1. After a redundant route processor failure occurs on a Layer 3 device, which mechanism allows for packets to be forwarded from a neighboring router based on the most recent tables?
A.
B.
C.
D.

Question 1 of 102

2. What is the differences between TCAM and the MAC address table?
A.
B.
C.
D.

Question 2 of 102

3. Which two southbound interfaces originate from Cisco DNA Center and terminate at fabric underlay switches? (Choose two)
A.
B.
C.
D.
E.

Question 3 of 102

4. What is the function of a control-plane node in a Cisco SD-Access solution?
A.
B.
C.
D.

Question 4 of 102

5. Refer to the exhibit. What is the result when a switch that is running PVST+ is added to this network?

A.
B.
C.
D.

Question 5 of 102

6. What is a characteristic of a next-generation firewall?
A.
B.
C.
D.

Question 6 of 102

7. Which measure is used by an NTP server to indicate its closeness to the authoritative time source?
A.
B.
C.
D.

Question 7 of 102

8. Which two resu lts occur if Cisco DNA Center loses connectivity to devices in the SD-Access fabric? (Choose two)
A.
B.
C.
D.
E.

Question 8 of 102

9. Which two components are supported by LISP? (Choose two)
A.
B.
C.
D.
E.

Question 9 of 102

10. Drag and drop the virtual component from the left onto their descriptions on the right.
configuration file containing settings for a virtual machine such as guest OS:
VMX

Unselect

OVA

Unselect

VMDK

Unselect

vNIC

Unselect

component of a virtual machine responsible for sending packets to the hypervisor:
VMX

Unselect

OVA

Unselect

VMDK

Unselect

vNIC

Unselect

zip file containing a virtual machine configuration file and a virtual disk:
VMX

Unselect

OVA

Unselect

VMDK

Unselect

vNIC

Unselect

file containing a virtual machine disk drive:
VMX

Unselect

OVA

Unselect

VMDK

Unselect

vNIC

Unselect

Question 10 of 102

11. How does EIGRP differ from OSPF?
A.
B.
C.
D.

Question 11 of 102

12. Refer to the exhibit.
What does the output confirm about the switch’s spanning tree configuration?
A.
B.
C.
D.

Question 12 of 102

13. A customer has recently implemented a new wireless infrastructure using WLC-5520S at a site directly next to a large commercial airport Users report that they intermittently lose Wi-Fi connectivity, and troubleshooting reveals it is due to frequent channel changes. Which two actions fix this issue? (Choose two)
A.
B.
C.
D.
E.

Question 13 of 102

14. What is a characteristic of para-virtualization?
A.
B.
C.
D.

Question 14 of 102

15. Drag and drop the characteristics from the left onto the QoS components they describe on the right.
marking:
process used to buffer traffic that exceeds a predefined rate

Unselect

distinguishes traffic types

Unselect

permits traffic to pass through the device while retaining DSCP/COS value

Unselect

applied on traffic to convey information to a downstream device

Unselect

shaping:
process used to buffer traffic that exceeds a predefined rate

Unselect

distinguishes traffic types

Unselect

permits traffic to pass through the device while retaining DSCP/COS value

Unselect

applied on traffic to convey information to a downstream device

Unselect

classification:
process used to buffer traffic that exceeds a predefined rate

Unselect

distinguishes traffic types

Unselect

permits traffic to pass through the device while retaining DSCP/COS value

Unselect

applied on traffic to convey information to a downstream device

Unselect

trust:
process used to buffer traffic that exceeds a predefined rate

Unselect

distinguishes traffic types

Unselect

permits traffic to pass through the device while retaining DSCP/COS value

Unselect

applied on traffic to convey information to a downstream device

Unselect

Question 15 of 102

16. A customer requests a network design that supports these requirements:
* FHRP redundancy
* multivendor router environment
* IPv4 and IPv6 hosts

Which protocol does the design include?
A.
B.
C.
D.

Question 16 of 102

17. Refer to the exhibit.
vlan 222
 remote-span
!
vlan 223
 remote-span
!
monitor session 1 source interface FastEthernet0/1 tx
monitor session 1 source interface FastEthernet0/2 rx
monitor session 1 source interface port-channel 5
monitor session 1 destination remote vlan 222
What happens to access interfaces where VLAN 222 is assigned?
A.
B.
C.
D.

