Which JSON syntax is derived from this data?

Refer to the exhibit. Which JSON syntax is derived from this data? A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: A

March 23, 2021 No Comments READ MORE +

Which two network problems indicate a need to implement QoS in a campus network? (Choose two)

Which two network problems indicate a need to implement QoS in a campus network? (Choose two)A . port flappingB . misrouted network packetsC . excess jitterD . bandwidth-related packet lossE . duplicate IP addressesView AnswerAnswer: C D

March 23, 2021 No Comments READ MORE +

Which technology is used to provide Layer 2 and Layer 3 logical networks in the Cisco SD-Access architecture?

Which technology is used to provide Layer 2 and Layer 3 logical networks in the Cisco SD-Access architecture?A . underlay networkB . overlay networkC . VPN routing/forwardingD . easy virtual networkView AnswerAnswer: B

March 22, 2021 No Comments READ MORE +

Which statement about a Cisco APIC controller versus a more traditional SDN controller is true?

Which statement about a Cisco APIC controller versus a more traditional SDN controller is true?A . APIC uses a policy agent to translate policies into instructionsB . APIC supports OpFlex as a Northbound protocolC . APIC does support a Southbound REST APID . APIC uses an imperative modelView AnswerAnswer: A

March 22, 2021 No Comments READ MORE +

What is a characteristic of a next-generation firewall?

What is a characteristic of a next-generation firewall?A . required in each layer of the networkB . filters traffic using Layer 3 and Layer 4 information onlyC . only required at the network perimeterD . provides intrusion preventionView AnswerAnswer: D

March 22, 2021 No Comments READ MORE +

Which configuration corrects the issue?

Refer to the exhibit. Company policy restricts VLAN 10 to be allowed only on SW1 and SW2. All other VLANs can be on all three switches. An administrator has noticed that VLAN 10 has propagated to SW3. Which configuration corrects the issue?A . SW2(config)#interface gi1/2 SW2(config)#switchport trunk allowed vlan 10B...

March 22, 2021 No Comments READ MORE +

Based on the output from SW1 and the log message received on Switch SW2, what action should the engineer take to resolve this issue?

Refer to the exhibit. After an engineer configures an EtherChannel between switch SW1 and switch SW2, this error message is logged on switch SW2. Based on the output from SW1 and the log message received on Switch SW2, what action should the engineer take to resolve this issue?A . Configure...

March 22, 2021 No Comments READ MORE +

What step resolves the authentication issue?

Refer to the exhibit. What step resolves the authentication issue?A . restart the vsmart hostB . target 192.168.100.82 in the URIC . change the port to 12446D . use basic authenticationView AnswerAnswer: B

March 21, 2021 No Comments READ MORE +

Which protocol does the design include?

A customer requests a network design that supports these requirements: * FHRP redundancy * multivendor router environment * IPv4 and IPv6 hosts Which protocol does the design include?A . GLBPB . VRRP version 2C . VRRP version 3D . HSRP version 2View AnswerAnswer: C

March 21, 2021 No Comments READ MORE +

Which two configuration changes accomplish this?

Refer to the exhibit. A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Which two configuration changes accomplish this? (Choose two)A . Apply the crypto map to the tunnel interface and change the tunnel mode to tunnel mode ipsec ipv4B . Remove all...

March 21, 2021 No Comments READ MORE +