Cisco (350-401-ENCOR) Exam Questions And Answers page 48
In a Cisco SD-Access solution, what is the role of a fabric edge node?
to connect wired endpoints to the SD-Access fabric
to advertise fabric IP address space to external networks
to connect the fusion router to the SD-Access fabric
Infrastructure
Network Assurance
Which Cisco FlexConnect state allows wireless users that are connected to the network to continue working after the connection to the WLC has been lost?
Authentication Down/Switching Down
Authentication-Central/Switch-Local
Authentication-Central/Switch-Central
Authentication-Down/Switch-Local
Infrastructure
Security
RouterA s Serial 0/0 interface is connected to RouterB. RouterA s Serial 0/1 interface is connected to RouterC. You issue the debug ppp authentication on RouterA and then transition all connected interfaces to the up state.
Next, you issue the show debug condition command on RouterA and receive the following output:
Using the least amount of administrative effort, which of the following should you issue to receive PPP authentication debug output from both RouterB and RouterC? (Select the best answer.)
Next, you issue the show debug condition command on RouterA and receive the following output:
Using the least amount of administrative effort, which of the following should you issue to receive PPP authentication debug output from both RouterB and RouterC? (Select the best answer.)
no debug alldebug condition interface serial 0/0 -0/1 debug condition username JohnnyB debug ppp authentication
debug condition interface serial 0/1
no debug alldebug condition interface serial 0/0 debug condition interface serial 0/1 debug condition username JohnnyB debug ppp authentication
no debug condition interface all
Virtualization
Network Assurance
Refer to the exhibit. An engineer must deny HTTP traffic from host A to host B while allowing all other communication between the hosts. Drag and drop the commands into the configuration to achieve these results. Some commands may be used more than once. Not all commands are used.
Network Assurance
Security
Refer to the exhibit.
An engineer must create a script that appends the output of the show process cpu sorted command to a file. Which action completes the configuration?
An engineer must create a script that appends the output of the show process cpu sorted command to a file. Which action completes the configuration?
action 4.0 syslog command "show process cpu sorted | append flash:high-cpu-file"
action 4.0 cli command "show process cpu sorted | append flash:high-cpu-file"
action 4.0 cns-event "show process cpu sorted | append flash:high-cpu-file"
action 4.0 publish-event "show process cpu sorted | append flash:high-cpu-file"
Virtualization
Security
An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy.
Which device presents the web authentication for the WLAN?
Which device presents the web authentication for the WLAN?
ISE server
RADIUS server
anchor WLC
local WLC
Infrastructure
Network Assurance
Refer to the exhibit.
A network engineer is configuring OSPF between router R1 and router R2. The engineer must ensure that a DR/BDR election does not occur on the Gigabit Ethernet interfaces in area 0.
Which configuration set accomplishes this goal?
A network engineer is configuring OSPF between router R1 and router R2. The engineer must ensure that a DR/BDR election does not occur on the Gigabit Ethernet interfaces in area 0.
Which configuration set accomplishes this goal?
R1(config-if)interface Gi0/0
R1(config-if)ip ospf network point-to-point
R2(config-if)interface Gi0/0
R2(config-if)ip ospf network point-to-point
R1(config-if)ip ospf network point-to-point
R2(config-if)interface Gi0/0
R2(config-if)ip ospf network point-to-point
R1(config-if)interface Gi0/0
R1(config-if)ip ospf network broadcast
R2(config-if)interface Gi0/0
R2(config-if)ip ospf network broadcast
R1(config-if)ip ospf network broadcast
R2(config-if)interface Gi0/0
R2(config-if)ip ospf network broadcast
R1(config-if)interface Gi0/0
R1(config-if)ip ospf database-filter all out
R2(config-if)interface Gi0/0
R2(config-if)ip ospf database-filter all out
R1(config-if)ip ospf database-filter all out
R2(config-if)interface Gi0/0
R2(config-if)ip ospf database-filter all out
R1(config-if)interface Gi0/0
R1(config-if)ip ospf priority 1
R2(config-if)interface Gi0/0
R2(config-if)ip ospf priority 1
R1(config-if)ip ospf priority 1
R2(config-if)interface Gi0/0
R2(config-if)ip ospf priority 1
Infrastructure
Network Assurance
Drag and drop the characteristics from the left onto the infrastructure types on the right.
Infrastructure
Refer to the exhibit. Which Python code snippet prints the descriptions of disabled interfaces only?
Infrastructure
Security
What is the recommended MTU size for a Cisco SD-Access Fabric?
4464
17914
9100
1500
Virtualization
Infrastructure
Comments