Networkers Home CCNP Enterprise ENCOR Exam(350-401) Question test 3 (Sreenath V S)

Networkers Home CCNP Enterprise ENCOR Exam(350-401) Question test 2 (Sreenath V S)
Broadcast
Point-to-point
ethernet
multicast
Choose the OSPF LSA type that is responsible for pointing to the ASBR router
Type 1
Type 3
Type 4
Type 5
Choose the correct description of an SD-Access wireless network infrastructure deployment
the access point is part of the fabric underlay
the wireless client is part of the fabric overlay
the access point is part of the fabric overlay
the WLC is part of the fabric underlay
Choose information types that are necessary to compute SNR (Choose two.)
antenna gain
EIRP
noise floor
RSSI
Choose the part of the HTTP message that the content type is specified
HTTP method
header
body
URL
Choose the correct config that displays text directly into the active console with a synchronous EEM applet policy
event manager applet boom
event syslog pattern 'up' 
action 1.0 puts logging directly to console
event manager applet boom
event syslog pattern 'up' 
action 1.0 gets logging directly to console
event manager applet boom
event syslog pattern 'up' 
action 1.0 syslog priority direct msg log directly to console
event manager applet boom
event syslog pattern 'up' 
action 1.0 string logging directly to console
Choose the correct statement for the local router if it shows an EBGP neighbor in the Active state.
it is receiving prefixes from the neighboring router and adding them in RIB-IN
it is attempting to open a tcp session with the neighboring router
it has BGP passive mode configured for the neighboring router
it has active prefix in the forwarding table from the neighboring router
Choose the valid JSON syntax
{"switch": {"name":"dist1","interfaces":["gig1","gig2","gig3]}}
{"switch": {"name":"dist1","interfaces":"gig1","gig2","gig3}
{"switch": "name":"dist1","interfaces":["gig1","gig2","gig3]}
{"switch": {"name":"dist1","interfaces":[/"gig1","gig2","/gig3]}}
Choose correct descriptions of FlexConnect mode for Cisco APs (Choose two.)
APs that operate in FlexConnect mode cannot detect rogue APs
FlexConnect mode used when the APs are set up in a mesh environment and used to bride between each other
FlexConnect mode is a wireless solution for branch office and remote office deployment
when connected to the controller .FlexConnect APs can tunnel traffic back to the controller
Choose the OSPF network type that is compatible and allow communication through the two peering devices
broadcast to broadcast
point-to-multipoint to nonbroadcast
point-to-multipoint to broadcast
broadcast to point-to-point
Choose the role of a fusion in an SD-Access solution
performs route leaking between user-defined virtual networks and shared services
acts as a DNS server
provides connectivity to external networks
provides additional forwarding capacity to the fabric
Choose the correct statement If you are connecting to your ISE server and you get the message of "YOUR CONNECTION IS NOT PRIVATE"
the server that is providing the portal has an expired certificate
the server that is providing the portal has a self signed certificate
the connection is using an unsupported browser
the connection is using an unsupported protocol
Choose IP SLA operation that requires the IP SLA responder to be configured on the remote end
UDP jitter
ICMP echo
ICMP Jitter
TCP connect
Choose pieces of information the LISP protocol splits the device identity (Choose two)
routing locator
enterprise identifier
device ID
endpoint Identifier
LISP ID
Choose entities that are Type 1 hypervisors (Choose two.)
Microsoft Virtual PC
VMware server
Microsoft Hyper -V
Oracle VM VirtualBox
VMware ESX
Choose correct statements about HSRP (Choose two)
HSRP supports tracking
HSRP default configuration allows for pre-emption
HSRP virtual MAC is 0000.5E00.01xx
HSRP virtual MAC is 0000.0C07.ACxx
Choose the WLC interface to use as the source for all RADIUS related traffic if WLC's interfaces are not in the same subnet as the RADIUS server.
the interface specified on the WLAN configuration
any interface configured on WLC
the controller interface
the controller management interface
Choose the device that presents the local web authentication for a WLAN
RADIUS server
ISE server
local WLC
anchor WLC
Choose the function a fabric edge node performs in an SD-Access deployment
connects the SD-Access fabric to another fabric or external Layer 3 networks
provides reachability border nodes in the underlay
connects endpoints to the fabric and forwards their traffic
encapsulates end user data traffic into LISP
Choose the relation between the Cisco Express Forwarding table and the FIB.
CEF uses a FIB to make IP destination Prefix-based switching decisions
The FIB is used to populate the CEF table
there can be only one FIB but multiple CEF tables on IOS device
the CEF tables allows route lookups to be forwarded to the route processor for processing before they are sent to the FIB
Choose the reason an AP is joining a different WLC than the one specified through option 43
The APs broadcast traffic is unable to reach the WLC through layer 2
the AP multicast traffic unable to reach the WLC through Layer 3
the WLC is running a different software version
the API is joining a primed WLC
Choose correct statements about EIGRP load balancing (Choose two)
EIGRP support unequal cost paths by default
A path can be used for load balancing only if it is a feasible successor
CEF is required to load balance across interfaces
EIGRP supports unequal cost paths
Choose the outbound access list that is applied to the WAN interface of a router that permits all traffic except for http traffic sourced from the workstation with IP address 192.168.1.1
ip access-list extended 100 
deny tcp host 192.168.1.1 any eq 80
permit ip any any
ip access-list extended 10
deny tcp host 192.168.1.1 any eq 80
permit ip any any
ip access-list extended 200 
deny tcp host 192.168.1.1 any eq 80
permit ip any any
ip access-list extended 20 
deny tcp host 192.168.1.1 any eq 80
permit ip any any
Choose the correct description of an SD-Access wireless network infrastructure deployment
the access point is part of the fabric underlay
the access point is part of the fabric overlay
the wireless client is part of the fabric overlay
the WLC is part of the fabric underlay
Choose the protocol that means a YANG data model is being used
NX-API
RSTCONF
REST
SNMP
Choose device roles in Cisco SD-Access fabric (Choose two.)
vBond controller
border node
core switch
access switch
edge node
Choose the corrrect statements if you have just created a new VRF on PE3, then you have enabled debug ip bgp vpnv4 unicast updates on PE1, and you can see the route in the debug, but not in the BGP VPNv4 table. (Choose two)
PE1 will reject the route due to automatic filtering
after you configure route target import 999:999 for a VRF on PE 1 Route be accepted
VPNv4 is not configured between PE1 and PE3
after you configure route target import 999:999 for a VRF on PE 3 Route be accepted
Choose the measurement for the total output energy of a Wi-Fi device
mW
dBi
EIRP
dBm

