|What are two protocols within the IPsec suite? (Choose two) TLS AES 3DES ESP AH.
What is the functionality of the Cisco DNA Center? IP address pool distribution scheduler data center network policy controller software-defined controller for automation of devices and services console server that permits secure access to all network devices.
The network engineer is configuring a new WLAN and is told to use a setup password for authentication instead of the RADIUS servers. Which additional set of tasks must the engineer perform to complete the configuration? Select WPA Policy
Select WPA2 Policy
Enable FT PSK Select WPA Policy
Enable PSK Select WPA2 Policy
Enable PSK Disable PMF
Which two server types support domain name to IP address resolution? (Choose two) web ESX host file transfer authoritative resolver.
QUESTIONS PART 12 - Question 38 a b c d.
When is the PUT method used within HTTP? to display a web site to update a DNS server when a nonidempotent operation is needed when a read-only operation is required.
Drag and drop the AAA features from the left onto the corresponding AAA security services on the right. Not all options are used It records the amount of time for which a user accesses the network on a remote server It uses TACACS+ to log the configuration commands entered by a network administrator It leverages a RADIUS server to grant user access to a reverse Telnet session It verifies the user before granting access to the device It enables the device to allow user- or group-based access It restricts the CLI commands that a user is able to perform.
Which two commands must be configured on router R1 to enable the router to accept secure remote-access connections? (Choose two) transport input telnet login console ip ssh pubkey-chain crypto key generate rsa username cisco password 0 cisco.
Which two values or settings must be entered when configuring a new WLAN in the Cisco Wireless LAN Controller GUI? (Choose two) SSID QoS settings ip address of one or more access points Profile name management interface settings.
Which type of API allows SDN controllers to dynamically make changes to the network? SOAP API southbound API northbound API REST API.
Which interface enables communication between a program on the controller and a program on the networking devices? software virtual interface tunnel interface northbound interface southbound interface.
A network engineer is configuring a switch so that it is remotely reachable via SSH. The engineer has already configured the host name on the router. Which additional command must the engineer configure before entering the command to generate the RSA key? ip ssh authentication-retries 2 ip domain-name domain password password crypto key generate rsa modulus 1024.
Which interface mode must be configured to connect the lightweight APs in a centralized architecture? management access WLAN dynamic trunk.
An engineer built a new L2 LACP EtherChannel between SW1 and SW2 and executed these show commands to verify the work. Which additional task allows the two switches to establish an LACP port channel? Change the channel-group mode on SW1 to desirable. Change the channel-group mode on SW2 to auto. Change the channel-group mode on SW1 to active or passive. Configure the interface port-channel 1 command on both switches.
What are two purposes of launching a reconnaissance attack on a network? (Choose two) to gather information about the network and devices to retrieve and modify data to scan for accessibility to escalate access privileges to prevent other users from accessing the system.
110 193 84 192 128.
Which QoS tool can you use to optimize voice traffic on a network that is primarily intended for data traffic? WFQ WRED PQ FIFO.
An engineer must configure interswitch VLAN communication between a Cisco switch and a third-party switch. Which action should be taken? configure ISL configure DSCP configure IEEE 802.1q configure IEEE 802.1p.
Which command must be present in a Cisco Device configuration to enable the device to resolve an FQDN? ip host ip domain-lookup ip name-server ip domain-name.
What is the collapsed layer in collapsed core architectures? distribution and access core and distribution access and WAN core and WAN.
An engineer is checking the routing table in the main router to identify the path to a server on the network. Which route does the router use to reach the server at 192.168.2.2? S 192.168.2.0/28 [1/0] via 10.1.1.1 S 192.168.1.0/30(1/0] via 10.1.1.1 S 192.168.0.0/20 [1/0] via 10.1.1.1 S 192.168.2.0/29 [1/0] via 10.1.1.1.
Which statement about Link Aggregation when implemented on a Cisco Wireless LAN Controller is true? To pass client traffic two or more ports must be configured One functional physical port is needed to pass client traffic The EtherChannel must be configured in “mode active” When enabled the WLC bandwidth drops to 500 Mbps.
Which command entered on a switch configured with Rapid-PVST+ listens and learns for a specific time period? switch(config)#spanning-tree vlan 1 max-age 6 switch(config)#spanning-tree vlan 1 forward-time 20 switch(config)#spanning-tree vlan 1 hello-time 10 switch(config)#spanning-tree vlan 1 priority 4096.
What are two roles of the Dynamic Host Configuration Protocol (DHCP)? (Choose two) The DHCP server leases client IP addresses dynamically The DHCP client can request up to four DNS server addresses The DHCP client maintains a pool of IP addresses it can assign The DHCP server assigns IP addresses without requiring the client to renew them The DHCP server offers the ability to exclude specific IP addresses from a pool of IP .
By default, how does EIGRP determine the metric of a route for the routing table? It counts the number of hops between the receiving and destination routers and uses that value as the metric It uses the bandwidth and delay values of the path to calculate the route metric It uses a default metric of 10 for all routes that are learned by the router It uses a reference Bandwidth and the actual bandwidth of the connected link to calculate the route metric.
Which type of VPN uses a hub-and-spoke configuration to establish a full mesh topology? dynamic multipoint VPN MPLS VPN IPsec virtual tunnel interface GRE over IPsec.
Which command configures the Cisco WLC to prevent a serial session with the WLC CLI from being automatically logged out? config sessions maxsessions 0 config serial timeout 0 config sessions timeout 0 config serial timeout 9600.
What is an advantage of using auto mode versus static mode for power allocation when an access point is connected to a PoE switch port? Power policing is enabled at the same timewrong All four pairs of the cable are used It detects the device is a powered device The default level is used for the access point.
Which command is used to specify the delay time in seconds for LLDP to initialize on any interface? lldp holdtime lldp reinit lldp timer lldp tlv-select.
What is a difference between local AP mode and FlexConnet AP mode? FlexConnect AP mode fails to function if me AP loses connectivity with the WLC Local AP mode causes the AP to behave as if it were an autonomous AP Local AP mode creates two CAPWAP tunnels per AP to the WLC FlexConnect AP mode bridges the traffic from the AP to the WLC when local switching is configured.
Which two features introduced in SNMPv2 provides the ability to retrieve large amounts of data in one request? (Choose two) GetNext Set Get GetBulk Inform.
R1 has learned route 192.168.12.0/24 via IS-IS, OSPF, RIP and Internal EIGRP. Under normal operating conditions, which routing protocol is installed in the routing table? RIP OSPF IS-IS Internal EIGRP.
What are two benefits of network automation? (Choose two) reduced operational costs faster changes with more reliable results fewer network failures reduced hardware footprint increased network security.
A router running EIGRP has learned the same route from two different paths. Which parameter does the router use to select the best path? administrative distance metric as-path cost.
Which option best describes an API? a stateless client-server model request a certain type of data by specifying the URL path that models the data communication often uses either Java scripting, Python, XML, or simple HTTP an architectural style (versus a protocol) for designing applications.
What is a benefit of using a Cisco Wireless LAN Controller? Central AP management requires more complex configurations It supports autonomous and lightweight APs It eliminates the need to configure each access point individually Unique SSIDs cannot use the same authentication method.
A public IPv6 address must be configured for internet access. Which command must be configured on the R2 WAN interface to the service provider? pv6 address fe80::260:3EFF:FE11:6770 link-local ipv6 address fe80: :/10 ipv6 address 2001:db8:123:45::4/64 ipv6 address 2001:db8:433:47:4620:ffff:ffff:ffff/64 anycast.
Drag and drop the QoS congestion management terms from the left onto the description on the right. services a specified number of bytes in one queue before continuing to the next queue provides guaranteed bandwidth to a specified class of traffic places packets into one of four priority-based queues provides minimum guaranteed bandwidth to one or more flows uses store-and-forward queuing.
Which statement about the Cisco ACI fabric is most accurate? The APIC is able to enforce security by inserting itself into the data path. An APIC is a cluster of at least three APIC controllers, providing a single point of management without a single point of failure The fabric header carries the EPG from the egress to the ingress leaf switch. The spine switch rewrites the EPG from ingress to egress when it performs the forwarding proxy function.
Which two command sequences must you configure on a switch to establish a Layer 3 EtherChannel with an open-standard protocol? (Choose two) interface port-channel 10
switchport mode trunk interface port-channel 10
ip address 172.16.0.1 255.255.255.0 interface GigabitEthernet0/0/1
channel-group 10 mode on interface GigabitEthernet0/0/1
channel-group 10 mode auto interface GigabitEthernet0/0/1
channel-group 10 mode active.
Refer to the exhibit. Refer to the exhibit. After the configuration is applied, the two routers fail to establish an OSPF neighbor relationship. what is the reason for the problem? The OSPF process IDs are mismatched The OSPF router IDs are mismatched The network statement on Router1 is misconfigured Router2 is using the default hello timer.
Which two commands must be added to update the configuration of router R1 so that it accepts only encrypted connections? (Choose two) crypto key generate rsa 1024 line vty 0 4 username CNAC secret R!41!4319115@ ip ssh version 2 transport input ssh.
What are two reasons for an engineer to configure a floating static route? (Choose two) to enable fallback static routing when the dynamic routing protocol fails to route traffic differently based on the source IP of the packet to control the return path of traffic that is sent from the router to support load balancing via static routing to automatically route traffic on a secondary path when the primary path goes down.
Refer to exhibit. How does SW2 interact with other switches in this VTP domain? It transmits and processes VTP updates from any VTP Clients on the network on its trunk ports It forwards only the VTP advertisements that it receives on its trunk ports It processes VTP updates from any VTP clients on the network on its access ports It receives updates from all VTP servers and forwards all locally configured VLANs out all trunk ports.
Which cloud service that usually provides software beyond the basic operating system is normally used for development? infrastructure-as-a-service database-as-a-service software-as-a-service platform-as-a-service.
An organization has decided to start using cloud-provided services. Which cloud service allows the organization to install its own operating system on a virtual machine? platform-as-a-service software-as-a-service network-as-a-service infrastructure-as-a-service.
What role does a hypervisor provide for each virtual machine in server virtualization? control and distribution of physical resources infrastructure-as-a-service software-as-a-service services as a hardware controller.
A manager asks a network engineer to advise which cloud service models are used so employees do not have to waste their time installing, managing, and updating software which is only used occasionally. Which cloud service model does the engineer recommend? infrastructure-as-a-service business process as service to support different types of service platform-as-a-service software-as-a-service.
What is a function of Wireless LAN Controller? use SSIDs to distinguish between wireless clients send LWAPP packets to access points monitor activity on wireless and wired LANs register with a single access point that controls traffic between wired and wireless endpoints.
What is a feature of WPA? preshared key TKIP/MIC encryption small Wi-Fi application 802.1x authentication.