Which controller is capable of acting as a STUN server during the onboarding process of Edge devices?
Which controller is capable of acting as a STUN server during the onboarding process of Edge devices?A . vBondB . vSmartC . vManageD . PNP serverView AnswerAnswer: A Explanation: In the Cisco SD-WAN architecture, the vBond orchestrator plays a pivotal role during the initial onboarding process of edge devices. It...
What are two differences between the RIB and the FIB? (Choose two.)
What are two differences between the RIB and the FIB? (Choose two.)A . The FIB is derived from the data plane, and the RIB is derived from the FIB.B . The RIB is a database of routing prefixes, and the FIB is the Information used to choose the egress interface...
What does the output verify?
Refer to the Exhibit. A network engineer configures a new GRE tunnel and enters the show run command. What does the output verify?A . The tunnel will be established and work as expectedB . The tunnel destination will be known via the tunnel interfaceC . The tunnel keepalive is configured...
Which command must be applied to R2 for an OSPF neighborship to form?
Refer to the Exhibit. Which command must be applied to R2 for an OSPF neighborship to form?A . network 20.1.1.2.0.0.0.0 area 0B . network 20.1.1.2 255.255.0.0. area 0C . network 20.1.1.2.0.0.255.255 area 0D . network 20.1.1.2 255.255.255 area 0View AnswerAnswer: B Explanation: The correct OSPF network command to be applied...
What is a benefit of a virtual machine when compared with a physical server?
What is a benefit of a virtual machine when compared with a physical server?A . Multiple virtual servers can be deployed on the same physical server without having to buy additional hardware.B . Virtual machines increase server processing performance.C . The CPU and RAM resources on a virtual machine cannot...
Which two threats does AMP4E have the ability to block? (Choose two.)
Which two threats does AMP4E have the ability to block? (Choose two.)A . DDoSB . ransomwareC . Microsoft Word macro attackD . SQL injectionE . email phishingView AnswerAnswer: B, C Explanation: Cisco Advanced Malware Protection for Endpoints (AMP4E) is designed to prevent, detect, and respond to advanced malware attacks. It...
Which configuration establishes EBGP neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP?
Refer to the exhibit. Which configuration establishes EBGP neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP?A . R1(config)#router bgp 1 R1(config-router)#neighbor 192.168.10.2 remote-as 2 R1(config-router)#network 10.1.1.0 mask 255.255.255.0 R2(config)#router bgp 2 R2(config-router)#neighbor 192.168.10.1 remote-as 1 R2(config-router)#network 10.2.2.0 mask 255.255.255.0B ....
What is the data policy in a Cisco SD-WAN deployment?
What is the data policy in a Cisco SD-WAN deployment?A . list of ordered statements that define node configurations and authentication used within the SD-WAN overlayB . Set of statements that defines how data is forwarded based on IP packet information and specific VPNsC . detailed database mapping several kinds...
Which command set configures RSPAN to capture outgoing traffic from VLAN 3 on interface GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface?
Which command set configures RSPAN to capture outgoing traffic from VLAN 3 on interface GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface?A . monitor session 2 source interface gigabitethernet0/3 tx monitor session 2 filter vlan 3B . monitor session 2 source interface gigabitethernet0/3 tx monitor session 2...
Which configuration commands can the engineer use to allow this traffic without disrupting existing traffic flows?
Refer to the exhibit. An engineer must modify the access control list EGRESS to allow all IP traffic from subnet 10.1.10.0/24 to 10.1.2.0/24. The access control list is applied in the outbound direction on router interface GigabitEthemet 0/1. Which configuration commands can the engineer use to allow this traffic without...