Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

300-420 Questions and Answers

Question # 6

Drag and drop the characteristics from the left onto the YANG models they describe on the right. Not all options are used.

Full Access
Question # 7

Which two statements about VRRP object tracking are true? (Choose two)

A.

The priority of a VRRP device can change in accordance with the up or down status of a VRRP object

B.

The VRRP interface priority must be manually configured by the administrator

C.

A VRRP group can track only one object at a time

D.

VRRP can track the status of interfaces and routes

E.

VRRP supports only interface tracking

Full Access
Question # 8

An architect is working on a design to connect a company's main site to several small to medium-sized remote branches. The solution must include redundant WAN links, but the customer has a limited budget and wants the ability to increase the link speed easily in the future. QoS will not on the branch routers so there is no need for consistent end-to-end QoS. Which solution does the architect propose?

A.

dual-homed WAN MPLS with single edge router

B.

dual-homed Internet with a single edge router running a site-to-site VPN topology

C.

dual-homed WAN MPLS and Internet links via dual edge routers

D.

dual-homed Internet with dual edge routers running a hub-and-spoke VPN topology

Full Access
Question # 9

An engineer is designing a BGP network for a large customer. To permit efficient scaling, the BGP domain is split into clusters. Which peering solution should be used between the route reflectors in different clusters for the BGP routes to be propagated appropriately?

A.

The route reflectors should be made dents of each other.

B.

The route reflectors should be nonclients with regards to each other.

C.

The route reflectors should not have any kind of BGP peering.

D.

The route reflectors should have peering through another nonclient router.

Full Access
Question # 10

Which design consideration must be made when using IPv6 overlay tunnels?

A.

Overlay tunnels that connect isolated IPv6 networks can be considered a final IPv6 network architecture.

B.

Overlay tunnels should only be considered as a transition technique toward a permanent solution.

C.

Overlay tunnels can be configured only between border devices and require only the IPv6 protocol stack.

D.

Overlay tunneling encapsulates IPv4 packets in IPv6 packets for delivery across an IPv6 infrastructure.

Full Access
Question # 11

Which method will filter routes between EIGRP neighbors within the same autonomous system?

A.

distribute-list

B.

policy-based routing

C.

leak-map

D.

route tagging

Full Access
Question # 12

A customer requires QoS to support multimedia conferencing over MPLS. The network architect chooses to use per-hop behavior. Which solution must the architect use to classify and mark traffic traveling between branch sites?

A.

BW Queue and DSCP WRED with DSCP AF3

B.

BW Queue with DSCP AF3

C.

BW Queue and DSCP WRED with DSCP AF4

D.

BW Queue with DSCP AF4

Full Access
Question # 13

Drag and drop the description from the left onto the corresponding WAN connectivity types and categories on the right.

Full Access
Question # 14

Which control plane protocol is responsible for ElD-to-RLOC mapping concerning SO-Access Architecture?

A.

GBAC

B.

LISP

C.

CEF

D.

VXLAN

Full Access
Question # 15

A company wants to deploy IPv6 within its existing network infrastructure. All current infrastructure equipment supports IPv6, and the company wants a migration strategy that must not require purchasing additional equipment The plan must keep operational management costs low. support IPv6 multicast, and allow applications to migrate using DNS. Which strategy must the company choose?

A.

hybrid ISATAP tunnel model

B.

hybrid manual tunnel model

C.

service block model

D.

dual-stack model

Full Access
Question # 16

When expanding an existing Cisco SD-Access network, in addition to the control plane, which two device roles are needed to create an additional fabric site? (Choose two.)

A.

leaf

B.

cEdge

C.

WLC

D.

edge

E.

border

Full Access
Question # 17

A company requires a private WAN design that allows remote sites to connect to HQ. The design must ensure that:

    traffic is always encrypted

    forwarding overhead is reduced

    management of security Is centralized

    multicast traffic is supported

Which technology must the company select?

A.

iPiac P2P

B.

GET VPN

C.

DMVPN Phase 3

D.

mGRE

Full Access
Question # 18

A global organization with several branches hired a network architect to design an overlay VPN solution. The branches communicate with each other frequently. The customer expects to add more branches in the future. To meet the customer's security requirements, the architect plans to provide traffic protection using dynamic IPsec tunnels. Which solution should the architect choose?

A.

DMVPN

B.

EasyVPN

C.

GETVPN

D.

L2TP

Full Access
Question # 19

What are the two purpose of the RPF check in multicast routing?

