QUESTION 13 Which three options focus of the current digital business era? (Choose three.)
Explanation The current digital business era is characterized by the rapid growth and adoption of digital technologies that enable companies to improve their business capabilities, operational efficiencies, and customer experiences. According to various sources, such as McKinsey1 and Forbes23, some of the key focus areas of the current digital business era are: IoT scale: The Internet of Things (IoT) refers to the network of physical devices, sensors, and machines that are connected to the internet and can communicate, collect, and exchange data. The IoT scale represents the massive amount and variety of data that are generated and processed by the IoT devices, as well as the potential value and insights that can be derived from them. The IoT scale also poses new challenges and opportunities for businesses, such as enhancing customer engagement, optimizing operations, creating new products and services, and ensuring security and privacy45. Automation: Automation refers to the use of technology to perform tasks or processes that would otherwise require human intervention or effort. Automation can increase productivity, efficiency, accuracy, and consistency, as well as reduce costs, errors, and risks. Automation can also enable businesses to scale up or down their operations, respond to changing customer demands, and innovate faster. Automation can be applied to various domains and functions, such as manufacturing, marketing, customer service, finance, and human resources6 . Connectivity: Connectivity refers to the ability to access, share, and exchange information and resources across different platforms, devices, and locations. Connectivity can enhance the communication and collaboration among businesses, customers, partners, and employees, as well as enable new business models and value propositions. Connectivity can also create new customer expectations and preferences, such as personalization, convenience, and speed. Connectivity can be enabled by various technologies, such as cloud computing, mobile devices, social media, and artificial intelligence . References: 1: Digital strategy in the postpandemic era | McKinsey 2: The Business Benefits Of Living In The Most Digital Era Yet – Forbes 3: Why The Era Of Digital Transformation Is Important For … – Forbes 4: [What is IoT? How Smart Devices Impact Businesses in 2021] 5: [The Internet of Things: How IoT is changing the world – Forbes] 6: [What is Automation? Definition, Benefits, and Examples] : [How Automation Is Changing The Future Of Work – Forbes] : [What is Connectivity? Definition, Types, and Examples] : [How Connectivity Is Driving Business Transformation – Forbes]
QUESTION 21 Which node enables Cisco ISE to share contextual information on a device with Cisco Stealth watch?
Explanation The node that enables Cisco ISE to share contextual information on a device with Cisco Stealthwatch is the pXGrid Controller. The pXGrid Controller is a component of the ISE Policy Service Node (PSN) that facilitates the exchange of contextual data between ISE and other security products, such as Stealthwatch, via the Platform Exchange Grid (pxGrid) protocol. The pXGrid Controller acts as a broker that registers, authenticates, and authorizes pxGrid clients, and allows them to publish and subscribe to topics of interest. For example, Stealthwatch can subscribe to the Session Directory topic to obtain user and device information from ISE, and use it to enrich the network flow data and provide better visibility and security analytics. Stealthwatch can also publish topics, such as Rapid Threat Containment (RTC), to allow ISE to take mitigation actions on compromised endpoints, such as quarantine or re-authentication. References: Cisco Identity Services Engine Administrator Guide, Release 2.4 – Manage Platform Exchange Grid Services [Cisco Identity Services Engine] – Cisco1 Deploying Cisco Stealthwatch 7.x with Cisco ISE 2.4 using pxGrid – Cisco Community2 Stealthwatch – Networking fun3 pxGrid in Depth > Sharing the Context | Cisco Press4
QUESTION 25 Which two primary categories are displayed on the overall health page of the assurance component in the Cisco DNA Center? (Choose two.)
Explanation The overall health page of the assurance component in the Cisco DNA Center displays two primary categories: Client and Network1. The Client category shows the health score of all the wired and wireless clients connected to the network, along with the number of clients, the top issues affecting the clients, and the distribution of clients by type, OS, and SSID1. The Network category shows the health score of all the network devices, such as switches, routers, wireless controllers, and access points, along with the number of devices, the top issues affecting the devices, and the distribution of devices by site, family, and role1. The other options are not primary categories on the overall health page. Server is not a category, but a type of client that can be filtered in the Client category1. Access-Distribution and Core are not categories, but roles of network devices that can be filtered in the Network category1. Wired is not a category, but a subcategory of the Client category that shows the health score of the wired clients only1. References: Cisco DNA Assurance User Guide, Release 1.3.1.0 – Monitor and Troubleshoot the Health of Your Network [Cisco DNA Center] Designing Cisco Enterprise Networks (ENDESIGN) Exam Topics [Cisco] Cisco Validated Design Guides [Cisco]
QUESTION 27 Which three ways are SD-Access and ACI Fabric similar? (Choose three.)
Explanation SD-Access and ACI Fabric are both solutions that provide software-defined networking for different domains. SD-Access is designed for the campus and branch networks, while ACI Fabric is designed for the data center networks. However, they share some common features and concepts, such as: Use of Scalable Group Tags: Both SD-Access and ACI Fabric use Scalable Group Tags (SGTs) to identify and classify the endpoints based on their attributes, such as user identity, device type, or application. SGTs are numerical labels that are assigned to the endpoints and carried in the packets, either in the header or in the metadata. SGTs enable granular and dynamic policy enforcement based on the endpoint identity and context, rather than the network topology and IP addresses12. Use of overlays: Both SD-Access and ACI Fabric use overlays to create a network abstraction layer that decouples the network services and functions from the underlying physical infrastructure. Overlays enable network virtualization and segmentation, as they allow multiple logical networks to coexist on the same physical network. Overlays also simplify the network design and management, as they reduce the complexity and variability of the network elements and interfaces. SD-Access uses VXLAN as the overlay protocol, while ACI Fabric uses VXLAN with EVPN as the overlay protocol34. Use of Endpoint Groups: Both SD-Access and ACI Fabric use Endpoint Groups (EPGs) to group the endpoints based on their policy requirements and network scope. EPGs are logical containers that define the allowed interactions between the endpoints, such as the protocols, ports, and quality of service. EPGs also define the network boundaries that isolate the endpoints from each other, based on the security and compliance needs. EPGs are synonymous with Scalable Groups in SD-Access, and they can be mapped between SD-Access and ACI Fabric to enable end-to-end policy across the domains56. References: Cisco TrustSec Overview Cisco TrustSec Configuration Guide, Cisco IOS XE Gibraltar 16.12.x – Scalable Group Tags [Cisco IOS XE 16] – Cisco Cisco SD-Access Architecture Overview Cisco Application Centric Infrastructure Fundamentals, Release 4.0(1) – ACI Fabric Fundamentals [Cisco Application Policy Infrastructure Controller (APIC)] – Cisco Cisco SD-Access (SDA) Integration with Cisco Application Centric Infrastructure (ACI) – Cisco Community Cisco Application Centric Infrastructure – Cisco Multidomain Integration At-a-Glance