Month End Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Implementing Cisco Enterprise Network Core Technologies (ENCOR) Question and Answers

Implementing Cisco Enterprise Network Core Technologies (ENCOR)

Last Update Mar 24, 2023
Total Questions : 746

We are offering FREE 350-401 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 350-401 free exam questions and then go for complete pool of Implementing Cisco Enterprise Network Core Technologies (ENCOR) test questions that will help you more.

350-401 pdf

350-401 PDF

$38.5  $109.99
350-401 Engine

350-401 Testing Engine

$45.5  $129.99
350-401 PDF + Engine

350-401 PDF + Testing Engine

$59.5  $169.99
Questions 1

Refer to the exhibit.

How does the router handle traffic after the CoPP policy is configured on the router?

Options:

A.  

Traffic coming to R1 that does not match access list SNMP is dropped.

B.  

Traffic coming to R1 that matches access list SNMP is policed.

C.  

Traffic passing through R1 that matches access list SNMP is policed.

D.  

Traffic generated by R1 that matches access list SNMP is policed.

Discussion 0
Questions 2

Drag and drop the snippets onto the blanks within the code to construct a script that advertises the network prefix 192.168.5.0/24 into a BGP session. Not all options are used

Options:

Discussion 0
Questions 3

Drag and drop characteristics of PIM dense mode from the left to the right.

Options:

Discussion 0
Questions 4

A network administrator is implementing a routing configuration change and enables routing debugs to track routing behavior during the change. The logging output on the terminal is interrupting the command typing process. Which two actions can the network administrator take to minimize the possibility of typing commands incorrectly? (Choose two.)

Options:

A.  

Configure the logging synchronous global configuration command

B.  

Configure the logging delimiter feature

C.  

Configure the logging synchronous command under the vty

D.  

Press the TAB key to reprint the command in a new line

E.  

increase the number of lines on the screen using the terminal length command

Discussion 0
Questions 5

Which LISP device is responsible for publishing EID-to-RLOC mappings for a site?

Options:

A.  

ETR

B.  

MR

C.  

ITR

D.  

MS

Discussion 0
Questions 6

Refer to the exhibit.

What is the result when a technician adds the monitor session 1 destination remote vlan 223 command1?

Options:

A.  

The RSPAN VLAN is replaced by VLAN 223.

B.  

RSPAN traffic is sent to VLANs 222 and 223

C.  

An error is flagged for configuring two destinations.

D.  

RSPAN traffic is split between VLANs 222 and 223.

Discussion 0
Questions 7

How must network management traffic be treated when defining QoS policies?

Options:

A.  

as delay-sensitive traffic in a low latency queue

B.  

using minimal bandwidth guarantee

C.  

using the same marking as IP routing

D.  

as best effort

Discussion 0
Questions 8

Refer to the exhibit.

An engineer attempts to bundle interface Gi0/0 into the port channel, but it does not function as expected. Which action resolves the issue?

Options:

A.  

Configure channel-group 1 mode active on interface Gi0/0.

B.  

Configure no shutdown on interface Gi0/0

C.  

Enable fast LACP PDUs on interface Gi0/0.

D.  

Set LACP max-bundle to 2 on interface Port-channeM

Discussion 0
Questions 9

What do Cisco DNA southbound APIs provide?

Options:

A.  

Interface between the controller and the network devices

B.  

NETCONF API interface for orchestration communication

C.  

RESful API interface for orchestrator communication

D.  

Interface between the controller and the consumer

Discussion 0
Questions 10

Refer to the exhibit.

An engineer configures the BGP adjacency between R1 and R2, however, it fails to establish Which action resolves the issue?

Options:

A.  

Change the network statement on R1 to 172.16 10.0

B.  

Change the remote-as number for 192 168.100.11.

C.  

Enable synchronization on R1 and R2

D.  

Change the remote-as number on R1 to 6500.

