Pre-Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Full Access
Question # 5

Full Access
Question # 6

Full Access
Question # 7

Full Access
Question # 8

Full Access
Question # 9

Full Access
Question # 10

Full Access
Question # 11

Full Access
Question # 12

Full Access
Question # 13

Full Access
Question # 14

Full Access
Question # 15

Full Access
Question # 16

Full Access
Question # 17

Full Access
Question # 18

Full Access
Question # 19

Full Access
Question # 20

OR

Full Access
Question # 21

Full Access
Question # 22

Full Access
Question # 23

Full Access
Question # 24

Full Access
Question # 25

Full Access
Question # 26

Full Access
Question # 27

Full Access
Question # 28

Full Access
Question # 29

Full Access
Question # 30

Full Access
Question # 31

A corporate policy mandates that a certificate-based authentication system must be implemented on the wireless infrastructure. All corporate clients will contain a certificate that will be used in conjunction with ISE and user credentials to perform authentication before the clients are allowed to connect to the corporate Wi-Fi. Which authentication key option must be selected to ensure that this authentication can take place?

A.

none

B.

PSK

C.

802.1x

D.

CCKM

Full Access
Question # 32

Drag and drop the characteristics from the left into the orchestration tools that they describe on the right.

Full Access
Question # 33

Drag and drop the characteristics of PIM Sparse Mode from the left to the right. Not all options are used.

Full Access
Question # 34

Drag anti drop the characteristics from the ten onto the configuration models on the right.

Full Access
Question # 35

Which two functions is an edge node responsible for? (Choose two.)

A.

provides multiple entry and exit points for fabric traffic

B.

provides the default exit point for fabric traffic

C.

provides the default entry point for fabric traffic

D.

provides a host database that maps endpoint IDs to a current location

E.

authenticates endpoints

Full Access
Question # 36

Which two operations are valid for RESTCONF? (Choose two)

A.

PULL

B.

ADD

C.

HEAD

D.

REMOVE

E.

GET

F.

PUSH

Full Access
Question # 37

Refer to the exhibit.

What does the snippet of code achieve?

A.

It creates a temporary connection to a Cisco Nexus device and retrieves a token to be used for API calls.

B.

It opens a tunnel and encapsulates the login information, if the host key is correct.

C.

It opens an ncclient connection to a Cisco Nexus device and maintains it for the duration of the context.

D.

It creates an SSH connection using the SSH key that is stored, and the password is ignored.

Full Access
Question # 38

An engineer must create a script to append and modify device entries in a JSON-formatted file. The script must work as follows:

    Until interrupted from the keyboard, the script reads in the hostname of a device, its management IP address, operating system type, and CLI remote access protocol.

    After being interrupted, the script displays the entered entries and adds them to the JSON-formatted file, replacing existing entries whose hostname matches.

The contents of the JSON-formatted file are as follows

Drag and drop the statements onto the blanks within the code to complete the script. Not all options are used.

Full Access
Question # 39

Which features does Cisco EDR use to provide threat detection and response protection?

A.

containment, threat intelligence, and machine learning

B.

firewalling and intrusion prevention

C.

container-based agents

D.

cloud analysts and endpoint firewall controls

Full Access
Question # 40

Which component of the Cisco Cyber Threat Defense solution provides user and flow context analysis?

A.

Cisco Firepower and FireSIGHT

B.

Cisco Stealth watch system

C.

Advanced Malware Protection

D.

Cisco Web Security Appliance

Full Access
Question # 41

Which definition describes JWT in regard to REST API security?

A.

an encrypted JSON token that is used for authentication

B.

an encrypted JSON token that is used for authorization

C.

an encoded JSON token that is used to securely exchange information

D.

an encoded JSON token that is used for authentication

Full Access
Question # 42

Which data format can be used for an API request?

A.

HTML

B.

PERL

C.

JSON

D.

Python

Full Access
Question # 43

Drag and drop the snippets onto the blanks within the code to create an EEM script that adds an entry to a locally stored text file with a timestamp when a configuration change is made. Not all options are used.

Full Access
Question # 44

To support new clients in the environment, an engineer must enable Fast Transition on the corporate WLAN. Which command must be applied on a Cisco Catalyst 9800 Series WLC?

A.

security ft adaptive

B.

security wpa akm dotlx

C.

security wpa akm psk

D.

security wpa akm ft psk

Full Access
Question # 45

How does SSO work with HSRP to minimize network disruptions?

A.

It enables HSRP to elect another switch in the group as the active HSRP switch.

B.

It ensures fast failover in the case of link failure.

C.

It enables data forwarding along known routes following a switchover, white the routing protocol reconverges.

D.

It enables HSRP to failover to the standby RP on the same device.

Full Access
Question # 46

What is the recommended minimum SNR for data applications on wireless networks?

A.

15

B.

20

C.

25

D.

10

Full Access
Question # 47

Drag and drop the code snippets from the bottom onto the blanks in the code to construct a request that configures a deny rule on an access list?

Full Access
Question # 48

Which technology is the Cisco SD-Access control plane based on?

A.

LISP

B.

CTS

C.

SGT

D.

VRF

Full Access
Question # 49

Which two conditions occur when the primary route processor fails on a switch that is using dual route processors with stateful switchover? (Choose two.)

A.

Data forwarding is stopped until the routing protocols reconverge after the switchover.

B.

The standby route processor initialization is started when the primary router processor fails.

C.

The standby route processor is fully initialed and state information is maintained.

D.

User sessions are immediately recreated on the new active route processor.

E.

Data forwarding can continue along known paths until routing protocol information is restored.

Full Access
Question # 50

Refer to the exhibit. What is achieved by this Python script?

A.

It configures access list statements

B.

It reads access list statements into a dictionary list

C.

It displays access list statements on a terminal screen.

D.

It converts access list statements to a human-readable format.

Full Access
Question # 51

Which RF value represents the decline of the RF signal amplitude over a given distance"?

A.

signal-to-noise ratio

B.

received signal strength indicator

C.

free space path loss

D.

effective isotropic radiated power

Full Access
Question # 52

Which method is used by an AP to join HA controllers and is configured in NVRAM?

A.

Primary/Secondary- Tertiary/Backup

B.

stored WLC information

C.

DNS

D.

IP Helper Addresses

Full Access
Question # 53

What is a benefit of implementing stateful switchover?

A.

modularity

B.

resiliency

C.

flexibility

D scalability

Full Access
Question # 54

Drag and drop the code snippets from the bottom onto blanks m the Python script so that the program changes the IP address and saves It as a new JSON Me on the disk Not all options are used

Full Access
Question # 55

What is one characteristic of Cisco SD-Access networks?

A.

Devices are assigned to virtual networks based on their VLAN membership.

B.

Scalable group tags are used for macrosegmentatlon.

C.

Virtual networks are used for microsegmentation.

D.

All traffic is Layer 3 within the fabric.

Full Access
Question # 56

Drag and drop the snippets onto the blanks within the code to construct a script that brings up the failover Ethernet port if the primary port goes down and also shuts down the failover port when the primary returns to service. Not all options are used.

Full Access