Which Cisco FlexConnect state allows wireless users that are connected to the network to continue working after the connection to the WLC has been lost?
Refer to the exhibit. An engineer must configure an eBGP neighborship to Router B on Router A. The network that is connected to GO/1 on Router A must be advertised to Router B. Which configuration should be applied?
A)
B)
C)
D)
Refer to the exhibit. An attacker can advertise OSPF fake routes from 172.16.20.0 network to the OSPF domain and black hole traffic. Which action must be taken to avoid this attack and still be able to advertise this subnet into OSPF?
What is a characteristics of traffic policing?
What is a TLOC in a Cisco SD-WAN deployment?
What is the recommended minimum SNR for data applications on wireless networks?
Drag and drop the characteristics from the left onto the deployment types on the right.
An engineer must configure an EXEC authorization list that first checks a AAA server then a local username. If both methods fail, the user is denied. Which configuration should be applied?
A Cisco DNA Center REST API sends a PUT to the /dna/intent/api/v1/network-device endpoint A response code of 504 is received What does the code indicate?
An engineer must configure an ACL that permits packets which include an ACK in the TCP header Which entry must be included in the ACL?
Refer to the exhibit.
How should the script be completed so that each device configuration is saved into a JSON-formatted file under the device name?
A)
B)
C)
D)
A network engineer is configuring OSPF on a router. The engineer wants to prevent having a route to 177.16.0.0/16 learned via OSPF. In the routing table and configures a prefix list using the command ip prefix-list OFFICE seq S deny 172.16.0.0/16. Winch two identical configuration commands must be applied to accomplish the goal? (Choose two.)
What is the API keys option for REST API authentication?
Refer the exhibit.
Which configuration elects SW4 as the root bridge for VLAN 1 and puts G0/2 on SW2 into a blocking state?
A)
B)
C)
D)
Refer to the exhibit. A network engineer checks connectivity between two routers. The engineer can ping the remote endpoint but cannot see an ARP entry. Why is there no ARP entry?
Refer to the exhibit. An engineer tries to log in to router R1. Which configuration enables a successful login?
A)
B)
C)
D)
An engineer is configuring Local WebAuth on a Cisco Wireless LAN Controller. According to RFC 5737, WHICH VIRTUAL IP address must be used in this configuration?
Refer to the exhibit.
An engineer entered the command no spanning-tree bpduguard enable on interface Fa 1/0/7. What is the effect of this command on Fa 1/0/7?
Which resource is able to be shared among virtual machines deployed on the same physical server?
Refer to the exhibit.
What is the result of the API request?
Refer to the exhibit. Which configuration must be added to enable GigabitEthemet 0/1 to participate in OSPF?
Refer to the exhibit.
Which command set must be applied on R1 to establish a BGP neighborship with R2 and to allow communication from R1 to reach the networks?
A)
B)
C)
D)
A large campus network has deployed two wireless LAN controllers to manage the wireless network. WLC1 and WLC2 have been configured as mobility peers. A client device roams from AP1 on WLC1 to AP2 on WLC2, but the controller's client interfaces are on different VLANs. How do the wireless LAN controllers handle the inter-subnet roaming?
What is one benefit of adopting a data modeling language?
Refer to the exhibit.
Object tracking has been configured for VRRP-enabled routers Edge-01 and Edge-02 Which commands cause Edge-02 to preempt Edge-01 in the event that interface G0/0 goes down on Edge-01?
A)
B)
C)
D)
Refer to the exhibit. An engineer has configured an IP SLA for UDP echo’s. Which command is needed to start the IP SLA to test every 30 seconds and continue until stopped?
Refer to the exhibit.
After configuring the BGP network, an engineer verifies that the path between Servers and Server2 Is functional. Why did RouterSF choose the route from RouterDAL instead of the route from RouterCHI?
Which IPv4 packet field carries the QoS IP classification marking?
What is the purpose of an RP in PIM?
Refer to the exhibit. A network administrator configured RSPAN to troubleshoot an issue between switch1 and switch2. The switches are connected using interface GigabitEthernet 1/1. An external packet capture device is connected is switch2 interface GigabitEthernet 1/2. Which two commands must be added to complete this configuration? (Choose two)
Which type of tunnel Is required between two WLCs to enable Intercontroller roaming?
An administrator is configuring NETCONF using the following XML string. What must the administrator end the request with?