Discussion 0
Questions 11

What are two considerations when using SSO as a network redundancy feature? (Choose two)

Options:

A.  

both supervisors must be configured separately

B.  

the multicast state is preserved during switchover

C.  

must be combined with NSF to support uninterrupted Layer 2 operations

D.  

must be combined with NSF to support uninterrupted Layer 3 operations

E.  

requires synchronization between supervisors in order to guarantee continuous connectivity

Discussion 0
Questions 12

What is a characteristic of Cisco DNA Northbound APIs?

Options:

A.  

They simplify the management of network infrastructure devices.

B.  

They enable automation of network infrastructure based on intent.

C.  

They utilize RESTCONF.

D.  

They utilize multivendor support APIs.

Discussion 0
Questions 13

An engineer is working with the Cisco DNA Center API Drag and drop the methods from the left onto the actions that they are used for on the right.

Options:

Discussion 0
Questions 14

What Is the difference between the MAC address table and TCAM?

Options:

A.  

The MAC address table supports partial matches. TCAM requires an exact match.

B.  

The MAC address table is contained in TCAM ACL and QoS information is stored in CAM.

C.  

Router prefix lookups happen in TCAM. MAC address table lookups happen In CAM.

D.  

TCAM is used to make L2 forwarding decisions. CAM is used to build routing tables

Discussion 0
Questions 15

By default, which virtual MAC address Goes HSRP group 25 use?

Options:

A.  

05:5c:5e:ac:0c:25

B.  

04:16:6S:96:1C:19

C.  

00:00:0c:07:ac:19

D.  

00:00:0c:07:ac:25

Discussion 0
Questions 16

Which two Cisco SD-Access components provide communication between traditional network elements and controller layer? (choose two)

Options:

A.  

network data platform

B.  

network underlay

C.  

fabric overlay

D.  

network control platform

E.  

partner ecosystem

Discussion 0
Questions 17

Refer to the exhibit. A network administrator configured RSPAN to troubleshoot an issue between switch1 and switch2. The switches are connected using interface GigabitEthernet 1/1. An external packet capture device is connected is switch2 interface GigabitEthernet 1/2. Which two commands must be added to complete this configuration? (Choose two)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

E.  

Option E

Discussion 0
Questions 18

A network is being migrated from IPV4 to IPV6 using a dual-stack approach. Network management is already 100% IPV6 enabled. In a dual-stack network with two dual-stack NetFlow collections, how many flow exporters are needed per network device in the flexible NetFlow configuration?

Options:

A.  

1

B.  

2

C.  

4

D.  

8

Discussion 0
Questions 19

A network engineer must configure a router to send logging messages to a syslog server based on these requirements:

  • uses syslog IP address: 10.10.10.1
  • uses a reliable protocol
  • must not use any well-known TCP/UDP ports

Which configuration must be used?

Options:

A.  

logging host 10.10.10.1 transport tcp port 1024

B.  

logging origin-id 10.10.10.1

C.  

logging host 10.10.10.1 transport udp port 1023

D.  

logging host 10.10.10.1 transport udp port 1024

Discussion 0
Questions 20

Drag and drop the Cisco SD-Access solution areas from the left onto the protocols they use on the right.

Options:

Discussion 0
Questions 21

Refer to the exhibit.

An engineer must configure and validate a CoPP policy that allows the network management server to monitor router R1 via SNMP while protecting the control plane. Which two commands or command sets must be used? (Choose two.)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

E.  

Option E

F.  

Option F

Discussion 0
Questions 22

Refer to the exhibit.

The trunk does not work over the back-to-back link between Switch1 interface Giq1/0/20 and Switch2 interface Gig1/0/20. Which configuration fixes the problem?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 23

Refer to the exhibit. Which command is required to verify NETCONF capability reply messages?

Options:

A.  

show netconf | section rpc-reply

B.  

show netconf rpc-reply

C.  

show netconf xml rpc-reply

D.  

show netconf schema | section rpc-reply

Discussion 0
Questions 24

An engineer must enable a login authentication method that allows a user to log in by using local authentication if all other defined authentication methods fail Which configuration should be applied?

