Where is port security often found in the classic three tier networking model of Cisco Systems?
A. Core
B. Access
C. Distribution
D. Backbone
B. Access
What is the technology used for the control plane of the overlay in a Cisco SD-Access solution
A. CTS
B. VXLAN
C. LISP
D. IS-IS
C. LISP
Breakdown of Cisco SD-Access Control Plane Technologies
In Cisco SD-Access architecture:
* LISP (Locator/ID Separation Protocol) is used as the control plane for the overlay network.
* It separates the device identity (Endpoint Identifier, EID) from its location (Routing Locator, RLOC).
* This enables efficient endpoint mobility and scalable routing within the fabric.
* VXLAN (Virtual Extensible LAN) is used as the data plane encapsulation protocol.
* It encapsulates Layer 2 frames in Layer 3 packets, allowing for scalable network virtualization.
* CTS (Cisco TrustSec) is used for security and policy enforcement, not for control or data plane functions.
* IS-IS is a traditional routing protocol, but not used as the control plane in SD-Access overlays.
Why might you choose a cloud solution over on-premises?
A. reatest level of control over the solution
B. CapEx instead of OpEx
C. Long contract lengths
D. Rapid provisioning
E. Pay up front models
D. Rapid provisioning
What enhancement of VXLAN is used for optimized use in a Cisco SD-Access solution?
A. NVI
B. VNID
C. VNI
D. SGT
E. VTEP
C. VNI
In SD-Access:
* VNI enables scalable Layer 2/Layer 3 segmentation.
* SGT works alongside VXLAN to enforce security policies.
* VTEPs are typically fabric edge nodes that handle VXLAN encapsulation.
What are the LACP modes of operation? Choose two.
A. On
B. Active
C. Desirable
D. Auto
E. Passive
B. Active
E. Passive
You are troubleshooting BGP and you would like to view a list of your BGP peers in a succinct table form. Which command should you use?
A. show ip bgp hosts
B. show ip bgp summary
C. show ip bgp
D. show ip bgp neighbors
B. show ip bgp summary
What do you use with an IP SLA to do sophisticated tests?
A. A WLC
B. Any IP-based host system
C. Nexus 9000 series device
D. Nexus 7000 series device
E. RTR Responder
E. RTR Responder
What asset tag technology can function with the location services of Cisco WLAN technologies?
A. CCX
B. 802.1X
C. RSSI
D. RFID
D. RFID
What component does a Virtual Machine often connect to?
A. Virtual cloud
B. Virtual router
C. Virtual switch
D. Virtual fabric
C. Virtual switch
What are two responsibilities for a fabric edge node in the Cisco SD-Access solution? (Choose 2)
A. ISP endpoint registration
B. Route traffic to an external Layer 3 network
C. VXLAN encapsulation/de-encapsulation
D. Encapsulate the data plane traffic into LISP
B. Route traffic to an external Layer 3 network
C. VXLAN encapsulation/de-encapsulation
The two correct responsibilities of a fabric edge node in a Cisco SD-Access solution are:
✅ B. Route traffic to an external Layer 3 network
✅ C. VXLAN encapsulation/de-encapsulation
🔍 Explanation of Each Option
🧠 Fabric Edge Node Responsibilities (Cisco SD-Access)
* Acts as the onboarding point for wired endpoints.
* Performs VXLAN encapsulation/de-encapsulation for traffic entering and exiting the fabric.
* Registers endpoint identity (EID) with the LISP control plane.
* Provides anycast Layer 3 gateway functionality.
* Enforces group-based policies using Security Group Tags (SGTs).
With the three-tier design model, each layer is focused on set roles for the network. Which layer provisions policy-based connectivity according to this model?
A. Core
B. Distribution
C. Access
D. Flat network
B. Distribution
which of the following should be considered in fabric capacity planning for your enterprise network design? (Choose 2)
A. 3-tier design sufficiency
B. 2-tier design sufficiency
C. Total network bandwidth utilization
D. Per switch bandwidth utilization
C. Total network bandwidth utilization
D. Per switch bandwidth utilization
Why These Matter
* Total network bandwidth utilization helps you understand aggregate traffic demands across the fabric. This is essential for sizing uplinks, core capacity, and ensuring the network can handle peak loads without congestion.
