350-401: Implementing Cisco Enterprise Network Core Technologies (ENCOR) Part 6
Question #: 351
Topic #: 1
Refer to the exhibit.
What is the value of the variable list after the code is run?
A. [1, 2], [1, 2], [1, 2]
B. [1, 2] * 3
C. [1, 2, 1, 2, 1, 2]
D. [3, 6]
Selected Answer: C
Question #: 352
Topic #: 1
Refer to the exhibit.
Which result does the Python code achieve?
A. The code encrypts a base64 decrypted password.
B. The code converts time to the Epoch LINUX time format.
C. The code converts time to the “year/month/day” time format.
D. The code converts time to the yyyymmdd representation.
Selected Answer: D
Question #: 353
Topic #: 1
Refer to the exhibit.
POSTMAN is showing an attempt to retrieve network device information from Cisco DNA Center API. What is the issue?
A. The URI string is incorrect.
B. The token has expired.
C. Authentication has failed.
D. The JSON payload contains the incorrect UUID.
Selected Answer: A
Question #: 354
Topic #: 1
Refer to the exhibit.
Running the script causes the output in the exhibit. What should be the first line of the script?
A. from ncclient import manager
B. import manager
C. from ncclient import *
D. ncclient manager import
Selected Answer: A
Question #: 355
Topic #: 1
Refer to the exhibit.
An engineer must create a script that appends the output of the show process cpu sorted command to a file. Which action completes the configuration?
A. action 4.0 syslog command “show process cpu sorted | append flash:high-cpu-file”
B. action 4.0 cli command “show process cpu sorted | append flash:high-cpu-file”
C. action 4.0 cns-event “show process cpu sorted | append flash:high-cpu-file”
D. action 4.0 publish-event “show process cpu sorted | append flash:high-cpu-file”
Selected Answer: B
Question #: 356
Topic #: 1
What is an advantage of utilizing data models in a multivendor environment?
A. lowering CPU load incurred to managed devices
B. improving communication security with binary encoded protocols
C. facilitating a unified approach to configuration and management
D. removing the distinction between configuration and runtime state data
Selected Answer: C
Question #: 357
Topic #: 1
How is a data modeling language used?
A. To enable data to be easily structured, grouped, validated, and replicated.
B. To represent finite and well-defined network elements that cannot be changed.
C. To model the flows of unstructured data within the infrastructure.
D. To provide human readability to scripting languages.
Selected Answer: A
Question #: 358
Topic #: 1
A network engineer is configuring OSPF on a router. The engineer wants to prevent having a route to 172.16.0.0/16 learned via OSPF in the routing table and configures a prefix list using the command ip prefix-list OFFICE seq 5 deny 172.16.0.0/16. Which two additional configuration commands must be applied to accomplish the goal? (Choose two.)
A. ip prefix-list OFFICE seq 10 permit 0.0.0.0/0 le 32
B. distribute-list prefix OFFICE in under the OSPF process
C. distribute-list OFFICE in under the OSPF process
D. distribute-list OFFICE out under the OSPF process
E. ip prefix-list OFFICE seq 10 permit 0.0.0.0/0 ge 32
Selected Answer: AB
Question #: 359
Topic #: 1
DRAG DROP –
Drag and drop the characteristics from the left onto the technology types on the right.
Select and Place:
Suggestion Answer:
Question #: 360
Topic #: 1
Refer to the exhibit. Which command must be configured for RESTCONF to operate on port 8888?
A. restconf port 8888
B. ip http restconf port 8888
C. ip http port 8888
D. restconf http port 8888
Selected Answer: C
Question #: 361
Topic #: 1
Why would a log file contain a * next to the date?
A. The network device was receiving NTP time when the log messages were recorded.
B. The network device was unable to reach the NTP server when the log messages were recorded.
C. The network device is not configured to use NTP.
D. The network device is not configured to use NTP time stamps for logging.
Selected Answer: C
Question #: 362
Topic #: 1
What is one difference between EIGRP and OSPF?
A. EIGRP uses the DUAL distance vector algorithm, and OSPF uses the Dijkstra link-state algorithm.
B. OSPF uses the DUAL distance vector algorithm, and EIGRP uses the Dijkstra link-state algorithm.
C. EIGRP uses the variance command for unequal cost load balancing, and OSPF supports unequal cost balancing by default.
D. OSPF is a Cisco proprietary protocol, and EIGRP is an IETF open standard protocol.
Selected Answer: A
Question #: 363
Topic #: 1
DRAG DROP –
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
Select and Place:
Suggestion Answer:
Question #: 364
Topic #: 1
A network engineer must configure a router to send logging messages to a syslog server based on these requirements:
* uses syslog IP address: 10.10.10.1
* uses a reliable protocol
* must not use any well-known TCP/UDP ports
Which configuration must be used?
A. logging host 10.10.10.1 transport tcp port 1024
B. logging host 10.10.10.1 transport udp port 1024
C. logging host 10.10.10.1 transport udp port 1023
D. logging origin-id 10.10.10.1
Selected Answer: A
Question #: 365
Topic #: 1
DRAG DROP –
Drag and drop the snippets onto the blanks within the code to construct a script that shows all logging that occurred on the appliance from Sunday until 9:00 p.m.
Thursday. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 366
Topic #: 1
DRAG DROP –
Drag and drop the characteristics from the left onto the infrastructure deployment models on the right.
Select and Place:
Suggestion Answer:
Question #: 367
Topic #: 1
Refer to the exhibit. A network engineer must log in to the router via the console, but the RADIUS servers are not reachable. Which credentials allow console access?
A. no username and only the password ג€test123ג€
B. no username and only the password ג€cisco123ג€
C. the username ג€ciscoג€ and the password ג€ciscoג€
D. the username ג€ciscoג€ and the password ג€cisco123ג€
Selected Answer: B
Question #: 368
Topic #: 1
DRAG DROP –
Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right.
Select and Place:
Suggestion Answer:
Question #: 369
Topic #: 1
Which configuration allows administrators to configure the device through the console port and use a network authentication server?
A. aaa new-model aaa authentication login default local aaa authorization console aaa authorization config-commands username netadmin secret 9 $9$vFpMf8elb4RVV8$seZ/bDAx1uV
B. aaa new-model aaa authentication login default local aaa authorization console aaa authorization config-commands
C. aaa new-model aaa authentication login default line
D. aaa new-model aaa authentication login default group radius aaa authorization console aaa authorization config-commands
Selected Answer: D
Question #: 370
Topic #: 1
What is the process for moving a virtual machine from one host machine to another with no downtime?
A. high availability
B. disaster recovery
C. live migration
D. multisite replication
Selected Answer: C
Question #: 371
Topic #: 1
DRAG DROP –
Drag and drop the characteristics from the left onto the infrastructure deployment models they describe on the right.
Select and Place:
Suggestion Answer:
Question #: 372
Topic #: 1
DRAG DROP –
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.
Select and Place:
Suggestion Answer:
Question #: 373
Topic #: 1
DRAG DROP –
Drag and drop the tools from the left onto the agent types on the right.
Select and Place:
Suggestion Answer:
Question #: 374
Topic #: 1
Refer to the exhibit. An engineer must create a configuration that prevents R3 from receiving the LSA about 172.16.1.4/32. Which configuration set achieves this goal?
A. On R3 ip access-list standard R4_L0 deny host 172.16.1.4 permit any router ospf 200 distribute-list R4_L0 in
B. On R1 ip prefix-list INTO-AREA1 seq 5 deny 172.16.1.4/32 ip prefix-list INTO-AREA1 seq 10 permit 0.0.0.0/0 le 32 router ospf 200 area 1 filter-list prefix INTO-AREA1 out
C. On R1 ip prefix-list INTO-AREA1 seq 5 deny 172.16.1.4/32 ip prefix-list INTO-AREA1 seq 10 permit 0.0.0.0/0 le 32 router ospf 200 area 1 filter-list prefix INTO-AREA1 in
D. On R3 ip prefix-list INTO-AREA1 seq 5 deny 172.16.1.4/32 ip prefix-list INTO-AREA1 seq 10 permit 0.0.0.0/0 le 32 router ospf 200 area 1 filter-list prefix INTO-AREA1 in
Selected Answer: B
Question #: 375
Topic #: 1
Refer to the exhibit. An engineer is reaching network 172.16.10.0/24 via the R1-R2-R4 path. Which configuration forces the traffic to take a path of R1-R3-R4?
