Question 251
            
                    
                    
Which command set configures RSPAN to capture outgoing traffic from VLAN 3 on interface GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface?
                        
                        
                        
                            
                                A. monitor session 2 source interface gigabitethernet0/3 rx monitor session 2 filter vlan 3 
                            
                            
                        
                        
                        
                            
                                B. monitor session 2 source interface gigabitethernet0/3 rx monitor session 2 filter vlan 1 - 2, 4 - 4094 
                            
                            
                        
                        
                        
                            
                                C. monitor session 2 source interface gigabitethernet0/3 tx monitor session 2 filter vlan 3 
                            
                            
                        
                        
                        
                            
                                D. monitor session 2 source interface gigabitethernet0/3 tx monitor session 2 filter vlan 1- 2, 4 - 4094 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 252
            
                    
                    Refer to the exhibit. What is required to configure a second export destination for IP address 192.168.10.1?
                        
                         
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. Specify a different UDP port. 
                            
                            
                        
                        
                        
                            
                                B. Specify a different TCP port. 
                            
                            
                        
                        
                        
                            
                                C. Configure a version 5 flow-export to the same destination. 
                            
                            
                        
                        
                        
                            
                                D. Specify a different flow ID. 
                            
                            
                        
                        
                        
                            
                                E. Specify a VRF. 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                 
             
     
     
     
     
     
            
            Question 253
            
                    
                    Refer to the exhibit. After implementing the configuration, 172.20.20.2 stops replying to ICMP echos, but the default route fails to be removed. What is the reason for this behavior?
                        
                         
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. The threshold value is wrong. 
                            
                            
                        
                        
                        
                            
                                B. The source-interface is configured incorrectly. 
                            
                            
                        
                        
                        
                            
                                C. The destination must be 172.30.30.2 for icmp-echo. 
                            
                            
                        
                        
                        
                            
                                D. The default route is missing the track feature. 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                 
             
     
     
     
     
     
            
            Question 254
            
                    
                    Refer to the exhibit.An engineer is troubleshooting a connectivity issue and executes a traceroute. What does the result confirm?
                        
                         
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. The destination port is unreachable. 
                            
                            
                        
                        
                        
                            
                                B. The probe timed out. 
                            
                            
                        
                        
                        
                            
                                C. The destination server reported it is too busy. 
                            
                            
                        
                        
                        
                            
                                D. The protocol is unreachable. 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                 
             
     
     
     
     
     
            
            Question 255
            
                    
                    
Which Cisco DNA Center application is responsible for group-based access control permissions?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. Provision 
                            
                            
                        
                        
                        
                            
                                B. Design 
                            
                            
                        
                        
                        
                            
                                C. Assurance 
                            
                            
                        
                        
                        
                            
                                D. Policy 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
	
     
     
            
            Question 256
            
                    
                    
An engineer is concerned with the deployment of a new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. Router(config)# ip sla responder udp-connect 172.29.139.134 5000 
                            
                            
                        
                        
                        
                            
                                B. Router(config)# ip sla responder tcp-connect 172.29.139.134 5000 
                            
                            
                        
                        
                        
                            
                                C. Router(config)# ip sla responder udp-echo 172.29.139.134 5000 Most Voted 
                            
                            
                        
                        
                        
                            
                                D. Router(config)# ip sla responder tcp-echo 172.29.139.134 5000 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 257
            
                    
                    
Which NGFW mode blocks flows crossing the firewall?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. tap 
                            
                            
                        
                        
                        
                            
                                B. inline 
                            
                            
                        
                        
                        
                            
                                C. passive 
                            
                            
                        
                        
                        
                            
                                D. inline tap 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 258
            
                    
                    
How does Cisco TrustSec enable more flexible access controls for dynamic networking environments and data centers?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. uses flexible NetFlow 
                            
                            
                        
                        
                        
                            
                                B. assigns a VLAN to the endpoint 
                            
                            
                        
                        
                        
                            
                                C. classifies traffic based on advanced application recognition 
                            
                            
                        
                        
                        
                            
                                D. classifies traffic based on the contextual identity of the endpoint rather than its IP address 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                
             
     
     
     
     
     
            
            Question 259
            
                    
                    The login method is configured on the VTY lines of a router with these parameters: *The first method for authentication is TACACS *If TACACS is unavailable, login is allowed without any provided credentials? Which configuration accomplishes this task?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. 
                            
                            
                                 
                            
                            
                        
                        
                        
                            
                                B. 
                            
                            
                                 
                            
                            
                        
                        
                        
                            
                                C. 
                            
                            
                                 
                            
                            
                        
                        
                        
                            
                                D. 
                            
                            
                                 
                            
                            
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                 
             
     
     
     
     
     
            
            Question 260
            
                    
                    
Which feature does Cisco TrustSec use to provide scalable, secure communication throughout a network?
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                        
                            
                                A. security group tag ACL assigned to each port on a switch 
                            
                            
                        
                        
                        
                            
                                B. security group tag number assigned to each user on a switch 
                            
                            
                        
                        
                        
                            
                                C. security group tag number assigned to each port on a network 
                            
                            
                        
                        
                        
                            
                                D. security group tag ACL assigned to each router on a network