* Per switch bandwidth utilization ensures that individual switches (especially edge and distribution nodes) are not overwhelmed. This helps prevent bottlenecks and supports efficient traffic flow across the fabric.
What are the characteristics of the distributed WLC deployment within a campus network? Choose all that apply
A. Only one WLC is needed
B. WLCs connected through distribution routers
C. WLCs can have separate RF and mobility groups
D. CAPWAP tunnels stay within the building.
B. WLCs connected through distribution routers
C. WLCs can have separate RF and mobility groups
Key Traits of Distributed WLC Deployment
* Each site or building may have its own WLC.
* CAPWAP tunnels terminate locally, reducing backhaul traffic.
* RF and mobility groups can be customized per location.
* Enhances scalability and fault isolation.
Which best characterizes an on-premises deployment design? Choose 2
A. Uses company’s infrastructure
B. Uses provider’s infrastructure
C. Complete control
D. Shared control
A. Uses company’s infrastructure
C. Complete control
You have a lightweight access point Cisco WiFi network in your enterprise. You have been asked to configure local web authentication in this area. What device is responsible for presenting this authentication to the clients?
A. The foreign WLC
B. The anchor WLC
C. The local WLC
D. The ISE
C. The local WLC
Local Web Authentication = WLC-hosted portal
External Web Authentication = ISE or external server-hosted portal
In a Cisco Wi-Fi network using lightweight access points, Local Web Authentication (LWA) is a method where the Wireless LAN Controller (WLC) itself hosts and presents the web portal for client authentication.
* The local WLC is responsible for:
* Redirecting unauthenticated clients to the web portal.
* Hosting the login page (or redirecting to an external server, if configured).
* Applying access control policies based on authentication results.
You are configuring a new gateway in your Enterprise, and you notice the command no vrrp preempt. What is the purpose of this command?
A. This command ensures that a gateway with a higher priority value immediately becomes the new master device in the VRRP group
B. This command ensures that a standby device cannot become the master device due to a priority change
C. This command ensures that VRRP version 2 is in use
D. This command ensures that there is automated load balancing in the VRRP group
B. This command ensures that a standby device cannot become the master device due to a priority change
What is a key difference between OSPF and EIGRP?
A. OSPF is a hybrid protocol
B. EIGRP can load balance unequal cost paths
C. EIGRP uses a cost metric
D. OSPF uses a composite metric
B. EIGRP can load balance unequal cost paths
There are API response codes you should be familiar with when working with RESTful APIs and your Cisco equipment. Which of these categories represent success, client problems, and server problems? (Choose 3)
A. 100
B. 200
C. 300
D. 400
E. 500
B. 200
D. 400
E. 500
Cisco SD-Access is composed of an underlay and overlay network. What defines the underlay, when deploying the SD-Access network? Choose 2
A. Physical routers and switches
B. Establishing IP connectivity via routing protocols
C. Virtualized networking
D. Using VRFs
A. Physical routers and switches
B. Establishing IP connectivity via routing protocols
Which is the purpose of the control plane node in SD-Access?
A. Encapsulates data packets
B. tracks all endpoints in the SD-Access network
C. Associates them to an RLOC
D. Secures and segments
D. Secures and segments
What are the two namespaces used by LISP for traffic forwarding?
A. FQDN
B. NetBIOS
C. EID
D. RLOC
Q: What does the mnemonic OCEAN stand for in OSPF?
O – Open standard
* C – Cost metric (based on bandwidth)
* E – Equal-cost load balancing only
* A – Algorithm: SPF (Dijkstra)
* N – Narrow scope (pure link-state)
What does the mnemonic BEAD stand for in EIGRP?
B – Balanced hybrid protocol
* E – Efficient composite metric (bandwidth, delay, reliability, load)
* A – Adaptive load balancing (supports unequal-cost paths)
* D – DUAL algorithm (Diffusing Update Algorithm)
Which protocol supports unequal-cost load balancing?
EIGRP