access-list 1 permit 192.168.1.0 0.0.0.255

ip nat inside source list 1 interface gigabitEthernet 0/2 overload

 

Choose the NAT type of the above configuration

Dynamic NAT
Static NAT
PAT
NAT64
Choose the TCP setting that is tuned to minimize the risk of fragmentation on a GRE/IP tunnel
MSS
MTU
MRU
Window size
Choose the HTTP status code that is the correct response for a request with an incorrect password applied to a REST API session
200
401
301
504
Choose the tool that is used in Cisco DNA Center to build generic configurations that are able to be applied on device with similar network settings
template Editor
Authentication Template
command runner
application policies
Choose the correct statement about the comparison between Cisco APIC controller versus a more traditional SDN controller
APIC uses an imperative model
APIC supports Opflex as a Northbound protocol
APIC uses a policy agent to translate policies into instructions
APIC does support a southbound REST API
Choose correct options that describe the cuase of the error. ( Choose two) A GRE tunnel is down with the error message %TUN-5-RECUR DOWN: Tunnel0 temporarily disabled due to recursive routing error.
the tunnel mode and tunnel IP address misconfigured
the tunnel destination is being routed out of the tunnel interface
there is instability in the network due to route flapping
there is link flapping on the tunnel

Match each statement with the routing protocol

 

A summaries can be created in specific parts of the IGP topology

B DUAL algorithm

C uses areas to segment a network

D summaries can be created anywhere in the IGP topology

 

1 OSPF

2 BGP

 
 
 

1 B C

2 A D

1 B D

2 A C

1 A B

2 C D

 

