Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ONCCNP ENCOR 350-401 - part 12

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
CCNP ENCOR 350-401 - part 12

Description:
CCNP ENCOR 350-401 - part 12

Author:
AVATAR

Creation Date:
18/04/2024

Category:
Others

Number of questions: 50
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
In a Cisco SD-Access wireless environment, which device is responsible for hosting the anycast gateway? A. fusion router B. control plane node C. fabric border node D. fabric edge node.
Refer to the exhibit. The port channel between the switches does not work as expected. Which action resolves the issue? A. Interface Gi0/1 on Switch1 must be configured as desirable. B. Trunking must be enabled on both interfaces on Switch2. C. Interface Gi0/0 on Switch2 must be configured as passive. D. Interface Gi0/1 on Switch2 must be configured as active.
Refer to the exhibit. Which set of commands is required to configure and verify the VRF for Site 1 Network A on router R1? A. R1#ip routing R1#(config)#ip vrf 100 R1#(config-vrf)#rd 100:1 R1#(config-vrf)# address family ipv4 ! R1(config)#interface Gi0/2 R1(config-if)#ip address 10.0.1.1 255.255.255.0 R1#show ip route B. R1#ip routing R1#(config)#ip vrf 100 ! R1(config)#interface Gi0/2 R1(config-if)#ip address 10.0.1.1 255.255.255.0 R1#showip route C. R1#ip routing R1#(config)#ip vrf 100 ! R1(config)#interface Gi0/2 R1(config-if)#ip vrf forwarding 100 R1(config-if)#ip address 10.0.1.1 255.255.255.0 R1#show ip vrf D. R1#ip routing R1#(config)#ip vrf 100 ! R1(config)#interface Gi0/2 R1(config-if)#ip address 10.0.1.1 255.255.255.0 R1#show ip vrf .
How does Protocol Independent Multicast function? A. In sparse mode, it establishes neighbor adjacencies and sends hello messages at 5-second intervals. B. It uses the multicast routing table to perform the multicast forwarding function. C. It uses unicast routing information to perform the multicast forwarding function. D. It uses broadcast routing information to perform the multicast forwarding function. .
Which VXLAN component is used to encapsulate and decapsulate Ethernet frames? A. VNI B. GRE C. VTEP D. EVPN .
Refer to the exhibit. Assuming all links are functional, which path does PC1 take to reach DSW1? A. PC1 goes from ALSW1 to DSW2 to CORE to DSW1. B. PC1 goes from ALSW1 to DSW2 to ALSW2 to DSW1. C. PC1 goes from ALSW1 to DSW2 to DSW1. D. PC1 goes from ALSW1 to DSW1. .
By default, which virtual MAC address does HSRP group 22 use? A. c0:41:99:98:06:16 B. 00:00:0c:07:ac:16 C. 00:00:0c:07:ac:22 D. c0:07:0c:ac:00:22 .
Refer to the exhibit. Both controllers are in the same mobility group. Which result occurs when client 1 roams between APs that are registered to different controllers in the same WLAN? A. The client database entry moves from controller A to controller B B. A CAPWAP tunnel is created between controller A and controller B C. Client 1 uses an EoIP tunnel to contact controller A D. Client 1 contacts controller B by using an EoIP tunnel .
Where in Cisco DNA Center is documentation of each API call organized by its functional area? A. Developer Toolkit B. platform management C. platform bundles D. Runtime Dashboard .
Refer to the exhibit. An engineer must protect the CPU of the router from high rates of NTP, SNMP, and SSH traffic. Which two configurations must be applied to drop these types of traffic when it continuously exceeds 320 kbps? (Choose two.) A. R1(config-pmap)#class CLASS-CoPP-Management R1(config-pmap-c)#police 32 conform-action transmit exceed-action drop violate-action transmit B. R1(config)#policy-map POLICY-CoPP R1(config-pmap)#class CLASS-CoPP-Management R1(config-pmap-c)#police 320000 conform-action transmit exceed-action drop violate-action drop C. R1(config)#policy-map POLICY-CoPP R1(config-pmap)#class CLASS-CoPP-Management R1(config-pmap-c)#police 320000 conform-action transmit exceed-action transmit violate-action drop D. R1(config)#control-plane R1(config-cp)# service-policy output POLICY-CoPP E. R1(config)#control-plane R1(config-cp)# service-policy input POLICY-CoPP.
Which free application has the ability to make REST calls against Cisco DNA Center? A. API Explorer B. REST Explorer C. Postman D. Mozilla .
If AP power level is increased from 25 mW to 100 mW, what is the power difference in dBm? A. 6 dBm B. 14 dBm C. 17 dBm D. 20 dBm .
What is the result when an active route processor fails in a design that combines NSF with SSO? A. The standby route processor temporarily forwards packets until route convergence is complete. B. An NSF-aware device immediately updates the standby route processor RIB without churning the network. C. An NSF-capable device immediately updates the standby route processor RIB without churning the network. D. The standby route processor immediately takes control and forwards packets along known routes.
Refer to the exhibit. Which command is required to verify NETCONF capability reply messages? A. show netconf rpc-reply B. show netconf | section rpc-reply C. show netconf schema | section rpc-reply D. show netconf xml rpc-reply .
DRAG DROP - Drag and drop the characteristics from the left to the table types on the right. Select and Place: used to make Layer 2 forwarding decisions used to build IP routing tables records MAC address, port of arrival, VLAN and time stamp stores ACL, QoS, and other upper-Layer information.
Which A record type should be configured for access points to resolve the IP address of @ wireless LAN controller using ONS? A. CISCO.CONTROLLER localdomain B. CISCO.CAPWAP.CONTROLLER localdomain C. CISCO-CONTROLLER localdomain D. CISCO-CAPWAP-CONTROLLER.localdomain.
DRAG DROP - Drag and drop the characteristics from the left onto the configuration models on the right. Select and Place: Administrators require deep syntax and context knowledge for the configured entities This model states what is wanted but not how it is achieved Puppet is a tool that uses this configuration model This model defines a set of commands that must be executed in a certain order for the system to achieve the desired state.
Which activity requires access to Cisco DNA Center CLI? A. provisioning a wireless LAN controller B. creating a configuration template C. upgrading the Cisco DNA Center software D. graceful shutdown of Cisco DNA Center .
Refer to the exhibit. An engineer must configure an ERSPAN tunnel that mirrors traffic from Linux1 on Switch1 to Linux2 on Switch2. Which command must be added to the destination configuration to enable the ERSPAN tunnel? A. (config-mon-erspan-dst-src)# erspan-id 172.16.10.10 B. (config mon erspan-dst-src)# erspan-id 110 C. (config-mon-erspan-dst-src)# no shut D. (config-mon-erspan-dst-src)# origin ip address 172.16.10.10 .
What are two characteristics of Cisco SD-Access elements? (Choose two.) A. The border node is required for communication between fabric and nonfabric devices. B. Traffic within the fabric always goes through the control plane node. C. Fabric endpoints are connected directly to the border node. D. The control plane node has the full RLOC-to-EID mapping database. E. The border node has the full RLOC-to-EID mapping database. .
When is an external antenna used inside a building? A. only when using Mobility Express B. only when using 2.4 GHz C. when it provides the required coverage D. only when using 5 GHz .
Refer to the exhibit. R1 and R2 are directly connected, but the BGP session does not establish. Which action must be taken to build an eBGP session? A. Configure no neighbor 192.168.12.1 shutdown under R2 BGP process. B. Configure neighbor 2.2.2.2 remote-as 65002 under R1 BGP process. C. Configure ip route 1.1.1.1 0.0.0.0 192.168.12.1 on R2. D. Configure neighbor 192.168.12.1 activate under R2 BGP process. .
A company requires a wireless solution to support its main office and multiple branch locations. All sites have local Internet connections and a link to the main office for corporate connectivity. The branch offices are managed centrally. Which solution should the company choose? A. Cisco DNA Spaces B. Cisco Unified Wireless Network C. Cisco Mobility Express D. Cisco Catalyst switch with embedded controller .
Which QoS feature uses the IP Precedence bits in the ToS field of the IP packet header to partition traffic into different priority levels? A. marking B. shaping C. policing D. classification.
Refer to the exhibit. Which two commands are required on router R1 to block FTP and allow all other traffic from the Branch 2 network? (Choose two.) A. access-list 101 deny tcp 10.0.2.0 0.0.0.255 host 10.0.101.3 eq ftp access-list 101 deny tcp 10.0.2.0 0.0.0.255 host 10.0.101.3 eq ftp-data access-list 101 permit ip any any B. access-list 101 deny tcp 10.0.2.0 0.0.0.255 host 10.0.101.3 eq ftp-data access-list 101 permit ip any any C. interface GigabitEthernet0/0 ip address 10.0.0.1 255.255.255.252 ip access-group 101 out D. access-list 101 deny tcp 10.0.2.0 0.0.0.255 host 10.0.101.3 eq ftp access-list 101 permit ip any any E. interface GigabitEthernet0/0 ip address 10.0.101.1 255.255.255.252 ip access-group 101 in.
A company recently decided to use RESTCONF instead of NETCONF, and many of their NETCONF scripts contain the operation <edit-config> (operation="create"). Which RESTCONF operation must be used to replace these statements? A. PUT B. CREATE C. GET D. POST.
An engineer is configuring RADIUS-Based Authentication with EAP MS-CHAPv2 is configured on a client device. Which outer method protocol must be configured on the ISE to support this authentication type? A. LDAP B. EAP-FAST C. EAP-TLS D. PEAP.
An engineer must protect the password for the VTY lines against over-the-shoulder attacks. Which configuration should be applied? A. line vty 0 15 password XD822j B. service password-encryption C. username netadmin secret 7 $1$42J31k98867Pyh4QzwXyZ4 D. username netadmin secret 9 $9$vFpMf8elb4RVV8$seZ/bDA .
Refer to the exhibit. Hosts FC1, PC2; and PC3 must access resources on Server1. An engineer configures NAT on Router R1 to enable the communication and enters the show command to verify operation. Which IP address is used by the hosts when they communicate globally to Server1? A. random addresses in the 155.1.1.0/24 range B. 155.1.1.1 C. their own address in the 10.10.10.0/24 range D. 155.1.1.5 .
Using the EIRP formula, what parameter is subtracted to determine the EIRP value? A. transmitter power B. antenna cable loss C. antenna gain D. signal-to-noise ratio .
What is one main REST security design principle? A. separation of privilege B. password hashing C. confidential algorithms D. OAuth .
Refer to the exhibit. R1 has a BGP neighborship with a directly connected router on interface Gi0/0. Which command set is applied between the iterations of show ip bgp 2.2.2.2? A. R1(config)#no ip route 192.168.50.2 255.255.255.255 Gi0/0 B. R1(config)#ip route 2.2.2.2 255.255.255.255 192.168.50.2 C. R1(config)#router bgp 65002 R1(config-router)#neighbor 192.168.50.2 shutdown D. R1(config)#router bgp 65001 R1(config-router)#neighbor 192.168.50.2 shutdown .
After a redundant route processor failure occurs on a Layer 3 device, which mechanism allows for packets to be forwarded from a neighboring router based on the most recent tables? A. BFD B. RP failover C. NSF D. RPVST+ .
By default, which virtual MAC address does HSRP group 15 use? A. c0:42:31:98:86:0f B. 05:af:1c:0f:ac:15 C. 00:00:0c:07:ac:0f D. 05:5e:ac:07:0c:0f .
An engineer must provide wireless coverage in a square office. The engineer has only one AP and believes that it should be placed it in the middle of the room. Which antenna type should the engineer use? A. directional B. polarized C. omnidirectional D. Yagi .
Which technology reduces the implementation of STP and leverages both unicast and multicast? A. VLAN B. VPC C. VXLAN D. VSS .
A customer has recently implemented a new wireless infrastructure using WLC-5520s at a site directly next to a large commercial airport. Users report that they intermittently lose Wi-Fi connectivity, and troubleshooting reveals it is due to frequent channel changes. Which two actions fix this issue? (Choose two.) A. Enable DFS channels because they are immune to radar interference. B. Restore the DCA default settings because this automatically avoids channel interference. C. Remove UNII-2 and Extended UNII-2 channels from the 5 Ghz channel list. D. Disable DFS channels to prevent interference with Doppler radar. E. Configure channels on the UNII-2 and the Extended UNII-2 sub-bands of the 5 Ghz band only. .
