpg](https://www.digitaltut.com/images/ENCOR/VRF/VRF_ospf.jpg) ``` R2: vrf definition hotel address-family ipv4 exit-address-family vrf definition bank address-family ipv4 exit-address-family interface Ethernet0/0 vrf forwarding bank ip address 172.16.0.4 255.255.0.0 interface Ethernet0/1 vrf forwarding hotel ip address 172.1.0.5 255.255.0.0 router ospf 42 vrf bank router-id 1.1.1.1 network 172.16.0.0 0.0.255.255 area 0 router ospf 43 vrf hotel router-id 3.3.3.3 network 172.16.0.0 0.0.255.255 area 0 R1: vrf definition bank ! address-family ipv4 exit-address-family ``` Which configuration must be applied to R1 to enable R1 to reach the server at 172.16.0.1? **Option A** ``` interface Ethernet0/0 ip address 172.16.0.7 255.255.0.0 ! router ospf 44 vrf hotel network 172.16.0.0 0.0.255.255 ``` **Option B** ``` interface Ethernet0/0 vrf forwarding bank ip address 172.16.0.7 255.255.0.0 ! router ospf 44 vrf bank network 172.16.0.0 0.0.255.255 area 0 ``` **Option C** ``` interface Ethernet0/0 vrf forwarding hotel ip address 172.16.0.7 255.255.0.0 ! router ospf 44 vrf hotel network 172.16.0.0 0.0.255.255 area 0 ``` **Option D** ``` interface Ethernet0/0 ip address 172.16.0.7 255.255.0.0 ! router ospf 44 vrf bank network 172.16.0.0 255.255.0.0 ```
**Option B** ``` interface Ethernet0/0 vrf forwarding bank ip address 172.16.0.7 255.255.0.0 ! router ospf 44 vrf bank network 172.16.0.0 0.0.255.255 area 0 ```
31
The following system log message is presented after a network administrator configures a GRE tunnel: %TUN-RECURDOWN: Interface Tunnel 0 temporarily **disabled due to recursive routing**. Why is **Tunnel 0 disabled**? A. Because the tunnel cannot reach its tunnel destination B. Because the best path to the tunnel destination is through the tunnel itself C. Because dynamic routing is not enabled D. Because the router cannot recursively identify its egress forwarding interface
B. Because the **best path** to the tunnel destination is through the **tunnel itself**
32
What is **provided by the Stealthwatch** component of the Cisco Cyber Threat Defense solution? A. real-time threat management to stop DDoS attacks to the core and access networks B. real-time awareness of users, devices and traffic on the network C. malware control D. dynamic threat control for web traffic
B. **real-time awareness of users**, devices and traffic on the network
33
How does **Protocol Independent Multicast function**? A. It uses unicast routing information to perform the multicast forwarding function. B. It uses the multicast routing table to perform the multicast forwarding function. C. In sparse mode it establishes neighbor adjacencies and sends hello messages at 5-second intervals. D. It uses broadcast routing information to perform the multicast forwarding function.
A. It **uses unicast routing** information to perform the multicast forwarding function.
34
Under which network conditions is an **outbound QoS policy** that is applied on a router WAN interface most beneficial? A. under all network conditions B. under network convergence conditions C. under interface saturation conditions D. under traffic classification and marking conditions
C. **under interface saturation** conditions
35
Which technology does VXLAN use to provide **segmentation** for **Layer 2** and **Layer 3** traffic? A. bridge domain B. VLAN C. VRF D. VNI
D. **VNI**
36
A company has an existing Cisco 5520 HA cluster using SSO. An engineer deploys a new single Cisco Catalyst **9800 WLC to test new features**. The engineer successfully configures a mobility tunnel between the 5520 cluster and 9800 WLC. Clients connected to the corporate WLAN roam seamlessly between access points on the 5520 and 9800 WLC. After a failure on the primary 5520 WLC, all WLAN services remain functional; however clients c**annot roam** between the **5520 and 9800** controllers without dropping their connection. Which feature must be configured to remedy the issue? A. mobility MAC on the 5520 cluster B. mobility MAC on the 9800 WLC C. new mobility on the 5520 cluster D. new mobility on the 9800 WLC
B. mobility **MAC** on the **9800** WLC
37
What are two methods of **ensuring** that the multicast **RPF check passes** without changing the unicast routing table? (Choose two) A. disabling BGP routing protocol B. implementing static mroutes C. disabling the interface of the router back to the multicast source D. implementing MBGP E. implementing OSPF routing protocol
B. implementing static **mroutes** D. implementing **MBGP**
38
What is the result when an active **route processor fails** in a design that combines **NSF with SSO**? A. An NSF-aware device immediately updates the standby route processor RIB without churning the network B. The standby route processor temporarily forwards packets until route convergence is complete C. An NSF-capable device immediately updates the standby route processor RIB without churning the network D. The standby route processor immediately takes control and forwards packets along known routes
D. The **standby** route processor **immediately takes control** and forwards packets along known routes
39
What is a **benefit** of a **virtual** machine when compared with a **physical** server? A. Deploying a virtual machine is technically less complex than deploying a physical server. B. Virtual machines increase server processing performance. C. The CPU and RAM resources on a virtual machine cannot be affected by other virtual machines. D. Multiple virtual servers can be deployed on the same physical server without having to buy additional hardware.
D. **Multiple virtual servers** can be deployed on the same physical server without having to buy additional hardware.
40
**What** is the wireless **received signal strength indicator**? A. The value of how strong the wireless signal is leaving the antenna using transmit power, cable loss, and antenna gain B. The value given to the strength of the wireless signal received compared to the noise level C. The value of how much wireless signal is lost over a defined amount of distance D. The value of how strong a wireless signal is received, measured in dBm
D. The value of **how strong** a wireless **signal is received**, measured in **dBm**
41
Which controller is capable of acting as a **STUN** server **during the onboarding** process of Edge devices? A. vManage B. vSmart C. vBond D. PNP server
C. **vBond**
42
What is the process for **moving a virtual machine** from one host machine to another with **no downtime**? A. live migration B. disaster recovery C. high availability D. multisite replication
A. **live** migration
43
What are two **features** of **NetFlow** flow **monitoring**? (Choose two) A. Can track ingress and egress information B. Include the flow record and the flow importer C. Copies all ingress flow information to an interface D. Does not required packet sampling on interfaces E. Can be used to track multicast, MPLS, or bridged traffic
A. **Can track ingress and egress** information E. **Can be used to track multicast, MPLS, or bridged traffic**
44
Which method should an engineer use to deal with a **long-standing contention** issue between any two VMs on the same host? A. Adjust the resource reservation limits B. Reset the host C. Reset the VM D. Live migrate the VM to another host
A. **Adjust the resource reservation** limits
45
What is the **recommended MTU** size for a Cisco **SD-Access** Fabric? A. 4464 B. 9100 C. 1500 D. 17914
B. **9100**
46
What does the **number** in an **NTP stratum** level represent? A. The number of hops it takes to reach the master time server. B. The amount of drift between the device clock and true time. C. The amount of offset between the device clock and true time. D. The number of hops it takes to reach the authoritative time source.
D. The **number of hops** it takes to **reach the authoritative** time source.
47
Refer to the exhibit. [IP_SLA_reachability.jpg](https://www.digitaltut.com/images/ROUTE/IP_SLA/IP_SLA_reachability.jpg) ``` R1(config)#ip sla 1 R1(config-ip-sla)#icmp-echo 172.20.20.2 source-interface FastEthernet1/0 R1(config-ip-sla-echo)#timeout 5000 R1(config-ip-sla-echo)#frequency 10 R1(config-ip-sla-echo)#threshold 500 R1(config)#ip sla schedule 1 start-time now life forever R1(config)#track 10 ip sla 1 reachability R1(config)#ip route 0.0.0.0 0.0.0.0 172.20.20.2 ``` After implementing the configuration 172.20.20.2 **stops replaying to ICMP echoes**, but the default route fails to be removed. What is the reason for this behavior? A. The source-interface is configured incorrectly. B. The destination must be 172.30.30.2 for icmp-echo C. The default route is missing the track feature D. The threshold value is wrong
C. The **default route is missing** the track feature
48
Refer to the exhibit. [Antenna](https://www.digitaltut.com/images/ENCOR/Wireless/dipole_atenna_pattern.jpg) Which type of **antenna** is show on the **radiation** patterns? A. Dipole B. Yagi C. Patch D. Omnidirectional
A. **Dipole**
49
[Characteristics of PIM dense mode](https://www.digitaltut.com/images/ENCOR/Drag_Drop/PIM_Dense_mode.jpg)
**PIM Dense Mode**: + builds **source-based** distribution trees + uses a **push model** to distribute multicast traffic + uses **prune mechanisms** to stop unwanted multicast traffic
50
Refer to the exhibit. [VRRP_interfaces.jpg](https://www.digitaltut.com/images/ENCOR/VRRP/VRRP_interfaces.jpg) Edge-01 ``` track 10 interface GigabitEthernet0/0 line-protocol ! interface GigabitEthernet0/1 ip address 10.104.110.2 255.255.255.0 vrrp 10 ip 10.104.110.100 vrrp 10 priority 120 ``` Edge-02 ``` interface GigabitEthernet0/1 ip address 10.104.110.3 255.255.255.0 vrrp 10 ip 10.104.110.100 ``` Object **tracking** has been configured for **VRRP** enabled routers Edge-01 and Edge-02. Which commands cause Edge-02 to preempt Edge-01 in the event that interface G0/0 goes down on Edge-01? Option A Edge-01(config)#interface G0/1 Edge-01(config-if)#vrrp 10 track 10 decrement 10 Option B Edge-02(config)#interface G0/1 Edge-02(config-if)#vrrp 10 track 10 decrement 30 Option C Edge-02(config)#interface G0/1 Edge-02(config-if)#vrrp 10 track 10 decrement 10 Option D Edge-01(config)#interface G0/1 Edge-01(config-if)#vrrp 10 track 10 decrement 30
Option D Edge-01(config)#interface G0/1 Edge-01(config-if)#vrrp 10 **track 10 decrement 30**
51
Which protocol is implemented to establish **secure control plane** adjacencies between Cisco **SD-WAN** nodes? A. IKE B. DTLS C. IPsec D. ESP
B. **DTLS**
52
Refer to the exhibit. ``` flow monitor FLOW-MONITOR-1 record netflow ipv6 original-input exit ! sampler SAMPLER-1 mode deterministic 1 out-of 2 exit ! ip cef ipv6 cef ! interface GigabitEthernet0/0/0 ipv6 address 2001:DB8:2:ABCD::2/48 ipv6 flow monitor FLOW-MONITOR-1 sampler SAMPLER-1 input ``` What is the **effect** of introducing the **sampler feature** into the Flexible NetFlow configuration on the router? A. NetFlow updates to the collector are sent 50% less frequently. B. Every second IPv4 packet is forwarded to the collector for inspection. C. CPU and memory utilization are reduced when compared with what is required for full NetFlow. D. The resolution of sampling data increases, but it requires more performance from the router.
C. **CPU and memory utilization** are **reduced** when compared with what is required for full NetFlow.
53
When does a stack **master lose its role**? A. When the priority value of a stack member is changed to a higher value B. When a switch with a higher priority is added to the stack C. When the stack master is reset D. When a stack member fails
C. When the stack **master is reset**
54
What is the calculation that is used to measure the radiated **power of a signal after it has gone through the radio, antenna cable, and antenna**? A. dBi B. mW C. dBm D. EIRP
D. EIRP