Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ONCCNP ENCOR 350-401 - part 18

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
CCNP ENCOR 350-401 - part 18

Description:
CCNP ENCOR 350-401 - part 18

Author:
AVATAR

Creation Date:
18/04/2024

Category:
Others

Number of questions: 48
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
Refer to the exhibit. What is the output of this code? A. 1st_item#######: 645298791871446 2nd_item_that_must_display: jlugyydt## B. 1st_item#######: 6452987918 2nd_item_that_m: jlugyydt## C. 1st_item#######: 8791871446 at_must_display: jlugyydt D. 645298791871446 ##jlugyydt .
Refer to the exhibit. What is the output of this code? A. 1st_item#######: 645298791871446 2nd_item_that_must_display: jlugyydt## Most Voted B. 1st_item#######: 6452987918 2nd_item_that_m: jlugyydt## C. 1st_item#######: 8791871446 at_must_display: jlugyydt D. 645298791871446 ##jlugyydt.
Refer to the exhibit. An engineer is troubleshooting an issue with non-Wi-Fi interference on the 5-GHz band. The engineer has enabled Cisco CleanAir and set the appropriate traps, but the AP does not change the channel when it detects significant interference. Which action will resolve the issue? A. Enable the Avoid Persistent Non-WiFi interference option B. Change the DCA Sensitivity option to High C. Enable the Event Driven Radio Resource Management option D. Disable the Avoid Foreign AP Interference option .
Refer to the exhibit. What is achieved by the XML code? A. It displays the access list sequence numbers from the output of the show ip access-list extended flp command on the terminal screen B. It displays the output of the show ip access-list extended flp command on the terminal screen C. It reads the access list sequence numbers from the output of the show ip access-list extended flp command into a dictionary list D. It reads the output of the show ip access-list extended flp command into a dictionary list.
An engineer measures the Wi-Fi coverage at a customer site The RSSI values are recorded as follows: • Location A: -72 dBm • Location B: -75 dBm • Location C -65 dBm • Location D -80 dBm Which two statements does the engineer use to explain these values to the customer? (Choose two.) A. The signal strength at location C is too weak to support web surfing B. Location D has the strongest RF signal strength C. The RF signal strength at location B is 50% weaker than location A D. The RF signal strength at location C is 10 times stronger than location B E. The signal strength at location B is 10 dB better than location C.
Drag and drop the code snippets from the bottom onto the blanks in the script to convert a Python object into a compact JSON object by removing space characters. Not all options are used. separators=(',', ':') "loads" data "dumps".
Where are operations related to software images located in the Cisco DNA Center GUI? A. Services B. Provisioning C. Assurance D. Design.
What is a difference between OSPF and EIGRP? A. OSPF uses a default hello timer of 5 seconds. EIGRP uses a default hello timer of 10 seconds. B. OSPF uses multicast addresses 224.0.0.5 and 224.0.0.6. EIGRP uses multicast address 224.0.0.10. C. OSPF uses an administrative distance of 115. EIGRP uses an administrative distance of 160. D. OSPF uses IP protocol number 88. EIGRP uses IP protocol number 89. .
Which type of antenna is designed to provide a 360-degree radiation pattern? A. Yagi B. patch C. directional D. omnidirectional.
Which two security mechanisms are used by Cisco Threat Defense to gain visibility into the most dangerous cyber threats? (Choose two.) A. virtual private networks B. file reputation C. VLAN segmentation D. Traffic Telemetry E. dynamic enforce policy .
Which action is a LISP ITR responsible for? A. responding to map-request messages B. forwarding user data traffic C. finding EID-to-RLOC mappings D. accepting registration requests from ETRs .
An engineer modifies the existing ISE guest portal URL to use a static FQDN. Users immediately report that they receive certificate errors when they are redirected to the new page. Which two additional configuration steps are needed to implement the change? (Choose two.) A. Add a new DNS record to resolve the FQDN to the PSN IP address B. Create and sign a new CSR that contains the static FQDN entry C. Manually configure the hosts file on each user device. D. Disable HTTPS on the WLC under the Management menu E. Add the FQDN entry under the WLC virtual interface.
Which JSON script is properly formatted? A B C D.
What is contained in the VXLAN header? A. VXLAN network identifier B. source and destination RLOC ID C. endpoint ID D. original Layer 2 VLAN ID .
Refer to the exhibit. Clients are reporting an issue with the voice traffic from the branch site to the central site. What is the cause of this issue? A. There is a routing loop on the network B. There is a high delay on the WAN links C. Traffic is load-balancing over both links, causing packets to arrive out of order D. The voice traffic is using the link with less available bandwidth .
Which virtualization component creates VMs and performs hardware abstraction that allows multiple VMs to run at the same time? A. container B. Docker C. hypervisor D. rkt .