Options:

A.  

aaa authentication login CONSOLE group radius local-case enable aaa

B.  

authentication login CONSOLE group radius local enable none

C.  

aaa authentication login CONSOLE group radius local enable

D.  

aaa authentication login CONSOLE group tacacs+ local enable

Discussion 0
Questions 25

Refer to the exhibit.

An engineer must create a configuration that executes the show run command and then terminates the session when user CCNP legs in. Which configuration change is required?

Options:

A.  

Add the access-class keyword to the username command

B.  

Add the access-class keyword to the aaa authentication command

C.  

Add the autocommand keyword to the username command

D.  

Add the autocommand keyword to the aaa authentication command

Discussion 0
Questions 26

Why is an AP joining a different WLC than the one specified through option 43?

Options:

A.  

The WLC is running a different software version.

B.  

The API is joining a primed WLC

C.  

The AP multicast traffic unable to reach the WLC through Layer 3.

D.  

The APs broadcast traffic is unable to reach the WLC through Layer 2.

Discussion 0
Questions 27

A company requires a wireless solution to support its mam office and multiple branch locations. All sites have local Internet connections and a link to the main office lor corporate connectivity. The branch offices are managed centrally. Which solution should the company choose?

Options:

A.  

Cisco United Wireless Network

B.  

Cisco DNA Spaces

C.  

Cisco Catalyst switch with embedded controller

D.  

Cisco Mobility Express

Discussion 0
Questions 28

AN engineer is implementing MPLS OAM to monitor traffic within the MPLS domain. Which action must the engineer perform to prevent from being forwarded beyond the service provider domain when the LSP is down?

Options:

A.  

Disable IP redirects only on outbound interfaces

B.  

Implement the destination address for the LSP echo request packet in the 127.x.y.z/8 network

C.  

Disable IP redirects on all ingress interfaces

D.  

Configure a private IP address as the destination address of the headend router of Cisco MPLS TE.

Discussion 0
Questions 29

Which Python snippet should be used to store the devices data structure in a JSON file?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 30

Which DHCP option helps lightweight APs find the IP address of a wireless LAN controller?

Options:

A.  

Option 43

B.  

Option 60

C.  

Option 67

D.  

Option 150

Discussion 0
Questions 31

Which command set configures RSPAN to capture outgoing traffic from VLAN 3 on interface GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 32

Drag and drop the characteristics from the left onto the appropriate infrastructure deployment types on the right.

Options:

Discussion 0
Questions 33

What is one difference between saltstack and ansible?

Options:

A.  

SaltStack uses an API proxy agent to program Cisco boxes on agent mode, whereas Ansible uses a Telnet connection

B.  

SaltStack uses the Ansible agent on the box, whereas Ansible uses a Telnet server on the box

C.  

SaltStack is constructed with minion, whereas Ansible is constructed with YAML

D.  

SaltStack uses SSH to interact with Cisco devices, whereas Ansible uses an event bus

Discussion 0
Questions 34

Refer to the exhibit.

An engineer is troubleshooting a connectivity issue and executes a traceoute. What does the result confirm?

Options:

A.  

The destination server reported it is too busy

B.  

The protocol is unreachable

C.  

The destination port is unreachable

D.  

The probe timed out

Discussion 0
Questions 35

If the noise floor is -90 dBm and wireless client is receiving a signal of -75 dBm, what is the SNR?

Options:

A.  

15

B.  

1.2

C.  

-165

D.  

.83

Discussion 0
Questions 36

Which JSON syntax is valid?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 37

Which exhibit displays a valid JSON file?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 38

What is a characteristic of a virtual machine?

Options:

A.  

It must be aware of other virtual machines, in order to allocate physical resources for them

B.  

It is deployable without a hypervisor to host it

C.  

It must run the same operating system as its host

D.  

It relies on hypervisors to allocate computing resources for it

Discussion 0
Questions 39

When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?

Options:

A.  

logging host 10.2.3.4 vrf mgmt transport tcp port 6514

B.  

logging host 10.2.3.4 vrf mgmt transport udp port 6514

C.  

logging host 10.2.3.4 vrf mgmt transport tcp port 514

D.  

logging host 10.2.3.4 vrf mgmt transport udp port 514

Discussion 0
Questions 40

What is a consideration when designing a Cisco SD-Access underlay network?

Options:

A.  

End user subnets and endpoints are part of the underlay network.

B.  

The underlay switches provide endpoint physical connectivity for users.

C.  

Static routing is a requirement,

D.  

It must support IPv4 and IPv6 underlay networks

Discussion 0
Questions 41

What are two benefits of YANG? (Choose two.)

Options:

A.  

It enforces the use of a specific encoding format for NETCONF.

B.  

It collects statistical constraint analysis information.

C.  

It enables multiple leaf statements to exist within a leaf list.

D.  

It enforces configuration semantics.

E.  

It enforces configuration constraints.

Discussion 0
Questions 42

Which measurement is used from a post wireless survey to depict the cell edge of the access points?

Options:

A.  

SNR

B.  

Noise

C.  

RSSI

D.  

CCI

Discussion 0
Questions 43

Which HTTP code must be returned to prevent the script form exiting?

Options:

A.  

200

B.  

201

C.  

300

D.  

301

Discussion 0
Questions 44

Refer to the exhibit.

A network engineer is configuring OSPF between router R1 and router R2. The engineer must ensure that a DR/BDR election does not occur on the Gigabit Ethernet interfaces in area 0. Which configuration set accomplishes this goal?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 45

Drag and drop the characteristics from the left onto the routing protocols they describe on the right.

Options:

Discussion 0
Questions 46

Refer to the exhibit. Which action completes the configuration to achieve a dynamic continuous mapped NAT for all users?

Options:

A.  

Configure a match-host type NAT pool

B.  

Reconfigure the pool to use the 192.168 1 0 address range

C.  

Increase the NAT pool size to support 254 usable addresses

D.  

Configure a one-to-one type NAT pool

Discussion 0
Questions 47

What is the function of a fabric border node in a Cisco SD-Access environment?

Options:

A.  

To collect traffic flow information toward external networks

B.  

To connect the Cisco SD-Access fabric to another fabric or external Layer 3 networks

C.  

To attach and register clients to the fabric

D.  

To handle an ordered list of IP addresses and locations for endpoints in the fabric.

Discussion 0
Questions 48

How does EIGRP differ from OSPF?

Options:

A.  

EIGRP is more prone to routing loops than OSPF

B.  

EIGRP supports equal or unequal path cost, and OSPF supports only equal path cost.

C.  

EIGRP has a full map of the topology, and OSPF only knows directly connected neighbors

D.  

EIGRP uses more CPU and memory than OSPF

Discussion 0
Questions 49

Which line must be added in the Python function to return the JSON object {"cat_9k": “FXS193202SE")?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 50

Which data is properly formatted with JSON?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 51

What is the purpose of the LISP routing and addressing architecture?

Options:

A.  

It creates two entries for each network node, one for Its identity and another for its location on the network.

B.  

It allows LISP to be applied as a network visualization overlay though encapsulation.

C.  

It allows multiple Instances of a routing table to co-exist within the same router.

D.  

It creates head-end replication used to deliver broadcast and multicast frames to the entire network.

Discussion 0
Questions 52

How does NETCONF YANG represent data structures?

Options:

A.  

as strict data structures denned by RFC 6020

B.  

in an XML tree format

C.  

in an HTML format

D.  

as modules within a tree

Discussion 0
Questions 53

Which AP mode allows an engineer to scan configured channels for rogue access points?

Options:

A.  

sniffer

B.  

monitor

C.  

bridge

D.  

local

Discussion 0
Questions 54

In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC?

Options:

A.  

Layer 3

B.  

inter-xTR

C.  

auto anchor

D.  

fast roam

Discussion 0
Questions 55

How is Layer 3 roaming accomplished in a unified wireless deployment?

Options:

A.  

An EoIP tunnel is created between the client and the anchor controller to provide seamless connectivity as the client is associated with the new AP.

B.  

The client entry on the original controller is passed to the database on the new controller.

C.  

The new controller assigns an IP address from the new subnet to the client

D.  

The client database on the original controller is updated the anchor entry, and the new controller database is updated with the foreign entry.

Discussion 0
Questions 56

What is the JSON syntax that is formed the data?

Options:

A.  

{'Name'';''Bob johnon';''Age': Sevenfive,''Alive'': true,''FavoriteFoods';[''Cereal';''Mustard';''Onions'}}

B.  

{'Name'':''Bob johnon':''Age': 75 ''Alive'': true,''Favorite Foods';[''Cereal';''Mustard';''Onions'}}

C.  

{'Name'':''Bob johnon':''Age: 75,''Alive: true, FavoriteFoods;[Cereal, Mustard';''Onions}}

D.  

{'Name'': 'Bob johnon','Age': 75,'Alive': true,''FavoriteFoods': 'Cereal';'Mustard','Onions'}}

Discussion 0
Questions 57

An engineer is configuring Local WebAuth on a Cisco Wireless LAN Controller. According to RFC 5737, WHICH VIRTUAL IP address must be used in this configuration?

Options:

A.  

192.0.2.1

B.  

172.20.10.1

C.  

1.1.1.1

D.  

192.168.0.1

Discussion 0
Questions 58

Refer to the exhibit. An engineer has configured an IP SLA for UDP echo’s. Which command is needed to start the IP SLA to test every 30 seconds and continue until stopped?

Options:

A.  

ip sla schedule 100 start-time now life forever

B.  

ip sla schedule 30 start-time now life forever

C.  

ip sla schedule 100 start-time now life 30

D.  

ip sla schedule 100 life forever

Discussion 0
Questions 59

Which type of tunnel Is required between two WLCs to enable Intercontroller roaming?

Options:

A.  

mobility

B.  

LWAPP

C.  

CAPWAP

D.  

iPsec

Discussion 0
Questions 60

What is one difference between EIGRP and OSPF?

Options:

A.  

OSPF is a Cisco proprietary protocol, and EIGRP is an IETF open standard protocol.

B.  

OSPF uses the DUAL distance vector algorithm, and EIGRP uses the Dijkstra link-state algorithm

C.  

EIGRP uses the variance command lot unequal cost load balancing, and OSPF supports unequal cost balancing by default.

D.  

EIGRP uses the DUAL distance vector algorithm, and OSPF uses the Dijkstra link-state algorithm

Discussion 0
Questions 61

Which two features does the Cisco SD-Access architecture add to a traditional campus network? (Choose two.)

Options:

A.  

software-defined segmentation

B.  

private VLANs

C.  

SD-WAN

D.  

modular QoS

E.  

identity services

Discussion 0
Questions 62

An engineer must configure a router to leak routes between two VRFs Which configuration must the engineer apply?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 63

Refer to the exhibit.

An engineer must configure an ERSPAN session with the remote end of the session 10.10.0.1. Which commands must be added to complete the configuration?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 64

Refer to the exhibit. Which python code parses the response and prints “18:32:21.474 UTC sun Mar 10 2019?

Options:

A.  

print(response['resut'][0||'simple_time']}

B.  

print(response[result']['body']['simple_time']}

C.  

print(response['body']['simple_time']}

D.  

print(response[jresult']['body']['simple_time']}

Discussion 0
Questions 65

Which two solutions are used for backing up a Cisco DNA Center Assurance database? (Choose two)

Options:

A.  

NFS share

B.  

non-linux server

C.  

local server

D.  

remote server

E.  

bare metal server

Discussion 0
Questions 66

Refer to the exhibit.

An engineer must allow R1 to advertise the 192 168.1 0/24 network to R2 R1 must perform this action without sending OSPF packets to SW1 Which command set should be applied?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 67

Which configuration creates a CoPP policy that provides unlimited SSH access from dient 10.0.0.5 and denies access from all other SSH clients'?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 68

A system must validate access rights to all its resources and must not rely on a cached permission matrix. If the access level to a given resource is revoked but is not reflected in the permission matrix, the security is violated. Which term refers to this REST security design principle?

Options:

A.  

economy of mechanism

B.  

complete mediation

C.  

separation of privilege

D.  

least common mechanism

Discussion 0
Questions 69

Refer to the exhibit.

What does the snippet of code achieve?

Options:

A.  

It creates a temporary connection to a Cisco Nexus device and retrieves a token to be used for API calls.

B.  

It opens a tunnel and encapsulates the login information, if the host key is correct.

C.  

It opens an ncclient connection to a Cisco Nexus device and maintains it for the duration of the context.

D.  

It creates an SSH connection using the SSH key that is stored, and the password is ignored.

Discussion 0
Questions 70

Refer to the exhibit.

An engineer must set up connectivity between a campus aggregation layer and a branch office access layer. The engineer uses dynamic trunking protocol to establish this connection, however, management traffic on VLAN1 is not passing. Which action resolves the issue and allow communication for all configured VLANs?

Options:

A.  

Allow all VLANs on the trunk links

B.  

Disable Spanning Tree for the native VLAN.

C.  

Configure the correct native VLAN on the remote interface

D.  

Change both interfaces to access ports.

Discussion 0
Questions 71

Wireless users report frequent disconnections from the wireless network. While troubleshooting a network engineer finds that after the user a disconnect, the connection re-establishes automatically without any input required. The engineer also notices these message logs .

Which action reduces the user impact?

Options:

A.  

increase the AP heartbeat timeout

B.  

increase BandSelect

C.  

enable coverage hole detection

D.  

increase the dynamic channel assignment interval

Discussion 0
Questions 72

Which function does a fabric wireless LAN controller perform In a Cisco SD-Access deployment?

Options:

A.  

manages fabric-enabled APs and forwards client registration and roaming information to the Control Plane Node

B.  

coordinates configuration of autonomous nonfabric access points within the fabric

C.  

performs the assurance engine role for both wired and wireless clients

D.  

is dedicated to onboard clients in fabric-enabled and nonfabric-enabled APs within the fabric

Discussion 0
Questions 73

What is a characteristics of a vSwitch?

Options:

A.  

supports advanced Layer 3 routing protocols that are not offered by a hardware switch

B.  

enables VMs to communicate with each other within a virtualized server

C.  

has higher performance than a hardware switch

D.  

operates as a hub and broadcasts the traffic toward all the vPorts

Discussion 0
Questions 74

Refer to the exhibit.

Which configuration must be applied to the HQ router to set up a GRE tunnel between the HQ and BR routers?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 75

Drag and drop the characteristics from the left onto the technology types on the right.

Options:

Discussion 0
Questions 76

A network engineer must configure a switch to allow remote access for all feasible protocols. Only a password must be requested for device authentication and all idle sessions must be terminated in 30 minutes. Which configuration must be applied?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 77

Simulation 09

Options:

Discussion 0
Questions 78

What is a benefit of using segmentation with TrustSec?

Options:

A.  

Packets sent between endpoints on a LAN are encrypted using symmetric key cryptography.

B.  

Firewall rules are streamlined by using business-level profiles.

C.  

Integrity checks prevent data from being modified in transit.

D.  

Security group tags enable network segmentation.

Discussion 0
Questions 79

An administrator is configuring NETCONF using the following XML string. What must the administrator end the request with?

Options:

A.  

]]>]]>

B.  

C.  

D.  

Discussion 0
Questions 80

What is a characteristic of a Type I hypervisor?

Options:

A.  

It is installed on an operating system and supports other operating systems above it.

B.  

It is referred to as a hosted hypervisor.

C.  

Problems in the base operating system can affect the entire system.

D.  

It is completely independent of the operating system.

Discussion 0
Questions 81

An engineer must configure a new loopback Interface on a router and advertise the interface as a fa4 in OSPF. Which command set accomplishes this task?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 82

Refer to the exhibit. A network engineer Is troubleshooting an Issue with the file server based on reports of slow file transmissions. Which two commands or command sets are required. In switch SW1 to analyze the traffic from the file server with a packet analyzer? (Choose two.)

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 83

What is the result of applying this access control list?

Options:

A.  

TCP traffic with the URG bit set is allowed

B.  

TCP traffic with the SYN bit set is allowed

C.  

TCP traffic with the ACK bit set is allowed

D.  

TCP traffic with the DF bit set is allowed

Discussion 0
Questions 84

Refer to the exhibit. An engineer must configure an ERSPAN tunnel that mirrors traffic from linux1 on Switch1 to Linux2 on Switch2. Which command must be added to the destination configuration to enable the ERSPAN tunnel?

Options:

A.  

(config-mon-erspan-dst-src)# origin ip address 172.16.10.10

B.  

(config-mon-erspan-dst-src)# erspan-id 172.16.10.10

C.  

(config-mon-erspan-dst-src)# no shut

D.  

(config-mon-erspan-dst-src)# erspan-id 110

Discussion 0
Questions 85

Refer to the exhibit.

Assuming all links are functional, which path does PC1 take to reach DSW1?

Options:

A.  

PC1 goes from ALSW1 to DSW2 to CORE to DSW1.

B.  

PC1 goes from ALSW1 to DSW2 to DSW1.

C.  

PC1 goes from ALSW1 to DSW1.

D.  

PC1 goes from ALSW1 to DSW2 to ALSW2 to DSW1.

Discussion 0
Questions 86

Why would a customer implement an on-premises solution instead of a cloud solution?

Options:

A.  

On-premises Offers greater compliance for government regulations than cloud

B.  

On-premises offers greater scalability than cloud.

C.  

On-premises oilers shorter deployment time than cloud.

D.  

On-premises is more secure man cloud.

Discussion 0
Questions 87

Refer to the exhibit An engineer is troubleshooting a newly configured BGP peering that does not establish What is the reason for the failure?

Options:

A.  

BGP peer 10 255 255 3 is not configured for peenng wth R1

B.  

Mandatory BOP parameters between R1 and 10 255 255 3 are mismatched

C.  

A firewall is blocking access to TCP port 179 on the BGP peer 10 255 255.3

D.  

Both BGP pern are configured for passive TCP transport

Discussion 0
Questions 88

An engineer is connected to a Cisco router through a Telnet session. Which command must be issued to view the logging messages from the current session as soon as they are generated by the router?

Options:

A.  

logging buffer

B.  

service timestamps log uptime

C.  

logging host

D.  

terminal monitor

Discussion 0
Questions 89

Refer to the exhibit. An engineer is reaching network 172.16.10.0/24 via the R1-R2-R4 path. Which configuration forces the traffic to fake a path of R1-R3-R4?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 90

What does the statement print(format(0.8, '.0%')) display?

Options:

A.  

80%

B.  

8%

C.  

.08%

D.  

8.8%

Discussion 0
Questions 91

Refer to the exhibit. Which two configurations enable R1 and R2 to advertise routes into OSPF? (Choose two)

A)

B)

C)

D)

E)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

E) Option E

Discussion 0
Questions 92

Which of the following are examples of Type 2 hypervisors? (Choose three.)

Options:

A.  

VMware ESXi

B.  

Oracle VirtualBox

C.  

Oracle Solaris Zones

D.  

Microsoft Hyper-V

E.  

Microsoft Virtual PC

Discussion 0
Questions 93

Refer to the exhibit.

An engineer configures a new WLAN that will be used for secure communications; however, wireless clients report that they are able to communicate with each other. Which action resolves this issue?

Options:

A.  

Enable Client Exclusions.

B.  

Disable Aironet IE

C.  

Enable Wi-Fi Direct Client Policy

D.  

Enable P2P Blocking.

Discussion 0
Questions 94

Which two methods are used to assign security group tags to the user in a Cisco Trust Sec architecture? (Choose two )

Options:

A.  

modular QoS

B.  

policy routing

C.  

web authentication

D.  

DHCP

E.  

IEEE 802.1x

Discussion 0
Questions 95

Which configuration enables a device to be configured via NETCONF over SSHv2?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 96

In a Cisco SD-Access wireless environment, which device is responsible for hosting the anycast gateway?

Options:

A.  

fusion router

B.  

control plane node

C.  

fabric border node

D.  

fabric edge node

Discussion 0
Questions 97

Drag and drop the automation characteristics from the left onto the corresponding tools on the right.

Options:

Discussion 0
Questions 98

Refer to the exhibit.

The server in DC2 is expecting traffic from the database in DC1 to use the source network of 10.50.250.0/24. The server sends the initial request. The inside global IP is configured for 10.50.250.1. What is the result of this configuration?

Options:

A.  

Only the server can initiate communication.

B.  

The server and the database cannot communicate.

C.  

The server and the database can initiate communication.

D.  

Only the database can initiate communication

Discussion 0
Questions 99

Refer to the exhibit. Which command set completes the ERSPAN session configuration?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 100

Refer to the exhibit Which two commands are required on route» R1 to block FTP and allow all other traffic from the Branch 2 network’ (Choose two)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

E.  

Option E

Discussion 0
Questions 101

Which Python library is used to work with YANG data models via NETCONF?

Options:

A.  

Postman

B.  

requests

C.  

nccllent

D.  

cURL

Discussion 0
Questions 102

An engineer must protect the password for the VTY lines against over-the-shoulder attacks. Which configuration should be applied?

Options:

A.  

service password-encryption

B.  

username netadmin secret 9 $9$vFpMf8elb4RVV8$seZ/bDA

C.  

username netadmin secret 7$1$42J36k33008Pyh4QzwXyZ4

D.  

line vty 0 15 p3ssword XD822j

Discussion 0
Questions 103

An engineer is configuring RADIUS-Based Authentication with EAP. MS-CHAPv2 is configured on a client device. Which outer method protocol must be configured on the ISE to support this authentication type?

Options:

A.  

EAP-TLS

B.  

EAP-FAST

C.  

LDAP

D.  

PEAP

Discussion 0
Questions 104

Which two steps are required for a complete Cisco DNA Center upgrade? (Choose two.)

Options:

A.  

golden image selection

B.  

automation backup

C.  

proxy configuration

D.  

application updates

E.  

system update

Discussion 0
Questions 105

Refer to the exhibit. An engineer must allow the FTP traffic from users on 172.16.1.0 /24 to 172.16.2.0 /24 and block all other traffic. Which configuration must be applied?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 106

Refer to the exhibit Users cannot reach the web server at 192.168 100 1. What is the root cause for the failure?

Options:

A.  

The server is attempting to load balance between links 10.100 100.1 and 10 100.200.1.

B.  

The server is out of service.

C.  

There is a loop in the path to the server.

D.  

The gateway cannot translate the server domain name.

Discussion 0
Questions 107

What is the process for moving a virtual machine from one host machine to another with no downtime?

Options:

A.  

high availability

B.  

disaster recovery

C.  

live migration

D.  

multisite replication

Discussion 0
Questions 108

A network engineer is enabling HTTPS access to the core switch, which requires a certificate to be installed on the switch signed by the corporate certificate authority Which configuration commands are required to issue a certificate signing request from the core switch?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 109

An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy. Which device presents the web authentication for the WLAN?

Options:

A.  

ISE server

B.  

local WLC

C.  

RADIUS server

D.  

anchor WLC

Discussion 0
Questions 110

Drag and drop the characteristics from the left onto the routing protocols they describe on the right.

Options:

Discussion 0
Questions 111

An engineer must create an EEM script to enable OSPF debugging in the event the OSPF neighborship goes down. Which script must the engineer apply?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0