preparacion test1
![]() |
![]() |
![]() |
Título del Test:![]() preparacion test1 Descripción: networking |




Comentarios |
---|
NO HAY REGISTROS |
How does EIGRP differ from OSPF?. EIGRP is more prone to routing loops than OSPF. EIGRP supports equal or unequal path cost, and OSPF supports only equal path cost. EIGRP has a full map of the topology, and OSPF only knows directly connected neighbors. EIGRP uses more CPU and memory than OSPF. A port channel is configured between SW2 and SW3. SW2 is not running Cisco operating system. When all physical connections are made, the port channel does not establish. Based on the configuration excerpt of SW3, what is the cause of the problem?. The port channel on SW2 is using an incompatible protocol. The port-channel trunk is not allowing the native VLAN. The port-channel should be set to auto. The port-channel interface lead balance should be set to src-mac. A customer requests a network design that supports these requirements: * FHRP redundancy * multivendor router environment * IPv4 and IPv6 hosts Which protocol does the design include?. GLBP. VRRP version 2. VRRP version 3. HSRP version 2. What is the function of a control-plane node in a Cisco SD-Access solution?. to connect APs and wireless endpoints to the SD-Access fabric. to connect external Layer 3 networks to the SD Access fabric. to implement policies and communicate with networks outside the fabric. to run a mapping system that manages endpoint to network device relationships. A company plans to implement intent-based networking in its campus infrastructure. Which design facilities a migrate from a traditional campus design to a programmer fabric designer?. Layer 2 access. three-tier. two-tier. routed access. A customer has completed the installation of a Wi-Fi 6 greenfield deployment at their new campus. They want to leverage Wi-Fi 6 enhanced speeds on the trusted employee WLAN. To configure the employee WLAN, which two Layer 2 security policies should be used? (Choose two). WPA(AES). WPA2(AES). WEP. 802.1X. open. Which statement about a Cisco APIC controller versus a more traditional SDN controller is true?. APIC uses a policy agent to translate policies into instructions. APIC supports OpFlex as a Northbound protocol. APIC does support a Southbound REST API. APIC uses an imperative model. What are two methods of ensuring that the multicast RPF check passes without changing the unicast routing table? (Choose two). disabling BGP routing protocol. implementing static mroutes. disabling the interface of the router back to the multicast source. implementing MBGP. implementing OSPF routing protocol. What is a benefit of deploying an on-premises infrastructure versus a cloud infrastructure deployment?. faster deployment times because additional infrastructure does not need to be purchased. lower latency between systems that are physically located near each other. less power and cooling resources needed to run infrastructure on-premises. ability to quickly increase compute power without the need to install additional hardware. What is a benefit of a virtual machine when compared with a physical server?. Deploying a virtual machine is technically less complex than deploying a physical server. Virtual machines increase server processing performance. The CPU and RAM resources on a virtual machine cannot be affected by other virtual machines. Multiple virtual servers can be deployed on the same physical server without having to buy additional hardware. The following system log message is presented after a network administrator configures a GRE tunnel: Why is Tunnel 0 disabled?. Because the tunnel cannot reach its tunnel destination. Because the best path to the tunnel destination is through the tunnel itself. Because dynamic routing is not enabled. Because the router cannot recursively identify its egress forwarding interface. What is a VPN in a Cisco SD-WAN deployment?. virtual channel used to carry control plane information. attribute to identify a set of services offered in specific places in the SD -WAN fabric. common exchange point between two different services. virtualized environment that provides traffic isolation and segmentation in the SD -WAN fabric. Which function does a fabric edge node perform in an SD-Access deployment?. Connects the SD-Access fabric to another fabric or external Layer 3 networks. Connects endpoints to the fabric and forwards their traffic. Provides reachability border nodes in the fabric underlay. Encapsulates end-user data traffic into LIS. In a three-tier hierarchical campus network design, which action is a design best-practice for the core layer?. provide QoS prioritization services such as marking, queueing, and classification for critical network traffic. provide advanced network security features such as 802. IX, DHCP snooping, VACLs, and port security. provide redundant Layer 3 point-to-point links between the core devices for more predictable and faster convergence. provide redundant aggregation for access layer devices and first-hop redundancy protocols such as VRRP. Refer to the exhibit. R1(config)#ip sla 1 R1(config-ip-sla)#icmp-echo 172.20.20.2 source-interface FastEthernet1/0 R1(config-ip-sla-echo)#timeout 5000 R1(config-ip-sla-echo)#frequency 10 R1(config-ip-sla-echo)#threshold 500 R1(config)#ip sla schedule 1 start-time now life forever R1(config)#track 10 ip sla 1 reachability R1(config)#ip route 0.0.0.0 0.0.0.0 172.20.20.2 After implementing the configuration 172.20.20.2 stops replaying to ICMP echoes, but the default route fails to be removed. What is the reason for this behavior?. The source-interface is configured incorrectly. The destination must be 172.30.30.2 for icmp-echo. The default route is missing the track feature. The threshold value is wrong. Which measure is used by an NTP server to indicate its closeness to the authoritative time source?. stratum. hop count. time zone. latency. What is a characteristic of MACsec?. 802.1AE provides encryption and authentication services. 802.1AE is built between the host and switch using the MKA protocol, which negotiates encryption keys based on the master session key from a successful 802.1X session. 802.1AE is built between the host and switch using the MKA protocol using keys generated via the Diffie-Hellman algorithm (anonymous encryption mode). 802.1AE is negotiated using Cisco AnyConnect NAM and the SAP protocol. An engineer creates the configuration below. Drag and drop the authentication methods from the left into the order of priority on the right. Not all options are used. AAA servers of AAA_RADIUS group. tacacs servers of group ACE. AAA servers of group ACE. local configured username in non-case-sensitive format. local configured username in case-sensitive format. if no method works, then deny login. Which technology is used to provide Layer 2 and Layer 3 logical networks in the Cisco SD – Access architecture?. underlay network. overlay network. VPN routing/forwarding. easy virtual network. Drag and drop the characteristic from the left onto the orchestration tools that they describe on the right. uses playbooks. uses a pull model. procedural. declarative. Which controller is the single plane of management for Cisco SD-WAN?. vBond. vEdge. vSmart. vManage. Refer to the exhibit. Which two facts does the device output confirm? (Choose two). The device is using the default HSRP hello timer. The standby device is configured with the default HSRP priority. The device’s HSRP group uses the virtual IP address 10.0.3.242. The device is configured with the default HSRP priority. The device sends unicast messages to its peers. What are two characteristics of Cisco SD-Access elements? (Choose two). Fabric endpoints are connected directly to the border node. The border node is required for communication between fabric and nonfabric devices. The control plane node has the full RLOC-to-EID mapping database. Traffic within the fabric always goes through the control plane node. The border node has the full RLOC-to-EID mapping database. On which protocol or technology is the fabric data plane based in Cisco SD -Access fabric?. LISP. IS-IS. Cisco TrustSec. VXLAN. Which protocol is implemented to establish secure control plane adjacencies between Cisco SD-WAN nodes?. IKE. DTLS. IPsec. ESP. What happens to access interfaces where VLAN 222 is assigned?. They are placed into an inactive state. A description “RSPAN” is added. STP BPDU guard is enabled. They cannot provide PoE. An engineer must assign an IP address of 192.168.1.1/24 to the GigabitEthemet1 interface. Which two commands must be added to the existing configuration to accomplish this task? (Choose two). Router(config-vrf)#address-family ipv6. Router(config-if)#ip address 192.168.1.1 255.255.255.0. Router(config-vrf)#ip address 192.168.1.1 255.255.255.0. Router(config-if)#address-family ipv4. Router(config-vrf)#address-family ipv4. What is the process for moving a virtual machine from one host machine to another with no downtime?. live migration. disaster recovery. high availability. multisite replication. What is an emulated machine that has dedicated compute, memory, and storage resources and a fully installed operating system?. host. virtual machine. container. mainframe. Which two results occur if Cisco DNA Center loses connectivity to devices in the SD – Access fabric? (Choose two). All devices reload after detecting loss of connection to Cisco DNA Center. Already connected users are unaffected, but new users cannot connect. Users lose connectivity. Cisco DNA Center is unable to collect monitoring data in Assurance. User connectivity is unaffected. All switches are configured with the default port priority value. Which two commands ensure that traffic from PC1 is forwarded over Gi1/3 trunk port between DWS1 and DSW2? (Choose two). DWS1(config-if)#spanning-tree port-priority 0. DSW2(config-if)#spanning-tree port-priority 16. DSW1(config-if)#interface gi1/3. DSW2(config-if)#interface gi1/3. DSW2(config-if)#spanning-tree port-priority 128. Which two southbound interfaces originate from Cisco DNA Center and terminate at fabric underlay switches? (Choose two). UDP 67: DHCP. ICMP: Discovery. TCP 23: Telnet. UDP 162: SNMP. UDP 6007: NetFlow. Which method should an engineer use to deal with a long-standing contention issue between any two VMs on the same host?. Adjust the resource reservation limits. Reset the host. Reset the VM. Live migrate the VM to another host. What is the result when a switch that is running PVST+ is added to this network?. Spanning tree is disabled automatically on the network. DSW2 operates in Rapid PVST+ and the new switch operates in PVST+. Both switches operate in the PVST+ mode. Both switches operate in the Rapid PVST+ mode. After an engineer configures an EtherChannel between switch SW1 and switch SW2, this error message is logged on switch SW2. Based on the output from SW1 SW1#show rtherchannel summary Group port-channel protocol port ----------------------------------------- 1 Po1 (SD) and the log message received on Switch SW2, what action should the engineer take to resolve this issue?. Configure the same protocol on the EtherChannel on switch SW1 and SW2. Connect the configuration error on interface Gi0/1 on switch SW1. Define the correct port members on the EtherChannel on switch SW1. Correct the configuration error on interface Gi0/0 switch SW1. Drag and drop characteristics of PIM dense mode from the left to the right. requires a rendezvous point to deliver multicast traffic. builds source-based distribution trees. uses a pull model to distribute multicast traffic. uses a push model to distribute multicast traffic. uses prune mechanisms to stop unwanted multicast traffic. builds shared distribution trees. In a Cisco SD-WAN solution, how is the health of a data plane tunnel monitored?. with IP SLA. ARP probing. using BFD. with OMP. When a wired client connects to an edge switch in an SDA fabric, which component decides whether the client has access to the network?. control-plane node. Identity Service Engine. RADIUS server. edge node. What is provided by the Stealth watch component of the Cisco Cyber Threat Defense solution?. real-time threat management to stop DDoS attacks to the core and access networks. real-time awareness of users, devices and traffic on the network. malware control. dynamic threat control for web traffic. Which type of antenna is show on the radiation patterns?. Dipole. Yagi. Patch. Omnidirectional. What is the differences between TCAM and the MAC address table?. Router prefix lookups happens in CAM. MAC address table lookups happen in TCAM. The MAC address table is contained in CAM. ACL and QoS information is stored in TCAM. TCAM is used to make Layer 2 forwarding decisions. CAM is used to build routing tables. The MAC address table supports partial matches. TCAM requires an exact match. What is a characteristic of para-virtualization?. Para-virtualization guest servers are unaware of one another. Para-virtualization allows direct access between the guest OS and the hypervisor. Para-virtualization lacks support for containers. Para-virtualization allows the host hardware to be directly accessed. What is YANG used for?. scraping data via CLI. providing a transport for network configuration data between client and server. processing SNMP read-only polls. describing data models. What is the calculation that is used to measure the radiated power of a signal after it has gone through the radio, antenna cable, and antenna?. dBi. mW. dBm. EIRP. Which configuration must be applied to R1 to enable R1 to reach the server at 172.16.0.1?. interface Ethernet0/0 ip address 172.16.0.7 255.255.0.0 router ospf 44 vrf bank network 172.16.0.0 255.255.0.0. interface Ethernet0/0 vrf forwarding hotel ip address 172.16.0.7 255.255.0.0 router ospf 44 vrf Hotel network 172.16.0.0 0.0.255.255 area 0. interface Ethernet0/0 vrf forwarding bank ip address 172.16.0.7 255.255.0.0 router ospf 44 vrf bank network 172.16.0.0 0.0.255.255 area 0. interface Ethernet0/0 ip address 172.16.0.7 255.255.0.0 router ospf 44 vrf hotel network 172.16.0.0 255.255.0.0. Refer to the exhibit. What does the output confirm about the switch’s spanning tree configuration?. The spanning-tree mode stp ieee command was entered on this switch. The spanning-tree operation mode for this switch is PVST. The spanning-tree operation mode for this switch is IEEE. The spanning-tree operation mode for this switch is PVST+. Which solution do IaaS service providers use to extend a Layer 2 segment across a Layer 3 network?. VXLAN. VTEP. VLAN. VRF. Drag and drop the descriptions of the VSS technology from the left to the right. Not all options are used. supported on the cisco 4500 and 6500 series. combines exactly two devices. supported on cisco 3750 and 3850 devices. supports up to nine devices. uses proprietary cabling. support devices that are geographically separated. In an SD-Access solution what is the role of a fabric edge node?. to connect external Layer 3- network to the SD-Access fabric. to connect wired endpoint to the SD-Access fabric. to advertise fabric IP address space to external network. to connect the fusion router to the SD-Access fabric. Which action is the vSmart controller responsible for in an SD-WAN deployment?. onboard vEdge nodes into the SD-WAN fabric. distribute security information for tunnel establishment between vEdge routers. manage, maintain, and gather configuration and status for nodes within the SD -WAN fabric. gather telemetry data from vEdge routers. Which data is properly formatted with JSON?. {"name": "Peter", "age": "25","likesJson": true, "characteristics": ["small","strong",18]}. {"name": "Peter", "age": "25","likesJson": true, "characteristics": ["small","strong","18"],}. {"name": Peter, "age": 25,"likesJson": true, "characteristics": ["small","strong","18"],}. {"name":"Peter" "age":"25""likesJson":true "characteristics":["small","strong",18]}. Which benefit is offered by a cloud infrastructure deployment but is lacking in an on-premises deployment?. efficient scalability. virtualization. storage capacity. supported systems. How does Protocol Independent Multicast function?. It uses unicast routing information to perform the multicast forwarding function. It uses the multicast routing table to perform the multicast forwarding function. In sparse mode it establishes neighbor adjacencies and sends hello messages at 5 -second intervals. It uses broadcast routing information to perform the multicast forwarding function. A customer has recently implemented a new wireless infrastructure using WLC -5520S at a site directly next to a large commercial airport Users report that they intermittently lose Wi-Fi connectivity, and troubleshooting reveals it is due to frequent channel changes. Which two actions fix this issue? (Choose two). Remove UNII-2 and Extended UNII-2 channels from the 5 GHz channel list. Restore the DCA default settings because this automatically avoids channel interference. Disable DFS channels to prevent interference with Doppler radar. Enable DFS channels because they are immune to radar interference. Configure channels on the UNII-2 and the Extended UNII-2 sub-bands of the 5 GHz band only. Which two components are supported by LISP? (Choose two). proxy ETR. HMAC algorithm. route reflector. egress tunnel router. spoke. Which configuration change ensures that R1 is the active gateway whenever it is in a functional state for the 172.30.110.0/24 network?. R1 standby 1 preempt R2 standby 1 priority 90. R1 standby 1 preempt R2 standby 1 priority 100. R2 standby 1 priority 100 standby 1 preempt. R2 standby 1 priority 110 staandby 1 preempt. What are two features of NetFlow flow monitoring? (Choose two). Can track ingress and egress information. Include the flow record and the flow importer. Copies all ingress flow information to an interface. Does not required packet sampling on interfaces. Can be used to track multicast, MPLS, or bridged traffic. Drag and drop the characteristics from the left onto the QoS components they describe on the right. applied on traffic to convey information to a downstream device. permits traffic to passthrough the device while retaining DSCP/COS value. process used to buffer traffic that exceeds a predefined rate. distinguishes traffic types. Which two methods are used to reduce the AP coverage area? (Choose two). Reduce AP transmit power. Increase minimum mandatory data rate. Reduce channel width from 40 MHz to 20 MHz. Enable Fastlane. Disable 2.4 GHz and use only 5 GHz. What is the effect of introducing the sampler feature into the Flexible NetFlow configuration on the router?. NetFlow updates to the collector are sent 50% less frequently. Every second IPv4 packet is forwarded to the collector for inspection. CPU and memory utilization are reduced when compared with what is required for full NetFlow. The resolution of sampling data increases, but it requires more performance from the router. Which outcome is achieved with this Python code? client.connect (ip, port=22,username=usr, password=pswd) stdin, stdout, stderr = client.exec_command(‘show ip bgp 192.168.10100 bestpathn’) print(stdout). displays the output of the show command in a formatted way. connects to a Cisco device using SSH and exports the routing table information. connects to a Cisco device using Telnet and exports the routing table information. connects to a Cisco device using SSH and exports the BGP table for the prefix. Which technology does VXLAN use to provide segmentation for Layer 2 and Layer 3 traffic?. bridge domain. VLAN. VRF. VNI. What are two device roles in Cisco SD-Access fabric? (Choose two). core switch. vBond controller. edge node. access switch. border node. What is the recommended MTU size for a Cisco SD-Access Fabric?. 4464. 9100. 1500. 17914. A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Apply the crypto map to the tunnel interface and change the tunnel mode to tunnel mode ipsec ipv4. Remove all configuration related to crypto map from R1 and R2 and eliminate the ACL 100. Remove the crypto map and modify the ACL to allow traffic between 10.10.0.0/24 to 10.20.0.0/24. Create an IPsec profile, associate the transform-set, and apply the profile to the tunnel interface. Which two network problems indicate a need to implement QoS in a campus network? (Choose two). port flapping. misrouted network packets. excess jitter. bandwidth-related packet loss. duplicate IP addresses. What are two reasons a company would choose a cloud deployment over an on-prem deployment? (Choose two). Cloud deployments require long implementation times due to capital expenditure processes. OnPrem deployments can be accomplished quickly using operational expenditure processes. Cloud costs adjust up or down depending on the amount of resources consumed. On- Prem costs for hardware, power, and space are ongoing regardless of usage. In a cloud environment, the company controls technical issues. On-prem environments rely on the service provider to resolve technical issue. Cloud resources scale automatically to an increase in demand. On-prem requires additional capital expenditure. In a cloud environment, the company is in full control of access to their data. On-prem risks access to data due to service provider outages. Which two actions, when applied in the LAN network segment, will facilitate Layer 3 CAPWAP discovery for lightweight AP? (Choose two). Utilize DHCP option 17. Utilize DHCP option 43. Configure WLC IP address on LAN switch. Enable port security on the switch port. Configure an ip helper-address on the router interface. After a redundant route processor failure occurs on a Layer 3 device, which mechanism allows for packets to be forwarded from a neighboring router based on the most recent tables?. RPVST+. RP failover. BFD. NSF. Refer to the exhibit. Edge-01 track 10 interface GigabitEthernet0/0 line-protocol ! interface GigabitEthernet0/1 ip address 10.104.110.2 255.255.255.0 vrrp 10 ip 10.104.110.100 vrrp 10 priority 120 Edge-02 interface GigabitEthernet0/1 ip address 10.104.110.3 255.255.255.0 vrrp 10 ip 10.104.110.100 Object tracking has been configured for VRRP enabled routers Edge-01 and Edge-02. Which commands cause Edge-02 to preempt Edge-01 in the event that interface G0/0 goes down on Edge-01?. Edge-01(config)#interface G0/1 Edge-01(config-if)#vrrp 10 track 10 decrement 10. Edge-02(config)#interface G0/1 Edge-02(config-if)#vrrp 10 track 10 decrement 30. Edge-02(config)#interface G0/1 Edge-02(config-if)#vrrp 10 track 10 decrement 10. Edge-01(config)#interface G0/1 Edge-01(config-if)#vrrp 10 track 10 decrement 30. VLANs 50 and 60 exist on the trunk links between all switches. All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server. Which command ensures that SW3 receives frames only from VLAN 50?. SW1(config)#vtp pruning. SW3(config)#vtp mode transparent. SW2(config)#vtp pruning. SW1(config)#vtp mode transparent. Based on the output below, which Python code shows the value of the “upTime” key?. option a. option b. option c. option d. Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial?. under all network conditions. under network convergence conditions. under interface saturation conditions. under traffic classification and marking conditions. Which JSON syntax is derived from this data?. {[{'First Name': 'Johnny', 'Last Name': 'Table', 'Hobbies': ['Running', 'Video games']}, {'First Name': 'Billy', 'Last Name': 'Smith', 'Hobbies': ['Napping', 'Reading']}]}. {'Person': [{'First Name': 'Johnny', 'Last Name': 'Table', 'Hobbies': 'Running', 'Video games'}, {'First Name': 'Billy', 'Last Name': 'Smith', 'Hobbies': 'Napping', 'Reading'}]}. {[{'First Name': 'Johnny', 'Last Name': 'Table', 'Hobbies': 'Running', 'Hobbies': 'Video games'}, {'First Name': 'Billy', 'Last Name': 'Smith', 'Hobbies': 'Napping', 'Reading'}]}. {'Person': [{'First Name': 'Johnny', 'Last Name': 'Table', 'Hobbies': ['Running', 'Video games']}, {'First Name': 'Billy', 'Last Name': 'Smith', 'Hobbies': ['Napping', 'Reading']}]}. SwitchC connects HR and Sales to the Core switch. However, business needs require that no traffic from the Finance VLAN traverse this switch. Which command meets this requirement?. SwitchC(config)#vtp pruning. SwitchC(config)#vtp pruning vlan 110. SwitchC(config)#interface port-channel 1 SwitchC(config-if)#switchport trunk allowed vlan add 210,310. SwitchC(config)#interface port-channel 1 SwitchC(config-if)#switchport trunk allowed vlan remove 110. Which action resolves the EtherChannel issue between SW2 and SW3?. Configure switchport mode trunk on SW2. Configure switchport nonegotiate on SW3. Configure channel-group 1 mode desirable on both interfaces. Configure channel-group 5 mode active on both interfaces. What is the data policy in a Cisco SD-WAN deployment?. list of ordered statements that define node configurations and authentication used within the SD-WAN overlay. Set of statements that defines how data is forwarded based on IP packet information and specific VPNs. detailed database mapping several kinds of addresses with their corresponding location. group of services tested to guarantee devices and links liveliness within the SD -WAN overlay. Which description of an SD-Access wireless network infrastructure deployment is true?. The access point is part of the fabric underlay. The WLC is part of the fabric underlay. The access point is part the fabric overlay. The wireless client is part of the fabric overlay. Drag and drop the solutions that comprise Cisco Cyber Threat Defense from the left onto the objectives they accomplish on the right. StealWatch. Web Security appliance. Identity Services Engine. Which controller is capable of acting as a STUN server during the onboarding process of Edge devices?. vManage. vSmart. vBond. PNP server. What does the number in an NTP stratum level represent?. The number of hops it takes to reach the master time server. The amount of drift between the device clock and true time. The amount of offset between the device clock and true time. The number of hops it takes to reach the authoritative time source. What is a characteristic of a next-generation firewall?. required in each layer of the network. filters traffic using Layer 3 and Layer 4 information only. only required at the network perimeter. provides intrusion prevention. Which unit measures the power of a radio signal with reference to 1 milliwatt?. dBw. dBi. mW. dBm. What the role of a fusion in an SD-Access solution?. provides connectivity to external networks. acts as a DNS server. performs route leaking between user-defined virtual networks and shared services. provides additional forwarding capacity to the fabric. Which statement about a fabric access point is true?. It is in local mode and must be connected directly to the fabric border node. It is in FlexConnect mode and must be connected directly to the fabric border node. It is in local mode an must connected directly to the fabric edge switch. It is in FlexConnect mode and must be connected directly to the fabric edge switch. When does a stack master lose its role?. When the priority value of a stack member is changed to a higher value. When a switch with a higher priority is added to the stack. When the stack master is reset. When a stack member fails. Which encryption hashing algorithm does NTP use for authentication?. SSL. AES256. AES128. MD5. Which component handles the orchestration plane of the Cisco SD-WAN?. vBond. vSmart. vManage. vEdge. Bgp route map components. optional action. routing protocol. processing action. sequence number. conditional matching criteria. Bgp AFI and SAFI. IPv4. IPv6. ICMPv4. ICMPv6. unicast. multicast. Broadcast. Bgp neigbor states. Idle. Connect. Active. OpenSent. OpenConfirm. Established. Which two commands can you use to verify an IP SLA? (Choose two.). show ip sla application. show ip sla history. show ip sla configuration. show ip sla reaction-configuration. show ip sla statistics. |