Which feature is required for graceful restart to recover from a processor failure?
ACisco Express Forwarding
BVirtual Switch System
CStateful Switchover
DBidirectional Forwarding Detection
Which solution allows overlay VNs to communicate with each other in an SD-WAN Architecture?
AExternal fusion routers can be used to map VNs to VRFs and selectively route traffic between VRFs.
BGRE tunneling can be configured between fabric edges to connect one VN to another.
CSGTs can be used to permit traffic from one VN to another.
DRoute leaking can be used on the fabric border nodes to inject routes from one VN to another.
An engineer is designing a multicast network for a financial application. Most of the multicast sources also receive multicast traffic (many-to-many deployment model). To better scale routing tables, the design must not use source trees. Which multicast protocol satisfies these requirements?
APIM-SSM
BPIM-SM
CMSDP
DBIDIR-PIM
Which PIM mode uses a shared tree only?
Abidirectional
Bsparse
Cdense
Dsource-specific
Which design element should an engineer consider when multicast is included in a Cisco SD-Access architecture?
APIM SSM must run in the underlay.
BMulticast clients reside in the underlay, and the multicast source is outside the fabric or in the overlay.
CRendezvous points must be used in a PIM SSM deployment.
DMulticast traffic is transported in the overlay and the EID space for wired and wireless clients.
A client is moving to Model-Driven Telemetry and requires periodic updates. What must the network architect consider with this design?
AUpdates that contain changes within the data are sent only when changes occur.
BEmpty data subscriptions do not generate empty update notifications.
CPeriodic updates include a full copy of the data that is subscribed to.
DThe primary push update is sent immediately and cannot be delayed.
An infrastructure team is concerned about the shared memory utilization of a device, and for this reason, they need to monitor the device state. Which solution limits impact on the device and provides the required data?
AIPFIX
Bstatic telemetry
Con-change subscription
Dperiodic subscription
A company with multiple service providers wants to speed up BGP convergence time in the event a failure occurs with their primary link. Which approach achieves this goal and does not impact router CPU utilization?
AUtilize BFD and tune the multiplier to 50
BLower the BGP hello interval
CDecrease the BGP keepalive timer
DUtilize BFD and keep the default BGP timers
Which two steps can be taken to improve convergence in an OSPF network? (Choose two.)
AUse Bidirectional Forwarding Detection
BMerge all the areas into one backbone area
CTune OSPF parameters
DMake all non-backbone areas stub areas
ESpan the same IP network across multiple areas.
Refer to the exhibit. EIGRP has been configured on all links. The spoke nodes have been configured as EIGRP stubs, and the WAN links to R3 have higher bandwidth and lower delay than the WAN links to R4. When a link failure occurs at the R1-R2 link, what happens to traffic on R1 that is destined for a subnet attached to R2?
AR1 has no route to R2 and drops the traffic
BR1 load-balances across the paths through R3 and R4 to reach R2
CR1 forwards the traffic to R3, but R3 drops the traffic
DR1 forwards the traffic to R3 in order to reach R2
Which design consideration must be made when using IPv6 overlay tunnels?
AOverlay tunnels that connect isolated IPv6 networks are considered a final IPv6 network architecture.
BOverlay tunnels should only be considered as a transition technique toward a permanent solution.
COverlay tunnels should be configured only between border devices and require only the IPv6 protocol stack.
DOverlay tunneling encapsulates IPv4 packets in IPv6 packets for delivery across an IPv6 infrastructure.
An engineer is working for a large cable TV provider that requires multiple sources streaming video on different channels using multicast with no rendezvous point.
Which multicast protocol meets these requirements?
APIM-SM
BPIM-SSM
Cany-source multicast
DBIDIR-PIM
How do endpoints inside an SD-Access network reach resources outside the fabric?
Aa VRF fusion router is used to map resources in one VN to another VN
BFabric borders use VRFs to map VNs to VRFs
CSD-Access transit links are used to transport encapsulated traffic from one fabric to another
DA fabric edge is used to de-encapsulate VXLAN traffic to normal IP traffic then transported over the outside network
Which two border nodes are available in the Cisco SD-Access architecture? (Choose two.)
Aextended border
Bedge border
Cinternal border
Danywhere border
Eintermediate border
An engineer is upgrading a company's main site to include a connection to a second ISP. The company will receive full Internet routing tables from both ISPs via
BGP. The engineer must ensure that the company does not become a transit autonomous system. Which solution should be included in this design?
ATag incoming routes from both ISPs with BGP community no-export.
BLower the MED for updates sent to the secondary ISP.
CUse a route-map to prevent all prefixes from being advertised to either ISP.
DModify the local-preference for routes incoming from the primary ISP.
Which control-plane technology allows the same subnet to exist across multiple network locations?
ALISP
BVXLAN
CFabricPath
DISE mobility services
In an SD-WAN architecture, which methods are used to bootstrap a vEdge router?
ADHCP options or manual configuration
BvManage or DNS records
CZTP or manual configuration
DDNS records or DHCP options
Which component of Cisco SD-Access integrates with Cisco DNA Center to perform policy segmentation and enforcement through the use of security group access control lists and security group tags?
An organization is designing a detailed QoS plan that limits bandwidth to specific rates. Which two parameters are supported by the traffic policing feature?
(Choose two.)
Aviolating
Bmarking
Cshaping
Dbursting
Econforming
Which design consideration should be observed when EIGRP is configured on Data Center switches?
APerform manual summarization on all Layer 3 interfaces to minimize the size of the routing table.
BPrevent unnecessary EIGRP neighborships from forming across switch virtual interfaces.
CLower EIGRP hello and hold timers to their minimum settings to ensure rapid route reconvergence.
DConfigure multiple EIGRP autonomous systems to segment Data Center services and applications.
A network solution is being designed for a company that connects to multiple Internet service providers. Which Cisco proprietary BGP path attribute will influence outbound traffic flow?
ALocal Preference
BMED
CWeight
DAS Path
ECommunity
A company is using OSPF between its HQ location and a branch office. HQ is assigned area 0 and the branch office is assigned area 1. The company purchases a second branch office, but due to circuit delays to HQ, it decides to connect the new branch office to the existing branch office as a temporary measure. The new branch office is assigned to area 2. Which OSPF configuration enables all three locations to exchange routes?
AThe existing branch office must be configured as a stub area
BA virtual link must be configured between the new branch office and HQ
CA sham link must be configured between the new branch office and HQ
DThe new branch office must be configured as a stub area
Refer to the exhibit. Which solution decreases the EIGRP convergence time?
AEnable subsecond timers
BIncrease the hold time value
CIncrease the dead timer value
DEnable stub routing on the spokes
Which QoS feature responds to network congestion by dropping lower priority packets?
ACBWFQ
Btail drop
CWRED
Dstrict priority
Which design consideration must be made when dual WAN Edge routers are deployed at a branch site?
AUse BGP AS-path prepending to influence egress traffic and use MED to influence ingress traffic from the branch.
BHSRP priorities must match the OMP routing policy to prefer one WAN Edge over the other.
CTraffic must be symmetrical as it egresses the WAN Edges and returns from remote sites for DPI to function properly.
DConfigure BFD between WAN Edge routers to detect sub-second link failures.