Which GRE tunnel configuration command is missing on R2? A. tunnel source 172.16.1.0 B. tunnel source 200.1.1.1 C. tunnel destination 200.1.1.1 D. tunnel source 192.168.1.2 .
The Gig0/0 interface of two routers is directly connected with a 1G Ethernet link. Which configuration must be applied to the interface of both routers to establish an OSPF adjacency without maintaining a DR/BDR relationship? A. interface Gig0/0 ip ospf network non-broadcast B. interface Gig0/0 ip ospf network point-to-multipoint C. interface Gig0/0 ip ospf network point-to-point D. interface Gig0/0 ip ospf network broadcast .
An engineer configures VRRP and issues the show commands to verify operation. What does the engineer confirm about VRRP group 1 from the output? A. Communication between VRRP members is encrypted using MD5. B. There is no route to 10.10.1.1/32 in R2's routing table. C. R1 is primary if 10.10.1.1/32 is in its routing table. D. If R1 reboots, R2 becomes the primary virtual router until R2 reboots. .
DRAG DROP - Drag and drop the Cisco SD-Access solution areas from the left onto the protocols they use on the right. Select and Place: fabric data plane fabric security policy fabric control plane external connectivity from the fabric.
DRAG DROP - Drag and drop the characteristics from the left onto the routing protocols they describe on the right. Select and Place: The default Administrative Distance is equal to 110 It requires an Autonomous System number to create a routing instance for exchanging routing information It uses virtual links to connect two parts of a partitioned backbone through a non-backbone area It is an Advanced Distance Vector routing protocol It relies on the Diffused Update Algorithm to calculate the shortest path to a destination It requires a process ID that is local to the router.
DRAG DROP - An engineer is working with the Cisco DNA Center API. Drag and drop the methods from the left onto the actions that they are used for on the right. Select and Place: GET POST DELETE PUT.
DRAG DROP - Drag and drop the characteristics from the left onto the QoS components they describe on the right. Select and Place: applied on traffic to convey information to a downstream device distinguishes traffic types process used to buffer traffic that exceeds a predefined rate permits traffic to pass through the device while retaining DSCP/COS values.
Refer to the exhibit. An administrator troubleshoots intermittent connectivity from internal hosts to an external public server. Some internal hosts can connect to the server while others receive an ICMP Host Unreachable message, and these hosts change over time. What is the cause of this issue? A. The NAT ACL and NAT pool share the same name. B. The translation does not use address overloading. C. The NAT ACL does not match all internal hosts. D. The NAT pool netmask is excessively wide. .
What is the function of the LISP map resolver? A. to connect a site to the LISP-capable part of a core network publish the EID-to-RLOC mappings for the site, and respond to map-request messages B. to advertise routable non-LISP traffic from one address family to LISP sites in a different address family C. to send traffic to non-LISP sites when connected to a service provider that does not accept nonroutable EIDs as packet sources D. to decapsulate map-request messages from ITRs and forward the messages to the MS.
Refer to the exhibit. An attacker can advertise OSPF fake routes from 172.16.20.0 network to the OSPF domain and black hole traffic. Which action must be taken to avoid this attack and still be able to advertise this subnet into OSPF? A. Configure 172.16.20.0 as a stub network. B. Configure graceful restart on the 172.16.20.0 interface. C. Configure a passive interface on R2 toward 172.16.20.0. D. Apply a policy to filter OSPF packets on R2. .
Refer to the exhibit. What is the result when a switch that is running PVST+ is added to this network? A. Both switches operate in the PVST+ mode. B. Spanning tree is disabled automatically on the network. C. Both switches operate in the Rapid PVST+ mode. D. DSW2 operates in Rapid PVST + and the new switch operates in PVST+.
Which protocol is responsible for data plane forwarding in a Cisco SD-Access deployment? A. IS-IS B. OSPF C. VXLAN D. LISP .
Refer to the exhibit. Which Python code parses the response and prints "18:32:21.474 UTC Sun Mar 10 2019"? A. print(response['result'][0]('simple_time']) B. print(response['result']['body']( 'simple_time']) C. print(response['body']['simple_time']) D. print(response['jsonrpc']['body'][ 'simple_time']) .
Report abuse Consent Terms of use