A customer deploys a new wireless network to perform location-based services using Cisco DNA Spaces.
The customer has a single WLC located on-premises in a secure data center.
The security team does not want to expose the WLC to the public Internet.
Which solution allows the customer to securely send RSSI updates to Cisco DNA Spaces?
A.Implement Cisco Mobility Services Engine
B.Replace the WLC with a cloud-based controller.
C.Perform tethering with Cisco DNA Center.
D.Deploy a Cisco DNA Spaces connector as a VM.
What does a YANG model provide?
A.standardized data structure independent of the transport protocols
B.creation of transport protocols and their interaction with the OS
C.user access to interact directly with the CLI of the device to receive or modify network configurations
D.standardized data structure that can be used only with NETCONF or RESTCONF transport protocols
Refer to the exhibit. Assuming all links are functional, which path does PC1 take to reach DSW1?
A.PC1 goes from ALSW1 to DSW2 to CORE to DSW1.
B.PC1 goes from ALSW1 to DSW2 to DSW1.
C.PC1 goes from ALSW1 to DSW1.
D.PC1 goes from ALSW1 to DSW2 to ALSW2 to DSW1.
Refer to the exhibit. Which set of commands is required to configure and verify the VRF for Site 1 Network A on router R1?
By default, which virtual MAC address does HSRP group 22 use?
Refer to the exhibit. An engineer must protect the CPU of the router from high rates of NTP, SNMP, and SSH traffic.
Which two configurations must be applied to drop these types of traffic when it continuously exceeds 320 kbps? (Choose two)
Based on the router's API output In JSON format below, which Python code will display the value of the 'role' key?
Refer to the exhibit. Which configuration is required to summarize the Area 2 networks that are advertised to Area 0?
A customer has a wireless network deployed within a multi-tenant building. The network provides client access, location-based services, and is monitored using Cisco DNA Center.
The security department wants to locate and track malicious devices based on threat signatures.
Which feature is required for this solution?
A.Cisco aWIPS policies on the WLC
B.Cisco aWIPS policies on Cisco DNA Center
C.malicious rogue rules on the WLC
D.malicious rogue rules on Cisco DNA Center
Refer to the exhibit. An engineer configures a trunk between SW1 and SW2 but tagged packets are not passing. Which action fixes the issue?
A.Configure SW1 with dynamic auto mode on interface FastEthernet0/1.
B.Configure the native VLAN to be the same VLAN on both switches on interface FastEthernet0/1.
C.Configure SW2 with encapsulation dot1q on interface FastEthernet0/1.
D.Configure FastEthernet0/1 on both switches for static trunking.
In a Cisco SD-Access wireless environment, which device is responsible for hosting the anycast gateway?
B.control plane node
C.fabric border node
D.fabric edge node
2022 Latest Braindump2go 350-401 PDF and 350-401 VCE Dumps Free Share: