Implementing Cisco Enterprise Network Core Technologies (ENCOR)
Last Update Apr 25, 2024
Total Questions : 843
We are offering FREE 350-401 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 350-401 free exam questions and then go for complete pool of Implementing Cisco Enterprise Network Core Technologies (ENCOR) test questions that will help you more.
Refer to the exhibit. An engineer must save the configuration of router R2 using the NETCONF protocol. Which script must be used?
Which QoS feature uses the IP Precedence bits in the ToS field of the IP packet header to partition traffic into different priority levels?
Reler to the exhibit The EtherChannel between SW1 and SW2 is not operational. Which a coon will resolve the issue?
Refer to the exhibit.
R1 has a BGP neighborship with a directly connected router on interface Gi0/0.
Which command set is applied between the iterations of show ip bgp 2.2.2.2?
Which device is responsible for finding EID-to-RLOC mappings when traffic is sent to a LISP-capable site?
Refer to the exhibit.
Both controllers are in the same mobility group. Which result occurs when client 1 roams between APs that are registered to different controllers in the same WLAN?
An engineer must use flexible NetFlow on a group of switches. To prevent overloading of the flow collector, if the flow is idle for 20 seconds, the flow sample should be exported. Which command set should be applied?
A)
B)
C)
D)
If AP power level is increased from 25 mW to 100 mW. what is the power difference in dBm?
High bandwidth utilization is occurring on interface Gig0/1 of a router. An engineer must identify the flows that are consuming the most bandwidth. Cisco DNA Center is used as a flow exporter and is configured with the IP address 192.168.23.1 and UDP port 23000. Which configuration must be applied to set NetFlow data export and capture on the router?
A)
B)
C)
D)
Which configuration filters out DOT1X messages in the format shown below from being sent toward Syslog server 10.15.20.33?
A)
B)
C)
D)
Where in Cisco DNA Center is documentation of each API call, organized by its functional area?
Which of the following protocols has a default administrative distance value of 90?
Which mobility role is assigned to a client in the client table of the new controller after a Layer 3 roam?
An engineer is configuring RADIUS-Based Authentication with EAP. MS-CHAPv2 is configured on a client device. Which outer method protocol must be configured on the ISE to support this authentication type?
Refer to the exhibit.
Which configuration enables fallback to local authentication and authorization when no TACACS+ server is available?
Refer to the exhibit. Cisco IOS routers R1 and R2 are interconnected using interface Gi0/0. Which configuration allows R1 and R2 to form an OSPF neighborship on interface Gi0/0?
Refer to the exhibit. Which command set completes the ERSPAN session configuration?
Refer to the exhibit. An engineer attempts to configure standby group 512 on interface GigabitEthernet0/1, but the configuration is not accepted. Which command resolves this problem?
A VoIP phone is plugged in to a port but cannot receive calls. Which of the following needs to be done on the port to address the issue?
Which router is elected the IGMP Querier when more than one router is in the same LAN segment?
An engineer applies this configuration to router R1. How does R1 respond when the user ‘cisco’ logs in?
A company hires a network architect to design a new OTT wireless solution within a Cisco SD-Access Fabric wired network. The architect wants to register access points to the WLC to centrally switch the traffic. Which AP mode must the design include?
Refer to the exhibit. An engineer must protect the CPU of the router from high rates of NTP, SNMP, and SSH traffic. Which two configurations must be applied to drop these types of traffic when it continuously exceeds 320 kbps? (Choose two)
An engineer is connected to a Cisco router through a Telnet session. Which command must be issued to view the logging messages from the current session as soon as they are generated by the router?
Refer to the exhibit. A network engineer must block Telnet traffic from hosts in the range of 10.100 2.248 to 10.100.2 255 to the network 10.100.3.0 and permit everything else. Which configuration must the engineer apply'?
A)
B)
C)
D)
Drag and drop the characteristics from the left to the table types on the right.
What is used to validate the authenticity of the client and is sent in HTTP requests as a JSON object?
Refer to the exhibit.
Object tracking has been configured for VRRP-enabled routers Edge-01 and Edge-02 Which commands cause Edge-02 to preempt Edge-01 in the event that interface G0/0 goes down on Edge-01?
A)
B)
C)
D)
Refer to the exhibit.
What is the effect of introducing the sampler feature into the Flexible NetFlow configuration on the router?
Drag and drop the automation characteristics from the left onto the appropriate tools on the right.
What is an emulated machine that has dedicated compute memory, and storage resources and a fully installed operating system?
Which VXLAN component is used to encapsulate and decapsulate Ethernet frames?
A Cisco DNA Center REST API sends a PUT to the /dna/intent/api/v1/network-device endpoint A response code of 504 is received What does the code indicate?
Drag and drop the LISP components on the left to their descriptions on the right. Not all options are used.
A network engineer is configuring OSPF on a router. The engineer wants to prevent having a route to 177.16.0.0/16 learned via OSPF. In the routing table and configures a prefix list using the command ip prefix-list OFFICE seq S deny 172.16.0.0/16. Winch two identical configuration commands must be applied to accomplish the goal? (Choose two.)
Refer to the exhibit.
An engineer configures routing between all routers and must build a configuration to connect R1 to R3 via a GRE tunnel Which configuration must be applied?
A)
B)
C)
D)
An engineer must configure an EXEC authorization list that first checks a AAA server then a local username. If both methods fail, the user is denied. Which configuration should be applied?
Drag and drop the LIPS components on the left to the correct description on the right.
A system must validate access rights to all its resources and must not rely on a cached permission matrix. If the access level to a given resource is revoked but is not reflected in the permission matrix, the security is violated. Which term refers to this REST security design principle?
Refer to the exhibit. A network engineer must be notified when a user switches to configuration mode. Which script should be applied to receive an SNMP trap and a critical-level log message?
A)
B)
C)
D)
A company requires a wireless solution to support its mam office and multiple branch locations. All sites have local Internet connections and a link to the main office lor corporate connectivity. The branch offices are managed centrally. Which solution should the company choose?
An engineer must configure a new loopback Interface on a router and advertise the interface as a fa4 in OSPF. Which command set accomplishes this task?
A)
B)
C)
D)
Refer to the exhibit.
The port channel between the switches does not work as expected. Which action resolves the issue?
Which two Cisco SD-Access components provide communication between traditional network elements and controller layer? (choose two)
Which configuration creates a CoPP policy that provides unlimited SSH access from dient 10.0.0.5 and denies access from all other SSH clients'?
A)
B)
C)
D)
Refer to the exhibit.
An engineer must set up connectivity between a campus aggregation layer and a branch office access layer. The engineer uses dynamic trunking protocol to establish this connection, however, management traffic on VLAN1 is not passing. Which action resolves the issue and allow communication for all configured VLANs?
Drag and drop the characteristics from the left onto the infrastructure deployment models on the right.
In a Cisco StackWise Virtual environment, which planes are virtually combined in the common logical switch?
Refer to the exhibit. Link 1 uses a copper connection and link 2 uses a fiber connection. The fiber port must be the primary port for all forwarding. The output of the show spanning-tree command on SW2 shows that the fiber port is blocked by Spanning Tree. After entering the spanning-tree port-priority 32 command on G0/1 on SW2, the port remains blocked. Which command should be entered on the ports connected to Link 2 is resolve the issue?
An engineer must configure Interface and sensor monitoring on a router. The NMS server is located in a trusted zone with IP address 10.15.2.19. Communication between the router and the NMS server must be encrypted and password-protected using the most secure algorithms. Access must be allowed only for the NMS server and with the minimum permission levels needed. Which configuration must the engineer apply?
A)
B)
C)
D)
Which Cisco FlexConnect state allows wireless users that are connected to the network to continue working after the connection to the WLC has been lost?
Which option works with a DHCP server to return at least one WLAN management interface IP address during the discovery phase and is dependent upon the VCI of the AP?
In a Cisco Catalyst switch equipped with two supervisor modules an administrator must temporally remove the active supervisor from the chassis to perform hardware maintenance on it. Which mechanism ensure that the active supervisor removal is not disruptive to the network operation?
Refer to the exhibit. Which command set must be added to permit and log all traffic that comes from 172.20.10.1 in interface GigabitEthernet0/1 without impacting the functionality of the access list?
Refer to the exhibit.
Which command set is needed to configure and verify router R3 to measure the response time from router R3 to the file server located in the data center?
A)
B)
C)
D)
In a Cisco SD-Access wireless architecture which device manages endpoint ID to edge node bindings?
Refer to the exhibit. A network administrator configured RSPAN to troubleshoot an issue between switch1 and switch2. The switches are connected using interface GigabitEthernet 1/1. An external packet capture device is connected is switch2 interface GigabitEthernet 1/2. Which two commands must be added to complete this configuration? (Choose two)
Refer to the exhibit. Which EEM script generates a critical-level syslog message and saves a copy of the running configuration to the bootflash when an administrator saves the running configuration to the startup configuration?
Which protocol is responsible for data plane forwarding in a Cisco SD-Access deployment?
Refer to the exhibit.
R1 is able to ping the R3 fa0/1 Interface. Why do the extended pings fail?
Refer to the exhibit .
Which command must be configured for RESTCONF to operate on port 8888?
Refer to the exhibit.
An engineer must allow all users in the 10.2.2.0/24 subnet to access the Internet. To conserve address space the public Interface address of 209 165 201.1 must be used for all external communication. Which command set accomplishes these requirements?
A)
B)
C)
D)
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
Which protocol is implemented to establish secure control plane adjacencies between Cisco SD-WAN nodes?
Refer the exhibit.
Which configuration elects SW4 as the root bridge for VLAN 1 and puts G0/2 on SW2 into a blocking state?
A)
B)
C)
D)
Refer to the exhibit.
An engineer must allow R1 to advertise the 192 168.1 0/24 network to R2 R1 must perform this action without sending OSPF packets to SW1 Which command set should be applied?
A)
B)
C)
D)
Refer to the exhibit.
Which commands are required to allow SSH connection to the router?
A)
B)
C)
D)
Drag and drop the characteristics from the left onto the deployment types on the right.
Refer to the exhibit.
An engineer entered the command no spanning-tree bpduguard enable on interface Fa 1/0/7. What is the effect of this command on Fa 1/0/7?
Refer to the exhibit. An attacker can advertise OSPF fake routes from 172.16.20.0 network to the OSPF domain and black hole traffic. Which action must be taken to avoid this attack and still be able to advertise this subnet into OSPF?
Refer to the exhibit.
The administrator troubleshoots an EtherChannel that keeps moving to err-disabled. Which two actions must be taken to resolve the issue? (Choose two.)
Refer to the exhibit.
Which type of antenna is show on the radiation patterns?
Refer to the exhibit.
Router 1 is currently operating as the HSRP primary with a priority of 110 router1 fails and router2 take over the forwarding role. Which command on router1 causes it to take over the forwarding role when it return to service?
Which statement about TLS is accurate when using RESTCONF to write configurations on network devices?
Refer to the exhibit.
What are two effect of this configuration? (Choose two.)
Refer to the exhibit.
Which command set must be applied on R1 to establish a BGP neighborship with R2 and to allow communication from R1 to reach the networks?
A)
B)
C)
D)
Refer to the exhibit. What does the error message relay to the administrator who is trying to configure a Cisco IOS device?
Which method should an engineer use to deal with a long-standing contention issue between any two VMs on the same host?
Refer to the exhibit.
What is the Json syntax that is formed from the data?
Running the script causes the output in the exhibit. Which change to the first line of the script resolves the error?
A server running Linux is providing support for virtual machines along with DNS and DHCP services for a small business. Which technology does this represent?
Drag and drop the virtual components from the left onto their deceptions on the right.
Refer to the exhibit.
An engineer implemented several configuration changes and receives the logging message on switch1. Which action should the engineer take to resolve this issue?
Which protocol does REST API rely on to secure the communication channel?
Which AP mode allows an engineer to scan configured channels for rogue access points?
Which entity is responsible for maintaining Layer 2 isolation between segments In a VXLAN environment?
Refer to the exhibit. An engineer must create a script that appends the output of the show process cpu sorted command to a file.
An engineer is concerned with the deployment of new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements?
Refer to the exhibit.
Which action resolves the EtherChannel issue between SW2 and SW3?
Refer to the exhibit.
An engineer must deny HTTP traffic from host A to host B while allowing all other communication between the hosts, drag and drop the commands into the configuration to achieve these results. Some commands may be used more than once. Not all commands are used.
Which design principle slates that a user has no access by default to any resource, and unless a resource is explicitly granted, it should be denied?
If the noise floor is -90 dBm and wireless client is receiving a signal of -75 dBm, what is the SNR?
