What are two benefits of network automation? (Choose two)
Choose 2 — select all that apply
Areduced operational costs
Breduced hardware footprint
Cfaster changes with more reliable results
Dfewer network failures
Eincreased network security
Correct Answer:AC
Q24. IP Services
Which command enables a router to become a DHCP client?
Aip address dhcp
Bip helper-address
Cip dhcp pool
Dip dhcp client
Correct Answer:A
If we want to get an IP address from the DHCP server on a Cisco device, we can use the command "ip address dhcp". Note: The command "ip helper-address" enables a router to become a DHCP Relay Agent. Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_dhcp/configuration/12-4/dhcp-12-4-book/config-dhcp-client.html
Q32. Network Access
Which design element is a best practice when deploying an 802.11b wireless infrastructure?
Adisabling TPC so that access points can negotiate signal levels with their attached wireless devices
Bsetting the maximum data rate to 54 Mbps on the Cisco Wireless LAN Controller
Callocating nonoverlapping channels to access points that are in close physical proximity to one another
Dconfiguring access points to provide clients with a maximum of 5 Mbps
Correct Answer:C
Q41. Network Fundamentals
When configuring IPv6 on an interface, which two IPv6 multicast groups are joined? (Choose two) A. 2000::/3
Choose 2 — select all that apply
B2002::5
CFC00::/7
DFF02::1
EFF02::2
Correct Answer:DE
When an interface is configured with IPv6 address, it automatically joins the all nodes (FF02::1) and solicitednode (FF02::1:FFxx:xxxx) multicast groups. The all-node group is used to communicate with all interfaces on the local link, and the solicited-nodes multicast group is required for link-layer address resolution. Routers also join a third multicast group, the all-routers group (FF02::2). Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6/configuration/xe-3s/ipv6-xe-36s-book/ip6-multicast.html
Q5Not categorized
Which option about JSON is true?
Auses predefined tags or angle brackets (<>) to delimit markup text
Bused to describe structured data that includes arrays
Cused for storing information
Dsimilar to HTML, it is more verbose than XML
Correct Answer:B
JSON data is written as name/value pairs. A name/value pair consists of a field name (in double quotes), followed by a colon, followed by a value: “name”:”Mark” JSON can use arrays. Array values must be of type string, number, object, array, boolean or null.. For example: { “name”:”John”, “age”:30, “cars”:[ “Ford”, “BMW”, “Fiat” ] }
Q61. Network Fundamentals
Which IPv6 address type provides communication between subnets and cannot route on the Internet?
Aglobal unicast
Bunique local
Clink-local
Dmulticast
Correct Answer:B
A IPv6 Unique Local Address is an IPv6 address in the block FC00::/7. It is the approximate IPv6 counterpart of the IPv4 private address. It is not routable on the global Internet. Note: In the past, Site-local addresses (FEC0::/10) are equivalent to private IP addresses in IPv4 but now they are deprecated. Link-local addresses only used for communications within the local subnet. It is usually created dynamically using a link-local prefix of FE80::/10 and a 64-bit interface identifier (based on 48-bit MAC address).
Q75. Security Fundamentals
Which command prevents passwords from being stored in the configuration as plaintext on a router or switch?
Aenable secret
Bservice password-encryption
Cusername Cisco password encrypt
Denable password
Correct Answer:B
Q86. Automation and Programmability
What are two southbound APIs? (Choose two)
Choose 2 — select all that apply
AOpenFlow
BNETCONF
CThrift
DCORBA
EDSC
Correct Answer:AB
OpenFlow is a well-known southbound API. OpenFlow defines the way the SDN Controller should interact with the forwarding plane to make adjustments to the network, so it can better adapt to changing business requirements. The Network Configuration Protocol (NetConf) uses Extensible Markup Language (XML) to install, manipulate and delete configuration to network devices. Other southbound APIs are: + onePK: a Cisco proprietary SBI to inspect or modify the network element configuration without hardware upgrades. + OpFlex: an open-standard, distributed control system. It send "summary policy" to
Q95. Security Fundamentals
Which set of action satisfy the requirement for multi-factor authentication?
AThe user swipes a key fob, then clicks through an email link.
BThe user enters a user name and password, and then clicks a notification in an authentication app on a mobile device.
CThe user enters a PIN into an RSA token, and then enters the displayed RSA key on a login screen.
DThe user enters a user name and password and then re-enters the credentials on a second screen.
Correct Answer:B
This is an example of how two-factor authentication (2FA) works: 1. The user logs in to the website or service with their username and password. 2. The password is validated by an authentication server and, if correct, the user becomes eligible for the second factor. 3. The authentication server sends a unique code to the user's second-factor method (such as a smartphone app). 4. The user confirms their identity by providing the additional authentication for their second-factor method.
Q106. Automation and Programmability
Which two capacities of Cisco DNA Center make it more extensible? (Choose two)
Choose 2 — select all that apply
Aadapters that support all families of Cisco IOS software
BSDKs that support interaction with third-party network equipment
Ccustomized versions for small, medium, and large enterprises
DREST APIs that allow for external applications to interact natively with Cisco DNA Center
Emodular design that is upgradable as needed
Correct Answer:BD
Cisco DNA Center offers 360-degree extensibility through four distinct types of platform capabilities: + Intent-based APIs leverage the controller and enable business and IT applications to deliver intent to the network and to reap network analytics and insights for IT and business innovation. + Process adapters, built on integration APIs, allow integration with other IT and network systems to streamline IT operations and processes. + Domain adapters, built on integration APIs, allow integration with other infrastructure domains such as data center, WAN, and security to deliver a consistent in