Please enter your email:

1. Which statement about Cisco Express Forwarding is true?


2. Which standard access control entry permits traffic from odd-numbered hosts in the subnet?


3. Which method creates an EEM applet policy that is registered with EEM and runs on
demand or manually?


4. Which two operations are valid for RESTCONF? (Choose two.)



The WLC administrator sees that the controller to which a roaming client associates has Mobility Role Anchor configured under Clients > Detail.Which type of roaming is supported?


6. A customer has several small branches and wants to deploy a Wi-Fi solution with local management using CAPWAP. Which deployment model meets this requirement?


7. Which statement about agent-based versus agentless configuration management tools is true?


8. Which First Hop Redundancy Protocol maximizes uplink utilization and minimizes the amount of configuration that is necessary?


9. What is the structure of a JSON web token?


10. In which part of the HTTP message is the content type specified?



Which configuration establishes EBGP connected neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP?


12. Which LISP device is responsible for publishing EID-to-RLOC mappings for a site?



Which type of antenna do the radiation patterns present?



What are two effects of this configuration? (Choose two.)


15. Which controller is the single plane of management for Cisco SD-WAN?


16. A response code of 404 is received while using the REST API on Cisco DNA Center to POST to this URI: /dna/intent/api/v1/template-programmer/project What does the code mean?


17. An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy.

Which device presents the web authentication for the WLAN?


18. When configuring WPA2 Enterprise on a WLAN, which additional security component
configuration is required?


19. What is a benefit of deploying an on-premises infrastructure versus a cloud infrastructure deployment?


20. Which reason could cause an OSPF neighborship to be in the EXSTART/EXCHANGE state?


21. Which method does the enable secret password option use to encrypt device passwords?


22. Which statement about TLS is true when using RESTCONF to write configurations on
network devices?


23. Which statement about a fabricaccess point is true?


24. A network is being migrated from IPv4 to IPv6 using a dual-stack approach. Network management is already 100%Pv6 enabled.In a dual-stack network with two dual-stack NetFlow collectors, how many flow exporters are needed per network device in the flexible NetFlow configuration?


Question 1 of 24