A.

to ensure that multicast packets are forwarded if they arrived on the interface used to route traffic back to the source address

B.

to ensure that multicast packets are forwarded if they arrived on the interface used to route traffic to the destination address

C.

to ensure that multicast packets, no matter the interface they arrived on. are forwarded out all interfaces

D.

to ensure that multicast packets are dropped if they arrived on the interface used to route traffic to the destination address

E.

to ensure that multicast packets are dropped if they arrived on the interface used to route traffic back to the source address

Full Access
Question # 20

Refer to the exhibit. Where must an architect plan for route summarization for the topology?

A.

from the core toward the aggregation and the access toward the aggregation

B.

from the core toward the aggregation and the aggregation toward the core

C.

from the aggregation toward the access and the access toward the aggregation

D.

from the aggregation toward the core and the aggregation toward the access

Full Access
Question # 21

Refer to the exhibit. An engineer is planning an IPv4 to IPv6 migration solution for a customer. The routers in the network can support IPv4 and IPv6, except for the DWDM routers. The DWDM routers provide a Layer 2 link in which the routers peer directly with each other across a DWDM circuit. The circuit also provides connectivity between the mail servers. Which IPv6 migration technique must the engineer deploy?

A.

dual-stack

B.

6to4

C.

ISATAP

D.

6rd

Full Access
Question # 22

What are two benefits of designing an SD-WAN network fabric with direct Internet access implemented at

every site? (Choose two.)

A.

It decreases latency to applications hosted by public cloud service provider.

B.

It decreases latency on Internet circuits.

C.

It increases the speed of delivery of site deployments through zero-touch provisioning.

D.

It increases the total available bandwidth on Internet circuits.

E.

It alleviates network traffic on MPLS circuits.

Full Access
Question # 23

In an SD-WAN architecture, which methods are used to bootstrap a vEdge router?

A.

DHCP options or manual configuration

B.

vManage or DNS records

C.

ZTP or manual configuration

D.

DNS records or DHCP options

Full Access
Question # 24

What is a feature of the SaaS subscription model?

A.

web connection not required

B.

access to industrial-strength storage and computing power

C.

autonomy and control over hardware

D.

tower initial costs

Full Access
Question # 25

Drag and drop the descriptions from the left onto the Cisco SD-WAN component they describe on the right.

Full Access
Question # 26

Which WAN connectivity technology is optimal for edge computing compared to others and why?

A.

Due to low latency, high bandwidth, and closest proximity to the user. 4G/5G connectivity is the optimal WAN technology for edge computing compared to L3 VPN MPLS connectivity, which offers native separation and security with close proximity to the data center.

B.

Due to high bandwidth, separation and security, and proximity to the data center network. DWDM Is the optimal WAN technology lor edge computing compared to 4G/5G connectivity, which offers native separation and security with close proximity to the data center.

C.

Due to low latency, high bandwidth, and closest proximity to the user, L3 VPN MPLS connectivity is the optimal WAN technology for edge computing compared to 4G/5G connectivity, which offers native separation and security with close proximity to the data center.

D.

Due to low cost, high bandwidth, low latency, and closest proximity to the edge of the network, Mero Ethernet is the optimal WAN technology for edge computing compared to MPLS, which offers native separation and security with close proximity to the data center.

Full Access
Question # 27

Drag and drop the descriptions from the left onto the categories they apply to on the right.

Full Access
Question # 28

A network engineer must optimize a campus OSPF deployment Currently each time a type 1 or type 2 LSA is generated within an area, the OSPF process must recompute the entire SPT Which solution improves the recomputation process?

A.

iSPF

B.

BFD

C.

SPF

D.

PRC

Full Access
Question # 29

An engineer must design a management network that enables SSH, NTP, FTP, and SNMP over the production network. The design requires the management of routers and switches that exist across different networks. Which feature must the design include?

A.

Management Plane Protection

B.

dedicated management console connection per device

C.

terminal server

D.

dedicated management VRF connection per device

Full Access
Question # 30

A network engineer prepares a script to configure a loopback interface with IP address 172.16.15.12/32. To comply with the company security policies, 'Content-type':

‘application/yang-data+json‘ is added to the script. Connection to the network devices must be secured. Which code snippet must the network engineer use to meet this requirement?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 31

Which feature is required for graceful restart to recover from a processor failure?

A.

Cisco Express Forwarding

B.

Virtual Switch System

C.

Stateful Switchover

D.

Bidirectional Forwarding Detection

Full Access
Question # 32

What does the fabric data plane leverage in SD-Access Architecture?

A.

LISP protocol to resolve endpoint-to-location mapping

B.

