Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Refer to the exhibit.

Router 1 and router 2 are running IBGP. and router 2 and router 3 are running OSPF Area 0. Router 1 is advertising loopback interlaces Lo0 and Lo2 and router 2 is redistributing BGP into OSPF Area 0. Which configuration must an administrator apply so that router 2 uses a route map to redistribute only the internal route from Lo 2?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Which OS uses a distributed subsystem architecture?

A.

IOS XE

B.

IOS

C.

IOS XR

D.

CatOS

Refer to the exhibit:

What is the effect of this configuration?

A.

The two routers fail to form a neighbor relationship because their system IDs are different.

B.

The two routers successfully form a neighbor relationship

C.

The two routers fail to form a neighbor relationship because the authentication configuration is missing

D.

The two routers fail to form a neighbor relationship because they have different ISIS area types.

What is the function of Cisco NFV infrastructure platform?

A.

It does not have a security audit feature.

B.

It does not offer high availability.

C.

It offers consistent performance.

D.

It offers decentralized logging.

Refer to the exhibit. Four midsize service providers provide access to different customers that use Layer 3 VPN services to enable communication across geographic regions. The service providers are connected as shown in the exhibit, and the PEs have established eBGP relationships. PE4 has an IBGP relationship with PE5. The routes that PE4 learns from PE5 must reach the other PE routers, but they are absent from the routing tables on the other PES. Which action should the engineers take to correct the problem?

A.

Configure a peering between all five Pes.

B.

Disable BGP synchronization on PE4.

C.

Enable BOP IPv4 unicast on PE4 and PE5

D.

Advertise the route targets for PE5 to the other PEs

What is a feature of model-driven telemetry?

A.

It occasionally streams to multiple servers in the network.

B.

It is less secure because it uses community strings.

C.

It uses the pull model to send requested data to a client when polled.

D.

It uses the push model to stream data to desired destinations.

After troubleshooting multiple outages on the network due to repeated configuration errors, the network architect asked an engineer to enable NETCONF to facilitate future configurations. The configuration must enable syslog messaging to record NETCONF notifications from each of the numerous devices on the network. Which configuration must the engineer apply?

A.

username cisco test taker privilege 15 password 0 cisco test

aaa new-model

aaa authorization exec default local

snmp-server community cisco test RW

netconf-yang cisco-ia snmp-community-string ciscotest

logging history warnings

B.

username cisco test taker privilege 15 password 0 ciscotest

aaa new-model

aaa authorization exec default local

snmp-server community ciscotest RW

netconf-yang cisco

logging history critical

C.

netconf-yang

username ciscotesttaker privilege 15 password 0 ciscotest

aaa new-model

aaa authorization exec default local

snmp-server community ciscotest RW

netconf-yang cisco-ia snmp-community-string ciscotest

logging history debugging

D.

netconf-yang

username ciscotesttaker privilege 15 password 0 ciscotest

snmp-server community ciscotest RW

netconf-yang cisco-ia snmp-community-string ciscotest

logging history informational

Refer to the exhibit:

Router 1 was experiencing a DDoS attack that was traced to interface gjgabitethernet0/1.

Which statement about this configuration is true?

A.

Router 1 drops all traffic that ingresses interface gigabitethernet0/1 that has a FIB entry that exits a different interface

B.

Router 1 accepts source addresses on interface gigabitethemet0/1 that are private addresses

C.

Router 1 accepts all traffic that ingresses and egresses interface gigabitethernet0/1

D.

Router 1 accepts source addresses that have a match in the FIB that indicates it is reachable through a real interface

Refer to the exhibit.

An engineer applied a gRPC dial-in configuration on customer's router to provide connection multiplexing and two-way streaming. What does this configuration accomplish in a gRPC?

A.

It is the encoding requested by the gRPC server.

B.

IT is the encoding that is used for dial-in and dial-out.

C.

It is used for encoding with the default protocol buffers

D.

It is the encoding requested by the gRPC client.

How does an untrusted interface at the boundary of an administrative domain handle incoming packets?

A.

It remarks all values to a CoS of 0.

B.

It forwards only traffic with a DSCP value of 48.

C.

It translates the IP precedence value to the corresponding DSCP value.

D.

It drops all traffic ingressing the network.