Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ONCCNP ENCOR 350-401 - part 10

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
CCNP ENCOR 350-401 - part 10

Description:
CCNP ENCOR 350-401 - part 10

Author:
AVATAR

Creation Date:
25/04/2024

Category:
Others

Number of questions: 50
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
Refer to the exhibit. After configuring HSRP an engineer enters the show standby command. Which two facts are derived from the output? (Choose two.) A. R2 becomes the active router after the hold time expires. B. If Fa0/0 is shut down, the HSRP priority on R2 becomes 80. Most Voted C. R2 Fa1/0 regains the primary role when the link comes back up. D. The router with IP 10.10.1.3 is active because it has a higher IP address. E. R2 is using the default HSRP hello and hold timers. Most Voted .
Which two parameters are examples of a QoS traffic descriptor? (Choose two.) A. DSCP B. MPLS EXP bits C. packet size D. bandwidth E. ToS .
Refer to the exhibit. An engineer attempts to create a configuration to allow the Blue VRF to leak into the global routing table, but the configuration does not function as expected. Which action resolves this issue? A. Change the source network that is specified in access-list 101. B. Change the access-list destination mask to a wildcard. C. Change the access-list number in the route map. D. Change the route-map configuration to VRF_BLUE. .
An engineer must configure a multicast UDP jitter operation. Which configuration should be applied? A. Router(config)#ip sla 1 Router(config)#udp-jitter 192.0.2.115 65051 B. Router(config)#ip sla 1 Router(config)#udp jitter 239.1.1.1 65051 end-point list List source-ip 192.168.1.1 C. Router(config)#ip sla 1 Router(config)#udp-jitter 192.0.2.115 65051 num-packets 20 D. Router(config)#ip sla 1 Router(config)#udp jitter 10.0.0.1 source-ip 192.168.1.1 .
Refer to the exhibit. The network administrator must be able to perform configuration changes when all the RADIUS servers are unreachable. Which configuration allows all commands to be authorized if the user has successfully authenticated? A. aaa authentication login default group radius local none B. aaa authorization exec default group radius C. aaa authorization exec default group radius if-authenticated D. aaa authorization exec default group radius none .
In a Cisco SD-WAN solution, which two functions are performed by OMP? (Choose two.) A. advertisement of network prefixes and their attributes B. configuration of control and data policies C. gathering of underlay infrastructure data D. delivery of crypto keys E. segmentation and differentiation of traffic .
How can an engineer prevent basic replay attacks from people who try to brute force a system via REST API? A. Add a timestamp to the request in the API header. B. Use a password hash. C. Add OAuth to the request in the API header. D. Use HTTPS. .
What are the main components of Cisco TrustSec? A. Cisco ISE and Enterprise Directory Services B. Cisco ISE, network switches, firewalls, and routers C. Cisco ISE and TACACS+ D. Cisco ASA and Cisco Firepower Threat Defense .
What is a characteristic of a WLC that is in master controller mode? A. Configuration on the master controller is executed on all wireless LAN controllers. B. The master controller is responsible for load balancing all connecting clients to other controllers. C. All new APs that join the WLAN are assigned to the master controller. D. All wireless LAN controllers are managed by the master controller. .
Which Cisco FlexConnect state allows wireless users that are connected to the network to continue working after the connection to the WLC has been lost? A. Authentication Down/Switching Down B. Authentication-Central/Switch-Local C. Authentication-Central/Switch-Central D. Authentication-Down/Switch-Local.
Refer to the exhibit. Object tracking has been configured for VRRP-enabled routers Edge-01 and Edge-02. Which commands cause Edge-02 to preempt Edge-01 in the event that interface G0/0 goes down on Edge-01? A. Edge-01(config)#interface G0/1 Edge-01(config-if)#vrrp 10 track 10 decrement 30 B. Edge-02(config)#interface G0/1 Edge-02(config-if)#vrrp 10 track 10 decrement 30 C. Edge-02(config)#interface G0/1 Edge-02(config-if)#vrrp 10 track 10 decrement 10 D. Edge-01(config)#interface G0/1 Edge-01(config-if)#vrrp 10 track 10 decrement 10 .
Refer to the exhibit. An engineer must prevent the R6 loopback from getting into Area 2 and Area 3 from Area 0. Which action must the engineer take? A. Apply a filter list outbound on R3 and R7. B. Apply a filter list inbound on R2 and R9. C. Apply a filter list inbound on R3 and R7. D. Apply a filter list outbound on R7 only. .
