Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ONCCNP ENCOR 350-401

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
CCNP ENCOR 350-401

Description:
ccnp exam

Author:
AVATAR

Creation Date:
24/04/2024

Category:
Others

Number of questions: 50
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
Drag and drop the descriptions from the left onto the correct QoS components on the right. Select and Place: causes TCP retransmissions when traffic is droped buffers excessive traffic introduces no delay and jitter introduces delay and jitter drops excessive traffic typically delays, rather than drops traffic.
What is the difference between a RIB and a FIB? The FIB is populated based on RIB content The RIB maintains a mirror image of the FIB The RIB is used to make IP source prefix-based switching decisions The FIB is where all IP routing information is stored.
Which QoS component alters a packet to change the way that traffic is treated in the network? policing classification marking shaping.
Which statement about Cisco Express Forwarding is true? The CPU of a router becomes directly involved with packet-switching decisions It uses a fast cache that is maintained in a router data plane It maintains two tables in the data plane: the FIB and adjacency table It makes forwarding decisions by a process that is scheduled through the IOS scheduler.
What is a benefit of deploying an on-premises infrastructure versus a cloud infrastructure deployment? ability to quickly increase compute power without the need to install additional hardware less power and cooling resources needed to run infrastructure on-premises faster deployment times because additional infrastructure does not need to be purchased lower latency between systems that are physically located near each other.
Drag and drop the characteristics from the left onto the appropriate infrastructure deployment types on the right. Select and Place: customizable hardware, purpose-built systems easy to scale and upgrade more suitable for companies with specific regulatory or security requirements resources can be over or underutilized as requirements vary requires a strong and stable internet connection built-in, automated data backups and recovery.
How does QoS traffic shaping alleviate network congestion? It drops packets when traffic exceeds a certain bitrate It buffers and queues packets above the committed rate It fragments large packets and queues them for delivery It drops packets randomly from lower priority queues.
An engineer is describing QoS to a client. Which two facts apply to traffic policing? (Choose two.) Policing should be performed as close to the source as possible Policing adapts to network congestion by queuing excess traffic Policing should be performed as close to the destination as possible Policing drops traffic that exceeds the defined rate Policing typically delays the traffic, rather than drops it.
Which component handles the orchestration plane of the Cisco SD-WAN? vBond vSmart vManage WAN Edge.
What are two device roles in Cisco SD-Access fabric? (Choose two.) edge node vBond controller access switch core switch border node.
What is the role of the vSmart controller in a Cisco SD-WAN environment? It performs authentication and authorization It manages the control plane It is the centralized network management system It manages the data plane.
When a wired client connects to an edge switch in a Cisco SD-Access fabric, which component decides whether the client has access to the network? edge node Identity Services Engine RADIUS server control-plane node.
Which benefit is offered by a cloud infrastructure deployment but is lacking in an on-premises deployment? virtualization supported systems storage capacity efficient scalability.
Which action is the vSmart controller responsible for in a Cisco SD-WAN deployment? onboard WAN Edge nodes into the Cisco SD-WAN fabric gather telemetry data from WAN Edge routers distribute policies that govern data forwarding performed within the Cisco SD-WAN fabric handle, maintain, and gather configuration and status for nodes within the Cisco SD-WAN fabric.
Where is radio resource management performed in a Cisco SD-Access wireless solution? DNA Center control plane node wireless controller Cisco CMX.
Drag and drop the characteristics from the left onto the infrastructure types on the right. Select and Place: enterprise owns the hardware low capital expenditure provider maintains the infrastructure slow upgrade lifecycle high capital expenditure fast upgrade lifecycle.
How does the RIB differ from the FIB? The FIB maintains network topologies and routing tables. The RIB is a list of routes to particular network destinations. The FIB includes many routes to a single destination. The RIB is the best route to a single destination. The RIB is used to create network topologies and routing tables. The FIB is a list of routes to particular network destinations. The RIB includes many routes to the same destination prefix. The FIB contains only the best route.
Which technology is used to provide Layer 2 and Layer 3 logical networks in the Cisco SD-Access architecture? underlay network VPN routing/forwarding easy virtual network overlay network.
What is the difference between CEF and process switching? CEF processes packets that are too complex for process switching to manage. Process switching is faster than CEF. CEF uses the FIB and the adjacency table to make forwarding decisions, whereas process switching punts each packet. CEF is more CPU-intensive than process switching.
What are two considerations when using SSO as a network redundancy feature? (Choose two.) requires synchronization between supervisors in order to guarantee continuous connectivity the multicast state is preserved during switchover must be combined with NSF to support uninterrupted Layer 3 operations both supervisors must be configured separately must be combined with NSF to support uninterrupted Layer 2 operations.
Drag and drop the characteristics from the left onto the correct infrastructure deployment type on the right. Select and Place: significant initial investment but lower reocurring costs pay-as-you-go model physical location of data can be defined in contract with provider very scalable and fast delivery of changes in scale company has control over the physical security of equipment.
In a Cisco SD-Access fabric, which control plane protocol is used for mapping and resolving endpoints? DHCP VXLAN SXP LISP.
What are two differences between the RIB and the FIB? (Choose two.) FIB is a database of routing prefixes, and the RIB is the information used to choose the egress interface for each packet The FIB is derived from the data plane, and the RIB is derived from the FIB The RIB is a database of routing prefixes, and the FIB is the information used to choose the egress interface for each packet The RIB is derived from the control plane, and the FIB is derived from the RIB The FIB is derived from the control plane, and the RIB is derived from the FIB.
Which two network problems indicate a need to implement QoS in a campus network? (Choose two.) port flapping excess jitter misrouted network packets duplicate IP addresses bandwidth-related packet loss.
In a Cisco SD-Access wireless architecture, which device manages endpoint ID to edge node bindings? fabric control plane node fabric wireless controller fabric border node fabric edge node.
DRAG DROP - Drag and drop the QoS mechanisms from the left onto their descriptions on the right. Select and Place: service policy policy map DSCP.
Which control plane protocol is used between Cisco SD-WAN routers and vSmart controllers? TCP OMP UDP BGP.
In a three-tier hierarchical campus network design, which action is a design best-practice for the core layer? provide QoS prioritization services such as marking, queueing, and classification for critical network traffic provide redundant Layer 3 point-to-point links between the core devices for more predictable and faster convergence provide advanced network security features such as 802.1X, DHCP snooping, VACLs, and port security provide redundant aggregation for access layer devices and first-hop redundancy protocols such as VRRP .
What is a VPN in a Cisco SD-WAN deployment? common exchange point between two different services attribute to identify a set of services offered in specific places in the SD-WAN fabric virtualized environment that provides traffic isolation and segmentation in the SD-WAN fabric virtual channel used to carry control plane information.
Which function does a fabric edge node perform in an SD-Access deployment? Connects endpoints to the fabric and forwards their traffic Encapsulates end-user data traffic into LISP Connects the SD-Access fabric to another fabric or external Layer 3 networks Provides reachability between border nodes in the fabric underlay.
What is the role of a fusion router in an SD-Access solution? acts as a DNS server provides additional forwarding capacity to the fabric performs route leaking between user-defined virtual networks and shared services provides connectivity to external networks.
Which action is the vSmart controller responsible for in an SD-WAN deployment? A. onboard vEdge nodes into the SD-WAN fabric B. gather telemetry data from vEdge routers C. distribute security information for tunnel establishment between vEdge routers D. manage, maintain, and gather configuration and status for nodes within the SD-WAN fabric .
What is one fact about Cisco SD-Access wireless network deployments? A. The access point is part of the fabric overlay. B. The wireless client is part of the fabric overlay. C. The access point is part of the fabric underlay. D. The WLC is part of the fabric underlay. .
In a Cisco SD-Access solution, what is the role of a fabric edge node? A. to connect external Layer 3 networks to the SD-Access fabric B. to connect wired endpoints to the SD-Access fabric C. to advertise fabric IP address space to external networks D. to connect the fusion router to the SD-Access fabric .
What are two reasons a company would choose a cloud deployment over an on-prem deployment? (Choose two.) A. Cloud costs adjust up or down depending on the amount of resources consumed. On-prem costs for hardware, power, and space are on-going regardless of usage. B. Cloud resources scale automatically to an increase in demand. On-prem requires additional capital expenditure. C. In a cloud environment, the company is in full control of access to their data. On-prem risks access to data due to service provider outages. D. In a cloud environment, the company controls technical issues. On-prem environments rely on the service provider to resolve technical issues. E. Cloud deployments require long implementation times due to capital expenditure processes. On-prem deployments can be accomplished quickly using operational expenditure processes. .
What is the difference between the MAC address table and TCAM? A. TCAM is used to make L2 forwarding decisions. CAM is used to build routing tables. B. Router prefix lookups happen in CAM. MAC address table lookups happen in TCAM. C. The MAC address table supports partial matches. TCAM requires an exact match. D. The MAC address table is contained in CAM. ACL and QoS information is stored in TCAM.
Which controller is the single plane of management for Cisco SD-WAN? A. vBond B. vSmart C. vManage D. vEdge .
A company plans to implement intent-based networking in its campus infrastructure. Which design facilitates a migration from a traditional campus design to a programmable fabric design? A. two-tier B. Layer 2 access C. three-tier D. routed access.
Which statement about a fabric access point is true? A. It is in local mode and must be connected directly to the fabric edge switch. B. It is in local mode and must be connected directly to the fabric border node. C. It is in FlexConnect mode and must be connected directly to the fabric border node. D. It is in FlexConnect mode and must be connected directly to the fabric edge switch. .
A customer requests a network design that supports these requirements: ✑ FHRP redundancy ✑ multivendor router environment ✑ IPv4 and IPv6 hosts Which protocol does the design include? A. VRRP version 2 B. VRRP version 3 C. GLBP D. HSRP version 2 .
While configuring an IOS router for HSRP with a virtual IP of 10.1.1.1, an engineer sees this log message. Jan 1 12:12:12.111 : %HSRP-4-DIFFVIP1: GigabitEthernet0/0 Grp 1 active routers virtual IP address 10.1.1.1 is different to the locally configured address 10.1.1.25 Which configuration change must the engineer make? A. Change the HSRP group configuration on the local router to 1. B. Change the HSRP virtual address on the local router to 10.1.1.1. C. Change the HSRP virtual address on the remote router to 10.1.1.1. D. Change the HSRP group configuration on the remote router to 1. .
A network administrator has designed a network with two multilayer switches on the distribution layer, which act as default gateways for the end hosts. Which two technologies allow every end host in a VLAN to use both gateways? (Choose two.) A. VRRP B. GLBP C. VSS D. MHSRP E. HSRP .
Refer to the exhibit. On which interfaces should VRRP commands be applied to provide first hop redundancy to PC-01 and PC-02? A. G0/0 and G0/1 on Core B. G0/0 on Edge-01 and G0/0 on Edge-02 C. G0/1 on Edge-01 and G0/1 on Edge-02 D. G0/0 and G0/1 on ASW-01 .
Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial? A. under traffic classification and marking conditions B. under interface saturation conditions C. under all network conditions D. under network convergence conditions .
An engineer must configure HSRP group 300 on a Cisco IOS router. When the router is functional, it must be the active HSRP router. The peer router has been configured using the default priority value. Which command set is required? A. standby version 2 standby 300 priority 110 standby 300 preempt B. standby 300 priority 110 standby 300 timers 1 110 C. standby version 2 standby 300 priority 90 standby 300 preempt D. standby 300 priority 90 standby 300 preempt .
What is the function of a fabric border node in a Cisco SD-Access environment? A. To collect traffic flow information toward external networks. B. To connect the Cisco SD-Access fabric to another fabric or external Layer 3 networks. C. To attach and register clients to the fabric. D. To handle an ordered list of IP addresses and locations for endpoints in the fabric. .
In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one AP to another on a different access switch using a single WLC? A. Layer 3 B. inter-xTR C. auto anchor D. fast roam .
What is the recommended MTU size for a Cisco SD-Access Fabric? A. 4464 B. 17914 C. 9100 D. 1500.
What is the function of the fabric control plane node in a Cisco SD-Access deployment? A. It is responsible for policy application and network segmentation in the fabric. B. It performs traffic encapsulation and security profiles enforcement in the fabric. C. It holds a comprehensive database that tracks endpoints and networks in the fabric. D. It provides integration with legacy nonfabric-enabled environments. .
What is the data policy in a Cisco SD-WAN deployment? A. list of ordered statements that define node configurations and authentication used within the SD-WAN overlay B. set of statements that defines how data is forwarded based on IP packet information and specific VPNs C. detailed database mapping several kinds of addresses with their corresponding location D. group of services tested to guarantee devices and links liveliness within the SD-WAN overlay .
Report abuse Consent Terms of use