Question 17 of 102

18. Which solution do IaaS service providers use to extend a Layer 2 segment across a Layer 3 network?
A.
B.
C.
D.

Question 18 of 102

19. What is a characteristic of MACsec?
A.
B.
C.
D.

Question 19 of 102

20. Which unit measures the power of a radio signal with reference to 1 milliwatt?
A.
B.
C.
D.

Question 20 of 102

21. Drag and drop the solutions that comprise Cisco Cyber Threat Defense from the left onto the objectives they accomplish on the right.
StealthWatch :
uses pxGrid to remediate security threats

Unselect

analyzes network behavior and detects anomalies

Unselect

detects suspicious web activity

Unselect

Web Security Appliance :
uses pxGrid to remediate security threats

Unselect

analyzes network behavior and detects anomalies

Unselect

detects suspicious web activity

Unselect

Identity Services Engine :
uses pxGrid to remediate security threats

Unselect

analyzes network behavior and detects anomalies

Unselect

detects suspicious web activity

Unselect

Question 21 of 102

22. What are two characteristics of Cisco SD-Access elements? (Choose two)
A.
B.
C.
D.
E.

Question 22 of 102

23. Refer to the exhibit.
Current configuration: 142 bytes
vrf definition STAFF
!
!
interface GigabitEthernet1
 vrf forwarding STAFF
 no ip address
 negotiation auto
 no mop enabled
 no mop sysid
end
An engineer must assign an IP address of 192.168.1.1/24 to the GigabitEthemet1 interface. Which two commands must be added to the existing configuration to accomplish this task? (Choose two)
A.
B.
C.
D.
E.

Question 23 of 102

24. What is the data policy in a Cisco SD-WAN deployment?
A.
B.
C.
D.

Question 24 of 102

25. Refer to the exhibit.

Which action resolves the EtherChannel issue between SW2 and SW3?
A.
B.
C.
D.

Question 25 of 102

26. Refer to the exhibit.

 

A network engineer configures OSPF and reviews the router configuration. Which interface or interfaces are able to establish OSPF adjacency?
A.
B.
C.
D.

Question 26 of 102

27. Refer to the exhibit.

What step resolves the authentication issue?

 
A.
B.
C.
D.

Question 27 of 102

28. Refer to the exhibit.

 

A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Which two configuration changes accomplish this? (Choose two)
A.
B.
C.
D.

Question 28 of 102

29. Which encryption hashing algorithm does NTP use for authentication?
A.
B.
C.
D.

Question 29 of 102

30. What is a VPN in a Cisco SD-WAN deployment?
A.
B.
C.
D.

Question 30 of 102

31. Drag and drop the characteristic from the left onto the orchestration tools that they describe on the right.
uses playbooks
Puppet

Unselect

Puppet

Unselect

Ansible

Unselect

Ansible

Unselect

prodedural
Puppet

Unselect

Puppet

Unselect

Ansible

Unselect

Ansible

Unselect

uses a pull model
Puppet

Unselect

Puppet

Unselect

Ansible

Unselect

Ansible

Unselect

declarative
Puppet

Unselect

Puppet

Unselect

Ansible

Unselect

Ansible

Unselect

Question 31 of 102

32. Refer to the exhibit.

 

Communication between London and New York is down. Which command set must be applied to resolve this issue?
A.
B.
C.
D.

Question 32 of 102

33. What is an emulated machine that has dedicated compute, memory, and storage resources and a fully installed operating system?
A.
B.
C.
D.

Question 33 of 102

34. Which two methods are used to reduce the AP coverage area? (Choose two)
A.
B.
C.
D.
E.

Question 34 of 102

35. Which data is properly formatted with JSON?
A.
B.
C.
D.

Question 35 of 102

36. Drag and drop the descriptions of the VSS technology from the left to the right. Not all options are used.
supported on the Cisco 4500 and 6500 series
StackWise