IS-IS protocol to exchange link-state routing information

C.

MAC-in-IP encapsulation method to transport of the Layer 2 frame

D.

BGP protocol to advertise endpoint prefixes outside of the fabric

Full Access
Question # 33

An engineer is designing a Layer 3 campus network running EIGRP between the core, aggregation, and access layers. The access layer switches will be connected to the aggregation layer using Layer 3 copper connections. The engineer wants to improve convergence time for access layer switch failures. Which technique must the design include?

A.

enabling BFD for EIGRP on the access layer uplinks

B.

reducing the EIGRP Hello / Hold timer values

C.

EIGRP summarization from core to aggregation layer

D.

EIGRP summarization from access to aggregation layer

Full Access
Question # 34

Refer to the exhibit. An architect is designing an IPv4 plan using the 172.16.0.0/16. The design must maximize the number of subnets while meeting these requirements:

    500 hosts within the server room

    100 hosts at the remote site

    25 hosts at the access site

Which plan must the architect choose?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 35

An engineer is working for a large cable TV provider that requires multiple sources streaming video on different channels using multicast with no rendezvous point. Which multicast protocol meets these requirements?

A.

PIM-SM

B.

PIM-SSM

C.

any-source multicast

D.

BIDIR-PIM

Full Access
Question # 36

In a cisco SD-Access brownfield deployment scenario, which configuration deployment must be taken with Cisco DNA center?

A.

Subnet stretching

B.

LAN automation

C.

Automated UNDERLAY

D.

Manual underlay

Full Access
Question # 37

Prior to establishing full-mesh iPsec tunnels in a typical Cisco SD-WAN deployment, which mechanism do WAN Edge routers use to exchange Key information for data plane encryption?

A.

They use vSmart controllers as key exchange servers.

B.

They use vManage as a key exchange server.

C.

They use IKEv2 when exchanging keys with each other.

D.

They use vBond as a key exchange server.

Full Access
Question # 38

Exhibit:

Refer to the exhibit. An engineer is designing a Layer 2 campus network. The design must support fast convergence and leverage as much bandwidth as possible between layers. Distribution switches do support VSS; unfortunately, not all routing protocols are available for use due to license limitations. Which solution must the engineer choose?

A.

EtherChannel

B.

MEC

C.

RSTP

D.

ECMP

Full Access
Question # 39

Refer to the exhibit. An architect is designing a hierarchical ISIS solution for a customer with these requirements:

    Routers will double In all areas within the next 24 months.

    Link flaps within areas 20 and 30 must not impact the backbone area.

    Traffic originating from A201 and A302 routers must connect to application servers in the backbone.

Which design must the architect select?

A.

C201 Level 1/2, A301 Level 1/2 and A102 Level 1/2

B.

C101 Level 1/2. A201 Level 1, and A101 Level 2

C.

C102 Level 2. A202 Level 2, and A102 Level 1

D.

C302 Level 2. A302 Level 1/2. and A101 Level 2

Full Access
Question # 40

A customer is discussing QoS requirements with a network consultant. The customer has specified that end-to-end path verification is a requirement. Which QoS solution meets this requirement?

A.

IntServ model with RSVP to support the traffic flows

B.

DiffServ model with PHB to support the traffic flows

C.

marking traffic at the access layer with DSCP to support the traffic flows

D.

marking traffic at the access layer with CoS to support the traffic flows

Full Access
Question # 41

A customer is undergoing a WAN re-architecture and wants to design QoS policies for remote sites that have low bandwidth. What must be considered to have CBWFQ configured in the parent and child policies in an end-to-end QoS design?

A.

CBWFQ is only supported in the child policy.

B.

CBWFQ is only supported in the parent policy.

C.

Traffic shaping is required in the parent policy.

D.

Traffic policing is required in the child policy.

Full Access
Question # 42

Which element in a Cisco SD-WAN architecture maintains a centralized routing table?

A.

WAN Edge router

B.

vSmart Controller

C.

vManage NMS

D.

vBond Orchestrator

Full Access
Question # 43

An engineer must propose a solution for a campus network that includes the capability to create multiple Layer 3 virtual networks. Each network must have its own addressing structure and routing table for data forwarding. The solution must be scalable to support hundreds of virtual networks and allow simple configuration and management with minimal administrative overhead. Which solution does the engineer recommend?

A.

hop-by-hop EVN

B.

multihop MPLS core

C.

multihop IPsec tunneling

D.

hop-by-hop VRF-Lite

Full Access
Question # 44

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 45

When a first hop redundancy solution is designed, which protocol ensures that load balancing occurs over multiple routers using a single virtual IP address and multiple virtual MAC addresses?

