In a wireless network environment, what is calculated using the numencal values of the transmitter power level, cable loss, and antenna gain?
Refer to the exhibit.
An engineer deploys a script to retrieve the running configuration from a NETCONF-capable Cisco IOS XE device that is configured with default settings. The script fails. Which configuration must be applied to retrieve the configurauon using NETCONF?
Refer to the exhibit. An SSID is configured and both clients can reach their gateways on the Layer 3 switch, but they cannot communicate with each other. Which action resolves this issue?
Refer to the exhibit.
An engineer applies this configuration to R1:
ip nat inside source static 192.168.10.17 192.168.27.42
Which command set should be added to complete the configuration?
A)
B)
C)
D)
Which two operational modes enables an AP to scan one or more wireless channels for rogue access points and at the same time provide wireless services to clients? (Choose two)
Refer to the exhibit.
An administrator must collect basic statistics about the approximate amount of IPv4 and IPv6 flows entering Gi0/0 using NetFlow. However, the administrator is concerned that NetFlow processing during periods of high utilization on Gi0/0 will overwhelm the router CPU Which configuration minimizes CPU impact and keeps the data flows across Gi0/0 Intact?
Refer to the exhibit.
Clients are reporting an issue with the voice traffic from the branch site to the central site. What is the cause of this issue?
An engineer must configure a new WLAN 802.11r and requires users to enter a passphrase. What must be configured to support this requirement?
Refer to the exhibit.
An engineer is creating a Pytnon script to fetch the BGP configuration from a device using RESTCONF. What does the output Indicate?
Which two actions are recommended as security best practices to protect REST API? (Choose two.)
Refer to the exhibit. Which configuration must be applied to ensure that the preferred path for traffic from AS 65010 toward AS 65020 uses the R2 to R4 path?
A)
B)
C)
D)
Which two mechanisms are used with OAuth 2.0 for enhanced validation? (Choose two.)
Refer to the exhibit.
Which two commands ensure that DSW1 becomes root bridge for VLAN 10 and 20?
Refer to the exhibit. Which two configurations enable R1 and R2 to advertise routes into OSPF? (Choose two)
A)
B)
C)
D)
E)
Refer to the exhibit. The DevOps team noticed missing NetFlow data during peak utilization times for remote branches. Which configuration allows for this issue to be minimized or resolved?
In a campus network design, what ate two benefits of using BFD tor failure detection? (Choose two.)
Which of the following security methods uses physical characteristics of a person to authorize access to a location?
Refer to the exhibit.
A network engineer must permit administrators to automatically authenticate if there is no response from cither of the AAA servers. Which configuration achieves these results?
Refer to the exhibit. The existing configuration must be updated to terminate EXEC sessions after 20 minutes of idle time. Which command set should be applied?
A technician is assisting a user who cannot connect to a website. The technician attempts to ping the default gateway and DNS server of the workstation. According to troubleshooting methodology, this is an example of:
Refer to the exhibit. Which action must be performed to allow RESTCONF access to the device?
Which of the following should a junior security administrator recommend implementing to mitigate malicious network activity?
Which two actions, when applied in the LAN network segment, will facilitate Layer 3 CAPWAP discovery for lightweight AP? Choose two.)
Why would a small or mid-size business choose a cloud solution over an on-premises solution?
Refer to Ihe exhibit. An engineer must update the existing configuation to achieve these resu ts:
• Only administrators from the 192.168 1.0.'?4 subnet can access the vty lines.
* Access to the vty lines using clear-text protocols is prohibited.
Which command set should be appled?
A)
B)
C)
D)
Refer to the exhibit. Which commands are required to allow SSHconnectionsto the router?
Refer to the exhibit. A network engineer configures NAT on R1 and enters me show command to verity me configuration What toes the output confirm?
Which mobility role is assigned to a client in the client table of the new controller after a Layer 3 roam?
Refer to the exhibit. An engineer must deny HTTP traffic from host A to host B while allowing all other communication between the hosts. Which command set accomplishes this task?
Refer to the exhibit.
Which action must be taken to configure a WLAN for WPA2-AES with PSK and allow only 802.l1r-capable clients to connect?
An engineer must use flexible NetFlow on a group of switches. To prevent overloading of the flow collector, if the flow is idle for 20 seconds, the flow sample should be exported. Which command set should be applied?
A)
B)
C)
D)
in Cisco DNA Center what is used to publish events and notifications to a third party product such as IPAM?
Router R1must be configured as a UDP responder on port 6336 Which configuration accomplishes this task?
Drag and drop the descriptions from the left onto the QoS components on the right.
Refer to the exhibit.
Which HTTP JSON response does the python code output give?
Refer to the exhibit. An engineer has configured Cisco ISE to assign VLANs to clients based on their method of authentication, but this is not working as expected. Which action will resolve this issue?
Where is radio resource management performed in a cisco SD-access wireless solution?
A network engineer configures BGP between R1 and R2. Both routers use BGP peer group CORP and are set up to use MD5 authentication. This message is logged to the console of router R1:
Which two configuration allow peering session to from between R1 and R2? Choose two.)
Refer to the exhibit. An engineer is configuring an EtherChannel between Switch1 and Switch2 and notices the console message on switch2. Based on the output, which action resolves this issue?
When a wireless client roams between two different wireless controllers, a network connectivity outage is experience for a period of time. Which configuration issue would cause this problem?
Refer to the exhibit. External users require HTTP connectivity to an internal company web server that is listening on TCP port 8080. Which command set accomplishes this requirement?
A)
B)
C)
D)
E)
After a redundant route processor failure occurs on a Layer 3 device, which mechanism allows for packets to be forwarded from a neighboring router based on the most recent tables?
Which features does Cisco EDR use to provide threat detection and response protection?
When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required?
Drag and drop the characteristics from the left onto the protocols they apply to on the right?
Refer to the exhibit.
A network engineer is configuring OSPF between router R1 and router R2. The engineer must ensure that a DR/BDR election does not occur on the Gigabit Ethernet interfaces in area 0. Which configuration set accomplishes this goal?
A)
B)
C)
D)
Refer to the exhibit.
Based on the configuration in this WLAN security setting, Which method can a client use to authenticate to the network?
A customer requests a network design that supports these requirements:
Which protocol does the design include?
When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?
Refer to the exhibit Which single security feature is recommended to provide Network Access Control in the enterprise?
An engineer configures HSRP group 37. The configuration does not modify the default virtual MAC address. Which virtual MAC address does the group use?
Refer to the exhibit.Anetwork engineer configuresNATon R1 and enters theshowcommand to verity the configuration What does the output confirm?
A customer has recently implemented a new wireless infrastructure using WLC-5520 at a site directly next to a large commercial airport. Users report that they intermittently lose WI-FI connectivity, and troubleshooting reveals it is due to frequent channel changes. Which two actions fix this issue? (Choose two)
Refer to the exhibit. POSTMAN is showing an attempt to retrieve network device information from Cisco DNA Center API. What is the issue?
Which controller is capable of acting as a STUN server during the onboarding process of Edge devices?
Drag and drop the threat defense solutions from the left onto their descriptions on the right.
Refer to the exhibit. An engineer configures a new HSRP group. While reviewing the HSRP status, the engineer sees the logging message generated on R2. Which is the cause of the message?
Refer to the exhibit. What does the error message relay to the administrator who is trying to configure a Cisco IOS device?
Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?
Refer to the exhibit. An engineer attempts to create a configuration to allow the Blue VRF to leak into the global routing table, but the configuration does not function as expected. Which action resolves this issue?
Which method should an engineer use to deal with a long-standing contention issue between any two VMs on the same host?
An engineer is concerned with the deployment of new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements?
A customer has several small branches and wants to deploy a WI-FI solution with local management using CAPWAP. Which deployment model meets this requirement?
Which design principle slates that a user has no access by default to any resource, and unless a resource is explicitly granted, it should be denied?
Drag and drop the DHCP messages that are exchanged between a client and an AP into the order they are exchanged on the right.
Refer to the exhibit. Which action completes the configuration to achieve a dynamic continuous mapped NAT for all users?
A network administrator has designed a network with two multilayer switches on the distribution layer, which act as default gateways for the end hosts. Which two technologies allow every end host in a VLAN to use both gateways? (Choose two)
An engineer is describing QoS to a client. Which two facts apply to traffic policing? (Choose two.)
Refer to the exhibit.
Why does the OSPF neighborship fail between the two interfaces?
An engineer must create a script to append and modify device entries in a JSON-formatted file. The script must work as follows:
Until interrupted from the keyboard, the script reads in the hostname of a device, its management IP address, operating system type, and CLI remote access protocol.
After being interrupted, the script displays the entered entries and adds them to the JSON-formatted file, replacing existing entries whose hostname matches.
The contents of the JSON-formatted file are as follows:
Drag and drop the statements onto the blanks within the code to complete the script. Not all options are used.
Refer to the exhibit. An engineer builds an EEM script to apply an access list. Which statement must be added to complete the script?
An engineer must implement a configuration to allow a network administrator to connect to the console port of a router and authenticate over the network. Which command set should the engineer use?
Refer to the exhibit.
Which two commands ensure that DSW1 becomes the root bridge for VLAN 10 and 20? (Choose two.)
Refer to the exhibit. An engineer constructs an EEM applet to prevent anyone from entering configuration mode on a switch. Which snippet is required to complete the EEM applet?
Which signal strength and noise values meet the minimum SNR for voice networks?
Which tool is used in Cisco DNA Center to build generic configurations that are able to be applied on device with similar network settings?
Which there application has the ability to make REST calls against Cisco DNA Center?
Refer to the exhibit.
The WLC administrator sees that the controller to which a roaming client associates has Mobility Role Anchor configured under Clients > Detail. Which type of roaming is supported?
Refer to the exhibit. Which configuration is required to summarize the Area 2 networks that are advertised to Area 0?
Drag and drop the characteristics from the left onto the switching mechanisms they describe on the right.
Which two features are available only in next-generation firewalls? (Choose two.)
Refer to the exhibit.
An engineer must assign an IP address of 192.168.1.1/24 to the GigabitEtherenet1 interface. Which two commands must be added to the existing configuration to accomplish this task? (Choose two.)
In which two ways does the routing protocol OSPF differ from EIGRP? (Choose two.)
Which IP SLA operation requires the IP SLA responder to be configured on the remote end?
Company policy restricts VLAN 10 to be allowed only on SW1 and SW2. All other VLANs can be on all three switches. An administrator has noticed that VLAN 10 has propagated to SW3. Which configuration corrects the issue?
Drag and drop the snippets onto the blanks within the code to create an EEM script that adds an entry to a locally stored text file with a timestamp when a configuration change is made. Not all options are used.
Which authorization framework gives third-party applications limited access to HTTP services?
Refer to the exhibit. Cisco IOS routers R1 and R2 are interconnected using interface Gi0/0. Which configuration allows R1 and R2 to form an OSPF neighborship on interface Gi0/0?
Refer to the exhibit.
Which type of antenna does the radiation pattern represent?
Drag and drop the characteristics from the left onto the deployment models on the right.
Refer to the exhibit. Which command is required to verify NETCONF capability reply messages?
Which element enables communication between guest VMs within a virtualized environment?
Refer to the exhibit.
After configuring HSRP an engineer enters the show standby command. Which two facts are derived from the output? (Choose two.)
A network monitoring system uses SNMP polling to record the statistics of router interfaces The SNMP queries work as expected until an engineer installs a new interface and reloads the router After this action, all SNMP queries for the router fail What is the cause of this issue?
Refer to the exhibit.
An engineer attempts to bundle interface Gi0/0 into the port channel, but it does not function as expected. Which action resolves the issue?
Refer to the exhibit.
An engineer troubleshoots connectivity issues with an application. Testing is performed from the server gateway, and traffic with the DF bit set is dropped along the path after increasing packet size. Removing the DF bit setting at the gateway prevents the packets from being dropped. What is the cause of this issue?
Refer to the exhibit.
VPN-A sends point-to-point traffic to VPN-B and receives traffic only from VPN-C VPN-B sends point-to-point traffic to VPN-C and receives traffic only from VPN-A Which configuration is applied?
A)
B)
C)
D)
Refer to the exhibit.
