350-401: Implementing Cisco Enterprise Network Core Technologies (ENCOR) Part 10
Question #: 631
Topic #: 1
JSON web tokens (JWT) are used to secure JSON based communications. Which of the following fields make up a JWT? (Choose three.)
A. Header
B. Trailer
C. Payload
D. Sequence number
E. Signature
Selected Answer: ACE
Question #: 632
Topic #: 1
Ansible is being used in a network for configuration and management automation. Which of the following are true statements regarding Ansible? (Choose two.)
A. Requires an agent on the end device.
B. Utilizes the concept of playbooks to execute the configuration.
C. Uses a pull model, where the end devices pull configuration files from the Ansible server.
D. Utilizes SSH.
Selected Answer: BD
Question #: 633
Topic #: 1
In a Cisco Software Defined Networking (SDN) architecture, what is used to describe the API communication between the SDN controller and the network elements (routers and switches) that it manages?
A. Southbound API
B. Northbound API
C. Westbound API
D. Eastbound API.
Selected Answer: A
Question #: 634
Topic #: 1
In a Cisco VXLAN based network, which of the following best describes the main function of a VXLAN Tunnel Endpoint (VTEP)?
A. A device that performs VXLAN encapsulation and decapsulation.
B. It is a 24 bit segment ID that defines the broadcast domain.
C. It is the Logical interface where the encapsulation and de-encapsulation occurs.
D. It is a device that performs tunneling using GRE.
Selected Answer: A
Question #: 635
Topic #: 1
Two Cisco switches are logically configured as a single switch using Cisco Stackwise technology. This will result in virtually combining which two planes? (Choose two.)
A. Data Plane
B. Control Plane
C. Forwarding Plane
D. Management Plane
E. Bearer Plane
Selected Answer: BD
Question #: 636
Topic #: 1
DRAG DROP –
Please drag and drop the options provided in the left to configure NTP in client mode.
Suggestion Answer:
Question #: 637
Topic #: 1
Please select the correct option that shows the correct combination for the Type 1 Hypervisor.
A. Hardware; Hypervisor; Guest OS
B. Hardware; Host OS; Hypervisor; Guest OS
C. Host OS; Hypervisor; Guest OS
D. Hardware; Host OS; Guest OS
Selected Answer: A
Question #: 638
Topic #: 1
DRAG DROP –
Drag and drop the definitions on the left to their respective technological names on the right.
Suggestion Answer:
Question #: 639
Topic #: 1
Select the prerequisites for configuring LISP from the below options. (Choose two.)
A. Determine the type of LISP deployment you intend to deploy
B. One can directly deploy LISP without determining the type.
C. LISP configuration requires the datak9 license.
D. LISP configuration requires the advanced ip services license.
Selected Answer: AC
Question #: 640
Topic #: 1
Select the benefits of implementing Cisco DNA Center. (Choose all that apply.)
A. Simplified management
B. Automatic VPN tunnelling
C. One click Configuration
D. Policy Driven Provisioning
E. Ensure Network & Appliance performance
Selected Answer: ACD
Question #: 641
Topic #: 1
A network administrator need to configure Netflow on the devices in his network. He has Source IP Address, Destination IP Address, Source Port number & Destination port number. What additional information do he need to configure Netflow.
A. Layer 3 Protocol type
B. Encryption type
C. ToS (Type of Service) byte
D. Input Logical Interface
E. Hashing Algorithm
F. Transform-set details
Selected Answer: ACD
Question #: 642
Topic #: 1
A network administrator is configuring a configuration management tool for some network devices that does not support agent. Select what option will you pick from the below options to successfully configure configuration management tool for that device.
A. Agent based Configuration
B. Agent Less Configuration
C. Proxy-agent Configuration
D. None of the above
Selected Answer: B
Question #: 643
Topic #: 1
DRAG DROP
–
Drag and drop the definitions in the left to their respective Terminology in the right.
Suggestion Answer:
Question #: 644
Topic #: 1
Select the devices from the below options that can be fart of Cisco SDWAN Solution. (Choose two.)
A. ISR 2900
B. ASR 1000
C. IR8300
D. FTD 1120
E. ASR 9000
Selected Answer: BC
Question #: 645
Topic #: 1
What is the purpose of the weight attribute in an EID-to-RLOC mapping?
A. It determines the administrative distance of LISP generated routes in the RIB.
B. It indicates the load-balancing ratio between ETRs of the same priority.
C. It indicates the preference for using LISP over native IP connectivity.
D. It identifies the preferred RLOC address family.
Selected Answer: B
Question #: 646
Topic #: 1
A network engineer is designing a QoS policy for voice and video applications. Which software queuing feature provides strict-priority servicing?
A. Class-Based Weighted Fair Queuing
B. Low Latency Queuing
C. Link Fragmentation
D. Automatic QoS
Selected Answer: B
Question #: 647
Topic #: 1
Which characteristic applies to a traditional WAN solution but not to a Cisco SD-WAN solution?
A. lengthy installation times
B. centralized reachability, security, and application policies
C. low complexity and increased overall solution scale
D. operates over DTLS/TLS authenticated and secured tunnels
Selected Answer: A
Question #: 648
Topic #: 1
What is a characteristic of traffic shaping?
A. drops out-of-profile packets
B. causes TCP retransmits when packets are dropped
C. can be applied in both traffic directions
D. queues out-of-profile packets until the buffer is full
Selected Answer: D
Question #: 649
Topic #: 1
What is a characteristic of para-virtualization?
A. Para-virtualization allows the host hardware to be directly accessed.
B. Para-virtualization guest servers are unaware of one another.
C. Para-virtualization lacks support for containers.
D. Para-virtualization allows direct access between the guest OS and the hypervisor.
Selected Answer: D
Question #: 650
Topic #: 1
What is a Type 2 hypervisor?
A. installed as an application on an already installed operating system
B. also referred to as a “bare metal hypervisor” because it sits directly on the physical server
C. runs directly on a physical server and includes its own operating system
D. supports over-allocation of physical resources
Selected Answer: A
Question #: 651
Topic #: 1
What is a characteristic of a Type 1 hypervisor?
A. It is referred to as a hosted hypervisor.
B. It is completely independent of the operating system.
C. Problems in the base operating system can affect the entire system.
D. It is installed on an operating system and supports other operating systems above it.
Selected Answer: B
Question #: 652
Topic #: 1
Refer to the exhibit.
Which antenna emits this radiation pattern?
A. omnidirectional
B. RP-TNC
C. dish
D. Yagi
Selected Answer: A
Question #: 653
Topic #: 1
Refer to the exhibit.
A. router bgp 65002
neighbor 10.0.1.2 remote-as 65002
network 10.0.2.0 255.255.255.0
B. router bgp 65001
neighbor 10.0.1.2 remote-as 65002
redistribute static
C. router bgp 65001
neighbor 10.0.1.2 remote-as 65002
network 10.0.1.0 255.255.255.0
D. router bgp 65001
neighbor 10.0.1.2 remote-as 65002
network 10.0.2.0 255.255.255.0
Selected Answer: A
Question #: 654
Topic #: 1
DRAG DROP
–
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
Suggestion Answer:
Question #: 655
Topic #: 1
What are two best practices when designing a campus Layer 3 infrastructure? (Choose two.)
A. Configure passive-interface on nontransit links.
B. Implement security features at the core.
C. Summarize routes from the aggregation layer toward the core layer.
D. Tune Cisco Express Forwarding load balancing hash for ECMP routing.
E. Summarize from the access layer toward the aggregation layer.
Selected Answer: CD
Question #: 656
Topic #: 1
Refer to the exhibit.
Which configuration must be applied to ensure that the preferred path for traffic from AS 65010 toward AS 65020 uses the R2 to R4 path?
A. R4(config)# router bgp 65020 –
R4(config-router)# bgp default local-preference 300
R5(config)# router bgp 65020 –
R5(config-router)# bgp default local-preference 200
B. R2(config)# router bgp 65010 –
R2(config-router)# bgp default local-preference 300
R1(config)# router bgp 65010 –
R1(config-router)# bgp default local-preference 200
C. R2(config)# router bgp 65010 –
R2(config-router)# bgp default local-preference 200
R1(config)# router bgp 65010 –
R1(config-router)# bgp default local-preference 300
D. R4(config)# router bgp 65020 –
R4(config-router)# bgp default local-preference 200
R5(config)# router bgp 65020 –
R5(config-router)# bgp default local-preference 300
Selected Answer: B
Question #: 657
Topic #: 1
Refer to the exhibit.