A.

GLBP

B.

IRDP

C.

VRRP

D.

HSRP

Full Access
Question # 46

Refer to the exhibit.

An engineer must optimize the traffic flow of the network. Which change provides a more

efficient design between the access and the distribution layer?

A.

Add a link between access switch A and access switch B

B.

Reconfigure the distribution switch A to become the HSRP Active

C.

Change the link between distribution switch A and distribution switch B to be a routed link

D.

Create an EtherChannel link between distribution switch A and distribution switch B

Full Access
Question # 47

Refer to the exhibit An engineer is designing an OSPF solution with these requirements:

    NMS server will manage R5 and R6.

    Upon failure of R1. all NMS traffic should be routed through R4.

    Upon failure of the link between R5 and R6. all traffic destined for 10.6.6.6 should be routed through R4

Which solution must the engineer choose?

A.

Advertise 172.16.1.1 into OSPF process 1 with high cost on R1.

B.

Apply static routes on R2 and R3 with IP SLA tracking toward R5 and R6.

C.

Enable the default-Information originate command with a higher metric on R2 to R1.

D.

Redistribute OSPF process 1 into process 2 on R1 and R4.

Full Access
Question # 48

Refer to the exhibit. An architect with an employee ID: 4542:60:170 is designing a campus Layer 2 infrastructure. The design requires a PoE power budget that varies from 30-60 W. In addition, power must be provided continuously to some endpoints and must be supported even during the reloading of edge switches. Which solution must the architect select?

A.

PoE Plus

B.

Fast PoE

C.

Universal PoE

D.

Perpetual PoE

Full Access
Question # 49

Refer to the exhibit.

An architect must design an IPv6 migration solution for an enterprise customer to support these requirements:

* Clients will transition to the new IPv6 network, which provides NAT64 and IPv6 DNS resolution services, using the same DNS name that points to the IPv4 address.

* The service provider will create a client-facing IPv6 interface with a new IPv6 virtual address that points to the same IPv4 DNS server.

* The service provider will support clients that use global IPv6 addresses and encapsulate IPv4 packets into IPv6 tunnels.

Which two migration solutions must the architect choose? (Choose two.)

A.

Use dual-stack lite from the MPLS network to the IGR.

B.

Use IPv6 tunneling from the devices to the core MPLS network.

C.

Use dual-stack lite from the devices to the core MPLS network.

D.

Use NAT44/64 from the MPLS network to the IGR.

E.

Use NAT44/64 from the devices to the core MPLS network.

Full Access
Question # 50

Drag and drop the steps WAN Edge performs when on-boarded into the Cisco SD-WAN overlay from the left into the order they are completed on the right.

Full Access
Question # 51

A customer plans to adopt distributed QoS in their enterprise WAN. The policy must allow for individual packet marking according to the type of treatment required and for forwarding based on hop-by-hop treatment locally defined on each device. Which technology must the customer select?

A.

CBWFQ

B.

LLQ

C.

Diffserv

D.

IntServ

Full Access
Question # 52

Drag and drop the characteristics from the left onto the telemetry mode they apply to on the right.

Full Access
Question # 53

Refer to the exhibit.

A customer is running HSRP on the core routers. Over time the company has grown and requires more

network capacity. In the current environment, some of the downstream interfaces are almost fully utilized, but

others are not. Which solution improves the situation?

A.

Make router R2 active for half of the VLANs.

B.

Add more interfaces to R1 and R2.

C.

Configure port channel toward downstream switches.

D.

Enable RSTP on the downstream switches.

Full Access
Question # 54

How is end-to-end microsegmentation enforced in a Cisco SD-Access architecture?

A.

VLANs are used to segment traffic at Layer 2.

B.

5-tuples and ACLs are used to permit or deny traffic.

C.

SGTs and SGTACLs are used to control access to various resources.

D.

VRFs are used to segment traffic at Layer 3.

Full Access
Question # 55

An architect is designing a multicast solution for a network that contains over 100 routers. The architect plans to create several multicast domains and balance the PIM-SM traffic within the network. Which technology should the architect include in the design?

A.

DVMRP

B.

IGMP

C.

MOSPF

D.

MSDP

Full Access
Question # 56

An engineer is designing a QoS policy that queues excess packets for later transmission. Which mechanism must be included in the design?

A.

shaping

B.

WRED

C.

policing

D.

