You are on page 1of 51
Taken on 2nd Sep Serecenm res tram aleny anacmatemy be wea re 6103 We R1(config#logging host 10.0.1.24 “1 R1(configtip flow-export version 9 R1(config}#ip flow-export destination Ri (config)#interface gigabit 4 R1(config-if#ip flow ingress R1(config-if}#ip flow egress @ R2#show ip traffic [Z/R1#show ip “oh lé OR1(config#snm| ible traps: R1 (config) rver host 10.0.1.21 traps version 3 Taken on 2nd Sep R1(config-ifip ospf network point-to-point R2(confg-iflinterface Gi0/0 a> R2(config-if)ip ospf network point-to-poi » R1(config-ifinterface Gi0/0 R1(config-ifjip ospf priority 1 R2(config-ifjinterface Gi0/0 R2(config-ifjip ospf priority » R1(config-ifinterface Gil Ri (config-ifjip ospf n R2(config-ifpi R2(config- broadcast Rilo 0 boii Ri (cenfia database-filter all out ifig-if)i ice Gi0/0 \9-ifip ospf database-filter all out Taken on 2nd Sep device params=fname'nexus}) am: fer to the exhibt What does he snippet of cose achieve? ‘© tereates a temporary connection to a Cisco News device and eieves token tobe use for AP als (topens an niet connecton toa Cisco News device ard mains for he duration of he conten ‘© Mopens.a tunnel and encapsulates the login information ifthe host key is covect. ‘© tereates an SSH connection using the SSH Ky thai seed, and he passwords ignored ye + Renate Betinatigh Sex 's the JSON syntax that is formed from the data? 1, Age’ 75, Alive: true, Favorite Foods: [Cereal, Mustard, Onions} ‘Name’ “Bob Johnson’, “Age” Seventyfive, “Alive”: tue, “Favorite Foods’ Cereal, Mustard’, “Onions"]) © (Name’ "Bob Johnson’, ‘Age': 75, Ale’: True, Favorite Foods’ Cereal, "Mustard, Onions} Taken on 2nd Sep Which two threats does AMP4E have the ability to block? (Choose two.) _ W@iransomware (@ Microsoft Word macro attack {SAL injection & (Gemail phishing © @DDos What does Gall Admission Control require the client to send if ‘the bandwidth? © WiFi muttimedia {itraffic specification © VoIP media session awareness @ SIP flow information When voice senioes are deployed oFastane © priory qseuing ‘Bedynamic wand pom cota, x yment, which service must be sable to ensure the quality of cas? Taken on 2nd Sep Which OSPF network types are compatible and allow communication through the two peering devices? © broadcast to point-to-point © point-to-multipoint to broadcast {jbroadcast to nonbroadcast © point-to-multipoint to nonbroadcast Which characteristic distinguishes Ansible from Chef? © Ansible uses Ruby to manage configurations. Chef uses YAML to manage configur (© The Ansible server can run on Linux, Unix or Windows. The Chef server Linux de Ur © Ansible lacks redundancy support forthe primary server. Chef runs 1 in 2tiWelactive mode. ry set |@iAnsible pushes the configuration to the client Chef client pulls ration ‘server. ‘An engineer must conigue the strongest password a ‘ona rete. Which configuration must be used? © username netadimin secret § $1851 u8K208S1 © username netadmin secret $1864, {Eline Console 0 assiord StSb1UuS © username netadmin secret 9 tee essa tare rn es me econ AEE nt nd ne ais ter ata eto sare onesteiac econo Taken on 2nd Sep \What is the primary responsibility of the vBond orchestrator? © te configure NAT communication on WAN Edge routers © te provide configuration synchronization of all WAN Edge devices (to facilitate start-up by performing authentication and authorization of all elements into the network © to provide centralized management and provisioning of all elements into the network Which technology provides a secure communication channel forall trafic at Layer 2 of IPsec osst © Cisco TrustSec WBIMACsec lied in the LAN network segment, wil facltate Layer 5 CAPWAP discovery Tor ighiweight AP? (Choose two.) oe onthe switch pot lize DHCP option 43. (a Certigure WLC IP address on LAN switch, (a Unie DHCP option 17. | Configure an ip helper adress on the outer interface, Taken on 2nd Sep When is an external antenna used inside a building? © only when using 5 GHz only when using 2.4 GHz éjwhen it provides the required coverage © only when using Mobility