1 A C

2 B D

Choose the antenna type that should be used for a site-to-site wireless connection
patch
Omnidirectional
Yagi
Dipole
Choose components that are supported by LISP (choose two )
Proxy ETR
spoke
HMAC algorithm
egress tunnel router
Choose router is selected as the new master router if a VRRP master router fails
the one with lowest priority
the one with lowest loopback address
the one with highest loopback address
the one with highest priority
Choose protocols that are used with YANG data models (Choose two.)
TLS
NETCONF
SSH
HHT

Match each component to its description

 

A portion of IP header that is used to classify packets

B tool to enforce rate-limiting on ingress/egress

C portion of the 802.1Q header used to classify packets

 

1 policing

2 CoS

3 DCSP

A1 B3 C2
A2 B3 C1
A1 B2 C3
A3 B1 C2
A1 B3 C2

Choose the correct statement about the OSPF debug output

 

debug ip ospf hello

debug condition interface Fa0/1

 
 
The output displays all OSPF messages which router R1 has sent to received on interface Fa0/1.

The output displays all OSPF messages which router R1 has sent or received on all interfaces.

The output displays OSPF hello and LSACK messages which router R1 has sent or received.

 
The output displays OSPF hello messages which router R1 has sent received on interface Fa0/1.

Choose the characteristic of MACsec

 
 
802.1AE is negotiated using Cisco AnyConnect NAM and the SAP protocol
802.1AE is bult between the host and switch using the MKA protocol, which negotiates encryption keys based on the master session key from a successful 802 1X session

802.1AE is bult between the host and switch using the MKA protocol using keysgenerated via the Diffie-Hellman algorithm (anonymous encryption mode)

 
802.1AE provides encryption and authentication services
Choose the data modeling language that is commonly used by NETCONF
REST
XML
YANG
HTML

Match the LISP components with their functions

 

A LISP map resolver

B LISP map server

C LISP ITR

 

 

1 learns of EID prefix mapping entries from an ETR

2 receives packets from site-facing interfaces

3 accepts LISP encapsulated map requests

 
 
A1 B3 C2
A2 B3 C1
A3 B2 C1
A1 B3 C2
A3 B1 C2

Match the correct REST API authentication method with its description

 

A HTTP basic authentication

B OAuth

C token-based authentication

 

1 authorization through identity provider

2 username and password in an encoded string

3 API-dependent secret

 
 
A3 B2 C1
A3 B1 C2
A1 B3 C3
A2 B3 C1
A1 B2 C3
Choose the correct statement about LISP encapsulation in an EIGRP OTP implementation
OTP maintains the LISP control plane
LISP learns the next hop
OTP uses LISP encapsulation for dynamic multipoint tunneling
OTP uses LISP encapsulation to obtain routes from neighbors
Choose the action that the vSmart controller is responsible for in an SD-WAN deployment
onboard vEdge nodes into the SD-WAN
gather telemetry data from vEdge routes
manage ,maintain and gather configuration and status for node within the SD-WAN fabric
distribute security information for tunnel between vEdge routers
Choose the correct features with On-Premises Infrastructure (Choose three)
enterprise owns the hardware
slow upgrades lifecycle
fast upgrade lifecycle
high capital expenditure
low capital expenditure

Choose correct facts that apply to traffic policing (Choose two.)

 
Policing drops traffic that exceeds the defined rate
Policing should be performed as close to the destination as possible ​
Policing should be performed as close to the source as possible
Policing adapts to network congestion by queuing excess traffic

Choose the correct statement that describes the IP and MAC allocation requirements for virtual machines on types 1 hypervisors

 
 
Each virtual machines requires a unique IP address but shares the MAC address with the address of the physical server.
Each virtual machine requires a unique MAC address but shares the IP address with the physical server.
Each virtual machine requires a unique IP and MAC addresses to be able to reach to other nodes.
Each virtual machine requires a unique IP address but shares the MAC address with the physical server
0
{"name":"Networkers Home CCNP Enterprise ENCOR Exam(350-401) Question test 3 (Sreenath V S)", "url":"https://www.quiz-maker.com/Q422XPGPC","txt":"Networkers Home CCNP Enterprise ENCOR Exam(350-401) Question test 2 (Sreenath V S), Choose the OSPF LSA type that is responsible for pointing to the ASBR router, Choose the correct description of an SD-Access wireless network infrastructure deployment","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker