Exam 38: Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Refer to the exhibit. Refer to the exhibit.   The WLC administrator sees that the controller to which a roaming client associates has Mobility Role Anchor configured under Clients > Detail. Which type of roaming is supported? The WLC administrator sees that the controller to which a roaming client associates has Mobility Role Anchor configured under Clients > Detail. Which type of roaming is supported?

(Multiple Choice)
4.7/5
(32)

Which two statements about DMVPN with NHRP are true? (Choose two.)

(Multiple Choice)
4.8/5
(42)

Which tool is used in Cisco DNA Center to build generic configurations that are able to be applied on devices with similar network settings?

(Multiple Choice)
4.9/5
(37)

Which two security features are available when implementing NTP? (Choose two.)

(Multiple Choice)
4.8/5
(41)

A local router shows an EBGP neighbor in the Active state. Which statement is true about the local router?

(Multiple Choice)
4.9/5
(34)

Based on this interface configuration, what is the expected state of OSPF adjacency? Based on this interface configuration, what is the expected state of OSPF adjacency?

(Multiple Choice)
4.9/5
(32)

  Refer to the exhibit. Which two facts does the device output confirm? (Choose two.) Refer to the exhibit. Which two facts does the device output confirm? (Choose two.)

(Multiple Choice)
4.9/5
(35)

  Refer to the exhibit. What step resolves the authentication issue? Refer to the exhibit. What step resolves the authentication issue?

(Multiple Choice)
4.9/5
(25)

What are two variants of NTPv4? (Choose two.)

(Multiple Choice)
4.8/5
(39)

A customer has completed the installation of a Wi-Fi 6 greenfield deployment at their new campus. They want to leverage Wi-Fi 6 enhanced speeds on the trusted employee WLAN. To configure the employee WLAN, which two Layer 2 security policies should be used? (Choose two.)

(Multiple Choice)
4.8/5
(39)

Refer to the exhibit. Refer to the exhibit.   An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as the exit point. Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplishes this task? An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as the exit point. Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplishes this task?

(Multiple Choice)
4.7/5
(43)

What mechanism does PIM use to forward multicast traffic?

(Multiple Choice)
4.8/5
(43)

Which component of the Cisco Cyber Threat Defense solution provides user and flow context analysis?

(Multiple Choice)
4.8/5
(28)

  Refer to the exhibit. Which router is the designated router on the segment 192.168.0.0/24? Refer to the exhibit. Which router is the designated router on the segment 192.168.0.0/24?

(Multiple Choice)
4.8/5
(40)

Refer to the exhibit. Refer to the exhibit.   Link1 is a copper connection and Link2 is a fiber connection. The fiber port must be the primary port for all forwarding. The output of the show spanning-tree command on SW2 shows that the fiber port is blocked by spanning tree. An engineer enters the spanning-tree port-priority 32 command on G0/1 on SW2, but the port remains blocked. Which command should be entered on the ports that are connected to Link2 to resolve the issue? Link1 is a copper connection and Link2 is a fiber connection. The fiber port must be the primary port for all forwarding. The output of the show spanning-tree command on SW2 shows that the fiber port is blocked by spanning tree. An engineer enters the spanning-tree port-priority 32 command on G0/1 on SW2, but the port remains blocked. Which command should be entered on the ports that are connected to Link2 to resolve the issue?

(Multiple Choice)
4.9/5
(40)

Which action is performed by Link Management Protocol in a Cisco StackWise Virtual domain?

(Multiple Choice)
4.9/5
(36)

Based on the output below, which Python code shows the value of the "upTime" key? Based on the output below, which Python code shows the value of the upTime key?

(Multiple Choice)
4.7/5
(33)

Refer to the exhibit. Refer to the exhibit.   Which two commands ensure that DSW1 becomes root bridge for VLAN 10? (Choose two.) Which two commands ensure that DSW1 becomes root bridge for VLAN 10? (Choose two.)

(Multiple Choice)
4.8/5
(33)

Which feature does Cisco TrustSec use to provide scalable, secure communication throughout a network?

(Multiple Choice)
4.8/5
(35)

Refer to the exhibit. Refer to the exhibit.   An engineer must deny Telnet traffic from the loopback interface of router R3 to the loopback interface of router R2 during the weekend hours. All other traffic between the loopback interfaces of routers R3 and R2 must be allowed at all times. Which command set accomplishes this task? An engineer must deny Telnet traffic from the loopback interface of router R3 to the loopback interface of router R2 during the weekend hours. All other traffic between the loopback interfaces of routers R3 and R2 must be allowed at all times. Which command set accomplishes this task?

(Multiple Choice)
4.8/5
(41)
Showing 161 - 180 of 260
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)