Which LISP component do routers in the public IP network use to forward traffic between the two networks?
Refer to the exhibit. Which LISP component do routers in the public IP network use to forward traffic between the two networks?A . RLOCB . map resolverC . EIDD . map serverView AnswerAnswer: A Explanation: Locator ID Separation Protocol (LISP) is a network architecture and protocol that implements the use...
Why do the extended pings fail?
Refer to the exhibit. R1 is able to ping the R3 fa0/1 interface. Why do the extended pings fail?A . The maximum packet size accepted by the command is 1476 bytes.B . R3 is missing a return route to 10.99.69.0/30C . R2 and R3 do not have an OSPF adjacencyD...
Which protocol does REST API rely on to secure the communication channel?
Which protocol does REST API rely on to secure the communication channel?A . TCPB . HTTPSC . SSHD . HTTPView AnswerAnswer: B Explanation: The REST API accepts and returns HTTP (not enabled by default) or HTTPS messages that contain JavaScript Object Notation (JSON) or Extensible Markup Language (XML) documents. You...
What the role of a fusion in an SD-Access solution?
What the role of a fusion in an SD-Access solution?A . provides connectivity to external networksB . acts as a DNS serverC . performs route leaking between user-defined virtual networks and shared servicesD . provides additional forwarding capacity to the fabricView AnswerAnswer: C Explanation: Today the Dynamic Network Architecture Software...
Which issue is occurring?
Refer to the exhibit. (YOUR CONNECTION IS NOT PRIVATE WARNING) An engineer is designing a guest portal on Cisco ISE using the default configuration. During the testing phase, the engineer receives a warning when displaying the guest portal. Which issue is occurring?A . The server that is providing the portal...
What is the logging severity level?
Refer to this output. What is the logging severity level? R1#Feb 14 37:15:12:429: %LINEPROTO-5-UPDOWN Line protocol on interface GigabitEthernet0/1. Change state to upA . NotificationB . AlertC . CriticalD . EmergencyView AnswerAnswer: A
Which access controls list allows only TCP traffic with a destination port range of 22-433, excluding port 80?
Which access controls list allows only TCP traffic with a destination port range of 22-433, excluding port 80?A . Deny tcp any any eq 80 Permit tcp any any gt 21 it 444B . Permit tcp any any ne 80C . Permit tcp any any range 22 443 Deny tcp...
How does Cisco Trustsec enable more flexible access controls for dynamic networking environments and data centers?
How does Cisco Trustsec enable more flexible access controls for dynamic networking environments and data centers?A . uses flexible NetFlowB . assigns a VLAN to the endpointC . classifies traffic based an the contextual identity of the endpoint rather than its IP addressD . classifies traffic based on advanced application...
Assuming that R is a CE router, which VRF is assigned to Gi0/0 on R1?
Refer to the exhibit. Assuming that R is a CE router, which VRF is assigned to Gi0/0 on R1? A. VRF VPN_B B. Default VRF C. Management VRF D. VRF VPN_AView AnswerAnswer: B Explanation: There is nothing special with the configuration of Gi0/0 on R1. Only Gi0/0 interface on R2...
Which type of antenna do the radiation patterns present?
Refer to the exhibit. Which type of antenna do the radiation patterns present?A . PatchB . OmnidirectionalC . YagiD . DipoleView AnswerAnswer: A