Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ONCCNP ENCOR - Part 2

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
CCNP ENCOR - Part 2

Description:
ccnp encor part2

Author:
AVATAR

Creation Date:
24/04/2024

Category:
Others

Number of questions: 50
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
In Cisco SD-WAN, which protocol is used to measure link quality? A. IPsec B. OMP C. RSVP D. BFD.
What is used to perform QoS packet classification? A. the Type field in the Layer 2 frame B. the Options field in the Layer 3 header C. the TOS field in the Layer 3 header D. the Flags field in the Layer 3 header .
How do cloud deployments differ from on-premises deployments? A. Cloud deployments require longer implementation times than on-premises deployments. B. Cloud deployments are more customizable than on-premises deployments. C. Cloud deployments have lower upfront costs than on-premises deployments. D. Cloud deployments require less frequent upgrades than on-premises deployments. .
Which controller is capable of acting as a STUN server during the onboarding process of Edge devices? A. vBond B. vSmart C. vManage D. PNP Server .
How is 802.11 traffic handled in a fabric-enabled SSID? A. centrally switched back to WLC where the user traffic is mapped to a VXLAN on the WLC B. converted by the AP into 802.3 and encapsulated into VXLAN C. centrally switched back to WLC where the user traffic is mapped to a VLAN on the WLC D. converted by the AP into 802.3 and encapsulated into a VLAN .
An engineer is installing a new pair of routers in a redundant configuration. When checking on the standby status of each router, the engineer notices that the routers are not functioning as expected. Which action will resolve the configuration error? A. configure matching hold and delay timers B. configure matching key-strings C. configure matching priority values D. configure unique virtual IP addresses.
Router1 is currently operating as the HSRP primary with a priority of 110. Router1 fails and Router2 takes over the forwarding role. Which command on Router1 causes it to take over the forwarding role when it returns to service? A. standby 2 priority B. standby 2 preempt C. standby 2 track D. standby 2 timers .
An engineer has deployed a single Cisco 5520 WLC with a management IP address of 172 16.50.5/24. The engineer must register 50 new Cisco AIR-CAP2802I- E-K9 access points to the WLC using DHCP option 43. The access points are connected to a switch in VLAN 100 that uses the 172.16.100.0/24 subnet. The engineer has configured the DHCP scope on the switch as follows: Network 172.16.100.0 255.255.255.0 Default Router 172.16.100.1 - Option 43 ASCII 172.16.50.5 - The access points are failing to join the wireless LAN controller. Which action resolves the issue? A. configure option 43 Hex F104.AC10.3205 B. configure option 43 Hex F104.CA10.3205 C. configure dns-server 172.16.50.5 D. configure dns-server 172. 16.100.1 .
What is the role of vSmart in a Cisco SD-WAN environment? A. to establish secure control plane connections B. to monitor, configure, and maintain SD-WAN devices C. to provide secure data plane connectivity over WAN links D. to perform initial authentication of devices .
Which action is performed by Link Management Protocol in a Cisco StackWise Virtual domain? A. It determines which switch becomes active or standby. B. It determines if the hardware is compatible to form the StackWise Virtual domain. C. It rejects any unidirectional link traffic forwarding. D. It discovers the StackWise domain and brings up SVL interfaces. .
What are two reasons why broadcast radiation is caused in the virtual machine environment? (Choose two.) A. vSwitch must interrupt the server CPU to process the broadcast packet. B. The Layer 2 domain can be large in virtual machine environments. C. Virtual machines communicate primarily through broadcast mode. D. Communication between vSwitch and network switch is broadcast based. E. Communication between vSwitch and network switch is multicast based. .
Which two GRE features are configured to prevent fragmentation? (Choose two.) A. TCP window size B. IP MTU C. TCP MSS D. DF bit clear E. MTU ignore .
Which LISP device is responsible for publishing EID-to-RLOC mappings for a site? A. ETR B. MR C. ITR D. MS.
Assuming that R1 is a CE router, which VRF is assigned to Gi0/0 on R1? A. default VRF B. VRF VPN_A C. VRF VPN_B D. management VRF .
What are two benefits of virtualizing the server with the use of VMs in a data center environment? (Choose two.) A. reduced rack space, power, and cooling requirements B. smaller Layer 2 domain C. increased security D. speedy deployment E. reduced IP and MAC address requirements .
Which statement about route targets is true when using VRF-Lite? A. Route targets control the import and export of routes into a customer routing table. B. When BGP is configured, route targets are transmitted as BGP standard communities. C. Route targets allow customers to be assigned overlapping addresses. D. Route targets uniquely identify the customer routing table. .
Which LISP infrastructure device provides connectivity between non-LISP sites and LISP sites by receiving non-LISP traffic with a LISP site destination? A. PITR B. map resolver C. map server D. PETR .