RED

Full Access
Question # 57

Refer to the exhibit. An architect must design an IP addressing scheme for a multisite network connected via a WAN transit. The campus site must accommodate 12,000 devices and the branch sites must accommodate 1,000 devices. Which address scheme optimizes network device resources, contains convergence events to the different blocks of the network, and ensures future growth of the network?

A.

Campus: 10.0.0.0/18

•Branch1: 10.0.192.0/21

•Branch2: 10.0.200.0/21

B.

• Campus: 10.0.0.0/16

•Branchi: 10.255.0.0/20

•Branch2: 10.255.16.0/20

C.

• Campus: 10.0.0.0/10

•Branch1: 10.64.0.0/10

•Branch2: 10.128.0.0/10

D.

• Campus: 10.0.0.0/20

•Branch1: 10.0.64.0/21

Branch2: 10.0.128.0/21

Full Access
Question # 58

Which two considerations must be made regarding the overlay network for a Cisco SD-Access architecture? (Choose two.)

A.

Virtual networks should be used for microsegmentation

B.

SGTs should be used for data plane isolation and microsegmentation

C.

Virtual networks should be used for data plane isolation only

D.

Overlapping IP addresses across different overlay networks should be used to conserve IP addresses

E.

Overlapping IP addresses across different overlay networks should be avoided for operational simplicity

Full Access
Question # 59

Drag and drop the characteristics from the left onto the Yang model they describe on the right.

Select and Place:

Full Access
Question # 60

What is the purpose of the fabric management plane in a Cisco SD-Access architecture?

A.

create LISP-based EID for the end-to-end solution that is offered by SD-Access

B.

enable EID-to-RLOC mapping that is based on the BGP protocol

C.

create an underlay network that is based on the IS-IS routing protocol

D.

enable automation techniques for device deployments and configurations

Full Access
Question # 61

Refer to the exhibit. An engineer is designing a BGP solution for a client that peers with ISP1 for full Internet connectivity and with ISP2 for direct exchange of routes for several third parties. Which action, when implemented on the edge routers, enables the client network to reach the Internet through ISP1?

A.

Run an eBGP session within different VRFs for each ISP.

B.

Advertise a default route for downstream routers within the client network.

C.

Apply the AS-path prepend feature for ISP2.

D.

Apply route filtering such that the client advertises only routes originated from its own AS.

Full Access
Question # 62

Drag and drop the characteristics from the left onto the correct telemetry mode on the right.

Full Access
Question # 63

An infrastructure team is concerned about the shared memory utilization of a device, and for this reason, they need to monitor the device state. Which solution limits impact on the device and provides the required data?

A.

IPFIX

B.

static telemetry

C.

on-change subscription

D.

periodic subscription

Full Access
Question # 64

An engineer is designing a campus network with Cisco Catalyst 95CO switches in the aggression layer. The design requires running nonblocking Layer 2 MEC from the aggregation layer to the access layer. The Catalyst switches are located on different campus floors for availability reasons, and each access switch veil contam a single VLAN. Which technology must the engineer choose for the aggregation switches in the design?

A.

VPC

B.

VSS

C.

StackWise Virtual

D.

StackWise-180

Full Access
Question # 65

Drag and drop the Cisco Catalyst SD-WAN components from the left to their definitions on the nght

Full Access
Question # 66

An engineer is designing a networking solution to allow two hosts to communicate—one host located within the company A network and the other within the company B network. The two companies have no other plans for future additional connections. Both companies want to use a single secure and encrypted internet connection, and the configuration must be as simple as possible. Which network solution must the engineer choose?

A.

single DMVPN with EIGRP routing

B.

routed IPsec tunnel with OSPF routing

C.

policy-based IPsec tunnel with static routing

D.

MPLS VPN provided service with BGP routing

Full Access
Question # 67

Refer to the exhibit.

An architect is designing a network for a customer supporting a Wake-on-LAN application. Which solution must the architect choose?

A.

IP directed-broadcasts on R1

B.

spanning-tree uplinkfast on SW1

C.

spanning-tree uplinkfast on SW2

D.

IP directed-broadcasts on R2

Full Access
Question # 68

The customer solution requires QoS to support streaming multimedia over a WAN. An architect chooses to use Per-Hop Behavior. Which solution should the engineer use to of mark traffic traveling between branch sites?

A.

LLQ with DSCP EF

B.

CBWFQ with DSCP AF3

C.

CBWFQ with DSCP AF2

D.

LLQ with DSCP AF4

Full Access
Question # 69

A network solution is being designed for a company that connects to multiple Internet service providers. Which Cisco proprietary BGP path attribute will influence outbound traffic flow?

A.

Local Preference

B.

MED

C.

