An engineer must add VNF implementation definitions and VNF service definitions to an OpenStack deployment data model to deploy virtual routers and firewalls to an enterprise network. After the virtual machine resources are prepared, which action must be taken next?

Refer to the exhibit. An engineer must connect switch TOR1 and switch TOR2 to switch LEAF1 and switch LEAF2 by using double-sided vPCs. LEAF1 and LEAF2 are already configured as vPC peers. Which action must be taken next to complete the configuration?
What should be used to protect against lateral movements during a Cisco NFVI security breach?
How does log management assist in meeting the requirements of cloud security regulatory compliance?

Refer to the exhibit. An engineer must configure an IPsec VPN connection between site 1 and site 2. The indicated configuration was applied to router R1; however, the tunnel fails to come up. Which command must be run on R1 to resolve the issue?

Refer to the exhibit. An engineer must configure an IPsec VPN connection between site 1 and site 2. The ISAKMP policy for the phase 1 negotiations of the tunnel must use AES and SHA-256. This configuration was applied to both PE routers; however, the tunnel fails to come up:
crypto isakmp policy 10
encryption 3des
hash md5
authentication pre-share
group 12
Which two commands must be run on router PE1 to resolve the issue? (Choose two.)
An engineer must enable the highest level of logging when troubleshooting Cisco NFVIS. Which command must be run?
Which type of cyberattack does Cisco Umbrella DNS-layer security effectively help mitigate?

Refer to the exhibit. An engineer must configure dual-homing with single active redundancy in a BGP EVPN VXLAN fabric. Which command must be run on the leaf router to complete the EVPN Ethernet segment configuration?