لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
To which category does a REST API that has been developed for IP address management integration belong?
A. estbound
B. astbound
C. outhbound
D. orthboun
عرض الإجابة
اجابة صحيحة: A
السؤال #2
What is a benefit of a virtual machine when compared with a physical server?
A. ultiple virtual servers can be deployed on the same physical server without having to buy additional hardware
B. irtual machines increase server processing performance
C. he CPU and RAM resources on a virtual machine cannot be affected by other virtual machines
D. eploying a virtual machine is technically less complex than deploying a physical server
عرض الإجابة
اجابة صحيحة: C
السؤال #3
Which resource must a hypervisor make available to the virtual machines?
A. andwidth
B. P address
C. torage
D. ecure acces
عرض الإجابة
اجابة صحيحة: B
السؤال #4
Which encryption hashing algorithm does NTP use for authentication?
A. SL
B. D5
C. ES128
D. ES25
عرض الإجابة
اجابة صحيحة: C
السؤال #5
An engineer is configuring a new SSID to present users with a splash page for authentication. Which WLAN Layer 3 setting must be configured to provide this functionality?
A. eb Policy
B. PA2 Policy
C. ocal Policy
D. CK
عرض الإجابة
اجابة صحيحة: C
السؤال #6
What is a VPN in a Cisco SD-WAN deployment?
A. ommon exchange point between two different services
B. ttribute to identify a set of services offered in specific places in the SD-WAN fabric
C. irtualized environment that provides traffic isolation and segmentation in the SD-WAN fabric
D. irtual channel used to carry control plane informatio
عرض الإجابة
اجابة صحيحة: ADE
السؤال #7
How can an engineer prevent basic replay attacks from people who try to brute force a system via REST API?
A. dd a timestamp to the request in the API header
B. se a password hash
C. dd OAuth to the request in the API header
D. se HTTPS
عرض الإجابة
اجابة صحيحة: B
السؤال #8
What is one fact about Cisco SD-Access wireless network deployments?
A. he access point is part of the fabric overlay
B. he WLC is part of the fabric underlay
C. he wireless client is part of the fabric overlay
D. he access point is part of the fabric underlay
عرض الإجابة
اجابة صحيحة: C
السؤال #9
Which device is responsible for finding EID-to-RLOC mappings when traffic is sent to a LISP-capable site?
A. ap server
B. gress tunnel router
C. ngress tunnel router
D. ap resolve
عرض الإجابة
اجابة صحيحة: D
السؤال #10
What is the result when an active route processor fails in a design that combines NSF with SSO?
A. n NSF-aware device immediately updates the standby route processor RIB without churning the network
B. n NSF-capable device immediately updates the standby route processor RIB without churning the network
C. he standby route processor temporarily forwards packets until route convergence is complete
D. he standby router processor immediately takes control and forwards packets along known route
عرض الإجابة
اجابة صحيحة: B
السؤال #11
What is a characteristic of MACsec?
A. 02
B. 02
C. 02
D. 02
عرض الإجابة
اجابة صحيحة: B
السؤال #12
Which two components are supported by LISP?
A. roxy ETR
B. gress tunnel router
C. oute reflector
D. MAC algorithm
E. pok
عرض الإجابة
اجابة صحيحة: B
السؤال #13
Which activity requires access to Cisco DNA Center CLI?
A. reating a configuration template
B. raceful shutdown of Cisco DNA Center
C. rovisioning a wireless LAN controller
D. pgrading the Cisco DNA Center softwar
عرض الإجابة
اجابة صحيحة: A
السؤال #14
Which component handles the orchestration plane of the Cisco SD-WAN?
A. Bond
B. Smart
C. Manage
D. Edg
عرض الإجابة
اجابة صحيحة: C
السؤال #15
Which technology is used to provide Layer 2 and Layer 3 logical networks in the Cisco SD-Access architecture?
A. nderlay network
B. PN routing/forwarding
C. asy virtual network
D. verlay networ
عرض الإجابة
اجابة صحيحة: A
السؤال #16
In a Cisco SD-WAN solution, how is the health of a data plane tunnel monitored?
A. ith IP SLA
B. RP probing
C. sing BFD
D. ith OM
عرض الإجابة
اجابة صحيحة: D
السؤال #17
How does a fabric AP fit in the network?
A. t is in local mode and must be connected directly to the fabric edge switch
B. t is in FlexConnect mode and must be connected directly to the fabric border node
C. t is in FlexConnect mode and must be connected directly to the fabric edge switch
D. t is in local mode and must be connected directly to the fabric border node
عرض الإجابة
اجابة صحيحة: C
السؤال #18
Which definition describes JWT in regard to REST API security?
