Which LISP component do routers in the public IP network use to forward traffic between the two networks?

Refer to the exhibit. Which LISP component do routers in the public IP network use to forward traffic between the two networks?A . RLOCB . map resolverC . EIDD . map serverView AnswerAnswer: A Explanation: Locator ID Separation Protocol (LISP) is a network architecture and protocol that implements the use...

December 1, 2020 No Comments READ MORE +

Why do the extended pings fail?

Refer to the exhibit. R1 is able to ping the R3 fa0/1 interface. Why do the extended pings fail?A . The maximum packet size accepted by the command is 1476 bytes.B . R3 is missing a return route to 10.99.69.0/30C . R2 and R3 do not have an OSPF adjacencyD...

December 1, 2020 No Comments READ MORE +

Which protocol does REST API rely on to secure the communication channel?

Which protocol does REST API rely on to secure the communication channel?A . TCPB . HTTPSC . SSHD . HTTPView AnswerAnswer: B Explanation: The REST API accepts and returns HTTP (not enabled by default) or HTTPS messages that contain JavaScript Object Notation (JSON) or Extensible Markup Language (XML) documents. You...

December 1, 2020 No Comments READ MORE +

What the role of a fusion in an SD-Access solution?

What the role of a fusion in an SD-Access solution?A . provides connectivity to external networksB . acts as a DNS serverC . performs route leaking between user-defined virtual networks and shared servicesD . provides additional forwarding capacity to the fabricView AnswerAnswer: C Explanation: Today the Dynamic Network Architecture Software...

December 1, 2020 No Comments READ MORE +

Which issue is occurring?

Refer to the exhibit. (YOUR CONNECTION IS NOT PRIVATE WARNING) An engineer is designing a guest portal on Cisco ISE using the default configuration. During the testing phase, the engineer receives a warning when displaying the guest portal. Which issue is occurring?A . The server that is providing the portal...

November 30, 2020 No Comments READ MORE +

What is the logging severity level?

Refer to this output. What is the logging severity level? R1#Feb 14 37:15:12:429: %LINEPROTO-5-UPDOWN Line protocol on interface GigabitEthernet0/1. Change state to upA . NotificationB . AlertC . CriticalD . EmergencyView AnswerAnswer: A

November 30, 2020 No Comments READ MORE +

Which access controls list allows only TCP traffic with a destination port range of 22-433, excluding port 80?

Which access controls list allows only TCP traffic with a destination port range of 22-433, excluding port 80?A . Deny tcp any any eq 80 Permit tcp any any gt 21 it 444B . Permit tcp any any ne 80C . Permit tcp any any range 22 443 Deny tcp...

November 30, 2020 8 Comments READ MORE +

How does Cisco Trustsec enable more flexible access controls for dynamic networking environments and data centers?

How does Cisco Trustsec enable more flexible access controls for dynamic networking environments and data centers?A . uses flexible NetFlowB . assigns a VLAN to the endpointC . classifies traffic based an the contextual identity of the endpoint rather than its IP addressD . classifies traffic based on advanced application...

November 29, 2020 No Comments READ MORE +

Assuming that R is a CE router, which VRF is assigned to Gi0/0 on R1?

Refer to the exhibit. Assuming that R is a CE router, which VRF is assigned to Gi0/0 on R1? A. VRF VPN_B B. Default VRF C. Management VRF D. VRF VPN_AView AnswerAnswer: B Explanation: There is nothing special with the configuration of Gi0/0 on R1. Only Gi0/0 interface on R2...

November 29, 2020 No Comments READ MORE +

Which type of antenna do the radiation patterns present?

Refer to the exhibit. Which type of antenna do the radiation patterns present?A . PatchB . OmnidirectionalC . YagiD . DipoleView AnswerAnswer: A

November 29, 2020 No Comments READ MORE +