Weight

D.

AS Path

E.

Community

Full Access
Question # 70

When differentiating between IETF. OpenConfig. and Cisco native YANG models, how does the use of containers differ?

A.

OpenConfig uses one container for operational data and another container for configuration data, and IETF and Cisco native models use a single container for operational data and configuration data.

B.

IETF and Cisco native models use a single container for operational data and configuration data, and OpenConfig uses one container for operational data and another container for configuration data.

C.

IETF and Cisco native models use one container for operational data and another container for configuration data, and OpenConfig uses a single container for operational data and configuration data.

D.

Cisco native models use one container for operational data and another container for configuration data, and OpenConfig and IETF use a single container for operational data and configuration data.

Full Access
Question # 71

Which design consideration must be made when dual WAN Edge routers are deployed at a branch site?

A.

Use BGP AS-path prepending to influence egress traffic and use MED to influence ingress traffic from the branch.

B.

HSRP priorities must match the OMP routing policy to prefer one WAN Edge over the other.

C.

Traffic must be symmetrical as it egresses the WAN Edges and returns from remote sites for DPI to function properly.

D.

Configure BFD between WAN Edge routers to detect sub-second link failures.

Full Access
Question # 72

Refer to the exhibit. An architect is designing a Layer 2 network for a customer. The network will use the spanning-tree protocol. During a link failure between SW1 and SW2, the fastest possible convergence time is desired. Which solution must the architect select?

A.

Loop Guard

B.

UplinkFast

C.

PortFast

D.

BackboneFast

Full Access
Question # 73

Refer to the exhibit. An architect is designing a Layer 3 campus network The design must hide network instability, reduce network overhead, and conserve critical device memory Which route summarization solution must the architect select?

A.

• The core layer must advertise a default route toward the aggregation layer

• The VLAN subnets must be summarized into 10 0 0 0.'16 at the aggregation layer and advertised to the core layer

B.

• The core layer must advertise a default route toward the aggregation layer

• The VLAN subnets must be summarized into 10 0 0 0/16 at the access layer and advertised to the aggregation layer

C.

• The aggregation layer must advertise a default route toward the access layer.

• The VLAN subnets must be summarized into 10 0.0 0/16 at the aggregation layer and advertised to the core layer

D.

• The aggregation layer must advertise a default route toward the core layer

• The VLAN subnets must be summarized into 10 0 0 0.116 at the aggregation layer and advertised to the access layer

Full Access
Question # 74

Refer to the exhibit. An architect must design a solution to connect bank site A with bank site B and support:

    network operation center monitoring end-to-end L3VPN and L2VPN traffic

    company adding thousands of routes in the next two years

Which two BGP solutions must the design include? (Choose two.)

A.

Establish full mesh IBGP peering with ail routers in different IGP domains.

B.

Redistribute different IGP domain routes in a BGP IPv4 routing instance.

C.

Transport site routes using a BGP VPNv4 address family on the PE routers.

D.

Apply BGP policies on all routers to filter out ABR and PE loopback IP addresses.

E.

Connect multiple IGP'LDP domains using a BGP IPv4 unicast family on the ABR.

Full Access
Question # 75

Which type of rendezvous point deployment is standards-based and support dynamic RP discovery?

A.

Auto-RP

B.

Anycast-RP

C.

bootstrap router

D.

static RP

Full Access
Question # 76

A customer's current Layer 2 infrastructure is running Spanning Tree 802.1d, and all configuration changes are manually implemented on each switch. An architect must redesign the Layer 2 domain to achieve these goals:

    reduce the impact of topology changes

    reduce the time spent on network administration

    reduce manual configuration errors

Which two solutions should the architect include in the new design? (Choose two.)

A.

Implement Rapid PVST+ instead of STP.

B.

Implement MST instead of STP.

C.

Use VTP to propagate VLAN information and to prune unused VLANs.

D.

Configure broadcast and multicast storm control on all switches.

E.

Configure dynamic trunking protocol to propagate VLAN information.

Full Access
Question # 77

Refer to the exhibit. Due to budget constraints, a customer decided to purchase WAN routers with one LAN and one WAN interface per device. There is a requirement to connect the three sites to ensure high availability without buying additional WAN links. Which design deployment must the customer choose?

A.

single-homed full mesh

B.

single-homed hub-and-spoke

C.

dual-homed hub-and-spoke

D.

dual-homed full mesh

Full Access
Question # 78

A network engineer must segregate three interconnected campus networks using IS-IS routing. A two-layer hierarchy must be used to support large routing domains and to avoid more specific routes from each campus network being advertised to other campus network routers automatically. Which two actions does the engineer take to accomplish this segregation? (Choose two.)

A.

Designate two IS-IS routers as BDR routers at the edge of each campus, and configure one BDR for all Level 1 routers and one BDR for all Level 2 routers.

B.

Designate two IS-IS routers from each campus to act as Level 1/Level 2 backbone routers at the edge of each campus network.

C.

Assign the same IS-IS NET value for each campus, and configure internal campus routers with Level 1/ Level 2 routing.

D.

Utilize different MTU values for each campus network segment. Level 2 backbone routers must utilize a larger MTU size of 9216.

E.

Assign a unique IS-IS NET value for each campus, and configure internal campus routers with Level 1 routing.

Full Access
Question # 79

An organization is designing a detailed QoS plan that limits bandwidth to specific rates. Which two parameters are supported be the traffic policing feature? (Choose two.)

A.

violating

B.

marking

C.

shaping

D.

bursting

E.

conforming

Full Access
Question # 80

Refer to the exhibit. A network engineer is designing an OSPF solution to connect a company's remote to a newly provisioned MPLS VPN backbone. Some of the branches have a direct dark fiber connection between each other. The engineer wants to ensure that the dark fibers are used only when the MPLS core is unavailable. Which solution must the engineer choose?

A.

Stub area

B.

Sham link

C.

Virtual link

D.

NSSA

Full Access
Question # 81

A company requested that an architect propose a new IPv4 and IPv6 deployment strategy. The company wants a solution that is straightforward, with no information hiding or forwarding overhead. Which solution meets these requirements?

A.

LISP

B.

NAT64

C.

dual-stack

D.

GRE tunnels

Full Access
Question # 82

Refer to the exhibit.

A network engineer must improve the current IS-IS environment. The Catalyst switch is equipped with dual supervisors. Each time a stateful switchover occurs, the network experiences unnecessary route recomputation. Which solution addresses this issue if the upstream router does not understand graceful restart messaging?

A.

Enable IS-IS remote LFA FRR on both devices.

B.

Enable NSR on the switch.

C.

Enable NSF on the switch.

D.

Configure ISIS aggressive timers on both devices.

Full Access
Question # 83

Which consideration must be made when designing a Cisco SD-Access fabric underlay?

A.

Subnets must be reduced to decrease latency.

B.

Up to six control planes are supported.

C.

The default MTU should be increased.

D.

A unified policy must be used.

Full Access
Question # 84

A company’s branch location uses redundant routers and links for connectivity to the headquarters. Also, to use the entire available bandwidth, the branch uses a dynamic routing protocol. An architect must design a multicast streaming solution to avoid RPF check failures because of the current network design. Which deployment model must the architect choose?

A.

PIM-SM

B.

BIDIR-PIM

C.

PIM-BSR

D.

PIM-SSM

Full Access
Question # 85

An engineer is designing a PIM Anycast RP solution between two data centers. The design must ensure that RP1 in DC1 and RP2 in DC2 inform each other about specific sources that have joined locally. Which solution must the engineer choose?

A.

Provision the RPs on the same IP subnet and extend the subnet at Layer 2 between data centers

B.

Enable MSDP between RPs using separate unique loopback interfaces

C.

Enable MSDP between RPs using the configured Anycast RP address

D.

No action is required because PIM registers from the source will, by default, reach each RP

Full Access
Question # 86

Which integration capability does gRPC provide?

A.

leveraging the LDAP protocol for authentication and directory services ensuring secure access control in RPC communications

B.

leveraging the XMPP protocol for real-time messaging and collaboration between client and server applications

C.

leveraging protocol buffers to provide efficient serialization and deserialization of structured data over the network

D.

leveraging GRAPH-API for network monitoring and management providing comprehensive visibility into RPC-related metrics and performance statistics

Full Access
Question # 87

What is the purpose of a border node in a Cisco SD-Access fabric?

A.

connect devices to a network

B.

perform traffic encapsulation and de-encapsulation

C.

perform network virtualization

D.

expand a network

Full Access
Question # 88

What is an advantage of using model-driven telemetry in the network?

A.

It uses interrupt-driven polling to pull data at regular intervals.

B.

It uses JSON encoding and is compatible with a wide variety of tools on the market.

C.

It uses MIB models to structure the data that are well known In the industry.

D.

Telemetry obtains data by parsing the CLI output from show commands.

Full Access
Question # 89

An engineer uses Postman and YANG to configure a router with:

    OSPF process ID 200

    network 172.16.10.128/26 enabled for Area 0

Which get-config reply verifies that the model set was designed correctly?