A. R1(config)#route-map RM_LOCAL_PREF permit 10 R1(config-route-map)#set local-preference 101 R1(config-route-map)#exit R1(config)#router bgp 100 R1(config-router)#neighbor 13.13.13.3 route-map RM_LOCAL_PREF in R1(config-router)#end R1#clear ip bgp 13.13.13.3 soft in
B. R1(config)#route-map RM_AS_PATH_PREPEND R1(config-route-map)#set as-path prepend 200 200 R1(config-route-map)#exit R1(config)#router bgp 100 R1(config-router)#neighbor 12.12.12.2 route-map RM_AS_PATH_PREPEND in R1(config-router)#end R1#clear ip bgp 12.12.12.2 soft in
C. R1(config)#router bgp 100 R1(config-router)#neighbor 13.13.13.3 weight 1 R1(config-router)#end
D. R2(config)#route-map RM_MED permit 10 R2(config-route-map)#set metric 1 R2(config-route-map)#exit R2(config)#router bgp 200 R2(config-router)#neighbor 12.12.12.1 route-map RM_MED out R2(config-router)#end R2#clear ip bgp 12.12.12.1 soft out
Selected Answer: A
Question #: 376
Topic #: 1
In a Cisco SD-Access solution, which protocol is used by an extended node to connect to a single edge node?
A. VXLAN
B. IS-IS
C. 802.1Q
D. CTS
Selected Answer: C
Question #: 377
Topic #: 1
Refer to the exhibit. How does the router handle traffic after the CoPP policy is configured on the router?
A. Traffic generated by R1 that matches access list SNMP is policed.
B. Traffic coming to R1 that matches access list SNMP is policed.
C. Traffic passing through R1 that matches access list SNMP is policed.
D. Traffic coming to R1 that does not match access list SNMP is dropped.
Selected Answer: B
Question #: 378
Topic #: 1
What is a characteristic of Cisco StackWise technology?
A. It is supported on the Cisco 4500 series.
B. It supports devices that are geographically separated
C. It combines exactly two devices.
D. It uses proprietary cabling.
Selected Answer: D
Question #: 379
Topic #: 1
What is one primary REST security design principle?
A. fail-safe defaults
B. password hash
C. adding a timestamp in requests
D. OAuth
Selected Answer: A
Question #: 380
Topic #: 1
Refer to the exhibit. After the code is run on a Cisco IOS-XE router, the response code is 204. What is the result of the script?
A. The configuration fails because interface GigabitEthernet2 is missing on the target device.
B. Interface GigabitEthemet2 is configured with IP address 10.10.10.1/24.
C. The configuration fails because another interface is already configured with IP address 10.10.10.1/24.
D. The configuration is successfully sent to the device in cleartext.
Selected Answer: B
Question #: 381
Topic #: 1
Which time protocol offers security features and utilizes site-local IPv6 multicast addresses?
A. NTPv3
B. PTP IEEE 1588v1
C. NTPv4
D. PTP IEEE 1588v2
Selected Answer: C
Question #: 382
Topic #: 1
Refer to the exhibit. Which command must be applied to Router1 to bring the GRE tunnel to an up/up state?
A. Router1(config-if)#tunnel source Loopback0
B. Router1(config-if)#tunnel mode gre multipoint
C. Router1(config-if)#tunnel source GigabitEthernet0/1
D. Router1(config)#interface tunnel0
Selected Answer: A
Question #: 383
Topic #: 1
DRAG DROP –
Drag and drop the characteristics from the left onto the infrastructure deployment models on the right.
