Study Guide Flashcards
(184 cards)
What is a benfit of data modeling languages like YANG?
A. They enable programmers to change or write their own application within the device operating system.
B. They create more secure and efficient SNMP OIDs.
C. They make the CLI simpler and more efficient.
D. They provide a standardized data structure, which results in configuration scalability and consistency.
D. They provide a standardized data structure, which results in configuration scalability and consistency.
A customer has several small branches and wants to deploy a Wi-Fi solution with local management using CAPWAP. Which deployment model meets this requirement? A. Autonomous B. Mobility express C. SD-Access wireless D. Local Mode
B. Mobility express.
Mobility express is the aility to use an access point (AP) as a controller instead of a real WLAN controller. This solution is only suitable for small to midsize, or multi-site branch locations where you might not want to invest in a dedicated WLC.
Which statement about agent-based versus agentless configuration management tools is true?
A. Agentless tools require no messaging systems between master and slaves.
B. Agentless tools use proxy nodes to interface with slave nodes.
C. Agent-based tools do not require a high-level language interpreter such as Python or Ruby on slave nodes.
D. Agent-based tools do not require installation of additional software packages on the slave nodes.
C. Agent-based tools do not require a high-level language interpreter such as Python or Ruby on slave nodes.
Agentless tool means that no software or agent needs to be installed on the client machines that are to be managed. Ansible is an example of an agentless tool.
On which protocol or technology is the fabric data plane based in Cisco SD-Access fabric? A. LISP B. IS-IS C. Cisco TrustSec D. VXLAN
D. VXLAN
VXLAN (Virtual Extensible LAN) can be forwarded by any IP-based network and creates the overlay network for the SD-Access fabric. Using VXLAN allows the SD-Access fabric to support Layer 2 and Layer 3 virtuial topologies (overlays).
When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?
A. logging host 10.2.3.4 vrf mgmt transport tcp port 6514
B. logging host 10.2.3.4 vrf mgmt transport udp port 6514
C. logging host 10.2.3.4 vrf mgmt transport tcp port 514
D. logging host 10.2.3.4 vrf mgmt transport udp port 514
A. logging host 10.2.3.4 vrf mgmt transport tcp port 6514
The TCP port 6514 has been allocated as the syslog over TLS.
A client device fails to see the enterprise SSID, but other device are connected to it. What is the cause of this issue?
A. The hidden SSID was not manually configured on the client.
B. The broadcast SSID was not manually configured on the client.
C. The client has incorrect credentials stored for the configured hidden SSID.
D. The client has incorrect credentials stored for the configured broadcast SSID.
A. The hidden SSID was not manually configured on the client.
Which function does a fabric edge node perform in an SD-Access deployment?
A. Connects the SD-Access fabric to another fabric or external Layer 3 networks.
B. Connects endpoints to the fabric and forwards their traffic.
C. Provides reachabiity border nodes in the fabric underlay.
D. Encapsulates end-user data traffic into LISP.
B. Connects endpoints to the fabric and forwards their traffic.
There are five device roles in the fabric overlay:
Control plane node - Contains the settings, protocols, and mapping tables to provide the endpoint-to-location mapping system for the fabric overlay.
Fabric Border Node - Connects external Layer 3 networks to the SDA fabric.
Fabric Edge Node - Connects wired endpoints to the SDA fabric.
Fabric WLAN Controller (WLC) - Connects APs and wireless endpoints to the SDA fabric.
Intermediate Nodes - Intermediate routers or extended switches that do not provide any sort of SD-Access fabric role other than underlay services.
Which two methods are used by an AP that is trying to discover a wireless LAN controller? (choose two)
A. Cisco Discovery Protocol neighbor
B. Broadcasting on the local subnet
C. DNS lookup cisco-DNA-PRIMARY.local domain
D. DHCP Option 43
E. Querying other APs
B and D.
B - Broadcasting on the local subnet
D - DHCP Option 43
Which statement describes the IP and MAC allocation requirements for virtual machines on Type 1 hypervisors?
A. Each virtual machine requires a unique IP and MAC addresses to be able to reach to other nodes.
B. Each virtual machine requires a unique IP address but shares the MAC address with the physical server.
C. Each virtual machine requires a unique IP address but shares the MAC address with the address of the physical server.
D. Each virtual machine requires a unique MAC address but shares the IP address with the physical server.
A. Each virtual machine requires a unique IP and MAC address to be able to reach to other nodes.
In Type 1 hypervisor (or native hypervisor), the hypervisor is installed directly on the physical server (VMware vSphere/ESXi, Oracle VM, KVM, and Hyper-V).
Which LISP infrastucture device provides connectivity between non-sites and LISP sites by receiving non-LISP traffic with a LISP site destination? A. PETR B. PITR C. map resolver D. map server
B. PITR
Proxy Ingress Tunnel Router (PITR) is an infrastructure LISP network entity that receives packets from non-LISP sites and encapsulates the packets to LISP sites or natively forwards them to non-LISP sites.
In OSPF, which LAS type is responsible for pointing to the ASBR router? A. type 1 B. type 2 C. type 3 D. type 4
D. Type 4
Summary ASBR LSA (Type 4) is generated by the ABR to describe an ASBR to routers in other areas so that routers in other areas know how to get to external routes through that ASBR.
An engineer configures a WLAN with fast transition enabled. Some legacy clients fail to connect to this WLAN. Which feature allows the legacy clients to connect while still allowing other clients to use fast transition based on their OLTI's? A. over the DS B. adaptive R C. 802.11v D. 802.11k
B. adaptive R
802.11r Fast Transition (FT) Roaming is a new concept for roaming. The initial handshake with the new AP occurs before the client roams to the target AP. Hence, fast transition.
What is the JSON syntax for the following data? Name Bob Johnson Age 75 Is alive Favorite Foods are cereal, mustard, and onions. A. Name: Bob, Johnson... B. Name" , "Bob Johnson"... C. Name', 'Bob Johnson,' ... D. Name", "Bob Johnson" ... E. {"Name" : "Bob Johnson" ...
E. {“Name” : “Bob Johnson” , “age” : 75, “alive” : true, “favorite foods” :[“Cereal” , “Mustard” , “Onions”]}
If a VRRP master router fails, which router is selected as the new master router?
A. router with the highest priority
B. router with the highest loopack address
C. router with the lowest loopback address
D. router with the lowest priority
A. router with the highest priority
Refer to the exhibit. Which type of antenna do the radiation patterns represent? A. Patch C. Omnidirectional C. Yagi D. Dipole
A. Patch
A patch antenna, in its simplest form, is just a single rectangular (or circular) conductive plate that is spaced above a ground plane. Patch antennas are attractive due to their low profile and ease of fabrication.
What do Cisco DNA southbound APIs provide?
A. Interface between the controller and the network devices.
B. NETCONF API interface for orchestration communication.
C. RESTful API interface for orchestrator communication.
D. Interface between the controller and the consumer.
A. Interface between the controller and the network devices.
To increase total throughput and redundancy on the links between the wireless controller and the switch, the customer enabled LAG on the wireless controller. Which EtherChannel mode must be configured on the switch to allow the WLC to connect? A. Auto B. Active C. On D. Passive
C. On
LAG requires the EtherChannel to be configured for “mode on” on both the controller and the catalyst switch.
Which description of an SD-Access wireless network infrastructure deployment is true?
A. The access point is part of the fabric underlay
B. The WLC is part of the fabric underlay
C. The access point is part of the fabric overlay
D. The wireless client is part of the fabric overlay
C. The access point is part of the fabric overlay.
Which method displays text directly into the active console with a synchronous EEM applet policy? event manager applet boom event syslog pattern 'UP' action 1.0 ... A. gets 'logging directly to console' B. syslog priority direct msg 'log directly to console' C. puts 'logging directly to console' D. string 'logging directly to console'
C. action 1.0 puts ‘logging directly to console’
What is the difference between a RIB and a FIB?
A. The RIB is used to make IP source prefic-based switching decisions
B. The FIB is where all IP routing information is stored.
C. The RIB maintains a mirror image of the FIB.
D. The FIB is populated based on RIB content.
D. The FIB is populated based on RIB content.
CEF uses a Forwarding Information Base (FIB) to make IP destination prefix-based switching decisions. RIB is in the control plane, FIB is in the data plane.
Which PAgP mode combination prevents an Etherchannel from forming? A. auto/auto B. desirable/desirable C. auto/desirable D. desirable
A. auto/auto
There are two PAgP modes:
Auto - Responds to PAgP messages but does not aggressively negotiate an Etherchannel, unless the other end is set to desirable.
Desirable - Actively negotiates Etherchannel with the other end of the link no matter if it is auto or desirable.
In which part of the HTTP message is the content type specified? A. HTTP method B. URL C. header D. body
C. header
What is the correct EBGP path attribute list, ordered from most preferred to the least preferred that the BGP best-path algorithm uses?
A. weight, AS path, local preference, MED
B. weight, local preference, AS path, MED
C. local preference, weight, AS path, MED
D. local preference, weight, MED, AS path
B. weight, local preference, AS path, and MED Path selection order for EBGP: 1. Weight 2. Local Preference 3. Originate 4. AS Path 5. Origin 6. MED 7. External 8. IGP Cost 9. eBGP Peering 10. Router ID
Which statement about multicast RPs is true?
A. RPs are required only when using protocol independent multicast dense mode
B. RPs are required for protocol independent multicast sparse mode and dense mode
C. By default, the RP is needed periodically to maintain sessions with sources and receivers.
D. By default, the RP is needed only to start new sessions with sources and receivers.
D. By default, the RP is needed only to start new sessions with sources and receivers.
A rendezvous point (RP) is required only in networks running protocol independent multicast sparse mode (PIM-SM). By default, the RP is needed only to start new sessions with sources and receivers.