Pre-Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

300-440 Leak Questions

Page: 2 / 3
Total 38 questions

Designing and Implementing Cloud Connectivity (ENCC) Questions and Answers

Question 5

Which method is used to create authorization boundary diagrams (ABDs)?

Options:

A.

identify only interconnected systems that are FedRAMP-authorized

B.

show all networks in CIDR notation only

C.

identify all tools as either external or internal to the boundary

D.

show only minor or small upgrade level software components

Question 6

An engineer must use Cisco vManage to configure an application-aware routing policy Drag and drop the steps from the left onto the order on the right to complete the configuration.

Options:

Question 7

An engineer must edit the settings of a site-to-site IPsec VPN connection between an on-premises Cisco IOS XE router and Amazon Web Services (AWS). IPsec must be configured to support multiple peers and failover after 120 seconds of idle time on the first entry of the crypto map named Cisco. Drag and drop the commands from the left onto the order on the right.

Options:

Question 8

Refer to the exhibit.

Refer to the exhibits. An engineer troubleshoots a Cisco SD-WAN connectivity issue between an on-premises data center WAN Edge and a public cloud provider WAN Edge. The engineer discovers that BFD is Dapping on vEdge1. What is the problem?

Options:

A.

The remote Edge device BFD is down.

B.

The remote Edgedevice failed to respond BFD keepalives.

C.

The remote Edge device has a duplicate IP address.

D.

The control plane deleted the BFD session.

Page: 2 / 3
Total 38 questions