Please enter your email:

1. Which two protocols are used with YANG data models? (Choose two.)

 
 
 
 
 

2. To increase total throughput and redundancy on the links between the wireless controller and switch, the customer enabled LAG on the wireless controller.

Which EtherChannel mode must be configured on the switch to allow the WLC to connect?

 
 
 
 

3.

Which privilege level is assigned to VTY users?

 
 
 
 

4. Which statement about multicast RPs is true?

 
 
 
 

5. Which requirement for an Ansible managed node is true?

 
 
 
 

6. Which HTTP status code is the correct response for a request with an incorrect password applied to a REST API session?

 
 
 
 

7. Which LISP infrastructure device provides connectivity between non-LISP sites and LISP sites by receiving non-LISP traffic with a LISP site destination?

 
 
 
 

8. Which OSPF network types are compatible and allow communication through the two peering devices?

 
 
 
 

9. What are two benefits of virtualizing the server with the use of VMs in a data center environment? (Choose two.)

 
 
 
 
 

10. Which statements are used for error handling in Python?

 
 
 
 

11. An engineer configures a WLAN with fast transition enabled. Some legacy clients fail to connect to this WLAN. Which feature allows the legacy clients to connect while still allowing other clients to use fast transition based on their OUIs?

 
 
 
 

12. What is the difference between a RIB and a FIB?

 
 
 
 

13. Which two pieces of information are necessary to compute SNR? (Choose two.)

 
 
 
 
 

14. Which two steps are required for a complete Cisco DNA Center upgrade? (Choose two.)

 
 
 
 
 

15. Which NGFW mode blocks flows crossing the firewall?

 
 
 
 

16. Which two descriptions of FlexConnect mode for Cisco APs are true? (Choose two.)

 
 
 
 
 

17. A client device fails to see the enterprise SSID, but other client devices are
connected to it.

What is the cause of this issue?

 
 
 
 

18. A network administrator is implementing a routing configuration change and enables routing debugs to track routing behavior during the change. The logging output on the terminal is interrupting the command typing process.

Which two actions can the network administrator take to minimize the possibility of typing commands incorrectly? (Choose two.)

 
 
 
 
 

19. Which feature does Cisco TrustSec use to provide scalable, secure communication

 
 
 
 

20.

Which statement about the OPSF debug output is true?

 
 
 
 

21. Which function does a fabric edge node perform in an SD-Access deployment?

 
 
 
 

22. How does Cisco TrustSec enable more flexible access controls for dynamic networking environments and data centers?

 
 
 
 

23. Which statement about route targets is true when using VRF-Lite?

 
 
 
 

24. Which exhibit displays a valid JSON file?

 
 
 
 

Question 1 of 24