Exam 38: Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An engineer must protect their company against ransomware attacks. Which solution allows the engineer to block the execution stage and prevent file encryption?

(Multiple Choice)
4.9/5
(34)

Refer to the exhibit. Refer to the exhibit.   MTU has been configured on the underlying physical topology, and no MTU command has been configured on the tunnel interfaces. What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared? MTU has been configured on the underlying physical topology, and no MTU command has been configured on the tunnel interfaces. What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared?

(Multiple Choice)
4.8/5
(37)

Which technology is used to provide Layer 2 and Layer 3 logical networks in the Cisco SD-Access architecture?

(Multiple Choice)
4.9/5
(27)

Which two pieces of information are necessary to compute SNR? (Choose two.)

(Multiple Choice)
4.8/5
(41)

Which two protocols are used with YANG data models? (Choose two.)

(Multiple Choice)
4.8/5
(30)

  Refer to the exhibit. Communication between London and New York is down. Which command set must be applied to resolve this issue? Refer to the exhibit. Communication between London and New York is down. Which command set must be applied to resolve this issue?

(Multiple Choice)
4.9/5
(33)

What are two device roles in Cisco SD-Access fabric? (Choose two.)

(Multiple Choice)
4.8/5
(34)

Which NGFW mode blocks flows crossing the firewall?

(Multiple Choice)
4.8/5
(25)

  Refer to the exhibit. A network engineer configures a GRE tunnel and enters the show interface tunnel command. What does the output confirm about the configuration? Refer to the exhibit. A network engineer configures a GRE tunnel and enters the show interface tunnel command. What does the output confirm about the configuration?

(Multiple Choice)
4.9/5
(35)

Which protocol infers that a YANG data model is being used?

(Multiple Choice)
4.9/5
(33)

Refer to the exhibit. Refer to the exhibit.   Which statement about the OSPF debug output is true? Which statement about the OSPF debug output is true?

(Multiple Choice)
4.9/5
(35)

A company plans to implement intent-based networking in its campus infrastructure. Which design facilitates a migration from a traditional campus design to a programmable fabric design?

(Multiple Choice)
4.8/5
(39)

What are two reasons a company would choose a cloud deployment over an on-prem deployment? (Choose two.)

(Multiple Choice)
4.9/5
(32)

Which First Hop Redundancy Protocol should be used to meet a design requirement for more efficient default gateway bandwidth usage across multiple devices?

(Multiple Choice)
4.8/5
(35)

Which benefit is offered by a cloud infrastructure deployment but is lacking in an on-premises deployment?

(Multiple Choice)
4.7/5
(37)

What is the difference between CEF and process switching?

(Multiple Choice)
4.9/5
(34)

Which feature of EIGRP is not supported in OSPF?

(Multiple Choice)
4.9/5
(43)

What are two considerations when using SSO as a network redundancy feature? (Choose two.)

(Multiple Choice)
4.9/5
(38)

Which two statements about VRF-Lite are true? (Choose two.)

(Multiple Choice)
4.9/5
(38)

Which two entities are Type 1 hypervisors? (Choose two.)

(Multiple Choice)
5.0/5
(29)
Showing 101 - 120 of 260
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)