A company has an existing Cisco 5520 HA cluster using SSO. An engineer deploys a new single Cisco Catalyst 9800 WLC to test new features. The engineer successfully configures a mobility tunnel between the 5520 cluster and 9800 WLC. Client connected to the corporate WLAN roam seamlessly between access points on the 5520 and 9800 WLC. After a failure on the primary 5520 WLC, all WLAN services remain functional; however, Client roam between the 5520 and 9800 controllers without dropping their connection. Which feature must be configured to remedy the issue?
Refer to the exhibit.
An engineer must deny Telnet traffic from the loopback interface of router R3 to the loopback interface of router R2 during the weekend hours. All other traffic between the loopback interfaces of routers R3 and R2 must be allowed at all times. Which command accomplish this task?
A)
B)
C)
D)
A network engineer configures BGP between R1 and R2. Both routers use BGP peer group CORP and are set up to use MD5 authentication. This message is logged to the console of router R1:
Which two configuration allow peering session to from between R1 and R2? Choose two.)
When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?
Which component of the Cisco Cyber Threat Defense solution provides user and flow context analysis?
Refer to the exhibit.
An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as an entry point. Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplish task?
Refer to the exhibit. External users require HTTP connectivity to an internal company web server that is listening on TCP port 8080. Which command set accomplishes this requirement?
A)
B)
C)
D)
E)
Refer to the exhibit. An engineer configures CoPP and enters the show command to verify the implementation. What is the result of the configuration?
How does an on-premises infrastructure compare to a cloud infrastructure?
Refer to the exhibit.
What are two effects of this configuration? (Choose two.)
Refer to the exhibit.
Security policy requires all idle-exec sessions to be terminated in 600 seconds. Which configuration achieves this goal?
Which features does Cisco EDR use to provide threat detection and response protection?
Refer to the exhibit. An engineer is configuring an EtherChannel between Switch1 and Switch2 and notices the console message on switch2. Based on the output, which action resolves this issue?
Refer to the exhibit. Which set of commands on router r R1 Allow deterministic translation of private hosts PC1, PC2, and PC3 to addresses in the public space?
A)
B)
C)
D)
Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel?
Refer to the exhibit. After configurating an IPsec VPN, an engineer enters the show command to verify the ISAKMP SA status. What does the status show?
Which action is the vSmart controller responsible for in an SD-WAN deployment?
In a Cisco SD-Access solution, what is the role of the Identity Services Engine?
Refer to the exhibit. Which two commands are needed to allow for full reachability between AS 1000 and AS 2000? (Choose two)
Drag and drop the wireless elements on the left to their definitions on the right.
Which measurement is used from a post wireless survey to depict the cell edge of the access points?
Where is radio resource management performed in a cisco SD-access wireless solution?
Refer to the exhibit.
Which configuration establishes EBGP neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP?
A)
B)
C)
D)
Refer to the exhibit. Which configuration change will force BR2 to reach 209 165 201 0/27 via BR1?
Refer to the exhibit. Communication between London and New York is down. Which command set must be applied to the NewYork switch to resolve the issue?
A)
B)
C)
D)
Refer to the exhibit Drag and drop the snippets into the RESTCONF request to form the request that returns this response Not all options are used
Refer to the exhibit.
An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24. The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router However, the router can still ping hosts on the 209.165.200.0/24 subnet. Which explanation of this behavior is true?
Drag and drop the characteristics from the left onto the protocols they apply to on the right?
Refer to the exhibit. Which command is required to verify NETCONF capability reply messages?
Refer to the exhibit.
Which configuration change ensures that R1 is the active gateway whenever it is in a functional state for the 172.30.110.0724 network?
A)
B)
C)
D)
A client device roams between access points located on different floors in an atrium. The access points are Joined to the same controller and configured in local mode. The access points are in different AP groups and have different IP addresses, but the client VLAN in the groups is the same. Which type of roam occurs?
Refer to the exhibit.
An engineer troubleshoots connectivity issues with an application. Testing is performed from the server gateway, and traffic with the DF bit set is dropped along the path after increasing packet size. Removing the DF bit setting at the gateway prevents the packets from being dropped. What is the cause of this issue?
An engineer must enable a login authentication method that allows a user to log in by using local authentication if all other defined authentication methods fail Which configuration should be applied?
An engineer is configuring a GRE tunnel interface in the default mode. The engineer has assigned an IPv4 address on the tunnel and sourced the tunnel from an Ethernet interface. Which option also is required on the tunnel interface before it is operational?
In a Cisco SD-WAN solution, which two functions are performed by OMP? (Choose two.)
Which technology is used as the basis for the cisco sd-access data plane?
Refer to the exhibit.
All switches are configured with the default port priority value. Which two commands ensure that traffic from PC1 is forwarded over Gi1/3 trunk port between DWS1 and DSW2? (Choose two)
An engineer creates the configuration below. Drag and drop the authentication methods from the left into the order of priority on the right. Not all options are used.
An engineer configures a WLAN with fast transition enabled Some legacy clients fail to connect to this WLAN Which feature allows the legacy clients to connect while still allowing other clients to use fast transition based on then OLTIs?
Which OSPF networks types are compatible and allow communication through the two peering devices?
Refer to the exhibit.
What is the effect of these commands on the BR and HQ tunnel interfaces?
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
An administrator must enable Telnet access to Router X using the router username and password database for authentication. Which configuration should be applied?
A)
B)
C)
D)
Refer to the exhibit.
An engineer must configure HSRP for VLAN 1000 on SW2. The secondary switch must immediately take over the role of active router If the interlink with the primary switch fails. Which command set completes this task?
A)
B)
C)
D)
Which feature does Cisco TrustSec use to provide scalable, secure communication throughout a network?
Based on the router's API output in JSON format below, which Python code will display the value of the "hostname" key?
A)
B)
C)
D)
Which two actions, when applied in the LAN network segment, will facilitate Layer 3 CAPWAP discovery for lightweight AP? (Choose two.)
Refer to the exhibit.
After the code is run on a Cisco IOS-XE router, the response code is 204.
What is the result of the script?
A customer requests a design that includes GLBP as the FHRP The network architect discovers that the members of the GLBP group have different throughput capabilities Which GLBP load balancing method supports this environment?
Refer the exhibit.
Which router is the designated router on the segment 192.168.0.0/24?
Refer to the exhibit.
An engineer must establish eBGP peering between router R3 and router R4. Both routers should use their loopback interfaces as the BGP router ID. Which configuration set accomplishes this task?
Refer to the exhibit. Router BRDR-1 is configured to receive the 0.0.0.0/0 and 172.17.1.0/24 network via BGP and advertise them into OSPF are 0. An engineer has noticed that the OSPF domain is receiving only the 172.17.1.0/24 route and default route 0.0.0.0/0 is still missing. Which configurating must engineer apply to resolve the problem?
What NTP Stratum level is a server that is connected directly to an authoritative time source?
Refer to the exhibit.
An engineer must prevent the R6 loopback from getting into Area 2 and Area 3 from Area 0 Which action must the engineer take?
Refer to the exhibit.
An engineers reaching network 172 16 10 0/24 via the R1-R2-R4 path. Which configuration forces the traffic to take a path of R1-R3-R4?
A)
B)
C)
D)
What does the Cisco DNA Center use to enable the delivery of applications through a network and to yield analytics for innovation?
An engineer is configuring a new SSID to present users with a splash page for authentication. Which WLAN Layer 3 setting must be configured to provide this functionally?
Refer to the Exhibit.
An engineer is installing a new pair of routers in a redundant configuration. When checking on the standby status of each router the engineer notices that the routers are not functioning as expected. Which action will resolve the configuration error?
Refer to the exhibit.
R2 is the neighboring router of R1. R2 receives an advertisement for network 192 168.10.50/32. Which configuration should be applied for the subnet to be advertised with the original /24 netmask?
A)
B)
C)
D)
What occurs when a high bandwidth multicast stream is sent over an MVPN using Cisco hardware?
Refer to the exhibit.
Cisco DNA Center has obtained the username of the client and the multiple devices that the client is using on the network. How is Cisco DNA Center getting these context details?
Refer to the exhibit.
An engineer configures OSPF and wants to verify the configuration Which configuration is applied to this device?
A)
B)
C)
D)
Refer to the exhibit.
CR2 and CR3 ate configured with OSPF. Which configuration, when applied to CR1. allows CR1 to exchange OSPF Information with CR2 and CR3 but not with other network devices or on new Interfaces that are added to CR1?