A. n encrypted JSON token that is used for authentication
B. n encrypted JSON token that is used for authorization
C. n encoded JSON token that is used to securely exchange Information
D. n encoded JSON token that is used for authenticatio
عرض الإجابة
اجابة صحيحة: DE
السؤال #19
A customer has two Cisco WLCs that manage separate APs throughout a building. Each WLC advertises the same SSID but terminates on different interfaces. Users report that they drop their connections and change IP addresses when roaming. Which action resolves this issue?
A. onfigure mobility groups
B. nable client load balancing
C. onfigure high availability
D. nable fast roaming
عرض الإجابة
اجابة صحيحة: B
السؤال #20
How is OAuth framework used in REST API?
A. y providing the external application a token that authorizes access to the account
B. s a framework to hash the security information in the REST URL
C. y providing the user credentials to the external application
D. s a framework to hide the security information in the REST UR
عرض الإجابة
اجابة صحيحة: A
السؤال #21
What is the recommended minimum SNR for data applications on wireless networks?
A. 0
B. 5
C. 0
D.
عرض الإجابة
اجابة صحيحة: AB
السؤال #22
Which DNS record type is required to allow APs to discover a WLC by using DNS on IPv4?
A. OA
B. S
C. X
D.
عرض الإجابة
اجابة صحيحة: A
السؤال #23
Which security measure mitigates a man-in-the-middle attack of a REST API?
A. SL certificates
B. onrepudiation feature
C. assword hash
D. iometric authenticatio
عرض الإجابة
اجابة صحيحة: C
السؤال #24
When does Cisco DNA Center make changes to a device?
A. ow-latency queuing
B. etwork-based application recognition
C. lass-based traffic shaping
D. lass-based weighted fair queuin
عرض الإجابة
اجابة صحيحة: D
السؤال #25
In a Cisco DNA Center Plug and Play environment, why would a device be labeled unclaimed?
A. he device has not been assigned a workflow
B. he device could not be added to the fabric
C. he device had an error and could not be provisioned
D. he device is from a third-party vendor
عرض الإجابة
اجابة صحيحة: B
السؤال #26
Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial?
A. nder traffic classification and marking conditions
B. nder interface saturation conditions
C. nder network convergence conditions
D. nder all network condition
عرض الإجابة
اجابة صحيحة: A
السؤال #27
Which three resources must the hypervisor make available to the virtual machines?
A. emory
B. andwidth
C. P address
D. rocessor
E. torage
F. ecure acces
عرض الإجابة
اجابة صحيحة: B
السؤال #28
In a Cisco Catalyst switch equipped with two supervisor modules, an administrator must temporarily remove the active supervisor from the chassis to perform hardware maintenance on it. Which mechanism ensures that the active supervisor removal is not disruptive to the network operation?
A. SO
B. SF/NSR
C. RRP
D. SR
عرض الإجابة
اجابة صحيحة: C
السؤال #29
Why is an AP joining a different WLC than the one specified through option 43?
A. he APs broadcast traffic is unable to reach the WLC through Layer 2
B. he AP multicast traffic is unable to reach the WLC through Layer 3
C. he WLC is running a different software version
D. he AP is joining a primed WLC
عرض الإجابة
اجابة صحيحة: A
السؤال #30
What is a difference between Chef and other automation tools?
A. hef is an agentless tool that uses playbooks, and Ansible is an agent-based tool that uses cookbooks
B. hef is an agentless tool that uses a primary/minion architecture, and SaltStack is an agent-based tool that uses a primary/secondary architecture
C. hef uses Domain Specific Language, and Puppet uses Ruby
D. hef is an agent-based tool that uses cookbooks, and Ansible is an agentless tool that uses playbooks
عرض الإجابة
اجابة صحيحة: C
السؤال #31
How is CAPWAP data traffic encapsulated when running an Over the Top WLAN in a Cisco SD-Access wireless environment?
A. ISP
B. XLAN
C. RE
D. Pse
عرض الإجابة
اجابة صحيحة: D
السؤال #32
What is the role of the vSmart controller in a Cisco SD-WAN environment?
A. t performs authentication and authorization
B. t manages the control plane
C. t is the centralized network management system
D. t manages the data plan
عرض الإجابة
اجابة صحيحة: C
السؤال #33
An engineer must configure a new WLAN that supports 802.11r and requires users to enter a passphrase. What must be configured to support this requirement?
A. 02
B. T PSK and SUITEB-1X
C. 02
D. T PSK and Fast Transitio
عرض الإجابة
اجابة صحيحة: C
السؤال #34
In a Cisco SD-Access wireless architecture, which device manages endpoint ID to edge node bindings?
A. abric control plane node
B. abric wireless controller
C. abric border node
D. abric edge nod
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: