Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ONCCNP ENCOR 350-401 - part 11

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
CCNP ENCOR 350-401 - part 11

Description:
CCNP ENCOR 350-401 - part 11

Author:
AVATAR

Creation Date:
25/04/2024

Category:
Others

Number of questions: 50
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
Drag and drop the characteristics from the left onto the deployment types on the right. Select and Place: It is responsible for hardware maintenance. It provides on-demand scalability. Maintenance is handled by a third party. Scalability requires time and effort.
Drag and drop the characteristics from the left onto the routing protocols they describe on the right. Select and Place: Maintains alternative loop-free backup path if available. Quickly computes new path upon link failure. Selects routes using the DUAL algorithm.
Which features does Cisco EDR use to provide threat detection and response protection? A. containment, threat intelligence, and machine learning B. firewalling and intrusion prevention C. container-based agents D. cloud analysis and endpoint firewall controls.
Refer to the exhibit. Only administrators from the subnet 10.10.10.0/24 are permitted to have access to the router. A secure protocol must be used for the remote access and management of the router instead of clear-text protocols. Which configuration achieves this goal? A. access-list 23 permit 10.10.10.0 0.0.0.255 line vty 0 15 access-class 23 in transport input ssh B. access-list 23 permit 10.10.10.0 0.0.0.255 line vty 0 15 access-class 23 out transport input all C. access-list 23 permit 10.10.10.0 0.0.0.255 line vty 0 4 access-class 23 in transport input ssh D. access-list 23 permit 10.10.10.0 255.255.255.0 line vty 0 15 access-class 23 in transport input ssh.
An engineer is configuring Local WebAuth on a Cisco Wireless LAN Controller. According to RFC 5737, which virtual IP address must be used in this configuration? A. 172.20.10.1 B. 192.168.0.1 C. 1.1.1.1 D. 192.0.2.1.
Refer to the exhibit. The OSPF neighborship fails between two routers. What is the cause of this issue? A. The OSPF process is stopped on the neighbor router. B. The OSPF router ID is missing on this router. C. The OSPF router ID is missing on the neighbor router. D. There is an MTU mismatch between the two routers.
What is one benefit of adopting a data modeling language? A. augmenting the use of management protocols like SNMP for status subscriptions B. refactoring vendor and platform specific configurations with widely compatible configurations C. augmenting management process using vendor centric actions around models D. deploying machine-friendly codes to manage a high number of devices.
In Cisco DNA Center what is the integration API? A. southbound consumer-facing RESTful API, which enables network discovery and configuration management B. westbound interface, which allows the exchange of data to be used by ITSM, IPAM and reporting C. an interface between the controller and the network devices, which enables network discovery and configuration management D. northbound consumer-facing RESTful API which enables network discovery and configuration management.
An engineer must configure a new WLAN that allows a user to enter a passphrase and provides forward secrecy as a security measure. Which Layer 2 WLAN configuration is required on the Cisco WLC? A. WPA3 Enterprise B. WPA2 Personal C. WPA2 Enterprise D. WPA3 Personal.
How does an on-premises infrastructure compare to a cloud infrastructure? A. On-premises offers faster deployment than cloud. B. On-premises requires less power and cooling resources than cloud. C. On-premises offers lower latency for physically adjacent systems than cloud. D. On-premises can increase compute power faster than cloud.
Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right. Select and Place: Declarative Uses Ruby Uses Python Procedural.
An engineer must create a script to append and modify device entries in a JSON-formatted file. The script must work as follows: > Until interrupted from the keyboard, the script reads in the hostname of a device, its management IP address operating system type, and CLI remote access protocol. > After being interrupted, the script displays the entered entries and adds them to the JSON-formatted file, replacing existing entries whose hostname matches. The contents of the JSON-formatted file are as follows: 1 2 3 4 5.
Refer to the exhibit. An engineer configures HSRP and enters the show standby command. Which two facts about the network environment are derived from the output? (Choose two.) A. If the local device fails to receive a hello from the active router for more than 5 seconds, it becomes the active router. B. If a router with a higher IP address and same HSRP priority as the active router becomes available that router becomes the new active router 5 seconds later. C. The virtual IP address of the HSRP group is 10.1.1.1. D. The hello and hold timers are set to custom values. E. The local device has a higher priority setting than the active router.
Refer to the exhibit. Cisco IOS routers R1 and R2 are interconnected using interface Gi0/0. Which configuration allows R1 and R2 to form an OSPF neighborship on interface Gi0/0? A. R2(config)#interface Gi0/0 R2(config-if)#ip ospf cost 1 B. R1(config)#router ospf 1 R1(config-if)#network 172.20.0.0 0.0.0.255 area 1 C. R1(config)#router ospf 1 R1(config-router)#no passive-interface Gi0/0 D. R2(config)#router ospf 1 R2(config-router)#passive-interface Gi0/0.
Refer to the exhibit. After configuring the BGP network an engineer verifies that the path between Server1 and Server2 is functional. Why did RouterSF choose the route from RouterDAL instead of the route from RouterCHI? A. BGP is not running on RouterCHI B. There is a static route in RouterSF for 10.0.0.0/24 C. The route from RouterDAL has a lower MED D. The Router-ID for Router DAL is lower than the Router-ID for RouterCHI.
Drag and drop the LISP components on the left to the correct description on the right. Select and Place: ETR map server EID.
Refer to the exhibit. Which command set must be added to permit and log all traffic that comes from 172.20.10.1 in interface GigabitEthernet0/1 without impacting the functionality of the access list? A. Router(config)#acess-list 100 permit ip host 172.20.10.1 any log Router(config)#interface GigabitEthernet0/1 Router(config-if)#access-group 100 in B. Router(config)#acess-list 100 seq 5 permit ip host 172.20.10.1 any log Router(config)#interface GigabitEthernet0/1 Router(config-if)#access-group 100 in C. Router(config)#ip access-list extended 100 Router(config)#5 permit ip 172.20.10.0 0.0.0.255 any log Router(config)#interface GigabitEthernet0/1 Router(config-if)#access-group 100 in D. Router(config)#no acess-list 100 permit ip 172.16.0.0 0.0.15.255 any Router(config)#acess-list 100 permit ip 172.16.0.0 0.0.15.255 any log Router(config)#interface GigabitEthernet0/1 Router(config-if)#access-group 100 in.
Refer to the exhibit. A network engineer checks connectivity between two routers. The engineer can ping the remote endpoint but cannot see an ARP entry. Why is there no ARP entry? A. When VRFs are used, ARP protocol must be enabled in each VRF. B. The ping command must be executed in the global routing table. C. Interface FastEthernet0/0 is configured in VRF CUST-A, so the ARP entry is also in that VRF. D. When VRFs are used, ARP protocol is disabled in the global routing table.
Which option must be used to support a WLC with an IPv6 management address and 100 Cisco Aironet 2800 Series access points that will use DHCP to register? A. 43 B. 52 C. 60 D. 82.
Refer to the exhibit. Which configuration set implements Control Plane Policing for SSH and Telnet? A. Router(config)#class-map type inspect match-all Router(config-cmap)#match access-group 100 Router(config-cmap)#match access-group 101 Router(config)#policy-map CoPP Router(config-pmap)#class class-control Router(config-pmap-c)#police 1000000 conform-action transmit Router(config)#control-plane Router(config-cp)#service-policy output CoPP B. Router(config)#class-map match-all class-control Router(config-cmap)#match access-group 100 Router(config-cmap)#match access-group 101 Router(config)#policy-map CoPP Router(config-pmap)#class class-control Router(config-pmap-c)#police 1000000 conform-action transmit Router(config)#control-plane Router(config-cp)#service-policy output CoPP C. Router(config)#class-map class-telnet Router(config-cmap)#match access-group 100 Router(config)#class-map class-ssh Router(config-cmap)#match access-group 101 Router(config)#policy-map CoPP Router(config-pmap)#class class-telnet-ssh Router(config-pmap-c)#police 1000000 conform-action transmit Router(config)#control-plane Router(config-cp)#service-policy input CoPP D. Router(config)#class-map match-any class-control Router(config-cmap)#match access-group 100 Router(config-cmap)#match access-group 101 Router(config)#policy-map CoPP Router(config-pmap)#class class-control Router(config-pmap-c)#police 1000000 conform-action transmit Router(config)#control-plane Router(config-cp)#service-policy input CoPP.
A customer deploys a new wireless network to perform location-based services using Cisco DNA Spaces. The customer has a single WLC located on-premises in a secure data center. The security team does not want to expose the WLC to the public Internet. Which solution allows the customer to securely send RSSI updates to Cisco DNA Spaces? A. Deploy a Cisco DNA Spaces connector as a VM B. Perform tethering with Cisco DNA Center C. Replace the WLC with a cloud-based controller D. Implement Cisco Mobility Services Engine.
Refer to the exhibit. An engineer entered the command no spanning-tree bpduguard enable on interface Fa1/0/7. What is the effect of this command on Fa1/0/7? A. It remains in err-disabled state until the errdisable recovery cause failed-port-state command is entered in the global configuration mode B. It remains in err-disabled state until the no shutdown command is entered in the interface configuration mode C. It remains in err-disabled state until the shutdown/no shutdown command is entered in the interface configuration mode D. It remains in err-disabled state until the spanning-tree portfast bpduguard disable command is entered in the interface configuration mode.
Which design principle states that a user has no access by default to any resource, and unless a resource is explicitly granted, it should be denied? A. least privilege B. fail-safe defaults C. economy of mechanism D. complete mediation.
A customer wants to connect a device to an autonomous Cisco AP configured as a WGB. The WGB is configured properly: however, it fails to associate to a CAPWAP-enabled AP. Which change must be applied in the advanced WLAN settings to resolve this issue? A. Enable Aironet IE. B. Enable passive client. C. Disable AAA override. D. Disable FlexConnect local switching.
By default, which virtual MAC address does HSRP group 32 use? A. 04:19:01:05:2e:32 B. 05:5e:5c:ac:0c:32 C. 00:00:0c:07:ac:20 D. 00:5e:0c:07:ac:20.
Which two Cisco SD-WAN components exchange OMP information? (Choose two.) A. WAN Edge B. vBond C. vManage D. vAnalytics E. vSmart.
What does the number in an NTP stratum level represent? A. The number of hops it takes to reach the authoritative time source B. The amount of offset between the device clock and true time C. The number of hops it takes to reach the primary time server D. The amount of drift between the device clock and true time.
Refer to the exhibit. Clients report that they cannot connect to this SSID using the provided PSK. Which action will resolve this issue? A. Apply the correct interface to this WLAN B. Apply the changes this SSID C. Select the PSK under authentication key management D. Define the correct Radio Policy.
Which QoS queuing method transmits packets out of the interface in the order the packets arrive? A. custom B. weighted-fair C. FIFO D. priority.
Which two results occur if Cisco DNA Center loses connectivity to devices in the SD-Access fabric? (Choose two.) A. Users lose connectivity B. Already connected users are unaffected but new users cannot connect C. All devices reload after detecting loss of connection to Cisco DNA Center D. User connectivity is unaffected E. Cisco DNA Center is unable to collect monitoring data in Assurance.
Refer to the exhibit. The connection between SW1 and SW2 is not operational. Which two actions resolve the issue? (Choose two.) A. configure switchport nonegotiate on SW1 B. configure switchport nonegotiate on SW2 C. configure switchport mode access on SW2 D. configure switchport mode trunk on SW2 E. configure switchport mode dynamic desirable on SW2.
Refer to the exhibit. A company has an internal wireless network with a hidden SSID and RADIUS-based client authentication for increased security. An employee attempts to manually add the company network to a laptop, but the laptop does not attempt to connect to the network. The regulatory domains of the access points and the laptop are identical. Which action resolves this issue? A. Ensure that the "Connect even if this network is not broadcasting" option is selected. B. Change the security type to WPA2-Personal AES. C. Use the empty string as the hidden SSID network name. D. Limit the enabled wireless channels on the laptop to the maximum channel range that is supported by the access points.
How do the RIB and the FIB differ? A. RIB is derived from the control plane, and the FIB is derived from the RIB. B. FIB is derived from the control plane, and the RIB is derived from the data plane. C. RIB contains the interface for a destination, and the FIB contains the next hop information. D. FIB contains routes learned through a dynamic routing protocol and the RIB contains routes that are static or directly connected.
What does a YANG model provide? A. standardized data structure independent of the transport protocols B. creation of transport protocols and their interaction with the OS C. user access to interact directly with the CLI of the device to receive or modify network configurations D. standardized data structure that can be used only with NETCONF or RESTCONF transport protocols.
A system must validate access rights to all its resources and must not rely on a cached permission matrix. If the access level to a given resource is revoked but is not reflected in the permission matrix, the security is violated. Which term refers to this REST security design principle? A. economy of mechanism B. complete mediation C. separation of privilege D. least common mechanism.
Refer to the exhibit. Which command set completes the ERSPAN session configuration? A. monitor session 11 type erspan-destination destination interface GigabitEthemet4 source erspan-id 11 ip address 10.10.10.10 B. monitor session 12 type erspan-destination destination interface GigabitEthernet4 source erspan-id 12 ip address 10.10.10.10 C. monitor session 11 type erspan-destination destination interface GigabitEthernet4 source erspan-id 12 ip address 10.100.10.10 D. monitor session 12 type erspan-destination destination interface GigabitEthernet4 source erspan-id 11 ip address 10.10.10.10.