Which statement explains why Type 1 hypervisor is considered more efficient than Type2 hypervisor? A. Type 1 hypervisor is the only type of hypervisor that supports hardware acceleration techniques. B. Type 1 hypervisor relies on the existing OS of the host machine to access CPU, memory, storage, and network resources. C. Type 1 hypervisor runs directly on the physical hardware of the host machine without relying on the underlying OS. D. Type 1 hypervisor enables other operating systems to run on it. .
Which statement about VXLAN is true? A. VXLAN encapsulates a Layer 2 frame in an IP-UDP header, which allows Layer 2 adjacency across router boundaries. B. VXLAN uses the Spanning Tree Protocol for loop prevention. C. VXLAN extends the Layer 2 Segment ID field to 24-bits, which allows up to 4094 unique Layer 2 segments over the same network. D. VXLAN uses TCP as the transport protocol over the physical data center network. .
Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel? A. MSS B. MTU C. MRU D. window size .
Which statement describes the IP and MAC allocation requirements for virtual machines on Type 1 hypervisors? A. Virtual machines do not require a unique IP or unique MAC. They share the IP and MAC address of the physical server. B. Each virtual machine requires a unique IP address but shares the MAC address with the physical server. C. Each virtual machine requires a unique IP and MAC addresses to be able to reach to other nodes. D. Each virtual machine requires a unique MAC address but shares the IP address with the physical server. .
Which two namespaces does the LISP network architecture and protocol use? (Choose two.) A. TLOC B. RLOC C. DNS D. VTEP E. EID .
Which two entities are Type 1 hypervisors? (Choose two.) A. Oracle VM VirtualBox B. Microsoft Hyper-V C. VMware server D. VMware ESXi E. Microsoft Virtual PC .
DRAG DROP - Drag and drop the LISP components from the left onto the functions they perform on the right. Not all options are used. Select and Place: LISP map resolver LISP proxy ETR LISP route reflector LISP ITR LISP map server.
Which action is a function of VTEP in VXLAN? A. tunneling traffic from IPv6 to IPv4 VXLANs B. allowing encrypted communication on the local VXLAN Ethernet segment C. encapsulating and de-encapsulating VXLAN Ethernet frames D. tunneling traffic from IPv4 to IPv6 VXLANs .
Which two actions provide controlled Layer 2 network connectivity between virtual machines running on the same hypervisor? (Choose two.) A. Use a virtual switch provided by the hypervisor. B. Use a virtual switch running as a separate virtual machine. C. Use VXLAN fabric after installing VXLAN tunneling drivers on the virtual machines. D. Use a single routed link to an external router on stick. E. Use a single trunk link to an external Layer2 switch.
What is a Type 1 hypervisor? A. runs directly on a physical server and depends on a previously installed operating system B. runs directly on a physical server and includes its own operating system C. runs on a virtual server and depends on an already installed operating system D. runs on a virtual server and includes its own operating system .
Refer to the exhibit. A network engineer configures a GRE tunnel and enters the show interface tunnel command. What does the output confirm about the configuration? A. The keepalive value is modified from the default value. B. The physical interface MTU is 1476 bytes. C. The tunnel mode is set to the default. D. Interface tracking is configured. .
What it the purpose of the LISP routing and addressing architecture? A. It creates two entries for each network node, one for its identity and another for its location on the network. B. It allows LISP to be applied as a network virtualization overlay though encapsulation. C. It allows multiple instances of a routing table to co-exist within the same router. D. It creates head-end replication used to deliver broadcast and multicast frames to the entire network. .
What function does VXLAN perform in a Cisco SD-Access deployment? A. policy plane forwarding B. control plane forwarding C. data plane forwarding D. systems management and orchestration .
MTU has been configured on the underlying physical topology, and no MTU command has been configured on the tunnel interfaces. What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared? A. The packet is discarded on router B B. The packet arrives on router C without fragmentation C. The packet arrives on router C fragmented D. The packet is discarded on router A .
Which entity is responsible for maintaining Layer 2 isolation between segments in a VXLAN environment? A. VNID B. switch fabric C. VTEP D. host switch .
What is an emulated machine that has dedicated compute, memory, and storage resources and a fully installed operating system? A. mainframe B. host C. virtual machine D. container .
Drag and drop the descriptions of the VSS technology from the left to the right. Not all options are used. Select and Place: combines exactly two devices supported on Cisco 3750 and 3850 devices supported on Cisco 4500 and 6500 series supports devices that are geographically separated supports up to nine devices uses proprietary cabling.
Which technology does VXLAN use to provide segmentation for Layer 2 and Layer 3 traffic? A. bridge domain B. VLAN C. VNI D. VRF .
Refer to the exhibit. An engineer must assign an IP address of 192.168.1.1/24 to the GigabitEthernet1 interface. Which two commands must be added to the existing configuration to accomplish this task? (Choose two.) A. Router(config-if)#ip address 192.168.1.1 255.255.255.0 B. Router(config-vrf)#address-family ipv4 C. Router(config-vrf)#ip address 192.168.1.1 255.255.255.0 D. Router(config-if)#address-family ipv4 E. Router(config-vrf)#address-family ipv6 .
The following system log message is presented after a network administrator configures a GRE tunnel: %TUN-RECURDOWN Interface Tunnel 0 temporarily disabled due to recursive routing Why is Tunnel 0 disabled? A. Because dynamic routing is not enabled. B. Because the tunnel cannot reach its tunnel destination. C. Because the best path to the tunnel destination is through the tunnel itself. D. Because the router cannot recursively identify its egress forwarding interface. .
What is a benefit of using a Type 2 hypervisor instead of a Type 1 hypervisor? A. better application performance B. improved security because the underlying OS is eliminated C. improved density and scalability D. ability to operate on hardware that is running other OSs .
Refer to the exhibit. A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Which two configuration changes accomplish this? (Choose two). A. Create an IPsec profile, associate the transform-set ACL, and apply the profile to the tunnel interface. B. Apply the crypto map to the tunnel interface and change the tunnel mode to tunnel mode ipsec ipv4. C. Remove all configuration related to crypto map from R1 and R2 and eliminate the ACL. D. Create an IPsec profile, associate the transform-set, and apply the profile to the tunnel interface. E. Remove the crypto map and modify the ACL to allow traffic between 10.10.0.0/24 to 10.20.0.0/24. .
What is a benefit of a virtual machine when compared with a physical server? A. Multiple virtual servers can be deployed on the same physical server without having to buy additional hardware. B. Virtual machines increase server processing performance. C. The CPU and RAM resources on a virtual machine cannot be affected by other virtual machines. D. Deploying a virtual machine is technically less complex than deploying a physical server. .
What is required for a virtual machine to run? A. a Type 1 hypervisor and a host operating system B. a hypervisor and physical server hardware C. only a Type 1 hypervisor D. only a Type 2 hypervisor .
Which entity is a Type 1 hypervisor? A. Oracle VM VirtualBox B. Citrix XenServer C. VMware server D. Microsoft Virtual PC .
What are two benefits of virtual switching when compared to hardware switching? (Choose two.) A. increased MTU size B. VM-level isolation C. extended 802.1Q VLAN range D. hardware independence E. increased flexibility.
What is a characteristic of a virtual machine? A. It must run the same operating system as its host. B. It is deployable without a hypervisor to host it. C. It must be aware of other virtual machines, in order to allocate physical resources for them. D. It relies on hypervisors to allocate computing resources for it. .
Which LISP component is required for a LISP site to communicate with a non-LISP site? A. Proxy ITR B. ITR C. ETR D. Proxy ETR.
Which two components are supported by LISP? (Choose two.) A. proxy ETR B. egress tunnel router C. route reflector D. HMAC algorithm E. spoke .
What is the function of a VTEP in VXLAN? A. provide the routing underlay and overlay for VXLAN headers B. dynamically discover the location of end hosts in a VXLAN fabric C. encapsulate and de-encapsulate traffic into and out of the VXLAN fabric D. statically point to end host locations of the VXLAN fabric .
Refer to the exhibit. Which configuration must be applied to R1 to enable R1 to reach the server at 172.16.0.1? A. interface Ethernet0/0 ip address 172.16.0.7 255.255.0.0 router ospf 44 vrf bank network 172.16.0.0 255.255.0.0 B. interface Ethernet0/0 vrf forwarding hotel ip address 172.16.0.7 255.255.0.0 router ospf 44 vrf Hotel network 172.16.0.0 0.0.255.255 area 0 C. interface Ethernet0/0 vrf forwarding bank ip address 172.16.0.7 255.255.0.0 router ospf 44 vrf bank network 172.16.0.0 0.0.255.255 area 0 D. interface Ethernet0/0 ip address 172.16.0.7 255.255.0.0 router ospf 44 vrf hotel network 172.16.0.0 255.255.0.0 .
Refer to the exhibit. Which configuration allows Customer2 hosts to access the FTP server of Customer1 that has the IP address of 192.168.1.200? A. ip route vrf Customer1 172.16.1.0 255.255.255.0 172.16.1.1 global ip route vrf Customer2 192.168.1.200 255.255.255.255 192.168.1.1 global ip route 192.168.1.0 255.255.255.0 Vlan10 ip route 172.16.1.0 255.255.255.0 Vlan20 B. ip route vrf Customer1 172.16.1.1 255.255.255.255 172.16.1.1 global ip route vrf Customer2 192.168.1.200 255.255.255.0 192.168.1.1 global ip route 192.168.1.0 255.255.255.0 Vlan10 ip route 172.16.1.0 255.255.255.0 Vlan20 C. ip route vrf Customer1 172.16.1.0 255.255.255.0 172.16.1.1 Customer2 ip route vrf Customer2 192.168.1.200 255.255.255.255 192.168.1.1 Customer1 D. ip route vrf Customer1 172.16.1.0 255.255.255.0 172.16.1.1 Customer1 ip route vrf Customer2 192.168.1.200 255.255.255.255 192.168.1.1 Customer2 .
Refer to the exhibit. A network engineer configures a new GRE tunnel and enters the show run command. What does the output verify? A. The tunnel keepalive is configured incorrectly because they must match on both sites. B. The tunnel destination will be known via the tunnel interface. C. The tunnel will be established and work as expected. D. The default MTU of the tunnel interface is 1500 bytes. .
Report abuse Consent Terms of use