Select and Place:
Suggestion Answer:
Question #: 384
Topic #: 1
Refer to the exhibit. VPN-A sends point-to-point traffic to VPN-B and receives traffic only from VPN-C. VPN-B sends point-to-point traffic to VPN-C and receives traffic only from VPN-A. Which configuration is applied?
A. PE-2 vrf VPN-B address-family ipv4 unicast import route-target 100:1 export route-target 100:2
B. PE-3 vrf VPN-B address-family ipv4 unicast import route-target 100:2 export route-target 100:2
C. PE-2 vrf VPN-B address-family ipv4 unicast import route-target 100:2 export route-target 100:2
D. PE-3 vrf VPN-B address-family ipv4 unicast import route-target 100:1 export route-target 100:2
Selected Answer: D
Question #: 385
Topic #: 1
A customer wants to use a single SSID to authenticate IoT devices using different passwords. Which Layer 2 security type must be configured in conjunction with
Cisco ISE to achieve this requirement?
A. Central Web Authentication
B. Cisco Centralized Key Management
C. Identity PSK
D. Fast Transition
Selected Answer: C
Question #: 386
Topic #: 1
In which two ways does TCAM differ from CAM? (Choose two.)
A. CAM is used to make Layer 2 forwarding decisions, and TCAM is used for Layer 3 address lookups.
B. CAM is used by routers for IP address lookups, and TCAM is used to make Layer 2 forwarding decisions.
C. CAM is used for software switching mechanisms, and TCAM is used for hardware switching mechanisms.
D. The MAC address table is contained in TCAM, and ACL and QoS information is stored in CAM.
E. The MAC address table is contained in CAM, and ACL and QoS information is stored in TCAM.
Selected Answer: AE
Question #: 387
Topic #: 1
When firewall capabilities are considered, which feature is found only in Cisco next-generation firewalls?
A. malware protection
B. stateful inspection
C. traffic filtering
D. active/standby high availability
Selected Answer: A
Question #: 388
Topic #: 1
A network engineer is enabling HTTPS access to the core switch, which requires a certificate to be installed on the switch signed by the corporate certificate authority. Which configuration commands are required to issue a certificate signing request from the core switch?
A. Core-Switch(config)#crypto pki enroll Core-Switch Core-Switch(config)#ip http secure-trustpoint Core-Switch
B. Core-Switch(config)#ip http secure-trustpoint Core-Switch Core-Switch(config)#crypto pki enroll Core-Switch
C. Core-Switch(config)#crypto pki trustpoint Core-Switch Core-Switch(ca-trustpoint)#enrollment terminal Core-Switch(config)#crypto pki enroll Core-Switch
D. Core-Switch(config)#crypto pki trustpoint Core-Switch Core-Switch(ca-trustpoint)#enrollment terminal Core-Switch(config)#ip http secure-trustpoint Core-Switch
Selected Answer: C
Question #: 389
Topic #: 1
An engineer must create a new SSID on a Cisco 9800 wireless LAN controller. The client has asked to use a pre-shared key for authentication. Which profile must the engineer edit to achieve this requirement?
A. Policy
B. RF
C. Flex
D. WLAN
Selected Answer: D
Question #: 390
Topic #: 1
An engineer is configuring a new SSID to present users with a splash page for authentication. Which WLAN Layer 3 setting must be configured to provide this functionality?
A. Local Policy
B. WPA2 Policy
C. CCKM
D. Web Policy
Selected Answer: D
Question #: 391
Topic #: 1
A customer requests a design that includes GLBP as the FHRP. The network architect discovers that the members of the GLBP group have different throughput capabilities. Which GLBP load balancing method supports this environment?
A. round robin
B. host dependent
C. weighted
D. least connection
Selected Answer: C
Question #: 392
Topic #: 1
Refer to the exhibit. Which command set changes the neighbor state from Idle (Admin) to Active?
