New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 300-540 - Designing and Implementing Cisco Service Provider Cloud Network Infrastructure (SPCNI v1.0)

Page: 2 / 2
Total 61 questions

Refer to the exhibit. An engineer must configure an IPsec VPN connection between site 1 and site 2. The indicated configuration was applied to router R1; however, the tunnel fails to come up. Which command must be run on R1 to resolve the issue?

A.

set peer 10.1.0.1

B.

set peer 192.168.20.2

C.

set peer 192.168.10.1

D.

set peer 10.2.0.1

Which type of cyberattack does Cisco Umbrella DNS-layer security effectively help mitigate?

A.

Phishing and malware-based attacks

B.

DDoS attacks targeting specific servers

C.

Brute force attacks on user accounts

D.

Advanced persistent threats and zero-day exploits

What is a benefit of using VXLANs in a cloud-scale environment?

A.

extends Layer 2 segments across the underlying Layer 3 infrastructure

B.

extends Layer 3 segments across the underlying Layer 2 infrastructure

C.

reduces spanning-tree complexity across the Layer 2 infrastructure

D.

eliminates the need for a Layer 3 underlay in the service provider infrastructure

Refer to the exhibit. An engineer is troubleshooting a Cisco NFVI issue where the management node fails to start. Which service must be restarted to resolve the issue?

A.

docker-kibana

B.

docker

C.

kube-apiserver

D.

docker-cobbler

Refer to the exhibit. An engineer must design a solution that allows a user to choose which private Cisco Catalyst SD-WAN network they want to connect to AWS. The solution must automatically identify the AWS VPC and other cloud services based on the user credentials. What must be used?

A.

AWS Direct Connect

B.

Transit VPC for AWS

C.

IPsec VPN

D.

Segment routing

What does Cisco Always-On Cloud DDoS use to protect against DDoS attacks?

A.

Load balancing

B.

Botnet zombies

C.

Traffic mirroring

D.

Scrubbing centers

How does log management assist in meeting the requirements of cloud security regulatory compliance?

A.

by supporting documentation and reporting processes

B.

by streamlining resource allocation across cloud environments

C.

by providing enhanced interoperability between cloud platforms

D.

by boosting the security of cloud-based applications

Refer to the exhibit. An engineer must configure multihoming between router R1 and service providers SP-1 and SP-2. Locally generated routes must be advertised to the service providers, and should prevent the risk that the local autonomous system becomes a transit AS for Internet traffic. Which two commands must be run on R1 to complete the configuration? (Choose two.)

A.

neighbor 172.16.1.1 filter-list 300 out

B.

neighbor 172.16.2.1 filter-list 400 out

C.

neighbor 172.16.1.1 filter-list 1 out

D.

neighbor 172.16.2.1 filter-list 1 out

E.

neighbor 172.16.1.1 filter-list 200