An engineer is designing a guest portal on Cisco ISE using the default configuration. During the testing phase, the engineer receives a warning when displaying the guest portal. Which issue is occurring?
Which method does Cisco DNA Center use to allow management of non-Cisco devices through southbound protocols?
The login method is configured on the VTY lines of a router with these parameters
The first method for authentication it TACACS
If TACACS is unavailable login is allowed without any provided credentials
Which configuration accomplishes this task?
Refer to the exhibit.
What are two reasons for IP SLA tracking failure? (Choose two )
Based on the router's API output in JSON format below, which Python code will display the value of the "hostname" key?
A)
B)
C)
D)
A customer wants to provide wireless access to contractors using a guest portal on Cisco ISE. The portal Is also used by employees A solution is implemented, but contractors receive a certificate error when they attempt to access the portal Employees can access the portal without any errors. Which change must be implemented to allow the contractors and employees to access the portal?
Refer to the exhibit.
An engineer must add the SNMP interface table to the NetFlow protocol flow records. Where should the SNMP table option be added?
An engineer must configure AAA on a Cisco 9800 WLC for central web authentication Which two commands are needed to accomplish this task? (Choose two.)
A customer wants to use a single SSID to authenticate loT devices using different passwords. Which Layer 2 security type must be configured in conjunction with Cisco ISE to achieve this requirement?
An engineer configures GigabitEthernet 0/1 for VRRP group 115. The router must assume the primary role when it has the highest priority in the group. Which command set is required to complete this task?
Refer to the exhibit.
An engineer must create a configuration that prevents R3from receiving the LSA about 172.16.1.4/32.Which configuration set achieves this goal?
Refer to the exhibit.
Which Python code snippet prints the descriptions of disabled interfaces only?
A)
B)
C)
D)
Which cisco DNA center application is responsible for group-based accesss control permissions?
What are two considerations when using SSO as a network redundancy feature? (Choose two)
An engineer must configure the strongest password authentication to locally authenticate on a router. Which configuration must be used?
Refer to the exhibit.
Which command when applied to the Atlanta router reduces type 3 LSA flooding into the backbone area and summarizes the inter-area routes on the Dallas router?
Which access point mode allows a supported AP to function like a WLAN client would, associating and identifying client connectivity issues?
Refer to the exhibit.
An engineer must establish eBGP peering between router R3 and router R4. Both routers should use their loopback interfaces as the BGP router ID. Which configuration set accomplishes this task?
Refer to the exhibit.
A company requires that all wireless users authenticate using dynamic key generation. Which configuration must be applied?
A client device roams between access points located on different floors in an atrium. The access points are Joined to the same controller and configured in local mode. The access points are in different AP groups and have different IP addresses, but the client VLAN in the groups is the same. Which type of roam occurs?
Refer to the exhibit.
The network administrator must be able to perform configuration changes when all the RADIUS servers are unreachable. Which configuration allows all commands to be authorized if the user has successfully authenticated?
Refer to the exhibit.
After the code is run on a Cisco IOS-XE router, the response code is 204.
What is the result of the script?
Refer to the exhibit. An engineer attempts to configure a router on a stick to route packets between Clients, Servers, and Printers; however, initial tests show that this configuration is not working. Which command set resolves this issue?
A)
B)
C)
D)
Reter to the exhibit.
An administrator troubleshoots intermittent connectivity from internal hosts to an external public server. Some internal hosts can connect to the server whileothers receive an ICMP Host Unreachable message and these hosts change over time. What is the cause of this issue?
Refer to the exhibit.
Which command set is needed to configure and verify router R3 to measure the response time from router R3 to the file server located in the data center?
A)
B)
C)
D)
Drag and drop the LIPS components on the left to the correct description on the right.
Refer the exhibit.
Which configuration elects SW4 as the root bridge for VLAN 1 and puts G0/2 on SW2 into a blocking state?
A)
B)
C)
D)
Which two characteristics apply to the endpoint security aspect of the Cisco Threat Defense architecture? (Choose two.)
Refer to the exhibit. Which python code parses the response and prints “18:32:21.474 UTC sun Mar 10 2019?
Which protocol is responsible for data plane forwarding in a Cisco SD-Access deployment?
Refer to the exhibit.
After configuring the BGP network, an engineer verifies that the path between Servers and Server2 Is functional. Why did RouterSF choose the route from RouterDAL instead of the route from RouterCHI?
Refer to the exhibit.
A network engineer must configure the router to use the ISE-Servers group for authentication. If both ISE servers are unavailable, the local username database must be used. If no usernames are defined in the configuration, then the enable password must be the last resort to log in. Which configuration must be applied to achieve this result?
Which Python snippet shouldbeused to store the devices data structure in a JSON file?
A)
B)
C)
D)
Refer to the exhibit. A network engineer checks connectivity between two routers. The engineer can ping the remote endpoint but cannot see an ARP entry. Why is there no ARP entry?
A company requires a wireless solution to support its mam office and multiple branch locations. All sites have local Internet connections and a link to the main office lor corporate connectivity. The branch offices are managed centrally. Which solution should the company choose?
Refer to the exhibit. Which configuration must be implemented to establish EBGP peering between R1 and R2?
A network engineer is configuring OSPF on a router. The engineer wants to prevent having a route to 177.16.0.0/16 learned via OSPF. In the routing table and configures a prefix list using the command ip prefix-list OFFICE seq S deny 172.16.0.0/16. Winch two identical configuration commands must be applied to accomplish the goal? (Choose two.)
Which function does a fabric wireless LAN controller perform In a Cisco SD-Access deployment?
Refer to the exhibit.
What is the effect of introducing the sampler feature into the Flexible NetFlow configuration on the router?
Which protocol is implemented to establish secure control plane adjacencies between Cisco SD-WAN nodes?
Drag and drop the characteristics from the left onto the infrastructure deployment models on the right.
Which type of tunnel Is required between two WLCs to enable Intercontroller roaming?
Refer to the exhibit.
The port channel between the switches does not work as expected. Which action resolves the issue?
Refer to the exhibit.
An engineer must allow R1 to advertise the 192 168.1 0/24 network to R2 R1 must perform this action without sending OSPF packets to SW1 Which command set should be applied?
A)
B)
C)
D)
If the maximum power level assignment for global TPC 802.11a/n/ac is configured to 10 dBm, which power level effectively doubles the transmit power?
Refer to the exhibit. A network administrator configured RSPAN to troubleshoot an issue between switch1 and switch2. The switches are connected using interface GigabitEthernet 1/1. An external packet capture device is connected is switch2 interface GigabitEthernet 1/2. Which two commands must be added to complete this configuration? (Choose two)
Refer to the exhibit .
Which command must be configured for RESTCONF to operate on port 8888?
Refer to the exhibit. A network engineer must load balance traffic that comes from the NAT Router and is destined to 10.10.110.10, to several FTP servers. Which two commands sets should be applied? (Choose two).
A)
B)
C)
D)
E)
Refer to the exhibit.
An engineer must deny Telnet traffic from the loopback interface of router R3 to the Loopback interface of router R2 during, the weekend hours. All other traffic between the loopback interfaces of routers R3 and R2 must be allowed at all times Which command set accomplishes this task?
A)
B)
C)
D)
Refer to the exhibit. Which configuration must be added to enable GigabitEthemet 0/1 to participate in OSPF?
Drag and drop the characteristics from the left onto the deployment types on the right.
Refer to the exhibit. A network engineer must block Telnet traffic from hosts in the range of 10.100 2.248 to 10.100.2 255 to the network 10.100.3.0 and permit everything else. Which configuration must the engineer apply'?
A)
B)
C)
D)
What is the recommended minimum SNR for data applications on wireless networks?
Refer to the exhibit.
An engineer must configure an ERSPAN session with the remote end of the session 10.10.0.1. Which commands must be added to complete the configuration?
A)
B)
C)
D)
Refer to the exhibit.
R1 is able to ping the R3 fa0/1 Interface. Why do the extended pings fail?
Which feature Is used to propagate ARP broadcast, and link-local frames across a Cisco SD-Access fabric to address connectivity needs for silent hosts that require reception of traffic to start communicating?
Which three resources must the hypervisor make available to the virtual machines? (Choose three)