A. R1(config)#router bgp 65001 R1(config-router)#neighbor 192.168.50.2 remote-as 65001
B. R1(config)#router bgp 65001 R1(config-router)#neighbor 192.168.50.2 activate
C. R1(config)#router bgp 65001 R1(config-router)#no neighbor 192.168.50.2 shutdown
D. R1(config)#router bgp 65002 R1(config-router)#neighbor 192.168.50.2 activate
Selected Answer: C
Question #: 393
Topic #: 1
A network engineer configures a WLAN controller with increased security for web access. There is IP connectivity with the WLAN controller, but the engineer cannot start a management session from a web browser. Which action resolves the issue?
A. Disable Adobe Flash Player.
B. Use a private or incognito session.
C. Use a browser that supports 128-bit or larger ciphers.
D. Disable JavaScript on the web browser.
Selected Answer: C
Question #: 394
Topic #: 1
What does a northbound API accomplish?
A. programmatic control of abstracted network resources through a centralized controller
B. access to controlled network resources from a centralized node
C. communication between SDN controllers and physical switches
D. controlled access to switches from automated security applications
Selected Answer: A
Question #: 395
Topic #: 1
In a Cisco SD-WAN solution, how is the health of a data plane tunnel monitored?
A. with IP SLA
B. ARP probing
C. using BFD
D. with OMP
Selected Answer: C
Question #: 396
Topic #: 1
Which solution do IaaS service providers use to extend a Layer 2 segment across a Layer 3 network?
A. VXLAN
B. VTEP
C. VRF
D. VLAN
Selected Answer: A
Question #: 397
Topic #: 1
By default, which virtual MAC address does HSRP group 16 use?
A. c0:41:41:43:07:10
B. 00:05:5c:07:0c:16
C. 00:00:0c:07:ac:10
D. 05:00:0c:07:ac:16
Selected Answer: C
Question #: 398
Topic #: 1
Refer to the exhibit. Why was the response code generated?
A. The resource was unreachable.
B. Access was denied based on the user permissions.
C. Access was denied based on the credentials.
D. The resource is no longer available on the server.
Selected Answer: B
Question #: 399
Topic #: 1
Refer the exhibit. Which configuration elects SW4 as the root bridge for VLAN 1 and puts G0/2 on SW2 into a blocking state?
A. SW4(config)#spanning-tree vlan 1 priority 0 ! SW2(config)#int G0/2 SW2(config-if)#spanning-tree cost 128
B. SW4(config)#spanning-tree vlan 1 priority 0 ! SW2(config)#interface G0/2 SW2(config-if)#spanning-tree vlan 1 port-priority 64
C. SW4(config)#spanning-tree vlan 1 priority 32768 ! SW2(config)#int G0/2 SW2(config-if)#spanning-tree cost 128
D. SW4(config)#spanning-tree vlan 1 priority 32768 ! SW2(config)#interface G0/2 SW2(config-if)#spanning-tree vlan 1 port-priority 0
Selected Answer: A
Question #: 400
Topic #: 1
What happens when a FlexConnect AP changes to standalone mode?
A. All client roaming continues to work.
B. Only clients on central switching WLANs stay connected.
C. All clients on all WLANs are disconnected.
D. All controller-dependent activities stop working except the DFS.
Selected Answer: D
Question #: 401
Topic #: 1
If the maximum power level assignment for global TPC 802.11a/n/ac is configured to 10 dBm. which power level effectively doubles the transmit power?
A. 13 dBm
B. 14 dBm
C. 17 dBm
D. 20 dBm
Selected Answer: A
Question #: 402
Topic #: 1
An engineer must create an EEM script to enable OSPF debugging in the event the OSPF neighborship goes down. Which script must the engineer apply?
