How does the EIGRP metric differ from the OSPF metric?
How does the EIGRP metric differ from the OSPF metric?A . The EIGRP metric is calculated based on bandwidth only. The OSPF metric is calculated on delay only.B . The EIGRP metric is calculated based on delay only. The OSPF metric is calculated on bandwidth and delay.C . The EIGRP...
Which function in handled by vManage in the cisco SD-WAN fabric?
Which function in handled by vManage in the cisco SD-WAN fabric?A . Establishes BFD sessions to test liveliness of links and nodes.B . Distributes polices that govern data forwarding.C . Performs remote software upgrades for WAN Edge vSmart and vBond.D . Establishes iPsec tunnels with nodesView AnswerAnswer: C
Which two methods are used to reduce the AP coverage area? (Choose two)
Which two methods are used to reduce the AP coverage area? (Choose two)A . Reduce channel width from 40 MHz to 20 MHzB . Disable 2.4 GHz and use only 5 GHz.C . Reduce AP transmit power.D . Increase minimum mandatory data rateE . Enable FastlaneView AnswerAnswer: C D
When is an external antenna used inside a building?
When is an external antenna used inside a building?A . only when using Mobility ExpressB . when it provides the required coverageC . only when using 2 4 GHzD . only when using 5 GHzView AnswerAnswer: B
What is the effect of the configuration?
Refer to the exhibit. An engineer must configure a SPAN session. What is the effect of the configuration?A . Traffic sent on VLANs 10, 11, and 12 is copied and sent to interface g0/1.B . Traffic sent on VLANs 10 and 12 only is copied and sent to interface g0/1.C...
What is the function of a fabric border node in a Cisco SD-Access environment?
What is the function of a fabric border node in a Cisco SD-Access environment?A . To collect traffic flow information toward external networksB . To connect the Cisco SD-Access fabric to another fabric or external Layer 3 networksC . To attach and register clients to the fabricD . To handle...
Which two configuration changes accomplish this?
Refer to the exhibit. A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Which two configuration changes accomplish this? (Choose two).A . Create an IPsec profile, associate the transform-set ACL, and apply the profile to the tunnel interface.B . Apply the crypto map...
Which action resolves this issue?
Refer to the Exhibit. An engineer attempts to create a configuration to allow the Blue VRF to leak into the global routing table, but the configuration does not function as expected. Which action resolves this issue?A . Change the access-list destination mask to a wildcard.B . Change the source network...
After a redundant route processor failure occurs on a Layer 3 device, which mechanism allows for packets to be forwarded from a neighboring router based on the most recent tables?
After a redundant route processor failure occurs on a Layer 3 device, which mechanism allows for packets to be forwarded from a neighboring router based on the most recent tables?A . BFDB . RPVST+C . RP failoverD . NSFView AnswerAnswer: D
How is 802.11 traffic handled in a fabric-enabled SSID?
How is 802.11 traffic handled in a fabric-enabled SSID?A . centrally switched back to WLC where the user traffic is mapped to a VXLAN on the WLCB . converted by the AP into 802.3 and encapsulated into VXLANC . centrally switched back to WLC where the user traffic is mapped...