A)
B)
C)
D)
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
Refer to the exhibit.
Which JSON syntax is derived from this data?
A)
B)
C)
D)
Which protocol is used to encrypt control plane traffic between SD-WAN controllers and SD-WAN endpoints?
Drag and drop the snippets onto the blanks within the code to construct a script that advertises the network prefix 192.168.5.0/24 into a BGP session. Not all options are used
Refer to the exhibit.
An engineer must create a configuration that prevents R3from receiving the LSA about 172.16.1.4/32.Which configuration set achieves this goal?
A vulnerability assessment highlighted that remote access to the switches is permitted using unsecure and unencrypted protocols Which configuration must be applied to allow only secure and reliable remote access for device administration?
Which two parameters are examples of a QoS traffic descriptor? (Choose two)
What is the function of cisco DNA center in a cisco SD-access deployment?
An engineer must export the contents of the devices object in JSON format. Which statement must be used?
An engineer configures GigabitEthernet 0/1 for VRRP group 115. The router must assume the primary role when it has the highest priority in the group. Which command set is required to complete this task?
A network engineer configures a WLAN controller with increased security for web access. There is IP connectivity with the WLAN controller, but the engineer cannot start a management session from a web browser. Which action resolves the issued
Refer to the exhibit.
An engineer is troubleshooting an application running on Apple phones. The application Is receiving incorrect QoS markings. The systems administrator confirmed that ail configuration profiles are correct on the Apple devices. Which change on the WLC optimizes QoS for these devices?
Refer to the exhibit.
What does the output confirm about the switch's spanning tree configuration?
Refer to the exhibit. A network operator is attempting to configure an IS-IS adjacency between two routers, but the adjacency cannot be established. To troubleshoot the problem, the operator collects this debugging output. Which interfaces are misconfigured on these routers?
Which LISP device is responsible for publishing EID-to-RLOC mappings for a site?
Which two GRE features are configured to prevent fragmentation? (Choose two.)
Refer to the exhibit:
An engineer configures VRRP and issues the show commands to verify operation. What does the engineer confirm about VRRP group 1 from the output?
Refer to the exhibit.
A company requires that all wireless users authenticate using dynamic key generation. Which configuration must be applied?
Refer to the exhibit.
Why does the OSPF neighborship fail between the two interfaces?
Which two results occur if Cisco DNA Center loses connectivity to devices in the SD-Access fabric? (Choose two)
A wireless administrator must create a new web authentication corporate SSID that will be using ISE as the external RADIUS server. The guest VLAN must be specified after the authentication completes. Which action must be performed to allow the ISE server to specify the guest VLAN?
Refer to the exhibit.
Which statement is needed to complete the EEM applet and use the Tel script to store the backup file?
Which DNS lookup does an access point perform when attempting CAPWAP discovery?
Drag and drop the characteristics from the left onto the architectures on the right.
A network administrator is preparing a Python scrip to configure a Cisco IOS XE-based device on the network. The administrator is worried that colleagues will make changes to the device while the script is running. Which operation of he in client manager prevent colleague making changes to the device while the scrip is running?
Why does the vBond orchestrator have a public IP?
to enable vBond to team the public IP of WAN Edge devices that are behind NAT gateways or in private address space
Refer to the exhibit. What are two results of the NAT configuration? (Choose two.)
In a wireless network environment, what is calculated using the numencal values of the transmitter power level, cable loss, and antenna gain?
Which LISP infrastructure device provides connectivity between non-sites and LISP sites by receiving non-LISP traffic with a LISP site destination?
Drag the characteristics from the left onto the routing protocols they describe on the right.
Which action limits the total amount of memory and CPU that is used by a collection of VMs?
Which solution supports end to end line-rate encryption between two sites?
Refer to the exhibit. Which configuration must be applied to ensure that the preferred path for traffic from AS 65010 toward AS 65020 uses the R2 to R4 path?
A)
B)
C)
D)
An engineer applies this EEM applet to a router:
What does the applet accomplish?
Refer to the exhibit. Which two configurations enable R1 and R2 to advertise routes into OSPF? (Choose two)
A)
B)
C)
D)
E)
Drag and drop the characteristics from the left onto the switching architectures on the right.
Which security measure mitigates a man-in-the-middle attack of a REST API?