Which technology reduces the implementation of STP and leverages both unicast and multicast?
A. VLAN
B. VPC
C. VXLAN
D. VSS
Question 572
A customer has recently implemented a new wireless infrastructure using WLC-5520s at a site directly next to a large commercial airport. Users report that they intermittently lose Wi-Fi connectivity, and troubleshooting reveals it is due to frequent channel changes Which two actions fix this issue? (Choose two.)
A. Enable DFS channels because they are immune to radar interference.
B. Restore the DCA default settings because this automatically avoids channel interference.
C. Remove UNII-2 and Extended UNII-2 channels from the 5 Ghz channel list.
D. Disable DFS channels to prevent interference with Doppler radar.
E. Configure channels on the UNII-2 and the Extended UNII-2 sub-bands of the 5 Ghz band only.
Question 573
The Gig0/0 interface of two routers is directly connected with a 1G Ethernet link Which configuration must be applied to the interface of both routers to establish an OSPF adjacency without maintaining a DR/BDR relationship?
A. interface Gig0/0 ip ospf network non-broadcast
B. interface Gig0/0 ip ospf network point-to-multipoint
C. interface Gig0/0 ip ospf network point-to-point
D. interface Gig0/0 ip ospf network broadcast
Question 574
Refer to the exhibit. An engineer configures VRRP and issues the show commands to verify operation. What does the engineer confirm about VRRP group 1 from the output?
A. Communication between VRRP members is encrypted using MD5.
B. There is no route to 10.10.1.1/32 in R2's routing table.
C. R1 is primary if 10.10.1.1/32 is in its routing table.
D. If R1 reboots, R2 becomes the primary virtual router until R2 reboots.
Question 575
DRAG DROP -Drag and drop the Cisco SD-Access solution areas from the left onto the protocols they use on the right. Select and Place:
Question 576
DRAG DROP -An engineer is working with the Cisco DNA Center API. Drag and drop the methods from the left onto the actions that they are used for on the right. Select and Place:
Question 577
DRAG DROP -Drag and drop the characteristics from the left onto the QoS components they describe on the right. Select and Place:
Question 578
What is the function of the LISP map resolver?
A. to connect a site to the LISP-capable part of a core network publish the EID-to-RLOC mappings for the site, and respond to map-request messages
B. to advertise routable non-LISP traffic from one address family to LISP sites in a different address family
C. to send traffic to non-LISP sites when connected to a service provider that does not accept nonroutable EIDs as packet sources
D. to decapsulate map-request messages from ITRs and forward the messages to the MS
Question 579
Refer to the exhibit. An attacker can advertise OSPF fake routes from 172.16.20.0 network to the OSPF domain and black hole traffic. Which action must be taken to avoid this attack and still be able to advertise this subnet into OSPF?
A. Configure 172.16.20.0 as a stub network.
B. Configure graceful restart on the 172.16.20.0 interface.
C. Configure a passive interface on R2 toward 172.16.20.0.
D. Apply a policy to filter OSPF packets on R2.
Question 580
Refer to the exhibit. What is the result when a switch that is running PVST+ is added to this network?
A. Both switches operate in the PVST+ mode.
B. Spanning tree is disabled automatically on the network.
C. Both switches operate in the Rapid PVST+ mode.
D. DSW2 operates in Rapid PVST + and the new switch operates in PVST+.