An engineer must configure and validate a CoPP policy that allows the network management server to monitor router R1 via SNMP while protecting the control plane. Which two commands or command sets must be used? (Choose two.) A. access-list 150 permit udp 10.0.1.4 0.0.0.0 host 10.0.1.2 eq snmp access-list 150 permit udp 10.0.1.4 0.0.0.0 eq snmp host 10.0.1.2 class-map match-all CoPP-management match access-group 150 policy-map CoPP-policy class CoPP-management police 8000 conform-action transmit exceed-action transmit violate-action drop control-plane Service-policy input CoPP-policy B. show ip interface brief C. show quality-of-service-profile D. access-list 150 permit udp 10.0.1.4 0.0.0.0 host 10.0.1.2 eq snmp class-map match-all CoPP-management match access-group 150 policy-map CoPP-policy class CoPP-management police 8000 conform-action transmit exceed-action transmit violate-action transmit control-plane Service-policy input CoPP-policy E. show policy-map control-plane.
A vulnerability assessment highlighted that remote access to the switches is permitted using unsecure and unencrypted protocols. Which configuration must be applied to allow only secure and reliable remote access for device administration? A. line vty 0 15 login local transport input all B. line vty 0 15 login local transport input ssh C. line vty 0 15 login local transport input telnet ssh D. line vty 0 15 login local transport input none .
Which feature is used to propagate ARP, broadcast, and link-local frames across a Cisco SD-Access fabric to address connectivity needs for silent hosts that require reception of traffic to start communicating? A. Multisite Fabric B. Native Fabric Multicast C. SDA Transit D. Layer 2 Flooding.
Which function does a fabric wireless LAN controller perform in a Cisco SD-Access deployment? A. manages fabric-enabled APs and forwards client registration and roaming information to the Control Plane Node B. coordinates configuration of autonomous nonfabric access points within the fabric C. performs the assurance engine role for both wired and wireless clients D. is dedicated to onboard clients in fabric-enabled and nonfabric-enabled APs within the fabric .
Refer to the exhibit. An engineer must permit traffic from these networks and block all other traffic. An informational log message should be triggered when traffic enters from these prefixes. Which access list must be used? A. access-list acl_subnets permit ip 10.0.32.0 0.0.7.255 access-list acl_subnets deny ip any log B. access-list acl_subnets permit ip 10.0.32.0 255.255.248.0 log C. access-list acl_subnets permit ip 10.0.32.0 0.0.7.255 log D. access-list acl_subnets permit ip 10.0.32.0 0.0.0.255 log .
Refer to the exhibit. Which Python code snippet prints the descriptions of disabled interfaces only? A. for interface in netconf_data["GigabitEthernet"]: if interface["enabled"]!='false': print(interface["description"]) B. for interface in netconf_data["GigabitEthernet"]: if interface["enabled"]!='true': print(interface["description"]) C. for interface in netconf_data["GigabitEthernet"]: if interface["disabled"]!='false': print(interface["description"]) D. for interface in netconf_data["GigabitEthernet"]: print(interface["enabled"]) print(interface["description"]).
Which measure is used by an NTP server to indicate its closeness to the authoritative time source? A. stratum B. time zone C. latency D. hop count .
When is the Design workflow used in Cisco DNA Center? A. in a greenfield deployment, with no existing infrastructure B. in a greenfield or brownfield deployment, to wipe out existing data C. in a brownfield deployment, to modify configuration of existing devices in the network D. in a brownfield deployment, to provision and onboard new network devices .
What are two characteristics of VXLAN? (Choose two) A. It lacks support for host mobility. B. It uses VTEPs to encapsulate and decapsulate frames. C. It allows for up to 16 million VXLAN segments. D. It extends Layer 2 and Layer 3 overlay networks over a Layer 2 underlay. E. It has a 12-bit network identifier. .
Refer to the exhibit. An engineer configures OSPF and wants to verify the configuration. Which configuration is applied to this device? A. R1(config)#interface Gi0/1 R1(config-if)#ip ospf enable R1(contig-if)#ip ospf network broadcast R1(config-if)#no shutdown B. R1(config)#router ospf 1 R1(config-router)#network 0.0.0.0 0.0.0.0 area 0 R1(config-router)#no passive-interface Gi0/1 C. R1(config)#interface Gi0/1 R1(config-if)#ip ospf 1 area 0 R1(config-if)#no shutdown D. R1(config)#router ospf 1 R1(config-router)#network 192.168.50.0 0.0.0.255 area 0 .
What is the function of a control-plane node in a Cisco SD-Access solution? A. to run a mapping system that manages endpoint to network device relationships B. to implement policies and communicate with networks outside the fabric C. to connect external Layer 3 networks to the SD-Access fabric D. to connect APs and wireless endpoints to the SD-Access fabric .
