Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which consideration must be made when using BFD in a network design?

A.

BFD requires a FHRP in order to provide sub second host failover.

B.

BFD can be deployed without any IP routing protocols being configured.

C.

NSF and graceful restart must be enabled on all participating routers.

D.

Cisco Express forwarding and IP routing must be enabled on all participating routers.

An engineer must create a script to append and modify device entries in a JSON-formatted file. The script must work as follows:

Until interrupted from the keyboard, the script reads in the hostname of a device, its management IP address, operating system type, and CLI remote access protocol.

After being interrupted, the script displays the entered entries and adds them to the JSON-formatted file, replacing existing entries whose hostname matches.

The contents of the JSON-formatted file are as follows

Drag and drop the statements onto the blanks within the code to complete the script. Not all options are used.

Which IEEE standard provides the capability to permit or deny network connectivity based on the user or device identity?

A.

802. 1d

B.

802.1x

C.

802.1q

D.

802.1w

What is the primary responsibility of the vBond orchestrator?

A.

to provide centralized management and provisioning of all elements into the network

B.

to configure NAT communication on WAN Edge routers

C.

to provide configuration synchronization of an WAN Edge devices

D.

to facilitate start-up by performing authentication and authorization of all elements into the network

Which characteristics applies to Cisco SD-Access?

A.

It uses dynamic routing to discover and provision the border and edge switches

B.

It uses VXLAN for the control plane

C.

It uses PnP to discover and provision border and access switches

D.

It uses GRE tor me policy plane

What is a benefit of MACsec in a multilayered LAN network design?

A.

There is no requirement to run IEEE 802.1X when MACsec is enabled on a switch port.

B.

Layer 2 trunk links between switches can be secured.

C.

Application flows between hosts on the LAN to remote destinations can be encrypted.

D.

Layer 3 links between switches can be secured.

Which characteristic applies to Cisco SD-Access?

A.

It uses dynamic routing the discover and provision access switches.

B.

It uses VXLAN for the control plane

C.

It uses VXLAN for the data plane

D.

It uses dynamic routing to discover and provision border switches

Refer to the exhibit. An engineer must configure a Cisco WLC with WPA2 Enterprise mode and avoid global server lists. Which action is required?

A.

Enable EAP parameters.

B.

Apply CISCO ISE default settings.

C.

Disable the RADIUS server accounting interim update.

D.

Select a RADIUS authentication server.

Which protocol is implemented to establish secure control plane adjacencies between Cisco Catalyst SD-WAN nodes?

A.

IPsec

B.

TLS

C.

IKE

D.

ESP

Which architectural component enables a zero-trust security model?

A.

management plane

B.

plug-and-play

C.

data plane

D.

control plane