Which benefit is offered by a cloud infrastructure deployment but is lacking in an on-premises deployment?
Which benefit is offered by a cloud infrastructure deployment but is lacking in an on-premises deployment?A . efficient scalabilityB . virtualizationC . storage capacityD . supported systemsView AnswerAnswer: A
In an SD-WAN deployment, which action in the vSmart controller responsible for?
In an SD-WAN deployment, which action in the vSmart controller responsible for?A . handle, maintain, and gather configuration and status for nodes within the SD -WAN fabricB . onboard vEdge nodes into the SD-WAN fabricC . gather telemetry data from vEdge routersD . distribute policies that govern data forwarding performed...
Which protocol is responsible for data plane forwarding in a Cisco SD -Access deployment?
Which protocol is responsible for data plane forwarding in a Cisco SD -Access deployment?A . VXLANB . IS-ISC . OSPFD . LISPView AnswerAnswer: A
How to make DSW1 the primary root for VLAN 10?
Refer to the exhibit. How to make DSW1 the primary root for VLAN 10? (Choose two)A . DWS1(config-if)#spanning-tree port-priority 0B . DSW2(config-if)#spanning-tree port-priority 16C . DSW1(config-if)#interface gi1/3D . DSW2(config-if)#interface gi1/3E . DSW2(config-if)#spanning-tree port-priority 128View AnswerAnswer: A C (?)
What are two device roles in Cisco SD-Access fabric? (Choose two)
What are two device roles in Cisco SD-Access fabric? (Choose two)A . core switchB . vBond controllerC . edge nodeD . access switchE . border nodeView AnswerAnswer: C E
In a three-tier hierarchical campus network design, which action is a design best-practice for the core layer?
In a three-tier hierarchical campus network design, which action is a design best-practice for the core layer?A . provide QoS prioritization services such as marking, queueing, and classification for critical network trafficB . provide advanced network security features such as 802. IX, DHCP snooping, VACLs, and port securityC . provide...
What is the differences between TCAM and the MAC address table?
What is the differences between TCAM and the MAC address table?A . Router prefix lookups happens in CAB . MAC address table lookups happen in TCAMC . The MAC address table supports partial matches. TCAM requires an exact matchD . The MAC address table is contained in CAE . ACL...
What is an emulated machine that has dedicated compute, memory, and storage resources and a fully installed operating system?
What is an emulated machine that has dedicated compute, memory, and storage resources and a fully installed operating system?A . hostB . virtual machineC . containerD . mainframeView AnswerAnswer: B
To configure the employee WLAN, which two Layer 2 security policies should be used?
A customer has completed the installation of a Wi-Fi 6 greenfield deployment at their new campus. They want to leverage Wi-Fi 6 enhanced speeds on the trusted employee WLAN. To configure the employee WLAN, which two Layer 2 security policies should be used? (Choose two)A . WPA (AES)B . WPA2...
Which two actions, when applied in the LAN network segment, will facilitate Layer 3 CAPWAP discovery for lightweight AP? (Choose two)
Which two actions, when applied in the LAN network segment, will facilitate Layer 3 CAPWAP discovery for lightweight AP? (Choose two)A . Utilize DHCP option 17B . Utilize DHCP option 43C . Configure WLC IP address on LAN switchD . Enable port security on the switch portE . Configure an...