"HTTP/1.1 204 No Content" is returned when the curl -i -X DELETE command is issued. Which situation has occurred? A. The command succeeded in deleting the object. B. The object was located at the URI, but it could not be deleted C. The object could not be located at the URI path. D. The URI was invalid.
Drag and drop the tools from the left onto the agent types on the right. Select and Place: Ansible Terraform Chef.
Refer to the exhibit. Which configuration is required to summarize the Area 2 networks that are advertised to Area 0? A. RouterB(config)# router ospf 1 RouterB(config-router)# area 2 range 192.168.36.0 255.255.252.0 B. RouterB(config)# router ospf 1 RouterB(config-router)# network 192.168.38.0 255.255.255.0 C. RouterB(config)# router ospf 1 RouterB(config-router)# network 192.168.38.0 255.255.252.0 D. RouterB(config)# router ospf 1 RouterB(config-router)# area 2 range 192.168.36.0 255.255.255.0.
Based on the router's API output in JSON format below, which Python code will display the value of the "role" key? A. json_data = json.loads(response.text) print(json_data['response']['family']['role']) B. json_data = response.json() print(json_data['response'][0]['role']) C. json_data = response.json() print(json_data['response'][family]['role']) D. json_data = json.loads(response.text) print(json_data[response][0][role]).
What is the recommended minimum SNR for voice applications on wireless networks? A. 10 B. 15 C. 20 D. 25.
Refer to the exhibit. What are two results of the NAT configuration? (Choose two.) A. Packets with a destination of 200.1.1.1 are translated to 10.1.1.1 or .2, respectively. B. A packet that is sent to 200 1.1.1 from 10.1.1.1 is translated to 209.165.201.1 on R1. C. R1 is performing NAT for inside addresses and outside address. D. R1 looks at the destination IP address of packets entering S0/0 and destined for inside hosts. E. R1 processes packets entering E0/0 and S0/0 by examining the source IP address.
A network engineer must configure a switch to allow remote access for all feasible protocols. Only a password must be requested for device authentication and all idle sessions must be terminated in 30 minutes. Which configuration must be applied? A. line vty 0 15 password cisco transport input telnet ssh exec-timeout 30 0 B. line vty 0 15 password cisco transport input all exec-timeout 0 30 C. username cisco privilege 15 cisco line vty 0 15 transport input telnet ssh login local exec-timeout 0 30 D. line console 0 password cisco exec-timeout 30 0.
Drag and drop the characteristics from the left onto the switching architectures on the right. Select and Place: Proprietary switching mechanism Supports the centralized and distributed modes of operation Low switching performance.
Refer to the exhibit. An engineer configures a trunk between SW1 and SW2 but tagged packets are not passing. Which action fixes the issue? A. Configure SW1 with dynamic auto mode on interface FastEthernet0/1. B. Configure the native VLAN to be the same VLAN on both switches on interface FastEthernet0/1. C. Configure SW2 with encapsulation dot1q on interface FastEthernet0/1. D. Configure FastEthernet0/1 on both switches for static trunking.
When does a Cisco StackWise primary switch lose its role? A. when a switch with a higher priority is added to the stack B. when a stack member fails C. when the priority value of a stack member is changed to a higher value D. when the stack primary is reset.
Refer to the exhibit. A network engineer troubleshoots an issue with the port channel between SW1 and SW2. Which command resolves the issue? A. SW2(config-if)#switchport mode trunk B. SW1(config-if)#channel-group 10 mode active C. SW1(config-if)#channel-group 10 mode desirable D. SW2(config-if)#channel-group 10 mode on.
Drag and drop the automation characteristics from the left onto the appropriate tools on the right. Select and Place: Provides intent-based networking feedback loop Agent or agentless automation platform Agentless automation platform Assesses the impact of changes before applied.
How do stratum levels relate to the distance from a time source? A. Stratum 0 devices are connected directly to an authoritative time source. B. Stratum 1 devices are connected directly to an authoritative time source. C. Stratum 15 devices are connected directly to an authoritative time source. D. Stratum 15 devices are an authoritative time source.
A customer has a wireless network deployed within a multi-tenant building. The network provides client access, location-based services and is monitored using Cisco DNA Center. The security department wants to locate and track malicious devices based on threat signatures. Which feature is required for this solution? A. malicious rogue rules on Cisco DNA Center B. malicious rogue rules on the WLC C. Cisco aWIPS policies on the WLC D. Cisco aWIPS policies on Cisco DNA Center.
Report abuse Consent Terms of use