Refer to the exhibit. An SSID is configured and both clients can reach their gateways on the Layer 3 switch, but they cannot communicate with each other. Which action resolves this issue? A. Set the WMM Policy to Allowed B. Set the P2P Blocking Action to Disabled C. Set the WMM Policy to Required D. Set the P2P Blocking Action to Forward-UpStream .
What is a characteristic of VXLAN? A. It extends Layer 2 and Layer 3 overlay networks over a Layer 2 underlay B. It has a 12-byte packet header C. It uses TCP for transport, D. It is a multi-tenant solution.
Which network devices secure API platforms? A. content switches B. web application firewalls C. next-generation intrusion detection systems D. Layer 3 transit network devices .
What does Call Admission Control require the client to send in order to reserve the bandwidth? A. SIP flow information B. Wi-Fi multimedia C. VoIP media session awareness D. traffic specification.
Which capability does a distributed virtual switch have? A. use floating static routes B. provide configuration consistency across the hosts C. run dynamic routing protocols D. use advanced IPsec encryption algorithms .
Which two methods are used to assign security group tags to the user in a Cisco TrustSec. architecture? (Choose two.) A. web authentication B. IEEE 802.1x C. DHCP D. modular QoS E. policy routing .
Which resource must the hypervisor make available to the virtual machines? A. bandwidth B. IP address C. processor D. secure access .
Drag and drop the automation characteristics from the left onto the corresponding tools on the right. all functions are performed over SSH Ruby syntax in configuration files YAML configuration language based on Python.
Refer to the exhibit. An engineer must configure a Cisco WLC with WPA2 Enterprise mode and avoid global server lists. Which action is required? A. Enable EAP parameters B. Apply CISCO ISE default settings C. Select a RADIUS authentication server D. Disable the RADIUS server accounting interim update .
Refer to the exhibit. An administrator must collect basic statistics about the approximate amount of IPv4 and IPv6 flows entering Gi0/0 using NetFlow. However, the administrator is concerned that NetFlow processing during periods of high utilization on Gi0/0 will overwhelm the router CPU. Which configuration minimizes CPU impact and keeps the data flows across Gi0/0 intact? A B C D.
Which two mechanisms are used with OAuth 2.0 for enhanced validation? (Choose two.) A. authorization B. custom headers C. request management D. authentication E. accounting .
Which characteristic applies to the endpoint security aspect of the Cisco Threat Defense architecture? A. detect and block ransomware in email attachments B. outbound URL analysis and data transfer controls C. user context analysis D. blocking of fileless malware in real time.
Refer to the exhibit. An administrator writes a script to fetch the list of devices that are registered with Cisco DNA Center. Why does the execution abort? A. The TLS certificate of DNA Center is invalid B. The username or the password is incorrect C. The “dna-center” hostname cannot be resolved to an IP address D. The authentication URL is incorrect .
When is GLBP preferred over HSRP? A. When the gateway routers are a mix of Cisco and non-Cisco routers. B. When encrypted hellos are required between gateways in a single group. C. When the traffic load needs to be shared between multiple gateways using a single virtual IP. D. When clients need the gateway MAC address to be the same between multiple gateways. .
Which TLV value must be added to Option 43 when DHCP is used to ensure that APs join the WLC? A. 0x77 B. AAA C. 0xf1 D. 642 .
Drag and drop the automation characteristics from the left onto the appropriate tools on the right. Not all options are used. uses Ruby lacks high availability uses push from primary to agent uses pull from agent to primary uses YAML.
What is a characteristic of a virtual machine? A. It is more resource efficient than a container. B. It provides an environment completely isolated from the host OS. C. It is more lightweight than a container. D. It shares the host OS kernel, binaries, and libraries. .
Refer to the Exhibit. External users require HTTP connectivity to an internal company web server that is listening on TCP port 8080. Which command set accomplishes? A. interface G0/0 ip address 209.165.200.225 255.255.255.224 ip nat outside interface G0/1 ip address 10.1.1.1 255.255.255.0 ip nat inside ip nat inside source static tcp 209.165.200.225 8080 10.1.1.100 8080 B. interface G0/0 ip address 209.165.200.225 255.255.255.224 ip nat inside interface G0/1 ip address 10.1.1.1 255.255.255.0 ip nat outside ip nat inside source static tcp 10.1.1.1 8080 209.165.200.225 80 C. interface G0/0 ip address 209.165.200.225 255.255.255.224 ip nat outside interface G0/1 ip address 10.1.1.1 255.255.255.0 ip nat inside ip nat inside source static tcp 10.1.1.1 8080 209.165.200.225 80 D. interface G0/0 ip address 209.165.200.225 255.255.255.224 ip nat inside interface G0/1 ip address 10.1.1.1 255.255.255.0 ip nat outside ip nat inside source static tcp 209.165.200.225 80 10.1.1.100 8080 .