Unselect

VSS

Unselect

StackWise

Unselect

StackWise

Unselect

VSS

Unselect

VSS

Unselect

combines exactly two devices
StackWise

Unselect

VSS

Unselect

StackWise

Unselect

StackWise

Unselect

VSS

Unselect

VSS

Unselect

supports devices that are geographically separated
StackWise

Unselect

VSS

Unselect

StackWise

Unselect

StackWise

Unselect

VSS

Unselect

VSS

Unselect

supported on Cisco 3750 and 3850 devices
StackWise

Unselect

VSS

Unselect

StackWise

Unselect

StackWise

Unselect

VSS

Unselect

VSS

Unselect

supports up to nine devices
StackWise

Unselect

VSS

Unselect

StackWise

Unselect

StackWise

Unselect

VSS

Unselect

VSS

Unselect

uses proprietary cabling
StackWise

Unselect

VSS

Unselect

StackWise

Unselect

StackWise

Unselect

VSS

Unselect

VSS

Unselect

Question 36 of 102

37. Refer to the exhibit.

 

All switches are configured with the default port priority value. Which two commands ensure that traffic from PC1 is forwarded over Gi1/3 trunk port between DWS1 and DSW2? (Choose two)
A.
B.
C.
D.
E.

Question 37 of 102

38. In a three-tier hierarchical campus network design, which action is a design best-practice for the core layer?
A.
B.
C.
D.

Question 38 of 102

39. Which two network problems indicate a need to implement QoS in a campus network? (Choose two)
A.
B.
C.
D.
E.

Question 39 of 102

40. In a Cisco SD-Access solution, what is the role of the Identity Services Engine?
A.
B.
C.
D.

Question 40 of 102

41. A customer has completed the installation of a Wi-Fi 6 greenfield deployment at their new campus. They want to leverage Wi-Fi 6 enhanced speeds on the trusted employee WLAN. To configure the employee WLAN, which two Layer 2 security policies should be used? (Choose two)
A.
B.
C.
D.

Question 41 of 102

42. Which outcome is achieved with this Python code?
client.connect (ip, port=22,username=usr,password=pswd)
stdin,stdout,stderr = client.exec_command('show ip bgp 192.168.10100 bestpath\n')
print(stdout)
A.
B.
C.
D.

Question 42 of 102

43. What is YANG used for?
A.
B.
C.
D.

Question 43 of 102

44. Refer to the exhibit.

 

Which configuration change ensures that R1 is the active gateway whenever it is in a functional state for the 172.30.110.0/24 network?
A.
B.
C.
D.

Question 44 of 102

45. Refer to the exhibit.
Person#1:First Name is JohnnyLast Name is TableHobbies are:• Running• Video gamesPerson#2First Name is BillyLast Name is SmithHobbies are:• Napping• ReadingWhich JSON syntax is derived from this data?
A.
B.
C.
D.

Question 45 of 102

46. An engineer creates the configuration below. Drag and drop the authentication methods from the left into the order of priority on the right. Not all options are used.
R1#sh run | i aaa
aaa new-model
aaa authentication login default group ACE group AAA_RADIUS local-case
aaa session-id common
R1#
AAA servers of ACE group
Step 1

Unselect

Step 4

Unselect

Step 3

Unselect

ليس من ضمن الخيارات

Unselect

Step 2

Unselect

AAA servers of AAA_RADIUS group
Step 1

Unselect

Step 4

Unselect

Step 3

Unselect

ليس من ضمن الخيارات

Unselect

Step 2

Unselect

local configured username in case-sensitive format
Step 1

Unselect

Step 4

Unselect

Step 3

Unselect

ليس من ضمن الخيارات

Unselect

Step 2

Unselect

If no method works, then deny login
Step 1

Unselect

Step 4

Unselect

Step 3

Unselect

ليس من ضمن الخيارات

Unselect

Step 2

Unselect

tacacs servers of group ACE
Step 1

Unselect

Step 4

Unselect

Step 3

Unselect

ليس من ضمن الخيارات

Unselect

Step 2

Unselect

Question 46 of 102

47. Refer to the exhibit.

 

Which two facts does the device output confirm? (Choose two)
A.
B.
C.
D.
E.

Question 47 of 102

48. Based on the output below, which Python code shows the value of the “upTime” key?
{
“response”: [{
“family”: “Routers”,
“type”: “Cisco ASR 1001-X Router”,
“errorCode”: null,
“location”: null,
“macAddress”: “00:c8:8b:80:bb:00”,
“hostname”: “asr1001-x.abc.inc”,
“role”: “BORDER ROUTER”,
“lastUpdateTime”: 1577391299537,
“serialNumber”: “FXS1932Q1SE”,
“softwareVersion”: “16.3.2”,
“locationName”: null,
“upTime”: “49 days, 13:43:44:13”,
“lastUpdated”: “2019-12-22 16:35:21”
}]
}
A.
B.
C.
D.

Question 48 of 102

49. Which two actions, when applied in the LAN network segment, will facilitate Layer 3 CAPWAP discovery for lightweight AP? (Choose two)
A.
B.
C.
D.
E.

Question 49 of 102

50. Refer to the exhibit.

 
R2:
vrf definition hotel
 address-family ipv4
 exit-address-family

vrf definition bank
 address-family ipv4
 exit-address-family

interface Ethernet0/0
 vrf forwarding bank
 ip address 172.16.0.4 255.255.0.0

interface Ethernet0/1
 vrf forwarding hotel
 ip address 172.1.0.5 255.255.0.0

router ospf 42 vrf bank
 router-id 1.1.1.1
 network 172.16.0.0 0.0.255.255 area 0

router ospf 43 vrf hotel
 router-id 3.3.3.3
 network 172.16.0.0 0.0.255.255 area 0

R1:
vrf definition bank
!
 address-family ipv4
 exit-address-family
Which configuration must be applied to R1 to enable R1 to reach the server at 172.16.0.1?
A.
B.
C.
D.

Question 50 of 102

51. The following system log message is presented after a network administrator configures a GRE tunnel:
%TUN-RECURDOWN: Interface Tunnel 0 temporarily disabled due to recursive routing.
Why is Tunnel 0 disabled?
A.
B.
C.
D.

Question 51 of 102

52. What is provided by the Stealthwatch component of the Cisco Cyber Threat Defense solution?
A.
B.
C.
D.

Question 52 of 102

53. How does Protocol Independent Multicast function?
A.
B.
C.
D.

Question 53 of 102

54. Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial?
A.
B.
C.
D.

Question 54 of 102

55. Which technology does VXLAN use to provide segmentation for Layer 2 and Layer 3 traffic?
A.
B.
C.
D.

Question 55 of 102

56. A company has an existing Cisco 5520 HA cluster using SSO. An engineer deploys a new single Cisco Catalyst 9800 WLC to test new features. The engineer successfully configures a mobility tunnel between the 5520 cluster and 9800 WLC. Clients connected to the corporate WLAN roam seamlessly between access points on the 5520 and 9800 WLC. After a failure on the primary 5520 WLC, all WLAN services remain functional; however clients cannot roam between the 5520 and 9800 controllers without dropping their connection. Which feature must be configured to remedy the issue?
A.
B.
C.
D.

Question 56 of 102

57. What are two methods of ensuring that the multicast RPF check passes without changing the unicast routing table? (Choose two)
A.
B.
C.
D.
E.

Question 57 of 102

58. What is the result when an active route processor fails in a design that combines NSF with SSO?
A.
B.
C.
D.

Question 58 of 102

59. What is a benefit of a virtual machine when compared with a physical server?
A.
B.
C.
D.

Question 59 of 102

60. What is the wireless received signal strength indicator?
A.
B.
C.
D.

Question 60 of 102

61. Which controller is capable of acting as a STUN server during the onboarding process of Edge devices?
A.
B.
C.
D.

Question 61 of 102

62. What is the process for moving a virtual machine from one host machine to another with no downtime?
A.
B.
C.
D.

Question 62 of 102

63. What are two features of NetFlow flow monitoring? (Choose two)
A.
B.
C.
D.
E.

Question 63 of 102

64. Which method should an engineer use to deal with a long-standing contention issue between any two VMs on the same host?
A.
B.
C.
D.

Question 64 of 102

65. What is the recommended MTU size for a Cisco SD-Access Fabric?
A.
B.
C.
D.

Question 65 of 102

66. What does the number in an NTP stratum level represent?
A.
B.
C.
D.

Question 66 of 102

67. Refer to the exhibit.

 
R1(config)#ip sla 1
R1(config-ip-sla)#icmp-echo 172.20.20.2 source-interface FastEthernet1/0
R1(config-ip-sla-echo)#timeout 5000
R1(config-ip-sla-echo)#frequency 10
R1(config-ip-sla-echo)#threshold 500
R1(config)#ip sla schedule 1 start-time now life forever
R1(config)#track 10 ip sla 1 reachability
R1(config)#ip route 0.0.0.0 0.0.0.0 172.20.20.2
After implementing the configuration 172.20.20.2 stops replaying to ICMP echoes, but the default route fails to be removed. What is the reason for this behavior?
A.
B.
C.
D.

Question 67 of 102

68. Refer to the exhibit.

 

Which type of antenna is show on the radiation patterns?
A.
B.
C.
D.

Question 68 of 102

69. Drag and drop characteristics of PIM dense mode from the left to the right.
require a rendezvous point to deliver multicast traffic
PIM Dense Mode

Unselect

ليس ضمن الخيارات

Unselect

ليس ضمن الخيارات

Unselect

ليس ضمن الخيارات

Unselect

PIM Dense Mode

Unselect

PIM Dense Mode

Unselect

builds source-based distribution trees
PIM Dense Mode

Unselect

ليس ضمن الخيارات

Unselect

ليس ضمن الخيارات

Unselect

ليس ضمن الخيارات

Unselect

PIM Dense Mode

Unselect

PIM Dense Mode

Unselect

uses a pull model to distribute multicast traffic
PIM Dense Mode

Unselect

ليس ضمن الخيارات

Unselect

ليس ضمن الخيارات

Unselect

ليس ضمن الخيارات

Unselect

PIM Dense Mode

Unselect

PIM Dense Mode

Unselect

uses a push model to distribute multicast traffic
PIM Dense Mode

Unselect

ليس ضمن الخيارات

Unselect

ليس ضمن الخيارات

Unselect

ليس ضمن الخيارات

Unselect

PIM Dense Mode

Unselect

PIM Dense Mode

Unselect

uses prune mechanisms to stop unwanted multicast traffic
PIM Dense Mode

Unselect

ليس ضمن الخيارات

Unselect

ليس ضمن الخيارات

Unselect

ليس ضمن الخيارات

Unselect

PIM Dense Mode

Unselect

PIM Dense Mode

Unselect

build shared distribution trees
PIM Dense Mode

Unselect

ليس ضمن الخيارات

Unselect

ليس ضمن الخيارات

Unselect

ليس ضمن الخيارات

Unselect

PIM Dense Mode

Unselect

PIM Dense Mode

Unselect

Question 69 of 102

70. Refer to the exhibit.

 
Edge-01
track 10 interface GigabitEthernet0/0 line-protocol
!
interface GigabitEthernet0/1
ip address 10.104.110.2 255.255.255.0
vrrp 10 ip 10.104.110.100
vrrp 10 priority 120
Edge-02
interface GigabitEthernet0/1
ip address 10.104.110.3 255.255.255.0
vrrp 10 ip 10.104.110.100
Object tracking has been configured for VRRP enabled routers Edge-01 and Edge-02. Which commands cause Edge-02 to preempt Edge-01 in the event that interface G0/0 goes down on Edge-01?
A.
B.
C.
D.

Question 70 of 102

71. Which protocol is implemented to establish secure control plane adjacencies between Cisco SD-WAN nodes?
A.
B.
C.
D.

Question 71 of 102

72. Refer to the exhibit.
flow monitor FLOW-MONITOR-1
 record netflow ipv6 original-input
 exit
!
sampler SAMPLER-1
 mode deterministic 1 out-of 2
 exit
!
ip cef
ipv6 cef
!
interface GigabitEthernet0/0/0
 ipv6 address 2001:DB8:2:ABCD::2/48
 ipv6 flow monitor FLOW-MONITOR-1 sampler SAMPLER-1 input
What is the effect of introducing the sampler feature into the Flexible NetFlow configuration on the router?
A.
B.
C.
D.

Question 72 of 102

73. When does a stack master lose its role?
A.
B.
C.
D.

Question 73 of 102

74. What is the calculation that is used to measure the radiated power of a signal after it has gone through the radio, antenna cable, and antenna?
A.
B.
C.
D.

Question 74 of 102

75. An engineer must create an EEM applet that sends a syslog message in the event a change happens in the network due to trouble with an OSPF process. Which action should the engineer use?
A.
B.
C.
D.

Question 75 of 102

76. Refer to the exhibit.

 

Which action completes the configuration to achieve a dynamic continuous mapped NAT for all users?
A.
B.
C.
D.

Question 76 of 102

77. A customer has 20 stores located throughout a city. Each store has a single Cisco AP managed by a central WLC. The customer wants to gather analytics for users in each store. Which technique supports these requirements?
A.
B.
C.
D.

Question 77 of 102

78. What is a characteristic of a WLC that is in master controller mode?
A.
B.
C.
D.

Question 78 of 102

79. A customer has a pair of Cisco 5520 WLCs set up in an SSO cluster to manage all APs. Guest traffic is anchored to a Cisco 3504 WLC located in a DM2. Which action is needed to ensure that the EoIP tunnel remains in an UP state in the event of failover on the SSO cluster?
A.
B.
C.
D.

Question 79 of 102

80. In a Cisco DNA Center Plug and Play environment, why would a device be labeled unclaimed?
A.
B.
C.
D.

Question 80 of 102

81. Refer to the exhibit.

 
SW1#show interfaces gigabitethernet0/0 switchport
Name:Gi0/0
Switchport: Enabled
Administrative Mode: dynamic auto
Operational Mode: trunk
Administrative Trunking Encapsulation: dot1q
Operational Trunking Encapsulation: dot1q
Negotiation of Trunking: Off
Access Mode VLAN: 1 (default)
Trunking Native Mode VLAN: 99 (NATIVE)
Administrtive Native VLAN tagging: enabled
Voice VLAN: none
---output omitted---

SW2#show interfaces gigabitethernet0/1 switchport
Name:Gi0/1
Switchport: Enabled
Administrative Mode: dynamic auto
Operational Mode: trunk
Administrative Trunking Encapsulation: negotiate
Operational Trunking Encapsulation: dot1q
Negotiation of Trunking: On
Access Mode VLAN: 1 (default)
Trunking Native Mode VLAN: 99 (NATIVE)
Administrtive Native VLAN tagging: enabled
Voice VLAN: none
---output omitted---
The connection between SW1 and SW2 is not operational. Which two actions resolve the issue? (Choose two)
A.
B.
C.
D.
E.

Question 81 of 102

82. Refer to the exhibit.
R1#show access-list 100
Extended IP access list 100
 10 deny ip any any
 20 permit ip 192.168.0.0 0.0.255.255 any
 30 permit ip any 192.168.0.0 0.0.255.255
Extended access-list 100 is configured on interface GigabitEthernet0/0 in an inbound direction, but it does not have the expected behavior of allowing only packets to or from 192.168.0.0/16. Which command set properly configures the access list?

 
A.
B.
C.
D.

Question 82 of 102

83. How do cloud deployments differ from on-prem deployments?

 
A.
B.
C.
D.

Question 83 of 102

84. Refer to the exhibit.

 

An engineer runs the sample code, and the terminal returns this output. Which change to the sample code corrects this issue?
A.
B.
C.
D.

Question 84 of 102

85. Refer to the exhibit.

 

An engineer is configuring an EtherChannel between Switch1 and Switch2 and notices the console message on Switch2. Based on the output, which action resolves this issue?
A.
B.
C.
D.

Question 85 of 102

86. An engineer is concerned with the deployment of a new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements?

 
A.
B.
C.
D.

Question 86 of 102

87. Which resource is able to be shared among virtual machines deployed on the same physical server?
A.
B.
C.
D.

Question 87 of 102

88. Which function is handled by vManage in the Cisco SD-WAN fabric?

 
A.
B.
C.
D.

Question 88 of 102

89. Refer to the exhibit.
switch1(config)# interface GigabitEthernet 1/1
switch1(config-if)# switchport mode trunk
switch1(config-if)# switchport trunk allowed vlan 10,20,30,40,50,60,70-90
switch1(config)# exit
switch1(config)# monitor session 1 source vlan 10
switch1(config)# monitor session 1 destination remote vlan 70

switch2(config)# interface GigabitEthernet 1/1
switch2(config-if)# switchport mode trunk
switch2(config-if)# switchport trunk allowed vlan 10,20,30,40,50,60,80-90
switch2(config)# exit
switch2(config)# monitor session 2 source remote vlan 70
switch2(config)# monitor session 2 destination interface GigabitEthernet1/1

A network administrator configured RSPAN to troubleshoot an issue between switch1 and switch2. The switches are connected using interface GigabitEthernet 1/1. An external packet capture device is connected to switch2 interface GigabitEthernet1/2. Which two commands must be added to complete this configuration? (Choose two)
A.
B.
C.
D.
E.