What is a characteristic of a Type 2 hypervisor? A. It eliminates the need for an underlying operating system. B. Problems in the base operating system can affect the entire system. C. Its main task is to manage hardware resources between different operating systems. D. It is completely independent of the operating system. .
What is the purpose of a data modeling language? A. to describe the structure and meaning of exchanged data B. to standardize the procedures that are executed when parsing sent and received data C. to establish a framework to process data by using an object-oriented programming approach D. to specify the rules for transcoding between text and binary data encodings .
Which IPv4 packet field carries the QoS IP classification marking? A. ID B. TTL C. FCS D. ToS .
Which two solutions are used for backing up a Cisco DNA Center Assurance database? (Choose two.) A. bare metal server B. remote server C. NFS share D. local server E. non-linux server .
Refer to the exhibit. Communication between R2 and R3 over FastEthenet1/1 falls. What is the root cause of the failure? A. The subnet mask is different between the two interfaces. B. The interface of R3 is not operational. C. The wrong type of cable is connected between the two interfaces. D. IP CEF is disabled on R3. .
What is one characteristic of the Cisco SD-Access control plane? A. It allows host mobility only in the wireless network. B. It is based on VXLAN technology. C. Each router processes every possible destination and route. D. It stores remote routes in a centralized database server.
A customer transitions a wired environment to a Cisco SD-Access solution. The customer does not want to integrate the wireless network with the fabric. Which wireless deployment approach enables the two systems to coexist and meets the customer requirement? A. Deploy the wireless network over the top of the fabric. B. Implement a Cisco DNA Center to manage the two networks. C. Deploy a separate network for the wireless environment. D. Deploy the APs in autonomous mode. .
By default, which virtual MAC address does HSRP group 14 use? A. 04:17:01:05:7c:0e B. 00:05:0c:07:ac:14 C. 00:00:0c:07:ac:0e D. 00:05:5e:19:0c:14 .
Which LISP component decapsulates messages and forwards them to the map server responsible for the egress tunnel routers? A. Router Locator B. Map Resolver C. Proxy ETR D. Ingress Tunnel Router .
An engineer must design a wireless network for a school system based on these requirements: ✑ The network must be able to triangulate client location based on RSSI. ✑ Each client must be able to sustain 5 Mbps of throughput at all times. ✑ Each classroom has up to 30 clients. ✑ Primary coverage is 5 GHz. Which design should be used? A. Place APs in a grid orientation throughout the building, located as close as possible to the center of each classroom. B. Mount one AP in the center of each classroom. C. Space APs evenly on both sides of the hallways. D. Place APs near exterior walls and corners of the building, and fill in the center area with a staggered pattern.
Refer to the exhibit. Which command must be applied to R2 for an OSPF neighborship to form? A. network 20.1.1.0 0.0.0.0 area 0 B. network 20.1.1.2 0.0.0.0 area 0 C. network 20.0.0.2 0.0.0.3 area 0 D. network 20.0.0.2 0.0.0.0 area 0 .
What is one characteristic of VXLAN? A. It supports a maximum of 4096 VLANs B. It supports multitenant segments C. It uses STP to prevent loops in the underlay network D. It uses the Layer 2 header to transfer packets through the network underlay .
What is the function of vBond in a Cisco SD-WAN deployment? A. initiating connections with SD-WAN routers automatically B. pushing of configuration toward SD-WAN routers C. onboarding of SD-WAN routers into the SD-WAN overlay D. gathering telemetry data from SD-WAN routers .
Refer to the exhibit. A network administrator configured RSPAN to troubleshoot an issue between switch 1 and switch2. The switches are connected using interface GigabitEthernet 1/1. An external packet capture device is connected to swich2 interface GigabitEthernet 1/2. Which two commands must be added to complete this configuration? (Choose two.) A. switch2(config-if)# switchport trunk allowed vlan 10,20,30,40,50,60,70-80 B. switch2(config)# monitor session 1 source remote vlan 70 switch2(config)# monitor session 1 destination interface GigabitEthernet1/2 C. switch1(config)# interface GigabitEthernet 1/1 switch1 (config-if)# switchport mode access switch1 (config-if)# switchport access vlan 10 switch2(config)# interface GigabitEthernet 1/1 switch2(config-if)# switchport mode access switch2(config-if)# switchport access vlan 10 D. switch2(config)# monitor session 2 destination vlan 10 E. switch2(config)# monitor session 1 source remote vlan 70 switch2(config)# monitor session 1 destination interface GigabitEthernet1/1 .