Which option must be used to support a WLC with an IPv6 management address and 100 Cisco Aironet 2800 Series access points that will use DHCP to register?
Drag and drop the characteristics from the left onto the infrastructure deployment models on the right.
Refer to the exhibit.
The port channel between the switches does not work as expected. Which action resolves the issue?
Which configuration creates a CoPP policy that provides unlimited SSH access from dient 10.0.0.5 and denies access from all other SSH clients'?
A)
B)
C)
D)
What happens when a FlexConnect AP changes to standalone mode?
Refer to the exhibit. Which configuration must be implemented to establish EBGP peering between R1 and R2?
Refer to the exhibit.
What is the effect of introducing the sampler feature into the Flexible NetFlow configuration on the router?
The Gig0/0 interface of two routers is directly connected with a 1G Ethernet link. Which configuration must be applied to the interface of both routers to establish an OSPF adjacency without maintaining a DR/BDR relationship?
A)
B)
C)
D)
What does the number in an NTP stratum level represent?
Which function does a fabric wireless LAN controller perform In a Cisco SD-Access deployment?
What is the calculation that is used to measure the radiated power of a signal after it has gone through the radio, antenna cable, and antenna?
Refer to The exhibit.
Assuming that R1 is a CE router, which VRF is assigned to Gi0/0 on R1?
Which benefit is provided by the Cisco DNA Center telemetry feature?
Refer to the exhibit. What is achieved by this code?
What is an emulated machine that has dedicated compute memory, and storage resources and a fully installed operating system?
Refer to the exhibit. A network engineer must block Telnet traffic from hosts in the range of 10.100 2.248 to 10.100.2 255 to the network 10.100.3.0 and permit everything else. Which configuration must the engineer apply'?
A)
B)
C)
D)
Which two characteristics apply to the endpoint security aspect of the Cisco Threat Defense architecture? (Choose two.)
An engineer must configure a router to leak routes between two VRFs Which configuration must the engineer apply?
What is a characteristic of a Type I hypervisor?
Which option works with a DHCP server to return at least one WLAN management interface IP address during the discovery phase and is dependent upon the VCI of the AP?
What is a characteristic of a type 2 hypervisor?
Refer to the exhibit. A network engineer must be notified when a user switches to configuration mode. Which script should be applied to receive an SNMP trap and a critical-level log message?
A)
B)
C)
D)
Drag and drop the automation characteristics from the left onto the appropriate tools on the right.
Drag and drop the LIPS components on the left to the correct description on the right.
What are the main components of Cisco TrustSec?
What is used to validate the authenticity of the client and is sent in HTTP requests as a JSON object?
In a Cisco SD-Access wireless architecture which device manages endpoint ID to edge node bindings?
In a Cisco Catalyst switch equipped with two supervisor modules an administrator must temporally remove the active supervisor from the chassis to perform hardware maintenance on it. Which mechanism ensure that the active supervisor removal is not disruptive to the network operation?
Drag and drop the characteristics from the left onto the technology types on the right.
What is one main REST security design principle?
What is one characteristic of the Cisco SD-Access control plane?
Which configuration restricts the amount of SSH traffic that a router accepts to 100 kbps?
A)
B)
C)
D)
What is a client who is running 802.1x for authentication reffered to as?
Refer to the exhibit.
Assuming all links are functional, which path does PC1 take to reach DSW1?
Simulation 04
What is a characteristics of Cisco SD-WAN?
Refer to the exhibit Which configuration enables password checking on the console line, using only a password?
A)
B)
C)
D)
A network engineer wants to configure console access to a router without using AAA so that the privileged exec mode is entered directly after a user provides the correct login credentials. Which action achieves this goal?
Refer to the exhibit.
What does the response "204 No Content mean for the REST API request?
Refer to the exhibit. R1 and R2 are directly connected, but the BGP session does not establish. Which action must be taken to build an eBGP session?
In which way are EIGRP and OSPF similar?
Where is the wireless LAN controller located in a mobility express deployment?
Refer to the exhibit. What is the result of this Python code?
Drag and drop the characteristics from the left onto the deployment models on the right.
By default, which virtual MAC address does HSRP group 41 use?
What is one being of implementing a data modetag language?
What is a command-line tool for consuming REST APIs?
What is a characteristics of VXLAN?
Refer to the exhibit.
Which action must be taken to configure a WLAN for WPA2-AES with PSK and allow only 802.l1r-capable clients to connect?
