Posted on June 26, 2020 CCNP Enterprise Please enter your email: 1. Which First Hop Redundancy Protocol maximizes uplink utilization and minimizes the amount of configuration that is necessary? A. GLBP B. HSRP v2 C. VRR D. HSRP v1 2. Which statement about TLS is true when using RESTCONF to write configurations on network devices? A. It is used for HTTP and HTTPS requests. B. It requires certificates for authentication. C. It is provided using NGINX acting as a proxy web server. D. It is not supported on Cisco devices. 3. Which statement about a fabricaccess point is true? A. It is in local mode and must be connected directly to the fabric edge switch B. It is in local mode and must be connected directly to the fabric border node C. It is in FlexConnect mode and must be connected directly to the fabric border node. D. It is in FlexConnect mode and must be connected directly to the fabric edge switch. 4. When configuring WPA2 Enterprise on a WLAN, which additional security component configuration is required? A. PKI server B. NTP server C. RADIUS server D. TACACS server 5. Which standard access control entry permits traffic from odd-numbered hosts in the 10.0.0.0/24 subnet? A. permit 10.0.0.0 0.0.0.1 B. permit 10.0.0.1 0.0.0.254 C. permit 10.0.0.1 0.0.0.0 D. permit 10.0.0.0 255.255.255.254 6. What is the structure of a JSON web token? A. three parts separated by dots: header, payload, and signature B. three parts separated by dots: version, header, and signature C. header and payload D. payload and signature 7. A network is being migrated from IPv4 to IPv6 using a dual-stack approach. Network management is already 100%Pv6 enabled.In a dual-stack network with two dual-stack NetFlow collectors, how many flow exporters are needed per network device in the flexible NetFlow configuration? A. 1 B. 2 C. 4 D. 8 8. What are two effects of this configuration? (Choose two.) A. It establishes a one-to-one NAT translation. B. The 209.165.201.0/27 subnet is assigned as the outside local address range. C. The 10.1.1.0/27 subnet is assigned as the inside local addresses. D. Inside source addresses are translated to the 209.165.201.0/27 subnet. 9. Which statement about Cisco Express Forwarding is true? A. The CPU of a router becomes directly involved with packet switching decisions. B. It uses a fast cache that is maintained in a router data plane. C. It maintains two tables in the data plane: the FIB and adjacency table. D. It makes forwarding decisions by a process that is scheduled through the IOS scheduler. 10. Which controller is the single plane of management for Cisco SD-WAN? A. vBond B. vSmart C. vManage D. vEdge 11. What is a benefit of deploying an on-premises infrastructure versus a cloud infrastructure deployment? A. ability to quickly increase compute power without the need to install additional hardware B. less power and coding resources needed to run infrastructure on-premises C. faster deployment times because additional infrastructure does not need to be purchased D. lower latency between systems that are physically located near each other 12. Which method does the enable secret password option use to encrypt device passwords? A. MD5 B. PAP C. CHAP D. AES 13. Which statement about agent-based versus agentless configuration management tools is true? A. Agentless tools use proxy nodes to interface with slave nodes. B. Agentless tools require no messaging systems between master and slaves. C. Agent-based tools do not require a high-level language interpreter such as Python or Ruby on slave nodes D. Agent-based tools do not require installation of additional software packages on the slave nodes 14. A customer has several small branches and wants to deploy a Wi-Fi solution with local management using CAPWAP. Which deployment model meets this requirement? A. local mode B. autonomous C. SD-Access wireless D. Mobility Express 15. A response code of 404 is received while using the REST API on Cisco DNA Center to POST to this URI: /dna/intent/api/v1/template-programmer/project What does the code mean? A. The POST/PUT request was fulfilled and a new resource was created. Information about the resource is in the response body. B. The request was accepted for processing, but the processing was not completed. C. The client made a request for a resource that does not exist. D. The server has not implemented the functionality that is needed to fulfill the request. 16. Which method creates an EEM applet policy that is registered with EEM and runs on demand or manually? A. event manager applet ondemand event none action 1.0 syslog priority critical msg ‘This is a message from ondemand’ B. event manager applet ondemand action 1.0 syslog priority critical msg‘This is a message from ondemand C. event manager applet ondemandevent registeraction 1.0 syslog priority critical msg ‘This is a message from ondemand’ D. event manager applet ondemand event manual action 1.0 syslog priority critical msg ‘This is a message from ondemand 17. An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy. Which device presents the web authentication for the WLAN? A. ISE server B. RADIUS server C. anchor WLC D. local WLC 18. Which two operations are valid for RESTCONF? (Choose two.) A. PULL B. PUSH C. PATCH D. REMOVE E. ADD F. HEAD 19. The WLC administrator sees that the controller to which a roaming client associates has Mobility Role Anchor configured under Clients > Detail.Which type of roaming is supported? A. indirect B. Layer 3 intercontroller C. intracontroller D. Layer 2 intercontroller 20. Which LISP device is responsible for publishing EID-to-RLOC mappings for a site? A. ETR B. MR C. ITR D. MS 21. Which reason could cause an OSPF neighborship to be in the EXSTART/EXCHANGE state? A. mismatched OSPF link costs B. mismatched OSPF network type C. mismatched areas D. mismatched MTU size 22. Which type of antenna do the radiation patterns present? A. Yagi B. patch C. omnidirectional D. dipole 23. In which part of the HTTP message is the content type specified? A. HTTP method B. body C. header D. URI 24. Which configuration establishes EBGP connected neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP? A. R1(config)#router bgp 1 R1(config-router)#neighbor 192.168.10.2 remote-as 2 R1(config-router)#network 10.1.1.0 mask 255.255.255.0 R2(config)#router bgp 2 R2(config-router)#neighbor 192.168.10.1 remote-as 1 R2(config-router)#network 10.2.2.0 mask 255.255.255.0 B. R1(config)#router bgp 1 R1(config-router)#neighbor 10.2.2.2 remote-as 2 R1(config-router)#network 10.1.1.0 mask 255.255.255.0 R2(config)#router bgp 2 R2(config-router)#neighbor 10.1.1.1 remote-as 1 R2(config-router)#network 10.2.2.0 mask 255.255.255.0 C. R1(config)#router bgp 1 R1(config-router)#neighbor 192.168.10.2 remote-as 2 R1(config-router)#network 10.0.0.0 mask 255.0.0.0 R2(config)#router bgp 2 R2(config-router)#neighbor 192.168.10.1 remote-as 1 R2(config-router)#network 10.0.0.0 mask 255.0.0.0 D. R1(config)#router bgp 1 R1(config-router)#neighbor 10.2.2.2 remote-as 2 R1(config-router)#neighbor 10.2.2.2 update-source |o0 R1(configrouter)# network 10.1.1.0 mask 255.255.255.0 R2(config)#router bgp 2 R2(config-router)#neighbor 10.1.1.1 remote-as 1 R2(config-router)#neighbor 10.1.1.1 update-source |o0 R2(config-router)#network 10.2.2.0 mask 255.255.255.0 Loading … Question 1 of 24