A network engineer must configure the VTY lines on a router to achieve these results: • Remote access should be permitted only for secure protocols. • Only a password should be required for device authentication. • All idle EXEC sessions must be terminated in 60 minutes. Which configuration should be applied? A. line vty 0 15 password Cisco123 transport input ssh exec-timeout 60 B. line vty 0 15 login password Cisco123 transport input ssh exec-timeout 60 C. line vty 0 15 password Cisco123 transport input telnet ssh exec-timeout 60 D. line vty 0 15 password Cisco123 transport input all session-timeout 60 .
How does NETCONF YANG represent data structures? A. as strict data structures defined by RFC 6020 B. in an XML tree format C. in an HTML format D. as modules within a tree .
Refer to the exhibit. An engineer must modify the existing configuration so that R2 can take over as the primary router when serial interface 0/0.1 on R1 goes down. Which command must the engineer apply? A. R2# standby 100 preempt B. R2# standby 100 priority 100 C. R2# standby 100 track 26 decrement 10 D. R2# track 26 interface Serial0/0.1 line-protocol .
Refer to the exhibit. An engineer deploys a script to retrieve the running configuration from a NETCONF-capable Cisco IOS XE device that is configured with default settings. The script fails. Which configuration must be applied to retrieve the configuration using NETCONF? A. print (netconf_host.get_config(‘show running’)) B. port=830 C. device_params=(‘name’:’los-xe’}) D. hostkey_verify=True, .
Refer to the exhibit. Which action must be taken to configure a WLAN for WPA2-AES with PSK and allow only 802.11r-capable clients to connect? A. Enable Fast Transition and FT + PSK. B. Enable Fast Transition and PSK. C. Change Fast Transition to Adaptive Enabled and enable FT + PSK. D. Enable PSK and FT + PSK .
Refer to the exhibit. Which address type is 10.10.10.10 configured for? A. outside global B. inside global C. outside local D. inside local .
Refer to the exhibit. What is the result of the NTP configuration? A. The router will use the address of loppback 0 to communicate with the NTP server. B. The router will advertise but not listen to NTP broadcast packets. C. The router will be used as an NTP authoritative server only if it synchronized with an outside source. D. The router will be used as an NTP authoritative server, even if it is not synchronized with an outside source. .
Refer to the exhibit. An engineer must create a manually triggered EEM applet to enable the R2 router interface and assign an IP address to it. What is required to complete this configuration? A. R2(config-apple)#action 4 cli command “ip add 172.16.1.1 0.0.0.255” B. R2(config)# event manager session cli username C. R2(config-applet)# event oir D. R2(config-applet)# event none sync yes .
What is stateful switchover? A. cluster protocol used to facilitate switch failover B. mechanism to take control from a failed RP while maintaining connectivity C. mechanism used to prevent routing protocol loops during an RP switchover D. First Hop Redundancy Protocol for host gateway connectivity .
Which two features are available only in next-generation firewalls? (Choose two.) A. application awareness B. packet filtering C. stateful inspection D. deep packet inspection E. virtual private network .
Refer to the exhibit. Which result is achieved by the CoPP configuration? A. Traffic that matches entry 10 of ACL 100 is always dropped. B. Class-default is dropped. C. Traffic that matches entry 10 of ACL 100 is always allowed with a limited CIR. D. Traffic that matches entry 10 of ACL 100 is always allowed.
An engineer must use flexible NetFlow on a group of switches. To prevent overloading of the flow connector, if the flow is idle for 20 seconds, the flow sample should be exported. Which command set should be applied? A. flow record recordflow exporter flowexport record recordflow cache timeout active 120 cache timeout inactive 20 cache type immediate B. flow monitor monitorflow exporter flowexport record recordflow cache timeout active 120 cache timeout inactive 20 cache type immediate C. flow monitor monitorflow exporter recordflow cache timeout active 120 cache timeout inactive 20 cache type permanent D. flow record recordflow match ipv6 destination ip-address match ipv6 source ip-address match ipv6 protocol-type view match interface input match interface output match transport destination-port collect counter bytes long .
When a branch location loses connectivity, which Cisco FlexConnect state rejects new users but allows existing users to function normally? A. Authentication-Down/Switch-Local B. Authentication-Down/Switching-Down C. Authentication-Central/Switch-Local D. Authentication-Local/Switch-Local .
Refer to the exhibit. Which action does the Python script accomplish? A. connects to the device using Telnet and exports the routing table information B. connects to the device using SSH and exports the routing table information C. displays the output of the show command in an unformatted way D. displays the output of the show command in a formatted way .
Report abuse Consent Terms of use