Ccnpnuevo
Ccnpnuevo
Ccnpnuevo
Which two security mechanisms are used by Cisco Threat Defense to gain visibility into the most
dangerous cyber threats? (Choose two)
Answer: B D
Explanation
Threat defense: It is important to have visibility into the most dangerous cyber threats. Threat
defense provides this visibility through network traffic telemetry, file reputation, and contextual
information (such as device types, locations, users, identities, roles, privileges levels, login
status, posture status, and so on). It enables assessment of the nature and the potential risk of
suspicious activity so that the correct next steps for cyber threats can be taken.
Question 2
Drag and drop the code snippets from the bottom onto the blanks in the code to construct a
request that configures a deny rule on an access list.
Answer:
1. access-list-seq-rule
2. deny
3. ip
4. dst-any
Explanation
Question 3
Answer: A
Explanation
The EAP-FAST protocol is a publicly accessible IEEE 802.1X EAP type that Cisco developed to
support customers that cannot enforce a strong password policy and want to deploy an 802.1X
EAP type that does not require digital certificates.
EAP-FAST is also designed for simplicity of deployment since it does not require a certificate on
the wireless LAN client or on the RADIUS infrastructure yet incorporates a built-in provisioning
mechanism.
Reference: https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-fixed/
72788-CSSC-Deployment-Guide.html
Question 4
A. HEAD
B. REMOVE
C. PULL
D. GET
E. ADD
F. PUSH
Answer: A D
Explanation
RESTCONF operations include OPTIONS, HEAD, GET, POST, PUT, PATCH, DELETE.
RESTCONF Description
HEAD The same as GET, but only the response headers are returned.
Question 5
Option A Option B
Option C Option D
A. Option A
B. Option B
C. Option C
D. Option D
Answer: D
Explanation
There are two interfaces that are connected to networks “outside” of router B, which are Gi0/0/0
& Gi0/0/1 so we have to apply the ACL to both interfaces with outbound direction.
Question 6
Drag and drop the Cisco SD-Access solution areas from the left onto the protocols they use on
the right.
Answer:
Explanation
Question 7
Drag and drop the code snippets from the bottom onto the blanks in the script to convert a
Python object into a compact JSON object by removing space characters. Not all options are
used.
Answer:
1. “dumps”
2. data
3. separators=(‘,’, ‘:’)
Explanation
We can create a compact JSON object by removing spaces with “dumps”. It helps save some
bytes when sending over the wire:
Question 8
Which configuration restricts the amount of SSH that a router accepts to 100 kbps?
Option A Option B
class-map match-all CoPP_SSH class-map match-all CoPP_SSH
match access-group name CoPP_SSH match access-group name CoPP_SSH
! !
policy-map CoPP_SSH policy-map CoPP_SSH
class CoPP_SSH class CoPP_SSH
police cir 100000 police cir CoPP_SSH
exceed-action drop exceed-action drop
! !
! !
! !
interface GigabitEthernet0/1 interface GigabitEthernet0/1
ip address 209.165.200.225 ip address 209.165.200.225
255.255.255.0 255.255.255.0
ip access-group CoPP_SSH out ip access-group CoPP_SSH out
duplex auto duplex auto
speed auto speed auto
media-type rj45 media-type rj45
service-policy input CoPP_SSH service-policy input CoPP_SSH
! !
ip access-list extended CoPP_SSH ip access-list extended CoPP_SSH
permit tcp any any eq 22 deny tcp any any eq 22
! !
Option C Option D
class-map match-all CoPP_SSH class-map match-all CoPP_SSH
match access-group name CoPP_SSH match access-group name CoPP_SSH
! !
policy-map CoPP_SSH policy-map CoPP_SSH
class CoPP_SSH class CoPP_SSH
police cir 100000 police cir 100000
exceed-action drop exceed-action drop
! !
! !
! !
control-plane control-plane transit
service-policy input CoPP_SSH service-policy input CoPP_SSH
! !
ip access-list extended CoPP_SSH ip access-list extended CoPP_SSH
permit tcp any any eq 22 permit tcp any any eq 22
! !
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C
Explanation
CoPP protects the route processor on network devices by treating route processor resources as a
separate entity with its own ingress interface (and in some implementations, egress also). CoPP
is used to police traffic that is destined to the route processor of the router such as:
+ Routing protocols like OSPF, EIGRP, or BGP.
+ Gateway redundancy protocols like HSRP, VRRP, or GLBP.
+ Network management protocols like telnet, SSH, SNMP, or RADIUS.
Therefore we must apply the CoPP to deal with SSH because it is in the management plane.
CoPP must be put under “control-plane” command. But we cannot name the control-plane (like
“transit”) -> Only Option C is correct.
Question 9
A. Ensure that the “Connect even if this network is not broadcasting” option is selected.
B. Limit the enabled wireless channels on the laptop to the maximum channel range that is
supported by the access points.
C. Change the security type to WPA2-Personal AES.
D. Use the empty string as the hidden SSID network name.
Answer: A
Question 10
restconf
!
ip http server
ip http authentication local
ip http secure-server
!
Answer: A
Question 11
A. password hash
B. fail-safe defaults
C. adding a timestamp in requests
D. OAuth
Answer: B
Explanation
The paper “The Protection of Information in Computer Systems” by Jerome Saltzer and Michael
Schroeder, put forth eight design principles for securing information in computer systems, as
described in the following sections:
+ Least Privilege: An entity should only have the required set of permissions to perform the
actions for which they are authorized, and no more. Permissions can be added as needed and
should be revoked when no longer in use.
+ Fail-Safe Defaults: A user’s default access level to any resource in the system should be
“denied” unless they’ve been granted a “permit” explicitly.
+ The economy of Mechanism: The design should be as simple as possible. All the component
interfaces and the interactions between them should be simple enough to understand.
+ Complete Mediation: A system should validate access rights to all its resources to ensure that
they’re allowed and should not rely on the cached permission matrix. If the access level to a
given resource is being revoked, but that isn’t reflected in the permission matrix, it would violate
the security.
+ Open Design: This principle highlights the importance of building a system in an open manner
—with no secret, confidential algorithms.
+ Separation of Privilege: Granting permissions to an entity should not be purely based on a
single condition, a combination of conditions based on the type of resource is a better idea.
+ Least Common Mechanism: It concerns the risk of sharing state among different components.
If one can corrupt the shared state, it can then corrupt all the other components that depend on
it.
+ Psychological Acceptability: It states that security mechanisms should not make the resource
more difficult to access than if the security mechanisms were not present. In short, security
should not make worse the user experience.
Reference: https://restfulapi.net/security-essentials/
Question 12
A. It shares the traffic load of the LAPs with the primary controller.
B. It avoids congestion on the primary controller by sharing the registration load on the LAPs.
C. It registers the LAPs if the primary controller fails.
D. It enables Layer 2 and Layer 3 roaming between itself and the primary controller.
Answer: C
Explanation
When the primary controller (WLC-1) goes down, the APs automatically get registered with the
secondary controller (WLC-2). The APs register back to the primary controller when the primary
controller comes back on line.
Reference: https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/
69639-wlc-failover.html
Question 13
Answer: B
Explanation
Ingress Tunnel Router (ITR) is the device (or function) that is responsible for finding EID-to-
RLOC mappings for all traffic destined for LISP-capable sites. After the encapsulation, the
original packet become a LISP packet.
Question 14
An engineer modifies the existing ISE guest portal URL to use a static FQDN. Users immediately
report that they receive certificate errors when they are redirected to the new page. Which two
additional configuration steps are needed to implement the change? (Choose two)
A. Create and sign a new CSR that contains the static FQDN entry
B. Add the FQDN entry under the WLC virtual interface
C. Manually configure the hosts file on each user device
D. Disable HTTPS on the WLC under the Management menu
E. Add a new DNS record to resolve the FQDN to the PSN IP address
Answer: B E
Question 15
In a Cisco Catalyst switch equipped with two supervisor modules an administrator must
temporally remove the active supervisor from the chassis to perform hardware maintenance on
it. Which mechanism ensure that the active supervisor removal is not disruptive to the network
operation?
A. NSF/NSR
B. SSO
C. HSRP
D. VRRP
Answer: B
Explanation
Stateful Switchover (SSO) provides protection for network edge devices with dual Route
Processors (RPs) that represent a single point of failure in the network design, and where an
outage might result in loss of service for customers.
Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SY/
configuration/guide/sy_swcg/stateful_switchover.html
Question 16
Option A Option B
{ "truck":[
"car":[ {
{ "type":"Dodge",
"type":"Ford", "color":"blue",
"color":"red", "year":"2015"
"year":"1998" }
} ]
]
}
Option C Option D
[ { "device":
"book":{ {[
"title":"Engineering", "type":"switch,
"grade":"11", "model":"Catalyst",
"edition":"4". "mac":"00:46:10:06:93:55",
} ]
] }
}
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
Explanation
A JSON script should start with “{” -> Only Option A and Option D are correct. But Option D is
surely not correct as the “switch is written without closing quote. Also another error in Option D
is: square bracket [ can only hold a group of values or objects, separated by comma. For
example:
or
"book": [
{
"id": "01",
"language": "Java",
"edition": "third"
},
{
"id": "02",
"language": "C++",
"edition": "second"
} -> This [] holds a group of objects
But in Option D we see square bracket holds key/value pair which is not correct. Therefore only
Option A is correct.
Question 17
A. SSL
B. AES256
C. AES128
D. MD5
Answer: D
Explanation
An engineer configures the trunk and proceeds to configure an ESPAN session to monitor VLANs
10, 20, and 30. Which command must be added to complete this configuration?
Answer: D
Explanation
The command “filter vlan 30” limits to monitor only VLAN 30 so we will not see any traffic for
VLAN 10 and 20. Therefore we must remove this command.
Question 19
An engineer must provide wireless converge in a square office. The engineer has only one AP
and believes that it should be placed it in the middle of the room. Which antenna type should the
engineer use?
A. directional
B. polarized
C. Yagi
D. omnidirectional
Answer: D
Explanation
Drag and drop the snippets onto the blanks within the code to create an EEM script that adds an
entry to a locally stored text file with a timestamp when a configuration change is made. Not all
options are used.
Answer:
Explanation
The command “show clock | append flash:ConfSave.txt” means that we want to write the output
of the “show clock” command to a file on the flash memory.
Question 21
A customer requires their wireless data traffic to egress at the switch port of the access point.
Which access point mode supports this?
A. FlexConnect
B. Sniffer
C. Bridge
D. Monitor
Answer: A
Explanation
FlexConnect AP mode enables switching traffic between an SSID and a VLAN locally if the
CAPWAP to the WLC is down, even when the AP is at a remote site. It can also be configured to
egress at the access point’s LAN port.
Reference: https://study-ccnp.com/cisco-wireless-access-point-ap-modes-explained/
Question 22
Which command when applied to the Atlanta router reduces type 3 LSA flooding into the
backbone area and summarizes the inter-area routes on the Dallas router?
A. Atlanta(config-route)#area 0 range 192.168.0.0 255.255.252.0
B. Atlanta(config-route)#area 1 range 192.168.0.0 255.255.252.0
C. Atlanta(config-route)#area 0 range 192.168.0.0 255.255.248.0
D. Atlanta(config-route)#area 1 range 192.168.0.0 255.255.248.0
Answer: B
Question 23
for x in range(5):
print(x)
A. 0 5
B. 0 1 2 3 4 5
C. 0 1 2 3 4
D. (0,5)
Answer: C
Explanation
The range() function returns a sequence of numbers, starting from 0 by default, and increments
by 1 (by default), and stops before a specified number.
Question 24
A. Yagi
B. multidirectional
C. directional patch
D. omnidirectional
Answer: A
Explanation
A Yagi antenna is formed by driving a simple antenna, typically a dipole or dipole-like antenna,
and shaping the beam using a well-chosen series of non-driven elements whose length and
spacing are tightly controlled.
Reference: https://www.cisco.com/c/en/us/products/collateral/wireless/aironet-antennas-
accessories/prod_white_paper0900aecd806a1a3e.html
Question 25
Answer: B
Question 26
Which configuration change ensures that R1 is the active gateway whenever it is in a functional
state for the 172.30.110.0/24 network?
Option A Option B
R1 R1
standby 1 preempt standby 1 preempt
R2 R2
standby 1 priority 90 standby 1 priority 100
Option C Option D
R2 R2
standby 1 priority 100 standby 1 priority 110
standby 1 preempt standby 1 preempt
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
Explanation
By default, HSRP does not have preemption enabled so we have to enable it on R1 so that R1
can take the active role of R2. We also need to lower the priority of R2 (to 90) than that of R1
(the default HSRP priority is 100) so that R1 can take the active role.
Question 27
Answer: A
Explanation
The key fields for the VXLAN packet in each of the protocol headers are:
+ Outer MAC header (14 bytes with 4 bytes optional) – Contains the MAC address of the
source VTEP and the MAC address of the next-hop router. Each router along the packet’s path
rewrites this header so that the source address is the router’s MAC address and the destination
address is the next-hop router’s MAC address.
+ Outer IP header (20 bytes)- Contains the IP addresses of the source and destination VTEPs.
+ (Outer) UDP header (8 bytes)- Contains source and destination UDP ports:
– Source UDP port: The VXLAN protocol repurposes this standard field in a UDP packet header.
Instead of using this field for the source UDP port, the protocol uses it as a numeric identifier for
the particular flow between VTEPs. The VXLAN standard does not define how this number is
derived, but the source VTEP usually calculates it from a hash of some combination of fields from
the inner Layer 2 packet and the Layer 3 or Layer 4 headers of the original frame.
– Destination UDP port: The VXLAN UDP port. The Internet Assigned Numbers Authority (IANA)
allocates port 4789 to VXLAN.
+ VXLAN header (8 bytes)- Contains the 24-bit VXLAN Network Identifiers (VNI).
+ Original Ethernet/L2 Frame – Contains the original Layer 2 Ethernet frame.
Note: In fact this question has two correct answer, which are: VXLAN network
identifier and original Layer 2 VLAN ID. But we believe the first answer is better.
Question 28
A. The answer is 25
B. The answer is 70
C. The answer is 5
D. The answer is 100
Answer: A
Explanation
The “magic” function receives a number, which is 5 from main() in this question. This function
returns a result of 5 + 2*10 = 25 and the str() function converts it into a string (“25”) before
printing to the terminal.
Question 29
Which two steps are required for a complete Cisco DNA Center upgrade? (Choose two)
Answer: D E
Explanation
A complete Cisco DNA Center upgrade includes “System Update” and “Appplication Updates”
Question 30
Answer: C
Explanation
Answer A is not correct as it is the role of vEdges. But by default, vEdges do not automatically
redistribute OMP routes into any legacy routing protocol. We must explicitly enable the
redistribution for each particular local protocol on each vEdge router.
Question 31
Answer: A
Explanation
OSPF forms neighbor relationship with other OSPF routers on the same segment by exchanging
hello packets. The hello packets contain various parameters. Some of them should match
between neighboring routers. These include:
In this question we see the subnet mask between two neighbors are not matched (/30 & /29) so
the OSPF neighborship failed.
Question 32
Clients are reporting an issue with the voice traffic from the branch site to the central site. What
is the cause of this issue?
A. The voice traffic is using the link with less available bandwidth
B. There is a high delay on the WAN links
C. There is a routing loop on the network
D. Traffic is load-balancing over both links, causing packets to arrive out of order
Answer: D
Explanation
From the traceroute output, we learn the second link (172.16.250.5) has greater latency than
the first link (172.16.250.1) so the packets will arrive out of order when traffic is load-balancing
over both links.
Note: Latency (also known as delay) refers to the time it takes a voice packet to reach its
destination. Latency is measured in milliseconds (ms) (or thousandths of a second). Latency of
150ms or less (one-way) is generally acceptable. Latency greater than 150ms (again, one way)
adversely affects the call quality experience.
Question 33
An engineer must deny HTTP traffic from host A to host B while allowing all other communication
between the hosts. Which command set accomplishes this task?
Option A Option B
Option C Option D
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
Explanation
In this case we need to configure a VLAN access-map to deny HTTP traffic and apply it to VLAN
10. To do it, first create an access-list, by which interesting traffic will be matched. The principle
of VLAN access-map config is similar to the route-map principle.
After this we’ll create a vlan access-map, which has two main parameters: action and match.
Match: by this parameter the interesting traffic is matched and here RACL or MAC ACL can be
applied as well.
Action: what to do with matched traffic. Two main parameters exist: Drop and Forward. In case
of Drop, matched traffic will be dropped, and in case of forward, matched traffic will be allowed.
In this question, we have to permit both ACL because the matched traffic will be decided by the
VLAN Access map below (forward or drop).
Question 34
Which virtualization component creates VMs and performs hardware abstraction that allows
multiple VMs to run at the same time?
A. rkt
B. Docker
C. container
D. hypervisor
Answer: D
Explanation
Hypervisors support the creation and management of virtual machines (VMs) by abstracting a
computer’s software from its hardware.
Question 35
Answer: C
Explanation
We tested with GNS3 and the router only requires password “cisco123” configured under line
console to authenticate. So we can deduce the “password” command under line interface is
preferred over “login authentication” command.
Question 36
Drag and drop the LISP components from the left onto the function they perform on the right.
Not all options are used.
Answer:
Explanation
ITR is the function that maps the destination EID to a destination RLOC and then encapsulates
the original packet with an additional header that has the source IP address of the ITR RLOC and
the destination IP address of the RLOC of an Egress Tunnel Router (ETR). After the
encapsulation, the original packet become a LISP packet.
ETR is the function that receives LISP encapsulated packets, decapsulates them and forwards to
its local EIDs. This function also requires EID-to-RLOC mappings so we need to point out an
“map-server” IP address and the key (password) for authentication.
A LISP proxy ETR (PETR) implements ETR functions on behalf of non-LISP sites. A PETR is
typically used when a LISP site needs to send traffic to non-LISP sites but the LISP site is
connected through a service provider that does not accept nonroutable EIDs as packet sources.
PETRs act just like ETRs but for EIDs that send traffic to destinations at non-LISP sites.
Map Server (MS) processes the registration of authentication keys and EID-to-RLOC mappings.
ETRs sends periodic Map-Register messages to all its configured Map Servers.
Map Resolver (MR): a LISP component which accepts LISP Encapsulated Map Requests,
typically from an ITR, quickly determines whether or not the destination IP address is part of the
EID namespace
Question 37
Drag and drop the characteristics from the left onto the correct places on the right.
Answer:
TCAM table
+ used to build IP Routing tables
+ stores ACL, QOS and other upper layer information
Question 38
Which technology is used to provide Layer 2 and Layer 3 logical networks in the Cisco SD-Access
architecture?
A. underlay network
B. overlay network
C. VPN routing/forwarding
D. easy virtual network
Answer: B
Explanation
An overlay network creates a logical topology used to virtually connect devices that are built
over an arbitrary physical underlay topology.
An overlay network is created on top of the underlay network through virtualization (virtual
networks). The data plane traffic and control plane signaling are contained within each
virtualized network, maintaining isolation among the networks and an independence from the
underlay network.
SD-Access allows for the extension of Layer 2 and Layer 3 connectivity across the overlay
through the services provided by through LISP.
Reference: https://www.cisco.com/c/en/us/td/docs/solutions/CVD/Campus/cisco-sda-design-
guide.html
Question 39
Drag and drop the snippets onto the blanks within the code to construct a script that advertises
the network prefix 192.168.5.0/24 into a BGP session. Not all options are used.
Answer: 1-A; 2-C; 3-B
Question 40
Answer: B
Explanation
Wi-Fi Multimedia (WMM) is used to prioritize different types of traffic -> It cannot block traffic so
it is not a problem of this question.
Peer to peer (P2P) blocking is applied to individual WLANs. You can have traffic bridged locally
within the controller, dropped by the controller, or forwarded to the upstream VLAN.
Choose one of the following options from the P2P Blocking drop-down list:
+ Disabled – Disables peer-to-peer blocking and bridges traffic locally within the controller
whenever possible.This is the default value.
Note: Traffic is never bridged across VLANs in the controller.
+ Drop – Causes the controller to discard the packets.
+ Forward-UpStream – Causes the packets to be forwarded on the upstream VLAN. The
device above the controller decides what action to take regarding the packets.
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-5/configuration-
guide/b_cg75/b_cg75_chapter_01001011.pdf
-> In this question two laptops are in the same VLAN so answer A is not correct. Only answer B
is correct.
Question 41
What does Call Admission Control require the client to send in order to reserve the bandwidth?
Answer: C
Explanation
The application residing on Device 1 originates an RSVP message called Path, which is sent to
the same destination IP address as the data flow for which a reservation is requested (that is,
10.60.60.60) and is sent with the “router alert” option turned on in the IP header. The Path
message contains, among other things, the following objects:
–The “sender T-Spec” (traffic specification) object, which characterizes the data flow for which
a reservation will be requested. The T-Spec basically defines the maximum IP bandwidth
required for a call flow using a specific codec. The T-Spec is typically defined using values for the
data flow’s average bit rate, peak rate, and burst size.
Reference: https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/srnd/9x/uc9x/
cac.html
Question 42
Which network devices secure API platform?
Answer: D
Explanation
Cisco Secure Web Application Firewall (WAF) and bot protection defends your online presence
and ensures that website, mobile applications, and APIs are secure, protected, and “always on.”
Reference: https://www.cisco.com/c/en/us/products/collateral/security/advanced-waf-bot-
aag.pdf
Question 43
Answer: B
Explanation
Mobility Express is the ability to use an access point (AP) as a controller instead of a real WLAN
controller. But this solution is only suitable for small to midsize, or multi-site branch locations
where you might not want to invest in a dedicated WLC. A Mobility Express WLC can support up
to 100 APs.
Question 44
Answer: D
Explanation
VXLAN header consists of 8 bytes and contains the 24-bit VNI -> Answer B is not correct.
Question 45
An engineer is configuring Local WebAuth on a Cisco Wireless LAN Controller. According to RFC
5737, which virtual IP address must be used in this configuration?
A. 1.1.1.1
B. 192.168.0.1
C. 192.0.2.1
D. 172.20.10.1
Answer: C
Question 46
A large campus network has deployed two wireless LAN controllers to manage the wireless
network. WLC1 and WLC2 have been configured as mobility peers. A client device roams from
AP1 on WLC1 to AP2 on WLC2, but the controller’s client interfaces are on different VLANs. How
do the wireless LAN controllers handle the inter-subnet roaming?
A. WLC2 marks the client with a foreign entry in its own database. The database entry is copied
to the new controller and marked with an anchor entry on WLC1
B. WLC2 marks the client with an anchor entry in its own database. The database entry is copied
to the new controller and marked with a foreign entry on WLC1
C. WLC1 marks the client with a foreign entry in its own database. The database entry is copied
to the new controller and marked with an anchor entry on WLC2
D. WLC1 marks the client with an anchor entry in its own database. The database entry is copied
to the new controller and marked with a foreign entry on WLC2
Answer: D
Explanation
In instances where the client roams between APs that are connected to different WLCs and the
WLC WLAN is connected to a different subnet, a Layer 3 roam is performed, and there is an
update between the new WLC (foreign WLC) and the old WLC (anchor WLC) mobility databases.
If this is the case, return traffic to the client still goes through its originating anchor WLC. The
anchor WLC uses Ethernet over IP (EoIP) to forward the client traffic to the foreign WLC, to
where the client has roamed. Traffic from the roaming client is forwarded out the foreign WLC
interface on which it resides; it is not tunneled back.
The client begins with a connection to AP B on WLC 1. This creates an ANCHOR entry in the
WLC client database. As the client moves away from AP B and makes an association with AP C,
WLC 2 sends a mobility announcement to peers in the mobility group looking for the WLC with
the client MAC address. WLC 1 responds to the announcement, handshakes, and ACKs. Next the
client database entry for the roaming client is copied to WLC 2, and marked as FOREIGN.
Included PMK data (master key data from the RADIUS server) is also copied to WLC 2. This
provides fast roam times for WPA2/802.11i clients because there is no need to re-authenticate
to the RADIUS server.
After a simple key exchange between the client and AP, the client is added to the WLC 2
database and is similar, except that it is marked as FOREIGN.
Reference: https://www.cisco.com/en/US/docs/solutions/Enterprise/Mobility/emob30dg/
TechArch.html
Question 47
What is the function of the fabric control plane node in a Cisco SD-Access deployment?
Explanation
Fabric control plane node (C): One or more network elements that implement the LISP Map-
Server (MS) and Map-Resolver (MR) functionality. The control plane node’s host tracking
database keep track of all endpoints in a fabric site and associates the endpoints to fabric nodes
in what is known as an EID-to-RLOC binding in LISP.
Reference: https://www.cisco.com/c/en/us/td/docs/solutions/CVD/Campus/cisco-sda-macro-
segmentation-deploy-guide.html
Question 48
Answer: B
Explanation
Virtual switches are used to connect virtual network controllers of VMs to networks on the
second layer of the OSI model.
Standard vSwitches are configured on each ESXi host manually. However, in large virtual
environments, virtual switches usually have the same vSwitch configuration, including for port
groups, VLANs, connected networks, etc. If you need to add a new port group associated with
VLAN to connect VMs on ESXi hosts to that VLAN, you have to configure vSwitch on each ESXi
host the same way manually. This is a time-consuming process.
To address this, VMware allows you to use the distributed virtual switch, a logical switch that can
be configured on vCenter Server once for several hosts. This means that you don’t have to
configure standard virtual switches on each ESXi host manually.
Reference: https://www.nakivo.com/blog/vmware-distributed-switch-configuration/
Question 49
#! /usr/bin/env python3
from env_lab import dnac
import json
import requests
import urllib3
from requests.auth import HTTPBasicAuth
from prettytable import PrettyTable
dnac_devices.add_row([item["hostname"],item["platformId"],item["softwareType"],
item["softwareVersion"],item["upTime"]])
Option A
Option B
Option C
Option D
Which code results in the working Python script displaying a list of network devices from the
Cisco DNA center?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
Explanation
This code is used in the “CCNP and CCIE Enterprise Core” book (page 1537) and we post the full
script here for your reference:
#! /usr/bin/env python3
from env_lab import dnac
import json
import requests
import urllib3
from requests.auth import HTTPBasicAuth
from prettytable import PrettyTable
headers = {
'content-type': "application/json",
'x-auth-token': ""
}
dnac_devices.add_row([item["hostname"],item["platformId"],item["softwareType"],
item["soft. wareVersion"],item["upTime"]])
Note: We broke some long lines so the Python format is not correct.
Question 50
Which two methods are used to assign security group tags to the user in a Cisco Trust Sec
architecture? (Choose two)
A. modular QoS
B. policy routing
C. web authentication
D. DHCP
E. IEEE 802.1x
Answer: C E
Explanation
Cisco ISE assigns the SGT tags to users or devices that are successfully authenticated and
authorized through 802.1x, MAB, or WebAuth.
Reference: CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert Guide
Question 51
interface GigabitEthernet1
ip address 10.10.10.1 255.255.255.0
!
access-list 10 permit 10.10.10.1
!
monitor session 10 type erspan-source
source interface Gi1
destination
erspan-id 10
ip address 192.168.1.1
Which command filters the ERSPAN session packets only to interface GigabitEthernet1?
A. source ip 10.10.10.1
B. source interface gigabitethernet1 ip 10.10.10.1
C. filter access-group 10
D. destination ip 10.10.10.1
Answer: C
Question 52
A network engineer configures a WLAN controller with increased security for web access. There
is IP connectivity with the WLAN controller, but the engineer cannot start a management session
from a web browser. Which action resolves the issue?
Answer: D
Explanation
Enable or disable secure web mode with increased security by entering this command:
config network secureweb cipher-option high {enable | disable}
This command allows users to access the controller GUI using “https://ip-address” but only from
browsers that support 128-bit (or larger) ciphers. With Release 8.10, this command is, by
default, in enabled state.
When high ciphers is enabled, SHA1, SHA256, SHA384 keys continue to be listed and TLSv1.0 is
disabled. This is applicable to webauth and webadmin but not for NMSP.
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-5/config-guide/
b_cg85/administration_of_cisco_wlc.html
Question 53
A customer has recently implemented a new wireless infrastructure using WLC-5520S at a site
directly next to a large commercial airport Users report that they intermittently lose Wi-Fi
connectivity, and troubleshooting reveals it is due to frequent channel changes. Which two
actions fix this issue? (Choose two)
A. Remove UNII-2 and Extended UNII-2 channels from the 5 GHz channel list
B. Restore the DCA default settings because this automatically avoids channel interference
C. Disable DFS channels to prevent interference with Doppler radar
D. Enable DFS channels because they are immune to radar interference
E. Configure channels on the UNII-2 and the Extended UNII-2 sub-bands of the 5 GHz band only
Answer: A C
Explanation
In the 5GHz spectrum some of the channels used by 802.11 are subject to Dynamic Frequency
Selection (DFS) requirements. This is due to our clients coexistence with other RF technologies
such as Maritime, Aviation and Weather RADAR.
Dynamic Frequency Selection (DFS) is the process of detecting radar signals that must be
protected against interference from 5.0 GHz (802.11a/h) radios, and upon detection switching
the operating frequency of the 5.0 GHz (802.11a/h) radio to one that is not interfering with the
radar systems.
Reference: https://www.cisco.com/en/US/docs/routers/access/wireless/software/guide/
RadioChannelDFS.pdf
Although DFS helps reduce interference with radar systems but “DFS channels” refer to the
5GHz channels that require DFS check. In other words, DFS channels are channels that may
interfere with radar signal. Therefore we should disable these DFS channels -> Answer C is
correct.
UNII-2 (5.250-5.350 GHz and 5.470-5.725 GHz) which contains channels 52, 56, 60, 64, 100,
104, 108, 112, 116, 120, 124, 128, 132, 136, and 140 are permitted in the United States, but
shared with radar systems. Therefore, APs operating on UNII-2 channels are required to use
Dynamic Frequency Selection (DFS) to avoid interfering with radar signals. If an AP detects a
radar signal, it must immediately stop using that channel and randomly pick a new channel.
Reference: https://documentation.meraki.com/MR/WiFi_Basics_and_Best_Practices/
Channel_Planning_Best_Practices
-> Therefore we should remove UNII-2 channels from 5GHz channel list.
Question 54
R1
interface GigabitEthernet0/0
ip address 192.168.250.2 255.255.255.0
standby 20 ip 192.168.250.1
standby 20 priority 120
R2
interface GigabitEthernet0/0
ip address 192.168.250.3 255.255.255.0
standby 20 ip 192.168.250.1
standby 20 priority 110
Answer: A E
Question 55
Drag and drop the automation characteristics from the left onto the corresponding tools on the
right.
Answer:
Ansible
+ all functions are performed over SSH
+ YAML configuration language
+ based on Python
Chef
+ Ruby syntax in configuration files
Explanation
We made a comparison list of Ansible, Puppet and Chef automation tool here:
Question 56
Which two features does the Cisco SD-Access architecture add to a traditional campus network?
(Choose two)
A. private VLANs
B. software-defined segmentation
C. SD-WAN
D. identity services
E. modular QoS
Answer: B D
Explanation
SD-Access uses logic blocks called fabrics which leverage virtual network overlays that are
driven through programmability and automation to create mobility, segmentation, and visibility.
Network virtualization becomes easy to deploy through software-defined segmentation and
policy for wired and wireless campus networks.
Reference: https://www.cisco.com/c/en/us/td/docs/solutions/CVD/Campus/SD-Access-
Distributed-Campus-Deployment-Guide-2019JUL.html
Question 57
What is a benefit of using segmentation with TrustSec?
Answer: C
Explanation
Reference: https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/
trustsec/trustsec_pci_validation.pdf
Question 58
The login method is configured on the VTY lines of a router with these parameters.
– The first method for authentication is TACACS
– If TACACS is unavailable, login is allowed without any provided credentials
Answer: C
Explanation
According to the requirements (first use TACACS+, then allow login with no authentication), we
have to use “aaa authentication login … group tacacs+ none” for AAA command.
The next thing to check is the if the “aaa authentication login default” or “aaa authentication
login list-name” is used. The ‘default’ keyword means we want to apply for all login connections
(such as tty, vty, console and aux). If we use this keyword, we don’t need to configure anything
else under tty, vty and aux lines. If we don’t use this keyword then we have to specify which
line(s) we want to apply the authentication feature.
From above information, we can find out answer C is correct. Although the “password 7
0202039485748” line under “line vty 0 4” is not necessary.
If you want to learn more about AAA configuration, please read our AAA TACACS+ and RADIUS
Tutorial – Part 2.
For your information, answer D would be correct if we add the following command under vty line
(“line vty 0 4”): “login authentication telnet” (“telnet” is the name of the AAA list above)
Question 59
A. bandwidth
B. IP address
C. processor
D. secure access
Answer: C
Question 60
An engineer is working with the Cisco DNA Center API. Drag and drop the methods from the left
onto the actions that they are used for on the right.
Answer:
Explanation
A RESTful API uses existing HTTP methodologies defined by the RFC 2616 protocol, such as:
Question 61
What is the differences between TCAM and the MAC address table?
A. Router prefix lookups happens in CAM. MAC address table lookups happen in TCAM
B. The MAC address table supports partial matches. TCAM requires an exact match
C. The MAC address table is contained in CAM. ACL and QoS information is stored in TCAM
D. TCAM is used to make Layer 2 forwarding decisions. CAM is used to build routing tables
Answer: C
Explanation
When using Ternary Content Addressable Memory (TCAM) inside routers it’s used for faster
address lookup that enables fast routing.
In switches Content Addressable Memory (CAM) is used for building and lookup of mac
address table that enables L2 forwarding decisions.
Besides Longest-Prefix Matching, TCAM in today’s routers and multilayer Switch devices are used
to store ACL, QoS and other things from upper-layer processing.
Question 62
Drag and drop the characteristic from the left onto the orchestration tools that they describe on
the right.
Answer:
Ansible:
+ uses playbooks
+ prodedural
Puppet:
+ uses a pull model
+ declarative
Explanation
In Ansible, Playbooks are files that provide actions and logic about what Ansible should do.
Ansible playbooks are files that contain tasks to configure hosts. Ansible playbooks are written in
YAML format.
Puppet is based on a Pull deployment model, where the nodes check in regularly after every
1800 seconds with the Master to see if anything needs to be updated in the agent. If anything
needs to be updated the agent pulls the necessary Puppet codes from the Master and performs
required actions.
Chef and Ansible encourage a procedural style where you write code that specifies, step-by-step,
how to to achieve some desired end state. Terraform, SaltStack, and Puppet all encourage a
more declarative style where you write code that specifies your desired end state, and the IAC
tool itself is responsible for figuring out how to achieve that state.
Question 63
Answer: A
Explanation
The “interim update” option is intended to periodically send the accounting data to the RADIUS
server (e.g every 60 seconds) -> Answer B is not correct.
If we scroll up a bit in the “AAA Servers” tab, we will see the message “Select AAA servers below
to override use of default servers on this WLAN” so we can choose the AAA server in the boxes
to avoid default/global server lists -> Answer A is correct.
Question 64
A. ID
B. TTL
C. FCS
D. ToS
Answer: D
Question 65
An administrator must collect basic statistics about the approximate amount of IPv4 and IPv6
flows entering Gi0/0 using NetFlow. However, the administrator is concerned that NetFlow
processing during periods of high utilization on Gi0/0 will overwhelm the router CPU. Which
configuration minimizes CPU impact and keeps the data flows across Gi0/0 intact?
Option A Option B
Option C Option D
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C
Explanation
Flow samplers are created as separate components in a router’s configuration. Flow samplers
are used to reduce the load on the device that is running Flexible NetFlow by limiting the number
of packets that are selected for analysis.
Question 66
Device#configure terminal
Device(config)#netconf ssh acl 1
Device(config)#netconf lock-time 100
Device(config)#netconf max-sessions 1
Device(config)#netconf max-message 10
A network engineer must configure NETCONF. After creating the configuration, the engineer gets
output from the command show line, but not from show running-config. Which command
completes the configuration?
Answer: D
Explanation
If we use the “no netconf ssh acl 1” then the whole NETCONF function will be disabled so the
best answer should be “netconf max-message 1000” as it will increase the maximum size of
messages received in a NETCONF session to 1000KB (~1MB).
Note:
+ The valid range for the netconf lock-time seconds is 1 to 300 so 500 is not a valid value.
+ The valid range for the netconf max-sessions number is 4 to 16 so 100 is not a valid value.
Question 67
An engineer must configure a multicast UDP jitter operation. Which configuration should be
applied?
A. Router(config)#ip sla 1
Router(config)#udp jitter 10.0.0.1 source-ip 192.168.1.1
B. Router(config)#ip sla 1
Router(config)#udp-jitter 192.0.2.115 65051 num-packets 20
C. Router(config)#ip sla 1
Router(config)#udp-jitter 192.0.2.115 65051
D. Router(config)#ip sla 1
Router(config)#udp jitter 239.1.1.1 65051 end-point list List source-ip 192.168.1.1
Answer: D
Explanation
The command “udp jitter 239.1.1.1 65051 end-point list List source-ip 192.168.1.1” configures
the IP SLAs operation as a multicast UDP jitter operation and enters multicast UDP jitter
configuration mode.
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipsla/configuration/15-mt/sla-
15-mt-book/sla_mcast_suppt.html
Note: In fact the correct command should be “Router(config-ip-sla)# udp-jitter 239.1.1.1 65051
endpoint-list List source-ip 192.168.1.1”. Maybe they are unintended typos of this question.
Question 68
Which two mechanisms are used with OAuth 2.0 for enhanced validation? (Choose two)
A. authorization
B. custom headers
C. request management
D. authentication
E. accounting
Answer: A D
Question 69
A. Traffic coming to R1 that does not match access list SNMP is dropped.
B. Traffic generated by R1 that matches access list SNMP is policed.
C. Traffic passing through R1 that matches access list SNMP is policed.
D. Traffic coming to R1 that matches access list SNMP is policed.
Answer: D
Question 70
Which two characteristics apply to the endpoint security aspect of the Cisco Threat Defense
architecture? (Choose two)
Answer: A D
Explanation
The goal of the Cyber Threat Defense solution is to introduce a design and architecture that can
help facilitate the discovery, containment, and remediation of threats once they have penetrated
into the network interior.
Cisco Cyber Threat Defense version 2.0 makes use of several solutions to accomplish its
objectives:
..
* Content Security Appliances and Services
– Cisco Web Security Appliance (WSA) and Cloud Web Security (CWS)
– Dynamic threat control for web traffic
– Outbound URL analysis and data transfer controls
– Detection of suspicious web activity
– Cisco Email Security Appliance (ESA)
– Dynamic threat control for email traffic
– Detection of suspicious email activity
Reference: https://www.cisco.com/c/dam/en/us/td/docs/security/network_security/ctd/ctd2-0/
design_guides/ctd_2-0_cvd_guide_jul15.pdf
Question 71
Drag and drop the characteristics from the left onto the routing protocols they describe on the
right.
Answer:
EIGRP
+ It is an Advanced Distance Vector routing protocol
+ It relies on the Diffused Update Algorithm to calculate the shortest path to a destination
+ It requires an Autonomous System number to create a routing instance for exchanging routing
information
OSPF
+ The default Administrative Distance is equal to 110
+ It requires a process ID that is local to the router
+ It uses virtual links to connect two parts of a partitioned backbone through a non-backbone
area
Question 72
Answer: D
Explanation
The Cisco DNA Center GUI can creates a configuration template by clicking on Menu icon and
choose Tools > Template Editor -> Answer B is not correct.
The Cisco DNA Center GUI can also upgrade the Cisco DNA Center software by clicking the menu
icon and choose System > Software Updates -> Answer C is not correct.
Between the two answers left, answer D is the best choice. We can shutdown the DNA Center
with the “sudo shutdown -h now” command.
Question 73
Answer: B
Explanation
Both EIGRP and OSPF is not susceptible to routing loops and EIGRP is not more prone to routing
loops than OSPF -> Answer A is not correct.
Both EIGRP and OSPF has a full map of the topology -> Answer C is not correct.
OSPF maintains information about all the networks and running routers in its area. Each time
there is a change within the area, all routers need to re-sync their database and then run SPF
again. This process makes it more CPU intensive. EIGRP, on the other hand, has triggered and
incremental updates. Therefore EIGRP is more efficient in terms of CPU usage and memory.
Question 74
Answer: A
Explanation
Orchestration plane (vBond) assists in securely onboarding the SD-WAN WAN Edge routers
into the SD-WAN overlay. The vBond controller, or orchestrator, authenticates and authorizes
the SD-WAN components onto the network. The vBond orchestrator takes an added
responsibility to distribute the list of vSmart and vManage controller information to the WAN
Edge routers. vBond is the only device in SD-WAN that requires a public IP address as it is the
first point of contact and authentication for all SD-WAN components to join the SD-WAN fabric.
All other components need to know the vBond IP or DNS information.
Question 75
#!/usr/bin/python3
import requests
requests.urllib3.disable_warnings()
AuthURL="https://dna-center/dna/system/api/v1/auth/token"
USER="admin"
PASSWORD="SomePassword"
<...removed...>
admin@linux:~$ ./fetch.py
Aborting; received status code 401
An administrator writes a script to fetch the list of devices that are registered with Cisco DNA
Center. Why does the execution abort?
Answer: B
Explanation
From the last line, we see the returned code was 401.
The 401 Unauthorized Error is an HTTP status code error that represented the request sent by
the client to the server that lacks valid authentication credentials. It may be represented as 401
Unauthorized, Authorization required, HTTP error 401- Unauthorized. It represents that the
request could not be authenticated.
Question 76
Answer: B
Explanation
An advantage of GLBP over HSRP, VRRP is GLBP can load-balance traffic without any trick.
Question 77
A network engineer wants to configure console access to a router without using AAA so that the
privileged exec mode is entered directly after a user provide the correct login credentials. Which
action achieves this goal?
Answer: C
Explanation
Putting the privilege-level 15 on the console is one way to work around the issue. And it works
– as long as you are comfortable with the fact that everyone who logs in on the console will be
immediately placed directly into privilege/enable mode.
Reference: https://community.cisco.com/t5/network-access-control/privileged-exec-at-line-con-
0/td-p/1705892
We also tested both “login authentication privileged” and “privilege level 15” commands. Only
the latter exists:
Question 78
Which TLV value must be added to Option 43 when DHCP is used to ensure that APs join the
WLC?
A. 642
B. 0x77
C. 0xf1
D. AAA
Answer: C
Explanation
“TLV values for the Option 43 suboption: Type + Length + Value. Type is always the suboption
code 0xf1.
Question 79
An engineer must create an EEM applet that sends a syslog message in the event a change
happens in the network due to trouble with an OSPF process. Which action should the engineer
use?
Answer: A
Question 80
Which method does Cisco DNA Center use to allow management of non-Cisco devices through
southbound protocols?
Answer: A
Explanation
Cisco DNA Center allows customers to manage their non-Cisco devices through the use of a
Software Development Kit (SDK) that can be used to create Device Packages for third-party
devices.
Reference: https://developer.cisco.com/docs/dna-center/#!cisco-dna-center-platform-
overview/multivendor-support-southbound
Question 81
Answer: A
Explanation
YANG (Yet Another Next Generation) is protocol independent, and YANG data models can be
used independent of the transport or RPC protocol and can be converted into any encoding
format supported by the network configuration protocol.
Reference: https://www.juniper.net/documentation/us/en/software/junos/netconf/topics/
concept/netconf-yang-overview.html
Question 82
Option A Option B
Option C Option D
A. Option A
B. Option B
C. Option C
D. Option D
Answer: D
Question 83
R1
interface Ethernet0/0
ip address 10.1.1.10 255.255.255.0
ip nat inside
!
interface Serial0/0
ip address 209.165.201.1 255.255.255.224
ip nat outside
!
ip nat pool Busi 209.165.201.1 209.165.201.2 netmask 255.255.255.252
ip nat inside source list 1 pool Busi
!
access-list permit 10.1.1.0 0.0.0.255
!
A network engineer configures NAT on R1 and enters the show command to verify the
configuration. What does the output confirm?
Answer: B
Question 84
Only administrators from the subnet 10.10.10.0/24 are permitted to have access to the router.
A secure protocol must be used for the remote access and management of the router instead of
clear-text protocols. Which configuration achieves this goal?
Option A Option B
Option C Option D
Answer: B
Question 85
Which two operational models enable an AP to scan one or more wireless channels for rouge
access points and at the same time provide wireless services to clients? (Choose two)
A. Sniffer
B. Rouge detector
C. Local
D. FlexConnect
E. Monitor
Answer: C D
Explanation
Although Monitor and Rogue detector mode can detect rough APs but they do not handle
data so they are not correct.
Rogue Detection
A rogue is essentially any device that shares your spectrum, but is not in your control. This
includes rogue Access Points, wireless router, rogue clients, and rogue ad-hoc networks. The
Cisco UWN uses a number of methods to detect Wi-Fi-based rogue devices such as off-channel
scanning and dedicated monitor mode capabilities. Cisco Spectrum Expert can also be used to
identify rogue devices not based on the 802.11 protocol, such as Bluetooth bridges.
Off-Channel Scanning
This operation is performed by Local and Flex-Connect (in connected mode) mode APs and
utilizes a time-slicing technique which allows client service and channel scanning with the usage
of the same radio.
Reference: https://www.cisco.com/c/en/us/support/docs/wireless/4400-series-wireless-lan-
controllers/112045-handling-rogue-cuwn-00.html
Question 86
What are two benefits of implementing a Cisco SD-WAN architecture? (Choose two)
Answer: B C
Explanation
Reference: https://www.sdxcentral.com/networking/sd-wan/definitions/sd-wan-technology/
-> We can provision endpoints (vEdges) through a centralized router vManage, but not
standalone router management -> Answer D is not correct.
Answer A is not correct as we can use different kind of connections on SD-WAN: MPLS, LTE, 4G,
xDSL, Internet connections…
Reference: https://www.cisco.com/c/en/us/td/docs/solutions/CVD/SDWAN/cisco-sdwan-
application-aware-routing-deploy-guide.html
Cisco SD-WAN is fully integrated with cloud-delivered Cisco Umbrella, which offers protection
against security blind spots and cyberthreats. Powered by the Umbrella global network and Cisco
Talos threat intelligence, it’s the easiest way to deliver protection to users anywhere they access
the internet and cloud apps -> Answer B is correct.
Question 87
Answer: A B
Explanation
From the output above, we see the local router is the active HSRP router with priority 110 while
the default priority is 100 -> Answer D is not correct.
From the line “Standby router is 10.0.3.242, priority 100”, we learn that standby router is
configured with default priority -> Answer B is correct.
HSRP default hello and hold timers are 3 seconds and 10 seconds, respectively so answer A is
correct.
Question 88
A network architect has partially configured static NAT. which commands should be asked to
complete the configuration?
A.
R1(config)#interface GigabitEthernet0/0
R1(config)#ip pat outside
R1(config)#interface GigabitEthernet0/1
R1(config)#ip pat inside
B.
R1(config)#interface GigabitEthernet0/0
R1(config)#ip nat outside
R1(config)#interface GigabitEthernet0/1
R1(config)#ip nat inside
C.
R1(config)#interface GigabitEthernet0/0
R1(config)#ip nat inside
R1(config)#interface GigabitEthernet0/1
R1(config)#ip nat outside
D.
R1(config)#interface GigabitEthernet0/0
R1(config)#ip pat inside
R1(config)#interface GigabitEthernet0/1
R1(config)#ip pat outside
Answer: B
Explanation
The syntax of NAT command is ip nat inside source static local-ip global-ip so we can deduce
the first IP address is the local IP address where we apply “ip nat inside” command and the
second IP address is the global IP address where we apply “ip nat outside” command.
Question 89
Which Python library is used to work with YANG data models via NETCONF?
A. Postman
B. requests
C. ncclient
D. cURL
Answer: C
Explanation
In order to work with NETCONF, we have a library called ncclient. It’s a Python library that
facilitates client-side scripting and application development around the NETCONF protocol.
Reference: https://blog.wimwauters.com/networkprogrammability/2020-03-30-
netconf_python_part1/
Question 90
A. R2
router ospf 0
network 172.16.1.0 255.255.255.0 area 0
network 172.16.2.0 255.255.255.0 area 0
B. R2
router ospf 0
network 172.16.1.0 0.0.0.255 area 0
network 172.16.2.0 255.255.255.0 area 0
C. R1
router ospf 0
network 192.168.1.0 0.0.0.255 area 0
network 192.168.2.0 0.0.0.255 area 0
D. R2
router ospf 0
network 172.16.1.0 0.0.0.255 area 0
network 172.16.2.0 0.0.0.255 area 0
E. R1
router ospf 0
network 192.168.1.0 255.255.255.0 area 0
network 192.168.2.0 255.255.255.0 area 0
Answer: C D
Question 91
Answer: A E
Explanation
From below reference, we learn that answer D is not correct as the Control node (not Edge
node) is a simple Host Database that maps Endpoint IDs to a current Location, along with other
attributes.
Also from below reference, we can see the functions of Edge Node (page 34):
Edge Node provides first-hop services for Users / Devices connected to a Fabric
+ Responsible for Identifying and Authenticating Endpoints (e.g. Static, 802.1X, Active
Directory) -> Answer E is correct
+ Register specific Endpoint ID info (e.g. /32 or /128) with the Control-Plane Node(s)
+ Provide an Anycast L3 Gateway for the connected Endpoints (same IP address on all Edge
nodes)
+ Performs encapsulation / de-encapsulation of data traffic to and from all connected Endpoints
Reference: https://www.ciscolive.com/c/dam/r/ciscolive/us/docs/2019/pdf/BRKCRS-2818.pdf
Also from above reference, we also learn Border Node is the “default” exit if no entry is available
in Control-Plane (“Gateway of Last Resort” for any unknown destinations) -> Answer B and
answer C are not correct.
Question 92
A network engineer is troubleshooting an issue with the file server based on reports of slow file
transmissions. Which two commands or command sets are required in switch SW1 to analyze
the traffic from the file server with a packet analyzer? (Choose two)
A. SW1#show monitor
C. SW1#show ip route
D. SW1#show vlan
Answer: A B
Question 93
Which configuration filters out DOT1X messages in the format shown below from being sent
toward Syslog server 10.15.20.33?
Nov 20 13:47:32.553: %DOT1X-5-FAIL: Authentication failed for client (e04f.438e.de4f) on
Interface Gi1/0/1 AuditSessionID OAQB50A5000004543910739E
Answer: A
Explanation
The “logging discriminator DOT1X facility drops DOT1X” command creates a logging message
filter that drops log messages with a specific facility of “DOT1X”.
+ facility drops DOT1X: This option tells the discriminator to drop log messages that have a
facility of “DOT1X”. Facilities are used to group log messages based on the type of device or
process that generated them.
Overall, this command creates a logging message filter that drops log messages with a facility of
“DOT1X”. Any log messages that have this facility will not be saved to the router’s log buffer.
This command could be useful in situations where a large number of log messages are generated
by the 802.1X authentication process and these messages are not required for troubleshooting
or auditing purposes. By dropping these messages, the router’s log buffer can be conserved and
the visibility of other log messages can be improved.
Reference: https://community.cisco.com/t5/network-management/filtering-of-logging-
messages-to-a-syslog-server-on-a-catalyst/td-p/2585566
Question 94
A customer has a pair of Cisco 5520 WLCs set up in an SSO cluster to manage all APs. Guest
traffic is anchored to a Cisco 3504 WLC located in a DMZ. Which action is needed to ensure that
the EoIP tunnel remains in an UP state in the event of failover on the SSO cluster?
Answer: B
Explanation
In order to keep the mobility network stable without any manual intervention and in the event of
failure or switchover, the back-and-forth concept of Mobility MAC has been introduced.
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/7-5/
High_Availability_DG.html
Question 95
A. SaltStack uses an API proxy agent to program Cisco boxes on agent mode, whereas Ansible
uses a Telnet connection
B. SaltStack uses the Ansible agent on the box, whereas Ansible uses a Telnet server on the box
C. SaltStack is constructed with minion, whereas Ansible is constructed with YAML
D. SaltStack uses SSH to interact with Cisco devices, whereas Ansible uses an event bus
Answer: C
Explanation
In SaltStack architecture, there is a core component called Salt-minion, which is a system that is
being controlled by a Salt master.
Question 96
Which protocol is used to encrypt control plane traffic between SD-WAN controllers and SD-WAN
endpoints?
A. DTLS
B. IPsec
C. PGP
D. HTTPS
Answer: A
Explanation
DTLS protocol is used to encrypt control plane traffic between vSmart (controllers) and other
SD-WAN endpoints.
Question 97
Refer to the exhibit.
BR(config)#interface tunnel1
BR(config-if)#keepalive 5 3
HQ(config)#interface tunnel1
HQ(config-if)#keepalive 5 3
A. The tunnel line protocol goes down when the keepalive counter reaches 6
B. The keepalives are sent every 5 seconds and 3 retries
C. The keepalives are sent every 3 seconds and 5 retries.
D. The tunnel line protocol goes down when the keepalive counter reaches 5
Answer: B
Explanation
The syntax of keepalive command is: keepalive {seconds retries} so R1 will send keepalive
message every 5 seconds and retry 3 times. If all of the keepalive messages are failed, R1
concludes the tunnel was broken.
Question 98
Answer: A
Explanation
Coverage Hole Detection is a feature that detects areas with poor wireless coverage and may
trigger power changes on APs to improve coverage. Disabling it would prevent the APs from
making these adjustments, which could stabilize the power levels.
MFP Client Protection is used to protect against clients connecting to a rogue access point only -
> Answer D is not correct.
From the exhibit, we see that DTIM Period ranges from 1 to 255 so we cannot set it to 0 ->
Answer C is not correct.
“Aironet IE” option means “Aironet IE Extension”. This extension help clients choose the best
access point. But it does not relate to our question.
Question 99
Drag and drop the solutions that comprise Cisco Cyber Threat Defense from the left onto the
objectives they accomplish on the right.
Answer:
Explanation
Cisco ISE collects dynamic contextual data from throughout the network and uses Cisco pxGrid
technology, a robust context-sharing platform, to share that deeper level of contextual data
about connected users and devices with external and internal ecosystem partner solutions.
Through the use of a single API, Cisco ISE network and security partners use this data in order
to improve their own network access capabilities and accelerate their solutions’ capabilities to
identify, mitigate, and remediate network threats.
Question 100
An engineer builds an EEM script to apply an access list. Which statement must be added to
complete the script?
A. event none
B. action 2.1 cli command “ip action 3.1 cli command 101”
C. action 6.0 cli command ”ip access-list extended 101”
D. action 6.0 cli command ”ip access-list extended 101″
Answer: A
Explanation
The “event none” means this EEM applet is manually triggered. Notice that even we entered the
“event none” command at the bottom of the EEM but it will be put on the top:
Question 101
Which two new security capabilities are introduced by using a next-generation firewall at the
Internet edge? (Choose two)
A. DVPN
B. NAT
C. stateful packet inspection
D. application-level inspection
E. integrated intrusion prevention
Answer: D E
Explanation
Next-generation firewalls (NGFWs) are deep-packet inspection firewalls that move beyond
port/protocol inspection and blocking to add application-level inspection, intrusion prevention,
and bringing intelligence from outside the firewall.
Reference: https://www.gartner.com/en/information-technology/glossary/next-generation-
firewalls-ngfws
Question 102
Why would a small or mid-size business choose a cloud solution over an on-premises solution?
Answer: A
Question 103
Answer: A
Explanation
SD-WAN Validator – This software-based component performs the initial authentication of WAN
Edge devices and orchestrates SD-WAN Controller, Manager, and WAN Edge connectivity. It also
has an important role in enabling the communication between devices that sit behind Network
Address Translation (NAT).
Reference: https://www.cisco.com/c/en/us/td/docs/solutions/CVD/SDWAN/cisco-sdwan-design-
guide.html
NAT traversal: The Cisco SD-WAN Validator facilitates the initial orchestration between edge
routers and Cisco SD-WAN Controllers when one or both of them are behind NAT devices.
Reference: https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/sdwan-xe-gs-
book/system-overview.html
Note: Cisco SD-WAN has been rebranded to Cisco Catalyst SD-WAN. As part of this rebranding,
the vManage name has been changed to SD-WAN Manager, the vSmart name has been changed
to SD-WAN Controller, and the vBond name has been changed to SD-WAN Validator.
Question 104
An engineer must export the contents of the devices object in JSON format. Which statement
must be use?
A. json.print(Devices)
B. json.loads(Devices)
C. json.dumps(Devices)
D. json.repr(Devices)
Answer: C
Explanation
json.loads() takes in a string and returns a json object while json.dumps() takes in a json
object and returns a string. In this question, “Devices” is a ‘list’, not a string so we have to
“dumps” it first to convert it into a string before printing it out.
Note: JSON does not have attributes “print” or “repr” so we cannot use them.