Which statement about a fabric access point is true?
Which statement about a fabric access point is true?A . It is in local mode and must be connected directly to the fabric edge switch. B. It is in local mode and must be connected directly to the fabric border node. C. It is in FlexConnect mode and must be...
Which LISP device is responsible for publishing EID-to-RLOC mappings for a site?
Which LISP device is responsible for publishing EID-to-RLOC mappings for a site?A . ETR B. MR C. ITR D. MSView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/locator-id-separation-protocol-lisp/white_paper_c11-652502.html
In a Cisco SD-Access solution, what is the role of a fabric edge node?
In a Cisco SD-Access solution, what is the role of a fabric edge node?A . to connect external Layer 3 networks to the SD-Access fabric B. to connect wired endpoints to the SD-Access fabric C. to advertise fabric IP address space to external networks D. to connect the fusion router...
Which two namespaces does the LISP network architecture and protocol use? (Choose two.)
Which two namespaces does the LISP network architecture and protocol use? (Choose two.)A . TLOC B. RLOC C. DNS D. VTEP E. EIDView AnswerAnswer: BE Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_lisp/configuration/xe-3s/irl-xe-3s-book/irl-overview.html
What are two considerations when using SSO as a network redundancy feature? (Choose two.)
What are two considerations when using SSO as a network redundancy feature? (Choose two.)A . requires synchronization between supervisors in order to guarantee continuous connectivity B. the multicast state is preserved during switchover C. must be combined with NSF to support uninterrupted Layer 3 operations D. both supervisors must be...
Assuming that R1 is a CE router, which VRF is assigned to Gi0/0 on R1?
Refer to the exhibit. Assuming that R1 is a CE router, which VRF is assigned to Gi0/0 on R1?A . default VRF B. VRF VPN_A C. VRF VPN_B D. management VRFView AnswerAnswer: A
Which two actions provide controlled Layer 2 network connectivity between virtual machines running on the same hypervisor? (Choose two.)
Which two actions provide controlled Layer 2 network connectivity between virtual machines running on the same hypervisor? (Choose two.)A . Use a virtual switch provided by the hypervisor. B. Use a virtual switch running as a separate virtual machine. C. Use VXLAN fabric after installing VXLAN tunneling drivers on the...
Drag and drop the characteristics from the left onto the appropriate infrastructure deployment types on the right
DRAG DROP Drag and drop the characteristics from the left onto the appropriate infrastructure deployment types on the right. View AnswerAnswer:
What does the output confirm about the configuration?
Refer to the exhibit. A network engineer configures a GRE tunnel and enters the show interface tunnel command. What does the output confirm about the configuration?A . The keepalive value is modified from the default value. B. The physical interface MTU is 1476 bytes. C. The tunnel mode is set...
Which statement about VXLAN is true?
Which statement about VXLAN is true?A . VXLAN encapsulates a Layer 2 frame in an IP-UDP header, which allows Layer 2 adjacency across router boundaries. B. VXLAN uses the Spanning Tree Protocol for loop prevention. C. VXLAN extends the Layer 2 Segment ID field to 24-bits, which allows up to...