Please enter your email:

1.

What are two effects of this configuration? (Choose two.)

 
 
 
 

2. Which controller is the single plane of management for Cisco SD-WAN?

 
 
 
 

3. Which method does the enable secret password option use to encrypt device passwords?

 
 
 
 

4. Which method creates an EEM applet policy that is registered with EEM and runs on
demand or manually?

 
 
 
 

5. Which statement about TLS is true when using RESTCONF to write configurations on
network devices?

 
 
 
 

6. Which two operations are valid for RESTCONF? (Choose two.)

 
 
 
 
 
 

7. When configuring WPA2 Enterprise on a WLAN, which additional security component
configuration is required?

 
 
 
 

8.

Which type of antenna do the radiation patterns present?

 
 
 
 

9. A customer has several small branches and wants to deploy a Wi-Fi solution with local management using CAPWAP. Which deployment model meets this requirement?

 
 
 
 

10. In which part of the HTTP message is the content type specified?

 
 
 
 

11. Which statement about a fabricaccess point is true?

 
 
 
 

12. What is a benefit of deploying an on-premises infrastructure versus a cloud infrastructure deployment?

 
 
 
 

13. Which LISP device is responsible for publishing EID-to-RLOC mappings for a site?

 
 
 
 

14. Which reason could cause an OSPF neighborship to be in the EXSTART/EXCHANGE state?

 
 
 
 

15. A response code of 404 is received while using the REST API on Cisco DNA Center to POST to this URI: /dna/intent/api/v1/template-programmer/project What does the code mean?

 
 
 
 

16. Which statement about agent-based versus agentless configuration management tools is true?

 
 
 
 

17. A network is being migrated from IPv4 to IPv6 using a dual-stack approach. Network management is already 100%Pv6 enabled.In a dual-stack network with two dual-stack NetFlow collectors, how many flow exporters are needed per network device in the flexible NetFlow configuration?

 
 
 
 

18. Which First Hop Redundancy Protocol maximizes uplink utilization and minimizes the amount of configuration that is necessary?

 
 
 
 

19. What is the structure of a JSON web token?

 
 
 
 

20. An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy.

Which device presents the web authentication for the WLAN?

 
 
 
 

21. Which standard access control entry permits traffic from odd-numbered hosts in the 10.0.0.0/24 subnet?

 
 
 
 

22.

The WLC administrator sees that the controller to which a roaming client associates has Mobility Role Anchor configured under Clients > Detail.Which type of roaming is supported?

 
 
 
 

23.

Which configuration establishes EBGP connected neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP?

 
 
 
 

24. Which statement about Cisco Express Forwarding is true?

 
 
 
 

Question 1 of 24