What is the reason for this behavior?
Refer to the exhibit. After implementing the configuration 172.20.20.2 stops replaying to ICMP echoes, but the default route fails to be removed. What is the reason for this behavior?A . The source-interface is configured incorrectly. B. The destination must be 172.30.30.2 for icmp-echo C. The default route is missing the...
What is a characteristic of MACsec?
What is a characteristic of MACsec?A . 802.1AE provides encryption and authentication services B. 802.1AE is bult between the host and switch using the MKA protocol, which negotiates encryption keys based on the master session key from a successful 802.1X session C. 802.1AE is bult between the host and switch...
Where is radio resource management performed in a cisco SD-access wireless solution?
Where is radio resource management performed in a cisco SD-access wireless solution?A . DNA Center B. control plane node C. wireless controller D. Cisco CMXView AnswerAnswer: C Explanation: Fabric wireless controllers manage and control the fabric-mode APs using the same general model as the traditional local-mode controllers which offers the...
An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as an entry point. Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplish task?
Refer to the exhibit. An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as an entry point. Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplish task? A ....
At which Layer does Cisco DNA Center support REST controls?
At which Layer does Cisco DNA Center support REST controls?A . EEM applets or scripts B. Session layer C. YMAL output from responses to API calls D. Northbound APIsView AnswerAnswer: D
When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required?
When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required?A . NTP server B. PKI server C. RADIUS server D. TACACS serverView AnswerAnswer: C
Which command set is required?
An engineer must configure HSRP group 300 on a Cisco IOS router. When the router is functional, it must be the must be the active HSRP router. The peer router has been configured using the default priority value. Which command set is required? A) B) C) D) A . Option...
How does EIGRP differ from OSPF?
How does EIGRP differ from OSPF?A . EIGRP is more prone to routing loops than OSPF B. EIGRP supports equal or unequal path cost, and OSPF supports only equal path cost. C. EIGRP has a full map of the topology, and OSPF only knows directly connected neighbors D. EIGRP uses...
Which outbound access list, applied to the WAN interface of a router, permits all traffic except for http traffic sourced from the workstation with IP address 10.10.10.1?
Which outbound access list, applied to the WAN interface of a router, permits all traffic except for http traffic sourced from the workstation with IP address 10.10.10.1? A) B) C) D) A . Option A B. Option B C. Option C D. Option DView AnswerAnswer: A
Which JSON syntax is valid?
Which JSON syntax is valid? A) B) C) D) A . Option A B. Option B C. Option C D. Option DView AnswerAnswer: C Explanation: This JSON can be written as follows: { 'switch': { 'name': 'dist1', 'interfaces': ['gig1', 'gig2', 'gig3'] } }