A. event manager applet ENABLE_OSPF_DEBUG
event syslog pattern “%OSPF-5-ADJCHG: Process 6, Nbr 1.1.1.1 on Serial0/0 from FULL to DOWN” action 1.0 cli command “enable” action 2.0 cli command “debug ip ospf event” action 3.0 cli command “debug ip ospf adj” action 4.0 syslog priority informational msg “ENABLE_OSPF_DEBUG”
B. event manager applet ENABLE_OSPF_DEBUG
event syslog pattern “%OSPF-5-ADJCHG: Process 5, Nbr 1.1.1.1 on Serial0/0 from LOADING to FULL” action 1.0 cli command “debug ip ospf event” action 2.0 cli command “debug ip ospf adj” action 3.0 syslog priority informational msg “ENABLE_OSPF_DEBUG”
C. event manager applet ENABLE_OSPF_DEBUG
event syslog pattern “%OSPF-1-ADJCHG: Process 5, Nbr 1.1.1.1 on Serial0/0 from FULL to DOWN” action 1.0 cli command “debug ip ospf event” action 2.0 cli command “debug ip ospf adj” action 3.0 syslog priority informational msg “ENABLE_OSPF_DEBUG”
D. event manager applet ENABLE_OSPF_DEBUG
event syslog pattern “%OSPF-5-ADJCHG: Process 5, Nbr 1.1.1.1 on Serial0/0 from LOADING to FULL” action 1.0 cli command “enable” action 2.0 cli command “debug ip ospf event” action 3.0 cli command “debug ip ospf adj” action 4.0 syslog priority informational msg “ENABLE_OSPF_DEBUG”
Selected Answer: A
Question #: 403
Topic #: 1
A customer wants to provide wireless access to contractors using a guest portal on Cisco ISE. The portal is also used by employees. A solution is implemented, but contractors receive a certificate error when they attempt to access the portal. Employees can access the portal without any errors.
Which change must be implemented to allow the contractors and employees to access the portal?
A. Install a trusted third-party certificate on the Cisco ISE.
B. Install an internal CA signed certificate on the Cisco ISE.
C. Install a trusted third-party certificate on the contractor devices.
D. Install an internal CA signed certificate on the contractor devices.
Selected Answer: A
Question #: 404
Topic #: 1
An engineer must configure a new loopback interface on a router and advertise the interface as a /24 in OSPF. Which command set accomplishes this task?
A. R2(config)#interface Loopback0 R2(config-if)#ip address 172.22.2.1 255.255.255.0 R2(config-if)#ip ospf network broadcast R2(config-if)#ip ospf 100 area 0
B. R2(config)#interface Loopback0 R2(config-if)#ip address 172.22.2.1 255.255.255.0 R2(config-if)#ip ospf network point-to-point R2(config-if)#ip ospf 100 area 0
C. R2(config)#interface Loopback0 R2(config-if)#ip address 172.22.2.1 255.255.255.0 R2(config-if)#ip ospf network point-to-multipoint R2(config-if)#router ospf 100
D. R2(config-router)#network 172.22.2.0 0.0.0.255 area 0 R2(config)#interface Loopback0 R2(config-if)#ip address 172.22.2.1 255.255.255.0 R2(config-if)#ip ospf 100 area 0
Selected Answer: B
Question #: 405
Topic #: 1
DRAG DROP –
Drag and drop the LISP components on the left to their descriptions on the right. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 406
Topic #: 1
What is a characteristic of a type 2 hypervisor?
A. complicated deployment
B. ideal for data center
C. referred to as bare-metal
D. ideal for client/end-user system
Selected Answer: D
Question #: 407
Topic #: 1
Which two features does the Cisco SD-Access architecture add to a traditional campus network? (Choose two.)
A. modular QoS
B. software-defined segmentation
C. identity services
D. private VLANs
E. SD-WAN
Selected Answer: BE
Question #: 408
Topic #: 1
Which congestion queuing method on Cisco IOS based routers uses four static queues?
A. weighted fair
B. custom
C. low latency
D. priority
Selected Answer: D
Question #: 409
Topic #: 1
DRAG DROP –
An engineer plans to use Python to convert text files that contain device information to JSON Drag and drop the code snippets from the bottom onto the blanks in the code to construct the request. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 410
Topic #: 1
Which resource is able to be shared among virtual machines deployed on the same physical server?
A. disk
B. VM configuration file
C. applications
D. operating system
Selected Answer: A
Question #: 411
Topic #: 1
Refer to the exhibit. An engineer must set up connectivity between a campus aggregation layer and a branch office access layer. The engineer uses dynamic trunking protocol to establish this connection; however, management traffic on VLAN1 is not passing. Which action resolves the issue and allow communication for all configured VLANs?
A. Disable Spanning Tree for the native VLAN.
B. Allow all VLANs on the trunk links.
C. Change both interfaces to access ports.
D. Configure the correct native VLAN on the remote interface
Selected Answer: D
Question #: 412
Topic #: 1
Which three resources must the hypervisor make available to the virtual machines? (Choose three.)
A. Memory
B. bandwidth
C. IP address
D. Processor
E. storage
F. secure access
Selected Answer: ADE
Question #: 413
Topic #: 1
DRAG DROP –
Refer to the exhibit. Drag and drop the snippets into the RESTCONF request to form the request that returns this response. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 414
Topic #: 1
Refer to the exhibit. An engineer must configure static NAT on R1 to allow users HTTP access to the web server on TCP port 80. The web server must be reachable through ISP 1 and ISP 2. Which command set should be applied to R1 to fulfill these requirements?
A. ip nat inside source static tcp 10.1.1.100 80 209.165.200.225 80 extendable ip nat inside source static tcp 10.1.1.100 80 209.165.201.1 80 extendable
B. ip nat inside source static tcp 10.1.1.100 80 209.165.200.225 80 ip nat inside source static tcp 10.1.1.100 80 209.165.201.1 80
C. ip nat inside source static tcp 10.1.1.100 80 209.165.200.225 80 no-alias ip nat inside source static tcp 10.1.1.100 80 209.165.201.1 80 no-alias
D. ip nat inside source static tcp 10.1.1.100 80 209.165.200.225 80 ip nat inside source static tcp 10.1.1.100 8080 209.165.201.1 8080
Selected Answer: A
Question #: 415
Topic #: 1
Refer to the exhibit. An engineer attempts to bundle interface Gi0/0 into the port channel, but it does not function as expected. Which action resolves the issue?
A. Enable fast LACP PDUs on interface Gi0/0.
B. Set LACP max-bundle to 2 on interface Port-channel1.
C. Configure no shutdown on interface Gi0/0.
D. Configure channel-group 1 mode active on interface Gi0/0.
Selected Answer: B
Question #: 416
Topic #: 1
In a Cisco StackWise Virtual environment, which planes are virtually combined in the common logical switch?
A. management and data
B. control, and forwarding
C. control and management
D. control and data
Selected Answer: C
Question #: 417
Topic #: 1
Refer to the exhibit. A network engineer is enabling logging to a local buffer, to the terminal, and to a syslog server for all debugging level logs filtered by facility code 7. Which command is needed to complete this configuration snippet?
A. logging buffered debugging
B. logging discriminator Disc1 severity includes 7
C. logging buffered discriminator Disc1 debugging
D. logging discriminator Disc1 severity includes 7 facility includes fac7
Selected Answer: D
Question #: 418
Topic #: 1
DRAG DROP –
Drag and drop the snippets onto the blanks within the code to construct a script that adds a prefix list to a route map and sets the local preference. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 419
Topic #: 1
Refer to the exhibit. What is the result of the API request?
A. The native interface information is read from the network appliance.
B. The information for all interfaces is read from the network appliance.
C. The ג€paramsג€ variable reads data fields from the network appliance.
D. The ג€paramsג€ variable sends data fields to the network appliance.
Selected Answer: B
Question #: 420
Topic #: 1
Which definition describes JWT in regard to REST API security?
A. an encrypted JSON token that is used for authentication
B. an encrypted JSON token that is used for authorization
C. an encoded JSON token that is used to securely exchange information
D. an encoded JSON token that is used for authentication
Selected Answer: C