Question 89 of 102

90. Refer to the exhibit.
event snmp oid 1.3.6.1.4.1.9.9.109.1.1.1.1.3 get-type next entry-op gt entry-val 80 poll-interval 5
!
action 1.0 cli command “enable”
action 2.0 syslog msg “high cpu”
action 3.0 cli command “term length 0”
An engineer must create a script that appends the output of the show process cpu sorted command to a file. Which action completes the configuration?
A.
B.
C.
D.

Question 90 of 102

91. Refer to the exhibit.
>>> netconf_data["GigabitEthernet"][0]["enabled"]
u'false'
>>> netconf_data["GigabitEthernet"][1]["enabled"]
u'true'
>>> netconf_data["GigabitEthernet"][2]["enabled"]
u'false'
>>> netconf_data["GigabitEthernet"][2]["description"]
u'my description'
Which Python code snippet prints the descriptions of disabled interfaces only?
A.
B.
C.
D.

Question 91 of 102

92. Refer to the exhibit.

 

An engineer must deny HTTP traffic from host A to host B while allowing all other communication between the hosts. Drag and drop the commands into the configuration to achieve these results. Some commands may be used more than once. Not all commands are used.

permit
ِA

Unselect

ليس إحابة

Unselect

ليس إحابة

Unselect

C

Unselect

D

Unselect

ليس إحابة

Unselect

B

Unselect

permit
ِA

Unselect

ليس إحابة

Unselect

ليس إحابة

Unselect

C

Unselect

D

Unselect

ليس إحابة

Unselect

B

Unselect

action drop
ِA

Unselect

ليس إحابة

Unselect

ليس إحابة

Unselect

C

Unselect

D

Unselect

ليس إحابة

Unselect

B

Unselect

action forward
ِA

Unselect

ليس إحابة

Unselect

ليس إحابة

Unselect

C

Unselect

D

Unselect

ليس إحابة

Unselect

B

Unselect

match
ِA

Unselect

ليس إحابة

Unselect

ليس إحابة

Unselect

C

Unselect

D

Unselect

ليس إحابة

Unselect

B

Unselect

deny
ِA

Unselect

ليس إحابة

Unselect

ليس إحابة

Unselect

C

Unselect

D

Unselect

ليس إحابة

Unselect

B

Unselect

filter
ِA

Unselect

ليس إحابة

Unselect

ليس إحابة

Unselect

C

Unselect

D

Unselect

ليس إحابة

Unselect

B

Unselect

Question 92 of 102

93. Which of the following statements regarding BFD are correct? (Choose two)

 
A.
B.
C.
D.
E.

Question 93 of 102

94. What is an advantage of using BFD?
A.
B.
C.
D.

Question 94 of 102

95. An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:
Location A: -72 dBm
Location B: -75 dBm
Location C: -85 dBm
Location D: -80 dBm
Which two statements does the engineer use to explain these values to the customer? (Choose two)
A.
B.
C.
D.
E.

Question 95 of 102

96. Which three resources must the hypervisor make available to the virtual machines? (Choose three)
A.
B.
C.
D.
E.
F.

Question 96 of 102

97. Which unit is used to express the signal-to-noise ratio?
A.
B.
C.
D.

Question 97 of 102

98. Refer to the exhibit.

 

An engineer is investigating why guest users are able to access other guest devices when the users are connected to the customer guest WLAN. What action resolves this issue?
A.
B.
C.
D.

Question 98 of 102

99. Which function does a fabric AP perform in a Cisco SD-Access deployment?
A.
B.
C.
D.

Question 99 of 102

100. Which design principle should be followed in a Cisco SD-Access wireless network deployment?

 
A.
B.
C.
D.

Question 100 of 102

101. Which code results in the working python script displaying a list of network devices from the Cisco DNA center?
A.
B.
C.
D.

Question 101 of 102

102. An engineer is configuring a GRE tunnel interface in the default mode. The engineer has assigned an IPv4 address on the tunnel and sourced the tunnel from an Ethernet interface. Which option also is required on the tunnel interface before it is operational?
A.
B.
C.
D.

Question 102 of 102