An engineer must reduce the number of Type 1 and Type 2 LSAs that are advertised to R4 within OSPF area 0. Which configuration must be applied?
A. R1# conf t –
Router(config)# router ospf 1 –
Router(config-router)# prefix-suppression
B. R4# conf t –
Router(config)# router ospf 1 –
Router(config-router)# summary-address 10.0.0.0 255.255.255.0
C. R2# conf t –
Router(config)# interface Gig0/0
Router(config-router)# ip ospf prefix-suppression
D. R2# conf t –
Router(config)# int Gig0/0 –
Router(config-if)# ip summary-address 10.0.0.0 255.255.255.0
Selected Answer: A
Question #: 658
Topic #: 1
An engineer is connected to a Cisco router through a Telnet session. Which command must be issued to view the logging messages from the current session as soon as they are generated by the router?
A. logging host
B. terminal monitor
C. service timestamps log uptime
D. logging buffer
Selected Answer: B
Question #: 659
Topic #: 1
Refer to the exhibit.
Users cannot reach the web server at 192.168.100.1. What is the root cause for the failure?
A. The server is attempting to load balance between links 10.100.100.1 and 10.100.200.1.
B. There is a loop in the path to the server.
C. The gateway cannot translate the server domain name.
D. The server is out of service.
Selected Answer: B
Question #: 660
Topic #: 1
What is one method for achieving REST API security?
A. using a combination of XML encryption and XML signatures
B. using HTTPS and TLS encryption
C. using a MDS hash to verify the integrity
D. using built-in protocols known as Web Services Security
Selected Answer: B
Question #: 661
Topic #: 1
What is a benefit of using segmentation with TrustSec?
A. Integrity checks prevent data from being modified in transit.
B. Packets sent between endpoints on a LAN are encrypted using symmetric key cryptography.
C. Security group tags enable network segmentation.
D. Firewall rules are streamlined by using business-level profiles.
Selected Answer: D
Question #: 662
Topic #: 1
Refer to the exhibit.
A network administrator must configure router B to allow traffic only from network 10.100.2.0 to networks outside of router B. Which configuration must be applied?
A. RouterB(config)# access-list 101 permit ip 10.100.2.0 0.0.0.255 any
RouterB(config)# access-list 101 deny any
RouterB(config)# int g0/0/0 –
RouterB(config-if)# ip access-group 101 out
B. RouterB(config)# access-list 101 permit ip 10.100.3.0 0.0.0.255 any
RouterB(config)# access-list 101 deny any
RouterB(config)# int g0/0/0 –
RouterB(config-if)# ip access-group 101 out
RouterB(config)# int g0/0/1 –
RouterB(config-if)# ip access-group 101 out
C. RouterB(config)# access-list 101 permit ip 10.100.2.0 0.0.0.255 any
RouterB(config)# access-list 101 deny any
RouterB(config)# int g0/0/2 –
RouterB(config-if)# ip access-group 101 in
D. RouterB(config)# access-list 101 permit ip 10.100.2.0 0.0.0.255 any
RouterB(config)# int g0/0/0 –
RouterB(config-if)# ip access-group 101 out
RouterB(config)# int g0/0/1 –
RouterB(config-if)# ip access-group 101 out
Selected Answer: D
Question #: 663
Topic #: 1
How is traffic classified when using Cisco TrustSec technology?
A. with the IP address
B. with the VLAN
C. with the security group tag
D. with the MAC address
Selected Answer: C
Question #: 664
Topic #: 1
DRAG DROP
–
Drag and drop the code snippets from the bottom onto the blanks in the code to construct a request that configures a deny rule on an access list.
Suggestion Answer:
Question #: 665
Topic #: 1
DRAG DROP
–
Drag and drop the characteristics from the left onto the orchestration tool classifications on the right.
Suggestion Answer:
Question #: 666
Topic #: 1
Refer to the exhibit.
How should the programmer access the list of VLANs that were received via the API call?
A. VlanNames[‘response’] B. VlanNames[0] C. VlanNames[‘Vlan1’] D. list(VlanNames)
Selected Answer: A
Question #: 667
Topic #: 1
An EEM applet contains this command:
event snmp oid 1.3.6.1.4.3.8.0.5.8.7.1.3 get-type next entry-op gt entry-val 80 poll-interval 8
What is the result of the command?
A. An SNMP event is generated when the value equals 80% for eight polling cycles.
B. An SNMP event is generated when the value is greater than 80% for eight polling cycles.
C. An SNMP event is generated when the value reaches 80%.
D. An SNMP variable is monitored and an action is triggered when the value exceeds 80%.
Selected Answer: D
Question #: 668
Topic #: 1
Refer to the exhibit.
What does this Python script do?
A. enters the TACACS+ username for a specific IP address
B. reads the username for a specific IP address from a light database
C. writes the username for a specific IP address into a light database
D. enters the RADIUS username for a specific IP address
Selected Answer: B
Question #: 669
Topic #: 1
Refer to the exhibit.
What is output by this code?
A. 0 5
B. 0 1 2 3 4 5
C. 0 1 2 3 4
D. (0,5)
Selected Answer: B
Question #: 670
Topic #: 1
Which statement describes the Cisco SD-Access plane functionality for fabric-enabled wireless?
A. The control plane traffic is sent to the WLC through VXLAN, and the data plane traffic is sent to the WLC through CAPWAP tunnels.
B. Control plane traffic and data plane traffic are sent to the WLC through CAPWAP tunnels.
C. The control plane traffic is sent to the WLC through CAPWAP tunnels, and the data plane traffic is sent from the AP to the fabric edge switch through VXLAN.
D. Control plane traffic and data plane traffic are sent to the WLC through VXLAN.
Selected Answer: C
Question #: 671
Topic #: 1
A company hires a network architect to design a new OTT wireless solution within a Cisco SD-Access Fabric wired network. The architect wants to register access points to the WLC to centrally switch the traffic. Which AP mode must the design include?
A. local
B. bridge
C. FlexConnect
D. fabric
Selected Answer: A
Question #: 672
Topic #: 1
Which two methods are used to interconnect two Cisco SD-Access Fabric sites? (Choose two.)
A. SD-Access transit
B. fabric interconnect
C. wireless transit
D. IP-based transit
E. SAN transit
Selected Answer: AD
Question #: 673
Topic #: 1
What is a characteristic of Cisco SD-WAN?
A. uses unique per-device feature templates
B. requires manual secure tunnel configuration
C. uses control plane connections between routers
D. operates over DTLS/TLS authenticated and secured tunnels
Selected Answer: D
Question #: 674
Topic #: 1
What is the centralized control policy in a Cisco SD-WAN deployment?
A. set of statements that defines how routing is performed
B. set of rules that governs nodes authentication within the cloud
C. list of ordered statements that define user access policies
D. list of enabled services for all nodes within the cloud
Selected Answer: A
Question #: 675
Topic #: 1
Which function is performed by vSmart in the Cisco SD-WAN architecture?
A. aggregation and distribution of VPN routing information
B. execution of localized policies
C. facilitation of NAT detection and traversal
D. redistribution between OMP and other routing protocols
Selected Answer: A
Question #: 676
Topic #: 1
DRAG DROP
–
Drag and drop the characteristics from the left onto the deployment models on the right.
Suggestion Answer:
Question #: 677
Topic #: 1
DRAG DROP
–
Drag and drop the characteristics from the left onto the deployment models on the right. Not all options are used.
Suggestion Answer:
Question #: 678
Topic #: 1
How do cloud deployments compare to on-premises deployments?
A. Cloud deployments provide a better user experience across world regions, whereas on-premises deployments depend upon region-specific conditions.
B. Cloud deployments mandate a secure architecture, whereas on-premises deployments are inherently unsecure.
C. Cloud deployments must include automation infrastructure, whereas on-premises deployments often lack the ability for automation.
D. Cloud deployments are inherently unsecure, whereas a secure architecture is mandatory for on-premises deployments.
Selected Answer: A
Question #: 679
Topic #: 1
DRAG DROP
–
Drag and drop the characteristics from the left onto the architectures on the right.
Suggestion Answer:
Question #: 680
Topic #: 1
When voice services are deployed over a wireless environment, which service must be disabled to ensure the quality of calls?
A. priority queuing
B. dynamic transmit power control
C. aggressive load balancing
D. Fastlane
Selected Answer: C
Question #: 681
Topic #: 1
DRAG DROP
–
Drag and drop the characteristics from the left onto the deployment models on the right.
Suggestion Answer:
Question #: 682
Topic #: 1
What is an OVF?
A. a package that is similar to an IMG and that contains an OVA file used to build a virtual machine
B. an alternative form of an ISO that is used to install the base operating system of a virtual machine
C. the third step in a P2V migration
D. a package of files that is used to describe a virtual machine or virtual appliance
Selected Answer: D
Question #: 683
Topic #: 1
Refer to the exhibit.
An engineer configures routing between all routers and must build a configuration to connect R1 to R3 via a GRE tunnel. Which configuration must be applied?
A. R1 –
interface Tunnel1
ip address 1.1.1.13 255.255.255.0
tunnel source Loopback0
tunnel destination x.y.z.110
R3 –
interface Tunnel
ip address 1.1.1.31 255.255.255.0
tunnel source Loopback0
tunnel destination x.y.z.160
B. R1 –
interface Tunnel1
ip address 1.1.1.13 255.255.255.0
tunnel source Loopback0
tunnel destination x.y.z.160
R3 –
interface Tunnel1
ip address 1.1.1.31 255.255.255.0
tunnel source Loopback0
tunnel destination x.y.z.110
C. R1 –
interface Tunnel2
ip address 1.1.1.12 255.255.255.0
tunnel source Loopback0
tunnel destination x.y.z.125
R2 –
interface Tunnel1
ip address 1.1.1.125 255.255.255.0
tunnel source Loopback0
tunnel destination x.y.z.110
interface Tunnel3
ip address 1.1.1.125 255.255.255.0
tunnel source Loopback0
tunnel destination x.y.z.160
R3 –
interface Tunnel2
ip address 1.1.1.32 255.255.255.0
tunnel source Loopback0
tunnel destination x.y.z.125
D. R1 –
interface Tunnel1
ip address 1.1.1.13 255.255.255.0
tunnel source Loopback0
tunnel destination x-y.z.110
R3 –
interface Tunnel1
ip address 1.1.1.31 255.255.255.0
tunnel source Loopback0
tunnel destination x.y.z.125
Selected Answer: B
Question #: 684
Topic #: 1
Which function does a virtual switch provide?
A. RAID storage for virtual machines
B. connectivity between virtual machines
C. CPU context switching for multitasking between virtual machines
D. emulation of power for virtual machines
Selected Answer: B
Question #: 685
Topic #: 1
Which device is responsible for finding EID-to-RLOC mapping when traffic is sent to a LISP-capable site?
A. map resolver
B. egress tunnel router
C. map server
D. ingress tunnel router
Selected Answer: D
Question #: 686
Topic #: 1
In which way are EIGRP and OSPF similar?
A. They both support unequal-cost load balancing.
B. They both support MD5 authentication for routing updates.
C. They both support autosummarization.
D. They have similar CPU usage, scalability, and network convergence times.
Selected Answer: B
Question #: 687
Topic #: 1
Which option works with a DHCP server to return at least one WLAN management interface IP address during the discovery phase and is dependent upon the VCI of the AP?
A. Option 15
B. Option 43
C. Option 125
D. Option 42
Selected Answer: B
Question #: 688
Topic #: 1
Refer to the exhibit.
PC 2 cannot communicate with PC 4. Which configuration resolves this issue?
A. SW1(config)# interface Gigabitethernet 2/1
SW1(config-if)# switchport mode trunk
B. SW1(config)# interface Gigabitethernet 2/1
SW1(config-if)# switchport mode access
SW1(config-if)# switchport access vlan 10
C. SW1(config)# interface Gigabitethernet 2/1
SW1(config-if)# switchport trunk allowed vlan add 10
D. SW1(config)# interface Gigabitethernet 2/1
SW1(config-if)# switchport vlan mapping 10 10
Selected Answer: C
Question #: 689
Topic #: 1
A customer has 20 stores located throughout a city. Each store has a single Cisco AP managed by a central WLC. The customer wants to gather analytics for users in each store. Which technique supports these requirements?
A. angle of arrival
B. presence
C. trilateration
D. hyperlocation
Selected Answer: B
Question #: 690
Topic #: 1
Refer to the exhibit.
Two switches are interconnected using interface GigabitEthernet0/0 on both sides. While configuring one of the switches, a network engineer receives the logging message. Which action resolves this issue?
A. Block VLAN1 on the trunk interface GigabitEthernet0/0.
B. Configure interface GigabitEthernet0/0 as an access port.
C. Configure interface GigabitEthernet0/0 as a trunk port.
D. Shutdown interface GigabitEthemet0/0 and bring it back up.
Selected Answer: C
Question #: 691
Topic #: 1
By default, which virtual MAC address does HSRP group 12 use?
A. 00:00:0c:07:ac:0c
B. 00:05:5e:00:0c:12
C. 00:5e:0c:07:ac:12
D. 05:43:84:57:29:2c
Selected Answer: A
Question #: 692
Topic #: 1
Refer to the exhibit.
An engineer configures a new WLAN that will be used for secure communications; however, wireless clients report that they are able to communicate with each other. Which action resolves this issue?
A. Enable Client Exclusions.
B. Enable P2P Blocking.
C. Disable Aironet IE.
D. Enable Wi-Fi Direct Client Policy.
Selected Answer: B
Question #: 693
Topic #: 1
Refer to the exhibit.
What happens to access interfaces where VLAN 222 is assigned?
A. STP BPDU guard is enabled.
B. A description “RSPAN” is added.
C. They are placed into an inactive state.
D. They cannot provide PoE.
Selected Answer: C
Question #: 694
Topic #: 1
Refer to the exhibit.
Which command is required to validate that an IP SLA configuration matches the traffic between the branch office and the central site?
A. R1# show ip sla group schedule
B. R1# show ip route
C. R1# show ip sla configuration
D. R1# show ip sla statistics
Selected Answer: D
Question #: 695
Topic #: 1
Refer to the exhibit.
The administrator must extend the configuration of the switch to perform remote logging using syslog according to these requirements:
• syslog server: 203.0.113.11 reachable through Gi0/0
• initial message severity: notifications
• message transport: reliable
Which two commands must be added to the configuration to accomplish this goal? (Choose two.)
A. logging monitor notifications
B. logging host 203.0.113.11 vrf Mgmt-vrf transport tcp
C. logging source-Interface GigabitEthernet0/0 vrf Mgmt-vrf
D. logging trap notifications
E. logging host 203.0.113.11 vrf Mgmt-vrf
Selected Answer: BD
Question #: 696
Topic #: 1
Which two prerequisites must be met before Cisco DNA Center can provision device? (Choose two.)
A. Cisco DNA Center must have the software image for he provisioned device in its image repository.
B. The provisioned device must be put into bootloader mode.
C. The provisioned device must be configured with CLI and SNMP credentials that are known to Cisco DNA Center.
D. Cisco DNA Center must have IP connectivity to the provisioned device.
E. The provisioned device must recognize Cisco DNA Center as its LLDP neighbor.
Selected Answer: CD
Question #: 697
Topic #: 1
In Cisco DNA Center, what is used to publish events and notifications to a third-party product such as IPAM?
A. intent API
B. southbound SDK
C. integration API
D. RESTful API
Selected Answer: C
Question #: 698
Topic #: 1
Router R1 must be configured as a UDP responder on port 6336. Which configuration accomplishes this task?
A. (config)#ip sla responder udp-echo ipaddress 10.10.10.1 port 6336
B. (config)#ip sla responder udp-echo ipv4 10.10.10.1 port 6336
C. (config)#ip sla responder ipaddress 10.10.10.1 port 6336
D. (config-if)#ip sla responder udp-port ipaddress 10.10.10.1 port 6336
Selected Answer: A
Question #: 699
Topic #: 1
Refer to the exhibit. An engineer must configure an ERSPAN tunnel that mirrors traffic from Linux1 on Switch1 to Linux2 on Switch2. Which command must be added to the destination configuration to enable the ERSPAN tunnel?
A. (config-mon-erspan-src-dst)# no shut
B. (config-mon-erspan-src-dst)# traffic bidirectional
C. (config-mon-erspan-src-dst)# monitor session 1 activate
D. (config-mon-erspan-src-dst)# ip address 10.10.10.10
Selected Answer: D
Question #: 700
Topic #: 1
Refer to the exhibit.
Which configuration enables fallback to local authentication and authorization when no TACACS+ server is available?
A. Router(config)# aaa fallback local
B. Router(config)# aaa authentication login FALLBACK local
Router(config)# aaa authorization exec FALLBACK local
C. Router(config)# aaa authentication login default local
Router(config)# aaa authorization exec default local
D. Router(config)# aaa authentication login default group tacacs+ local
Router(config)# aaa authorization exec default group tacacs+ local
Selected Answer: D