Express \BIANETCONF request was made for a data mde! hat does rot xs, ©A NETCONF message win vad content based en the YANG data models mace, bu the Fest fled (© The NETCONE running dase is caren locked 6 The device ecved avatd NETCONF request and served Which solution do laaS service provi to extend, 2 segment across a Layer 3 network? @VUAN ovrer HEVXLAN ‘ata made ina multvendor environment? coach to contiguaton and management agurication secuny with binary-encoded protocels smouing the dstincbon betwaen coniiguation and runtime state data lowering CPU load curred ta managed devices Taken on 2nd Sep congigure tazminal Sp dlowexpoct destination 192.268.20.2 9992 Sp Elowenport version ® Refer to the exhibit Whats required to configure a second export destination for P adress 182.169.10.17 © Specty a cifferent fow 1D. © Configure aversion § flon-expor tothe same destination. © Specify a RF. [Bi Speciy a ferent UDP por. © Specityaciferent TOP port Which measure is used by an NTP server to indicate its closeness t@ the ai source? © time zone © latency = % @ hop count Yy Which two components by LISP? (Choose two.) iZiproxy ETT Sette ates her crac ei LU nettoab teen acs rey ts heats ane eNrnge Pe Rec NeW elas RS? Ri(config}#router bgp 1 R1(config-router}#neighbor 192.168.10.2 remote-as 2 R1(config-router)#network 10.0.0.0 mask 255.0.0.0 R2(config}#router bg} R2(config- rote enelghbor 12: 168.10.1 remote-as4 R2(config-router)#network 10.0.0.0 mask 255.0.0.0 Ri(config}#router bgp 1 R1(config-router}#neighbor 10.2.2.2 remote-as 2 R1(config-router}#neighbor 10.2.2.2 update-source 1o0 Ri(config-router}#network 10.1.1.0 mask 258:255.255.0 R2(config}#router bgp 2 R2(config-router}#neighbor 10.1.1.1 remote-as 1 R2(config-router}#neighbor 10.1.1.1 update-source 100 R2(config-router}#network 10.2:2.0 mask 255.255.255.0 fS}R1(config}#router bgp 1 "R1(config-router)#neighbor 192.168.10.2 remote-as 2 R1(config-roufer}#network 10.1.1.0 mask 255.255.255.0 R2(configtrouter by R2(config- Mpeniialgnbor 192.168.10.1 remote-as 1 R2(config-router}#network 10.2.2.0 mask 255.255.255.0 RI Reni roman bgp 1 R1(Config-router}#neighbor 10.2.2.2 remote-as 2 R1(config-router}#network 10.1.1.0 mask 255.255.255.0 R2(config}#router bgp 2 Ra{config-router}énelghbor 10.1.1.1 remote-as 1 R2(config-router)#network 10.2.2.0 mask 255.255.255.0 Taken on 2nd Sep { een C "family": "Routers", *intertaceCount". "12", “lineCardCount": “9°, “platformid”: "ASR1001-X", “reachabilityFailureReason": ™, *reachabiltyStatus” ennai “hostname”: "RouterASR-1”, “macAddress”: "00:c8:8b'80'bb:00", ‘ “amy: "Schas ond Hubs’ “platformid*: °C9300.24UX", “teachabilityFailureReason”. ™, *reachabiltyStatus" “Authentication Failed”, “hostname”: "cat9000-1", “macAddress”: '8:7b:20'67:62:80", “family”: "Switches and Hubs", ‘interlace Count: "so", ‘lineCardCount’: "2", ‘latformid: ‘WS-C3850-48U-E", “FeecnantyraturcReason” es “TeachabityStlus: “Unread “hostname”: Tnochdaess! cea et 5 Cisco DNA Center has the incorrect credentials for RouterASR-1 Taken on 2nd Sep When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default por? © logging host 10.2..4 vrf mgmt transport udp port 6514 © logging host 10.2:.4 vet mgmt transport tep port 514 © logging host 10.2.4 vrf mgmt transport udp port $14 legging host 10.2.3.4 vrf mgmt transport tep port 6514 ‘Which devices does Cisco DNA Center configure when deploying an IP-based Bjall devices integrating with ISE © selected individual devices @ all devices in selected sites all wired devices A ‘Which benefits offered by a cloud i re depl is lacking in an on-premises deployment? Hleficient scalability @ storage capacity Taken on 2nd Sep 254 192.168.12.0024 192.168.1.0024 4 Frame 7: 186 bytes on wire (888 bits), 196 bytes captured (sis bits) Ethernet 11, sre: vmare. Ber O01 = Header Length: 20 bytes Differentiated Services Field: 0100 (OSC otal Length: 92 éentification: @x02c? (967) Flags: 0x00 Frageert offset: 0 baa a) Source: 192.168.1. Destinetion; 192.166,3.2 0, cone The paoatreane Fan he FTL exes > Repeat aT eeeted mesg Foes nth aT ceded mesons Taken on 2nd Sep Interface Goo Ip ddcress 209.15 200228 255.256 258.226 Ibnatousige Interface cor Ipadcress 0.11.1 286.206.2880 ipnatineige Ip natinside source stati top 208.165.200.226 8 Interface G00 Ip aderess 200.188.200.228 288 Tp natinsige Interface cot Ipadcress 10.44.4256 IBratousiae Ip natinside 1tep 10:44 8080 200.168.200.228 80 leertace Ipadcress 256.258.266.226 Ipratowsige 4 255.266.2550 cs precoder DEE me ott ' papa lala a lp natinside source sta top 208.165.200.228 8010.11.10 8080 Taken on 2nd Sep . ‘ \ BS'o—_‘a@ : J eri 4 209.165202.132/00 * peer 172.26.109.2/39 . (00) 172.28.109.1130 . ; ! > BR 1 209.165 200.2280) BRI router bgp 100 neighbor 172 24.109.1 remote-as 100 neighbor 172 24.109.1 next-hop-seif 35 202,133 remote-as 100 ‘neighbor 209,165 202.134 remate-as 200, BR2 router bgp 100 router bgp 300, neighbor 172.24. 109.2 remo bgp log-neighbor-changes neighbor 172.24 109.2 next-n neighbor 209.165.200.229 remote-as 100 neighbor 209.165. 300 Set the origin to igp on BR2 toward PE2 inbound © Set the local preference to 150 on PE1 toward BR1 outbound. © Set the weight attribute to 65,535 on BR1 toward PE1. Taken on 2nd Sep sord111024 Trane 247 158 bytes on wire (lies bits), 158 bytes captured (1100 bl Ethernet II, Sre: 50:00:00:01:00:01 (50:00:00:01:00:01), Dst: 50: Internet Protocol Version 4, Sre: 209.165.202.130, Dst: 209.165. Generic Routing Encapsulation (IP) Internet Protocol Version 4, Src: 10.111.111.1, Ost: 10. Internet Control Message Protocol Refer to the exhibit. A GRE tunnel has been created between is he tunnel IP on the HO router? ejtoanan oro. Windows bagstuis (© 209.165:202,120, (© 208.165.202.134 Taken on 2nd Sep Saco nes wg oa a ono Ae a ea omc tes Ot a SW1 (config) # ip access-list extended DeNY-HTTP Swi (config-ext-naci# [__pwmt |tcp host 10.1.1.10 host 10,141.20 6g www SW1 (config) # ip access-List extended MATCH_ALL ‘SW1(config-ext-naci)# [__pemt Jip any any SWI (config) # vlan access-map HOST-A-B 1 ‘SW1(config-access-map)# match ip address DENY-#T ‘SW1 (config-access-map) # ‘SW1 (config)# vlan access-map Ho: ‘SW1 (config-access-map)# mat ‘Sw (config-access-map) # ‘Swi (config) #/ vlan ACB vlan 10 ‘action op fier emt deny match x aken on 2nd Sep Flags Do downs P «in portchannal 1 fandatone 5 suspense > hotestanty (UP only) il tyed Se lye Ul ia'cse fated to allocate agrenstor 12 eaustebde dor tontng SS Salting to be aupregtes 3. Geta pore hiner of aegrenators i rn igh oars) eal ‘Siterktshow etherchenel port-chenel ‘Chanrel-grsp isting: Taken on 2nd Sep en condgaton reste aroun of SH tai ata rar accept 100 pe? Taken on 2nd Sep a .3(config}#route-map PREPEND permit 10 R3(config-route-map)#set as-path prepend R3(config}#router bg| Aetconte rca ae uhior 10.1.1. PEND out R4(config}#route-map PREPEN| R4(config-route-map)#set a: re J 200 200 200 R4(config}frouter bgp R4(config-router}#nei: 0. route-map PREPEND out > R4(config}#rot PEND permit 10 R4(config- t as-path prepend 100 100 100 jp 200 eighbor 10.2.2.2 route-map PREPEND in ap PREPEND permit 41 ute-map}#set as-path ody 100 100 100 ifig}#router bgp 200 R3(config-router)#neighbor 10.1.1.4 route-map PREPEND in Taken on 2nd Sep Taken on 2nd Sep Fast Transition Fast Transition (| PME Protected Management Frame WPA+WPA2 Parameters WPA Policy WPA2 Policy-AES 802.1X CCKM a 4 Authentication Key Management A Enable Enable en Taken on 2nd Sep interface Vian10 ip vrf forwarding Clients ip address 192.168.1.1 255.255.255.0 ! interface Vian20 ip vrf forwarding Servers ip address 172.16.1.1 255.255.255.0 ! interface Vian30 ip vrf forwarding Printers ip address 10.1.1.1 255.255.255.0 ~ Output omitted for brevity — router eigrp 1 10.0.0.0 172.16.0.0 192.168,1.0 Se = opt oranda Pras Taken on 2nd Sep What is one fact about Cisco SD-Access wireless network deployments? © The WLC is part of the fabric underlay. © The wireless client is part of the fabric overlay, ijThe access point is part of the fabric overlay. © The access point is part of the fabric underlay « ‘fete amt nen ru la omar ey cece Skat names as ‘imagens numero anovnse 220202 ioemeningheconkgaon 17220202 soe yn ICNP ech bth eae ao bread ate eres kre bahar? Te soucesrtetce scotgves nancty [sth eats emsen re acai (0 Teds msde 17230307 empet Taken on 2nd Sep Rifshow ip bap BGP table vorsion s 32, local routor 1D is 192.168.1015 Status codes: S suppressed, d damped, history, vad, > best | intemal, RIB-lalure,§ Stale, m multipath, b backup-path RT-Fier, x bestexiomal, a adabonal-path, cRIB-compressod, Origin codes: - IGP, e - EGP. ?- incomplete RPK validation codes: V valid | invalid. N Not found Network Next Hop Matric LocPrt Weight Path 192.168.1020 19216810118 80 192168 1011480 192,168 101.10, 492 168 1012 192 168.1016 Refer'o the exhibit Which IP adress becomes the active next hop for 182 168 102028 when 192 168.1012 fais? > 162.168101.14 mt62 168 101.18 192.166 101.10 192.168.1016 inverace F0/0 {Padsrese 372303203 standby ip 17230... Fefertothe exibe Which confguratn Rt Eandby pram andby pricy 100 Ra Standby # peg 99 sandy wert lr | & R2 09 = Taken on 2nd Sep Which protocol does REST API rely on to secure the communication channel? @TcPp @SSH Relerto the exhibt An engineer must congue a SPAN session Wha isthe fect fhe © Tea sent on VLANs 10 and 12 ons copied and sent intetace gOt © Tate sent on VLANS 1,11, and 12 copied and sett interface grt © Trafic received on VUANS 10 and 12 onli copied and sent io ‘ [Bia received on VLANS 10,1, and 12 copied and sent to What is a Type 2 hypervisor? Wjinstalled as an application on an| it ting system © runs directly on a physi its own operating system © supports over-all of | resources also referred t because it sits directly on the physical server oh Taken on 2nd Sep ‘What is the difference between the MAC addr eee ene Ven ogee cere oven sere 1215800207 o Rear haps eae ta lower (es seventh devrait Ye » Rover Nowe bacaua «has ahha router IO o Ts segverthas no seer because i erates er T © Router prefix lookups happen in TCAM, is, TCAM requires an exact match ACL and QoS information is stored in CAM. Taken on 2nd Sep (© SPAN session? mentors al afc entering and exang port FatEtberet 15. (© RSPAN session 1 montrsacvty en VLAN 50 of @remete suitch (© SPAN session2 only monitors eres afc exting port Fasttnemet O14 Which two threats does AMP4E have the al bl hoose two.) W@iransomware 7 (@ Microsoft Word macro attack {SAL injection i (Gemail phishing Ay @DDos in the LAN network segment, wil facile Layers GAPWAP cscovery for bghtweight AP? (Ghoose two) the switch pot fegien 42 igure WLC IP adress on LAN switch (a Unie DHCP option 17. | Configure an ip helper adress on the outer interface, Taken | on n 2nd Sep - stave Which measure is used by an N to in its closeness to the authoritative time source? @ time zone @ latency Taken on 2nd Sep What is a benefit of data modeling languages like YANG? [They provide a standardized data structure, which results in configuration scalability and consistency, © They create more secure and efficient SNMP OIDs. © They enable programmers to change or write their own applications within the device operating system. © They make the CLI simpler and more efficient. What is a benefit of data modeling languages like YANG? [They provide a standardized data structure, which results in configuration scalability and © They create more secure and efficient SNMP OIDs. © They enable programmers to change or write their own applications within the © They make the CLI simpler and more efficient. Which characteristic distinguishes Ansible from Chef? (© Ansible uses Ruby to manage configurations. Chef uses YAML (© The Ansible server can run on Linux, Unix or Windows, server Mist run on Linux or Unix. (© Ansible lacks redundancy support for the primary runs fe primary servers in actvelactive mode [Anil pushes the configuration tothe client. pull figuration from the server What are two char 1? (Choose two) lt lacks su host Layer 3 overlay networks over a Layer 2 underlay. identifier. Ps to encapsulate and decapsulate frames. Me allows for up to 16 million VXLAN segments.

You might also like