New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which type of cyberattack does Cisco Umbrella DNS-layer security effectively help mitigate?

A.

Phishing and malware-based attacks

B.

DDoS attacks targeting specific servers

C.

Brute force attacks on user accounts

D.

Advanced persistent threats and zero-day exploits

Which command must be run on a Cisco IOS device to configure six parallel iBGP and eBGP routes that can be installed into a routing table?

A.

maximum paths bgp 6

B.

multipath eibgp 6

C.

maximum paths bgp routers 6

D.

maximum-paths eibgp 6

An engineer must design a pay-as-you-go solution for their partners. The solution must allow for rapid deployments, be flexible, and scale resources up or down in a hybrid workplace. What must be used?

A.

Cisco+ Hybrid Cloud for Bare Metal Compute

B.

Cisco+ Hybrid Cloud for Virtual Desktop Infrastructure

C.

Cisco+ Hybrid Cloud for Virtualization

D.

Cisco+ Hybrid Cloud for Service Provider Networking

An engineer must enable the highest level of logging when troubleshooting Cisco NFVIS. Which command must be run?

A.

system set-log logtype configuration level warning

B.

system set-log logtype configuration level error

C.

system set-log logtype configuration level critical

D.

system set-log logtype operational level debug

What is a valid connection method between carrier-neutral facilities within the same metro area?

A.

OSPF backbone area adjacency

B.

private wireless connection

C.

DWDM ring

D.

CAT6e connection

What is a capability of a Cisco NFVIS SNMP trap?

A.

Monitors the activities of a network host

B.

Controls the activities of a network host

C.

Sends an unsolicited notification to the SNMP manager

D.

Retrieves an SNMP object variable from the MIB

How does SR-IOV move data directly to and from the network adapter?

A.

Using the STP PortFast

B.

Bypassing the guest operating system

C.

Bypassing the hypervisor

D.

Using the STP VLAN root

Refer to the exhibit. An engineer must connect switch TOR1 and switch TOR2 to switch LEAF1 and switch LEAF2 by using double-sided vPCs. LEAF1 and LEAF2 are already configured as vPC peers. Which action must be taken next to complete the configuration?

A.

Add all the switches to the fabric.

B.

Configure peering between LEAF1 and LEAF2 and TOR1 and TOR2.

C.

Configure MSTP between TOR1 and TOR2.

D.

Configure a vPC between TOR1 and TOR2.

An engineer must configure NTP servers in Cisco Enterprise NFVIS. The primary NTP server has an IP address of 192.168.1.1 and the backup NTP server has an IP address of 192.168.2.1. Which two commands must be run to complete the configuration? (Choose two.)

A.

system time ntp preferred_server 192.168.1.1

B.

utils ntp server add 192.168.2.1 backup

C.

system set-manual-time 192.168.1.1 192.168.2.1

D.

utils ntp server add 192.168.1.1 primary

E.

system time ntp backup_server 192.168.2.1

What is a valid connection method between carrier-neutral facilities within the same metro area?

A.

OSPF backbone area adjacency

B.

private wireless connection

C.

DWDM ring

D.

CAT6e connection