A.

Text, letter Description automatically generated

B.

Graphical user interface, text, letter, email Description automatically generated

C.

Text, letter Description automatically generated

D.

Text, letter Description automatically generated

Full Access
Question # 90

An engineer uses Postman and YANG to configure a router with:

    OSPF process ID 400

    network 192.168.128.128/25 enabled for Area 0

Which get-config reply verifies that the model set was designed correctly?

A.

Text Description automatically generated

B.

Text Description automatically generated

C.

Text Description automatically generated

D.

Text Description automatically generated with medium confidence

Full Access
Question # 91

Refer to the exhibit An engineer is designing a hierarchical ISIS solution for an enterprise customer with these requirements

    Users in areas 25 and 55 send and receive traffic from both backbone areas

    Link flaps in areas 35 and 45 must not impact other areas

    Routers will double within the next 12 months in areas 35 and 45

Which design must the engineer select?

A.

A series routers Level 2, B series routers Level 2, and C series routers Level 1

B.

A series routers Level 1/2 B series routers Level 2 and C series routers Level 2

C.

A series routers Level 1. B series routers Level 1/2. and C series routers Level 2

D.

A series routers Level 1.2 B series routers Level 1/2 and C series routers Level 1/2

Full Access
Question # 92

Drag and drop the elements from the left onto the protocols where they are used on the right.

Full Access
Question # 93

A company wants to switch from static routing to a dynamic routing protocol to ease the administrative and operational overhead. The network topology is hub and spoke, and the branches use DM VPN back to the hub with two 10-Mbps internet connections. The branch routers are multivendor and have limited memory and CPU resources. Which routing protocol and design solution meets the requirements?

A.

eBGP with the hub routers set up as route reflectors

B.

ISIS with the hub and spoke routers configured in two different areas

C.

EIGRP with branch routers as stub routers and variance enabled

D.

OSPF with the hub in area 0 and branch routers in stub areas with ECMP

Full Access
Question # 94

Which feature is used to optimize WAN bandwidth of IGMP network traffic among WAN Edge routers in the

same VPN?

A.

IGMPv2

B.

multicast RP

C.

multicast-replicator

D.

multicast service routes

Full Access
Question # 95

Refer to the exhibit. An architect working for a service provider with an employee ID: 4763:44:876 must design a Layer 2 VPN solution that supports:

    transparency of service provider devices

    direct communication between CE routers attached to the same VLAN

Which solution must the design include?

A.

multiple VPWS

B.

single VPLS

C.

single VPWS

D.

multiple VPLS

Full Access
Question # 96

Which two functions are provided by the Cisco SD-WAN orchestration plane? (Choose two.)

A.

centralized provisioning

B.

primary authentication point

C.

NAT traversal facilitation

D.

Zero Touch Provisioning

E.

troubleshooting and monitoring

Full Access
Question # 97

An engineer must design a management network for a customer's enterprise network. The design must:

    provide the ability to grant and revoke access privileges

    allow only protocols SSH, NTP, FTP, and SNMP

    restrict access to management Interfaces

Which solution must the engineer choose to meet the requirements?

A.

in-band

B.

enterprise internal private

C.

out-of-band

D.

mGRE

Full Access
Question # 98

What is one function of the vSmart controller in an SD-WAN deployment?

A.

orchestrates vEdge and cEdge connectivity

B.

responsible for the centralized control plane of the SD-WAN network

C.

provides centralized network management and a GUI to monitor and operate the SD-WAN overlay

D.

provides a data-plane at branch offices to pass traffic through the SD-WAN network

Full Access
Question # 99

Which feature minimizes HOC connections and reduces strain on the vSmart controller m an SO-WAN architecture?

A.

control-connections

B.

corrtroWirection

C.

color

D.

affinity

Full Access
Question # 100

How is redundancy achieved among Cisco vBond Orchestrators in a Cisco SD-WAN deployment?

A.

The IP addresses of all Orchestrators are mapped to a single DNS name.

B.

The closest Orchestrator to each Cisco WAN Edge router is selected.

C.

Cisco WAN Edge routers are configured with all Orchestrators using their IP addresses and priority.

D.

A single Cisco Orchestrator is deployed in each network.

Full Access
Question # 101

What is an advantage of designing an out-of-band network management solution?

A.

In the event of a production network outage, network devices can still be managed.

B.

There is no separation between the production network and the management network.

C.

In the event of a production network outage, it can be used as a backup network path.

D.

It is less expensive than an in-band management solution

Full Access