Which function does a Cisco SD-Access extended node perform? A. provides fabric extension to nonfabric devices through remote registration and configuration B. performs tunneling between fabric and nonfabric devices to route traffic over unknown networks C. used to extend the fabric connecting to downstream nonfabric enabled Layer 2 switches D. in charge of establishing Layer 3 adjacencies with nonfabric unmanaged node .
Which router is elected the IGMP Querier when more than one router is in the same LAN segment? A. The router with the shortest uptime. B. The router with the longest uptime. C. The router with the highest IP address. D. The router with the lowest IP address.
The forwarding table is created in advance The router processor is involved with every forwarding decision All forwarding decisions are made in software All packets are switched using hardware.
In which two ways does the routing protocol OSPF differ from EIGRP? (Choose two.) A. OSPF provides shorter convergence time than EIGRP. B. OSPF supports only equal-cost load balancing EIGRP supports unequal-cost load balancing. C. OSPF is distance vector protocol. EIGRP is a link-state protocol. D. OSPF supports an unlimited number of hops EIGRP supports a maximum of 255 hops. E. OSPF supports unequal-cost load balancing EIGRP supports only equal-cost load balancing. .
Refer to the exhibit. A network engineer must configure the router to use the ISE-Servers group for authentication. If both ISE servers are unavailable, the local username database must be used. If no usernames are defined in the configuration, then the enable password must be the last resort to log in. Which configuration must be applied to achieve this result? A. aaa authorization exec default group ISE-Servers local enable B. aaa authentication login error-enable aaa authentication login default group enable local ISE-Servers C. aaa authentication login default group ISE-Servers local enable D. aaa authentication login default group enable local ISE-Servers .
When using BFD in a network design, which consideration must be made? A. BFD is used with dynamic routing protocols to provide subsecond convergence. B. BFD is used with first hop routing protocols to provide subsecond convergence. C. BFD is used with NSF and graceful to provide subsecond convergence. D. BFD is more CPU-intensive than using reduced hold timers with routing protocols. .
Refer to the exhibit. Which command filters the ERSPAN session packets only to interface GigabitEthernet1? A. source ip 10.10.10.1 B. filter access-group 10 C. destination ip 10.10.10.1 D. source interface gigabitethernet1 ip 10.10.10.1 .
Refer to the exhibit. Traffic is not passing between SW1 and SW2. Which action fixes the issue? A. Configure switch port mode to ISL on S2 B. Configure LACP mode on S1 to active C. Configure PAgP mode on S1 to desirable D. Configure LACP mode on S1 to passive .
Which Python code snippet must be added to the script to store the changed interface configuration to a local JSON-formatted file? A. OutFile = open("ifaces.json","w") OutFile.write(Response.text) OutFile.close() B. OutFile = open("ifaces.json","w") OutFile.write(UpdatedConfig) OutFile.close() A. OutFile = open("ifaces.json","w") OutFile.write(UpdatedConfig, OutFile) OutFile.close() A. OutFile = open("ifaces.json","w") OutFile.write(Response.json()) OutFile.close().
Refer to the exhibit. An engineer configures a new HSRP group. While reviewing the HSRP status, the engineer sees the logging message generated on R2. What is the cause of the message? A. The HSRP configuration has caused a routing loop B. The same virtual IP address has been configured for two HSRP groups C. A PC is on the network using the IP address 10.10.1.1 D. The HSRP configuration has caused a spanning-tree loop .
Refer to the exhibit. Which configuration must be implemented to establish EBGP peering between R1 and R2? A. R2 router bgp 300 neighbor 131.108.1.1 remote-as 320 R1 router bgp 320 neighbor 131.108.1.2 remote-as 300 B. R2 router bgp 320 neighbor 131.108.1.11 remote-as 300 R1 router bgp 300 neighbor 131.108.1.2 remote-as 320 C. R2 router bgp 320 neighbor 131.108.1.1 remote-as 300 R1 router bgp 300 neighbor 131.108.1.2 remote-as 320 D. R2 router bgp 320 neighbor 1.1.1.1 remote-as 300 R1 router bgp 300 neighbor 2.2.2.2 remote-as 320.
It optimizes the switching process to handle larger packet volumes It is referred to as "software switching" The general-purpose CPU is in charge of packet switching.
A server running Linux is providing support for virtual machines along with DNS and DHCP services for a small business. Which technology does this represent? A. container B. Type 1 hypervisor C. Type 2 hypervisor D. hardware pass-thru .
Report abuse Consent Terms of use