Drag and drop the automation characteristics from the left onto the corresponding tools on the right.
A company recently decided to use RESTCONF instead of NETCONF and many of their NETCONF scripts contain the operation
A company hires a network architect to design a new OTT wireless solution within a Cisco SD-Access Fabric wired network. The architect wants to register access points to the WLC to centrally switch the traffic. Which AP mode must the design include?
What does a YANG model provide?
: 264
What is a characteristic of para-virtualization?
Which Python library is used to work with YANG data models via NETCONF?
Refer to the exhibit What does this Python script do?
Which signal strength and noise values meet the minimum SNR for voice networks?
Drag and drop the code snippets from the bottom onto the blanks in the Python script to print the device model to the screen and write JSON data to a file Not all options are used
A script contains the statement "while loop != 999:" Which value terminates the loop?
What is an advantage of utilizing data models in a multivendor environment?
Refer to the exhibit. Why was the response code generated?
Refer to the exhibit.
Which configuration enables fallback to local authentication and authorization when no TACACS+ server is available?
Which two methods are used by an AP that is typing to discover a wireless LAN controller? (Choose two.)
Drag the characteristics from the left onto the routing protocols they describe on the right.
Refer to the exhibit. Which command set enables router R2 to be configured via NETCONF?
A)
B)
C)
D)
How does Protocol Independent Multicast function?
Which activity requires access to Cisco DNA Center CLI?
An engineer is connected to a Cisco router through a Telnet session. Which command must be issued to view the logging messages from the current session as soon as they are generated by the router?
Refer to the exhibit.
Which statement is needed to complete the EEM applet and use the Tel script to store the backup file?
Why would a small or mid-size business choose a cloud solution over an on-premises solution?
Which DNS lookup does an access point perform when attempting CAPWAP discovery?
: 194
Refer to the exhibit.
Which type of antenna is shown on the radiation patterns?
Refer to the exhibit An engineer is troubleshooting a newly configured BGP peering that does not establish What is the reason for the failure?
Simulation 01
BGP connectivity exists between Headquarters and both remote sites; however, Remote Site 1 cannot communicate with Remote Site 2. Configure BGP according to the topology to
goals:
1. Configure R1 and R3 under the BGP process to provide reachability between Remote Site 1 and Remote Site 2. No configuration changes are permitted on R2.
2. Ensure that the /32 networks at Remote Site 1 and Remote Site 2 can ping each other.
R1
R3
Which JSON script is properly formatted?
A)
B)
C)
D)
Which Python code snippet must be added to the script to store the changed interface configuration to a local JSON-formatted file?
Which configuration protects the password for the VTY lines against over-the-shoulder attacks?
Refer to the exhibit. What are two results of the NAT configuration? (Choose two.)
Which device is responsible for finding EID-to-RLOC mappings when traffic is sent to a LISP-capable site?
Refer to the exhibit.
Which GRE tunnel configuration command is missing on R2?
What is the function of vBond in a Cisco SD-WAN deployment?
Which IP SLA operation requires the IP SLA responder to be configured on the remote end?
Refer to the exhibit. An engineer must configure an ERSPAN tunnel that mirrors traffic from linux1 on Switch1 to Linux2 on Switch2. Which command must be added to the destination configuration to enable the ERSPAN tunnel?
Refer to the exhibit.
Which result Is achieved by the CoPP configuration?
Drag and drop the characteristics from the left onto the switching architectures on the right.
When a branch location loses connectivity, which Cisco FlexConnect state rejects new users but allows existing users to function normally?
Simulation 09
Which mobility role is assigned to a client in the client table of the new controller after a Layer 3 roam?
An engineer must configure Interface and sensor monitoring on a router. The NMS server is located in a trusted zone with IP address 10.15.2.19. Communication between the router and the NMS server must be encrypted and password-protected using the most secure algorithms. Access must be allowed only for the NMS server and with the minimum permission levels needed. Which configuration must the engineer apply?
A)
B)
C)
D)
Refer to the exhibit. Which configuration set implements Control plane Policing for SSH and Telnet?
Which two features are available only in next-generation firewalls? (Choose two.)
Refer to the exhibit. Which configuration is required to summarize the Area 2 networks that are advertised to Area 0?
Which two security features are available when implementing NTP? (Choose two.)
When using BFD in a network design, which consideration must be made?
Refer to the exhibit.
An engineer must configure static NAT on R1 lo allow users HTTP access to the web server on TCP port 80. The web server must be reachable through ISP 1 and ISP 2. Which command set should be applied to R1 to fulfill these requirements?
A network monitoring system uses SNMP polling to record the statistics of router interfaces The SNMP queries work as expected until an engineer installs a new interface and reloads the router After this action, all SNMP queries for the router fail What is the cause of this issue?
Refer to the exhibit.
CR2 and CR3 ate configured with OSPF. Which configuration, when applied to CR1. allows CR1 to exchange OSPF Information with CR2 and CR3 but not with other network devices or on new Interfaces that are added to CR1?
A)
B)
C)
D)
Refer to the exhibit.
An engineer must configure HSRP for VLAN 1000 on SW2. The secondary switch must immediately take over the role of active router If the interlink with the primary switch fails. Which command set completes this task?
A)
B)
C)
D)
Which two parameters are examples of a QoS traffic descriptor? (Choose two)
Refer to the exhibit.
Which JSON syntax is derived from this data?
A)
B)
C)
D)
Which LISP device is responsible for publishing EID-to-RLOC mappings for a site?
What are two common sources of interference for Wi-Fi networks? (Choose two.)
Refer to the exhibit.
What is required to configure a second export destination for IP address 192.168.10.1?
Refer to the exhibit.
The trunk does not work over the back-to-back link between Switch1 interface Giq1/0/20 and Switch2 interface Gig1/0/20. Which configuration fixes the problem?
A)
B)
C)
D)
What is a benefit of Type 1 hypervisors?
How is a data modeling language used?
What is a VPN in a Cisco SD-WAN deployment?
Refer to the exhibit. Which result does the python code achieve?
Refer to the exhibit.
What is the result when a switch that is running PVST+ is added to this network?
The login method is configured on the VTY lines of a router with these parameters.
Which configuration accomplishes this task?
What is the responsibility of a secondary WLC?
Which two characteristics define the Intent API provided by Cisco DNA Center? (Choose two.)
What is the structure of a JSON web token?
Refer to the exhibit.
An engineer is designing a guest portal on Cisco ISE using the default configuration. During the testing phase, the engineer receives a warning when displaying the guest portal. Which issue is occurring?
A network engineer is adding an additional 10Gps link to an exiting 2x10Gps LACP-based LAG to augment its capacity. Network standards require a bundle interface to be taken out of service if one of its member links goes down, and the new link must be added with minimal impact to the production network. Drag and drop the tasks that the engineer must perform from the left into the sequence on the right. Not all options are used.
Refer to the exhibit. Router BRDR-1 is configured to receive the 0.0.0.0/0 and 172.17.1.0/24 network via BGP and advertise them into OSPF are 0. An engineer has noticed that the OSPF domain is receiving only the 172.17.1.0/24 route and default route 0.0.0.0/0 is still missing. Which configurating must engineer apply to resolve the problem?
Refer to the exhibit.
An engineers reaching network 172 16 10 0/24 via the R1-R2-R4 path. Which configuration forces the traffic to take a path of R1-R3-R4?
A)
B)
C)
D)
In a three-tier hierarchical campus network design, which action is a design best-practice for the core layer?
A vulnerability assessment highlighted that remote access to the switches is permitted using unsecure and unencrypted protocols Which configuration must be applied to allow only secure and reliable remote access for device administration?
Refer to the exhibit. A network operator is attempting to configure an IS-IS adjacency between two routers, but the adjacency cannot be established. To troubleshoot the problem, the operator collects this debugging output. Which interfaces are misconfigured on these routers?
Why would an engineer use YANG?
Drag and drop the snippets onto the blanks within the code to construct a script that configures BGP according to the topology. Not all options are used, and some options may be used twice.
Refer to the exhibit.
The network administrator must be able to perform configuration changes when all the RADIUS servers are unreachable. Which configuration allows all commands to be authorized if the user has successfully authenticated?
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
Refer to the exhibit.
Which IP address becomes the active next hop for 192.168.102 0/24 when 192.168.101.2 fails?
Refer to the exhibit.
After the code is run on a Cisco IOS-XE router, the response code is 204.
What is the result of the script?
In a Cisco SD-WAN solution, how Is the health of a data plane tunnel monitored?
Refer to the exhibit.
An engineer reconfigures the pot-channel between SW1 and SW2 from an access port to a trunk and immediately notices this error in SW1's log.
Which command set resolves this error?
A)
B)
C)
D)
Refer to the exhibit.
Which code results in the working Python script displaying a list of network devices from the Cisco DNA Center?
What is required for intercontroller Layer 3 roaming?
How does a fabric AP fit in the network?
What do Cisco DNA southbound APIs provide?
Refer the exhibit.
Which router is the designated router on the segment 192.168.0.0/24?
How are map-register messages sent in a LISP deployment?
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
Refer to the exhibit.
An engineer configures OSPF and wants to verify the configuration Which configuration is applied to this device?
A)
B)
C)
D)
In a Cisco SD-WAN solution, which two functions are performed by OMP? (Choose two.)
How does CEF switching differ from process switching on Cisco devices?
Which element enables communication between guest VMs within a virtualized environment?
Which technology uses network traffic telemetry, contextual information, and file reputation to provide insight into cyber threats?
Refer to the exhibit. Which configuration must be applied to R1 to enable R1 to reach the server at 172.16.0.1?
Which threat defence mechanism, when deployed at the network perimeter, protects against zero-day attacks?
Which NGFW mode block flows crossing the firewall?
Drag and drop the descriptions from the left onto the QoS components they describe on the right.
Drag and drop the characteristics from the left onto the infrastructure deployment models on the right.
Refer to the exhibit.
Which two facts does the device output confirm? (Choose two.)
The login method is configured on the VTY lines of a router with these parameters
Which configuration accomplishes this task?
Which cisco DNA center application is responsible for group-based accesss control permissions?
A customer wants to use a single SSID to authenticate loT devices using different passwords. Which Layer 2 security type must be configured in conjunction with Cisco ISE to achieve this requirement?
When is the Design workflow used In Cisco DNA Center?
Refer to the exhibit.
A company requires that all wireless users authenticate using dynamic key generation. Which configuration must be applied?
Drag and drop the tools from the left onto the agent types on the right.
Which access point mode allows a supported AP to function like a WLAN client would, associating and identifying client connectivity issues?
Refer to the exhibit.
Which type of antenna does the radiation pattern represent?
Refer to the exhibit.
Which command must be applied to Router 1 to bring the GRE tunnel to an up/up state?
Refer to the Exhibit.
An engineer is installing a new pair of routers in a redundant configuration. When checking on the standby status of each router the engineer notices that the routers are not functioning as expected. Which action will resolve the configuration error?
In which two ways does TCAM differ from CAM? (Choose two.)
Which characteristic distinguishes Ansible from Chef?
Refer to Exhibit.
MTU has been configured on the underlying physical topology, and no MTU command has been configured on the tunnel interfaces. What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared?
Which component of the Cisco Cyber Threat Defense solution provides user and flow context analysis?
Drag and drop the Qos mechanisms from the left to the correct descriptions on the right
Refer to the exhibit. Communication between London and New York is down. Which command set must be applied to the NewYork switch to resolve the issue?
A)
B)
C)
D)
What is the output of this code?
Which three methods does Cisco DNA Centre use to discover devices? (Choose three)
Refer to the exhibit How was spanning-tree configured on this interface?
Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel?
Refer to the exhibit. External users require HTTP connectivity to an internal company web server that is listening on TCP port 8080. Which command set accomplishes this requirement?
A)
B)
C)
D)
E)
When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required?
What is the function of a VTEP in VXLAN?
What is the purpose of the LISP routing and addressing architecture?
Refer to the exhibit.
An engineer must deny HTTP traffic from host A to host B while allowing all other communication between the hosts, drag and drop the commands into the configuration to achieve these results. Some commands may be used more than once. Not all commands are used.
When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?
Which device makes the decision for a wireless client to roam?
Drag and drop the virtual components from the left onto their deceptions on the right.
Which three elements determine Air Time efficiency? (Choose three)
Which AP mode allows an engineer to scan configured channels for rogue access points?
An engineer must provide wireless converge in a square office. The engineer has only one AP and believes that it should be placed it in the middle of the room. Which antenna type should the engineer use?
Which design principle slates that a user has no access by default to any resource, and unless a resource is explicitly granted, it should be denied?
What does the cisco DNA REST response indicate?
Which line must be added in the Python function to return the JSON object {"cat_9k": “FXS193202SE")?
A)
B)
C)
D)
Which devices does Cisco DNA Center configure when deploying an IP-based access control policy?
Refer to the exhibit.
An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as the exit point. Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplish task?
Refer to the exhibit.
An engineer must create a configuration that executes the show run command and then terminates the session when user CCNP legs in. Which configuration change is required?
Refer to the exhibit. Which set of commands on router r R1 Allow deterministic translation of private hosts PC1, PC2, and PC3 to addresses in the public space?
A)
B)
C)
D)
Refer to exhibit.
VLANs 50 and 60 exist on the trunk links between all switches All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server Which command ensures that SW3 receives frames only from VLAN 50?
An engineer must configure HSRP group 300 on a Cisco IOS router. When the router is functional, it must be the must be the active HSRP router. The peer router has been configured using the default priority value. Which command set is required?
A)
B)
C)
D)
which entity is a Type 1 hypervisor?
Which entity is responsible for maintaining Layer 2 isolation between segments In a VXLAN environment?
An engineer has deployed a single Cisco 5520 WLC with a management IP address of 172.16.50.5/24. The engineer must register 50 new Cisco AIR-CAP2802I-E-K9 access points to the WLC using DHCP option 43. The access points are connected to a switch in VLAN 100 that uses the 172.16.100.0/24 subnet. The engineer has configured the DHCP scope on the switch as follows:
The access points are failing to join the wireless LAN controller. Which action resolves the issue?
Refer to the exhibit.
A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Which two configuration changes accomplish this? (Choose two).
Drag and drop the characteristics from the left onto the orchestration tools they describe on the right.
Which outbound access list, applied to the WAN interface of a router, permits all traffic except for http traffic sourced from the workstation with IP address 10.10.10.1?
A)
B)
C)
D)
What is one benefit of implementing a VSS architecture?
An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:
Which two statements does the engineer use to explain these values to the customer? (Choose two)
Refer to the exhibit.
An engineer must deny Telnet traffic from the loopback interface of router R3 to the loopback interface of router R2 during the weekend hours. All other traffic between the loopback interfaces of routers R3 and R2 must be allowed at all times. Which command accomplish this task?
A)
B)
C)
D)
What is the function of the LISP map resolver?
Refer to the exhibit.
An engineer must modify the access control list EGRESS to allow all IP traffic from subnet 10.1.10.0/24 to 10.1.2.0/24. The access control list is applied in the outbound direction on router interface GigabitEthemet 0/1. Which configuration commands can the engineer use to allow this traffic without disrupting existing traffic flows?
A)
B)
C)
D)
What is the difference between CEF and process switching?
In an SD-Access solution what is the role of a fabric edge node?
What is a characteristic of a virtual machine?
“HTTP/1.1 204 content” is returned when cur –I –x delete command is issued. Which situation has occurred?
Drag and drop the characteristics from the left onto the appropriate infrastructure deployment types on the right.
Drag and drop the DHCP messages that are exchanged between a client and an AP into the order they are exchanged on the right.
What are two characteristics of VXLAN? (Choose two)
Refer to the exhibit. Which two commands are needed to allow for full reachability between AS 1000 and AS 2000? (Choose two)
Which JSON syntax is valid?
A)
B)
C)
D)
Which method of account authentication does OAuth 2.0 within REST APIs?
If the noise floor is -90 dBm and wireless client is receiving a signal of -75 dBm, what is the SNR?
Refer to the exhibit. An engineer attempts to configure a trunk between switch sw1 and switch SW2 using DTP, but the trunk does not form. Which command should the engineer apply to switch SW2 to resolve this issue?
Refer to the exhibit.
A network engineer configures OSPF and reviews the router configuration. Which interface or interface or interface are able to establish OSPF adjacency?
When is an external antenna used inside a building?
What is the recommended MTU size for a Cisco SD-Access Fabric?
Refer to the exhibit. A network engineer troubleshoots an issue with the port channel between SW1 and SW2. which command resolves the issue?
A)
B)
C)
D)
In a Cisco SD-Access solution, what is the role of the Identity Services Engine?
Drag and drop the threat defense solutions from the left onto their descriptions on the right.
Refer to the exhibit. Which configuration change will force BR2 to reach 209 165 201 0/27 via BR1?
Where is radio resource management performed in a cisco SD-access wireless solution?
What is used to perform OoS packet classification?
Refer to the exhibit. POSTMAN is showing an attempt to retrieve network device information from Cisco DNA Center API. What is the issue?
Which data is properly formatted with JSON?
A)
B)
C)
D)