Networkers Home CCNP Enterprise ENCOR Exam(350-401) Question test 4 (Sreenath V S)

Choose correct statements about VRRP (Choose two)

 
 
The TTL for VRRP packets must be 255.
Its IP address number is 115.
It supports both MD5 and SHA1 authentication.
It is assigned multicast address 224.0.0.9. ​
Three versions of the VRRP protocol have been defined.

Choose the difference between the RIB and the FIB

 
The FIB includes many routes a single destination. The RIB is the best route to a single destination.
The FIB maintains network topologies and routing tables. The RIB is a Iist of routes to particular network destinations. ​
The RIB includes many routes to the same destination prefix. The FIB contains only the best route
The RIB is used to create network topologies and routing tables. The FIB is a list of routes to particular network destinations.

Choose the benefit of deploying an on-premises infrastructure versus a cloud infrastructure deployment

 
 
faster deployment times because additional infrastructure does not need to be purchased
ability to quickly increase compute power without the need to install additional hardware
lower latency between systems that are physically located near each other
less power and cooling resources needed to run infrastructure on-premises

Choose results that will occur if Cisco DNA Center loses connectivity to devices in the SD-Access fabric (Choose two )

 
 
User connectivity is unaffected.
Users lose connectivity
Already connected users are unaffected, but new users cannot connect
Cisco DNA Center is unable to collect monitoring data in Assurance.

Choose the algorithms that are used to secure REST API from brute attacks and minimize the impact

 
 
 
PBKDF2, BCrypt, and SCrypt
SHA-1, SHA-256, and SHA-512 ​
MD5 algorithm-128 and SHA-384
SHA-512 and SHA-384

Choose the DNS lookup that an access point performs when attempting CAPWAP discovery

 
 

 

 
CISCO-DNA-CONTROLLER.local
CAPWAP-CONTROLLER.local
CISCO-CAPWAP-CONTROLLER.local
CISCO-CONTROLLER.local

What wil happen if you add the command

monitor session 1 destination remote vlan 200

to the following config

monitor session 1 destination remote vlan 100

 

RSPAN traffic is split between VLANs 100 and 200 equally
An error is flagged for configuring two destinations.
The RSPAN VLAN is replaced by VLAN 200.
RSPAN traffic is sent to VLANs 100 and 200 randomly

Choose the correct features with Cloud-Hosted Infrastructure (Choose three)

 
 
 
low capital expenditure
enterprise owns the hardware
high capital expenditure
fast upgrade lifecycle
provider maintains the infrastructure
Choose the correct statements that are used for error handling in Python
block/rescue
try/except
catch/release
try/catch

Choose the behavior that can be expected when the HSRP versions is changed from 1 to 2

 
 
No changes occur because version 1 and 2 use the same virtual MAC OUI.
Each HSRP group reinitializes because the multicast address has changed.
Each HSRP group reinitializes because the virtual MAC address has changed.
No changes occur because the standby router is upgraded before the active router.
https://router1.defcompany.com/getstuff?queryName=errorsresults=yes Choose the automation option or tool that is used above.
EEM
Bash script
Python
REST

Choose the mechanism that PIM uses to forward multicast traffic

 
 
 
PIM sparse mode uses a flood and prune model to deliver multicast traffic. ​
PIM dense mode uses a pull model to deliver multicast traffic.
PIM sparse mode uses receivers to register with the RP.
PIM sparse mode uses a pull model to deliver multicast traffic.
Choose the option a cloud infrastructure deployment has but an on-premises deployment doesn't have
Virtualization
supported systems
efficient scalability
storage capacity

Choose the feature Cisco TrustSec uses to provide scalable secure communication throughout a network

 
 
 
security group tag ACL assigned to each port on a switch
security group tag number assigned to each port on a network
security group tag number assigned to each user on a switch ​
security group tag ACL assigned to each router on a network

Choose the statement that explains the reason Type 1 hypervisor is considered more efficient than Type 2 hypervisor

 
 
 
Type 1 hypervisor is the only type of hypervisor that supports hardware acceleration techniques.
Type 1 hypervisor enables other operating systems to run on it.
Type 1 hypervisor relics on the existing OS of the host machine to access CPU, memory, storage, and network resources.
Type 1 hypervisor runs directly on the physical hardware of the host machine without relying on the underlying OS.

Choose the difference between the enable password and the enable secret password when service password encryption is enable on an IOS device

 
There is no difference and both passwords are encrypted identically. ​
The enable secret password is protected via stronger cryptography mechanisms.
The enable password cannot be decrypted.
The enable password is encrypted with a stronger encryption method.

Choose the distinguishing characteristic of Ansible from Chef

 
 
Ansible lacs redundancy support for the master server. Chef runs two masters in an active/active mode. ​
Ansible pushes the configuration to the client. Chef client pulls the configuration from the server.
Ansible uses Ruby to manage configurations. Chef uses YAML to manage configurations.
The Ansible server can run on Linux, Unix or Windows. The Chef server must run on Linux or Unix.
Choose the QoS mechanism that will prevent a decrease in TCP performance
LLQ
policer
WRED
Shaper
Rate-limit

Choose the reason of the problem if a client device fails to see the enterprise SSID, but other devices are connected to it.

 
 
 
The broadcast SSID was not manually configured on the client.
The client has incorrect credentials stored for the configured hidden SSID. ​
The hidden SSID was not manually configured on the client.
The client has incorrect credentials stored for the configured broadcast SSID.

Choose the correct structure of a JSON web token

 
 
 
three parts separated by dots: version header and signature
three parts separated by dots: header payload, and signature
payload and signature
header and payload

Choose the correct statement about agent-based versus agentless configuration management tools.

 
Agentless tools require no messaging systems between master and slaves. ​
Agent-based tools do not require installation of additional software packages on the slave nodes.
Agent-based tools do not require a high-level language interpreter such as Python or Ruby on slave nodes.
Agentless tools use proxy nodes to interface with slave nodes.

Choose the correct statement about multicast RPs

 
 
RPs are required only when using protocol independent multicast dense mode. ​
By default, the RP is needed only to start new sessions with sources and receivers.
By default, the RP is needed periodically to maintain sessions with sources and receivers
RPs are required for protocol independent multicast sparse mode and dense mode.
Choose configuration options that are used for 802.11w PMF on Cisco IOS XE controller (Choose three.)
saquery-retry-time
SA teardown protection
association comeback
enable
mandatory
comeback time
Choose the etherchannel mode that must be configured on the switch to allow the WLC to connect with links that have increased total throughput and redundancy
auto
passive
on
active

Choose the correct descriptions that will be the most related with Traffic policing (Choose three)

 
 
 
 
causes TCP restransmissions when traffic is dropped
introduces delay and jitter
introduces no delay and jitter
typically delays, rather than drops traffic
drops excessive traffic

Choose advantages of virtualizing the server with the use of VMs in data center environment (Choose two.)

 
reduced IP and MAC address requirements
reduced rack space, power, and cooling requirements
Increased security
speedy deployment
smaller Layer 2 domain
Choose mechanisms that are available to secure NTP (Choose two.)
TACACS-based authentication
IP Access list based
Encrypted authentication
IP prefix list based
IP sec
Choose the configuration step to make sure that voice traffic is treated properly, if voice traffic is not being tagged correctly as it travels through the network
COS of 3 to DSCP 26
COS of 7 to DSCP 48
COS of 7 to DSCP 46
COS of 5 to DSCP 46
Choose how many flow exporters are needed per network device in the flexible NetFlow configuration in a dual-stack network with two dual-stack NetFlow collections for a IPv4 to IPv6 migration
8
1
2
4

Choose the result you get when you apply this EEM applet event

"event snmp oid 1.3.6.1.3.7.1.5.1.2.4.2.9 get-type next entry-op g entry-val 75 poll-interval 5"

 
 
 
It presents a SNMP variable that can be interrogated.
It issues email when the value is greater than 75% for five polling cycles. ​
Upon the value reaching 75%, a SNMP event is generated and sent to the trap server
It reads an SNMP variable, and when the value exceeds 75% for live polling cycles.

Choose the correct command that will allow hosts which are conected to Fa0/2 to access the internet depending on the config part below.

 

interface Fa0/1

ip address 210.110.100.100 255.255.255.224

ip nat outside

interface Fa0/2

ip address 192.168.1.1 255.255.255.0

ip nat inside

access-list 11 permit 192.168.1.0 0.0.0.255

 

 
ip nat outside source list 11 interface FastEthernet0/2 overload
ip nat inside source list 11 interface FastEthernet0/2 overload
ip nat outside source static 210.110.100.100 192.168.1.0 overload ​
ip nat inside source list 11 interface FastEthernet0/1 overload

Choose the component of the Cisco Cyber Threat Defense solution that provides user and flow context analysis

 
 

 

 
Cisco Stealthwatch system
Cisco Firepower and FireSIGHT
Advanced Malware Protection
Cisco Web Security Appliance
Choose the protocol that REST API relies on to secure the communication channel
HTTPS
SSH
TCP
HTTP
Choose two namespaces the LISP network architecture and protocol uses (Choose two.)
VTEP
RLOC
DNS
TLOC
EID
Choose valid operations for RESTCONF (Choose two.)
PULL
HEAD
REMOVE
PATCH
PUSH

Choose methods that are used by an AP that is typing to discover a wireless LAN controller (Choose two.)

 
 
 
broadcasting on the local subnet
DNS lookup cisco-DNA-PRIMARY.localdomain
querying other APs
DHCP Option 43
Cisco Discovery Protocol neighbour
Choose the access point mode that allows a supported AP to function like a WLAN client would, associating and identifying client connectivity issues
SE-connect mode
sensor mode
sniffer mode
client mode
Choose the technology that is used to provide Layer 2 and Layer 3 logical networks in the Cisco SD-Access architecture
easy virtual network
underlay network
overlay network
VPN routing/forwarding

Choose the correct requirement for an Ansible-managed node

 
 
 
It must be a Linux server or a Cisco device.
It must support ad hoc commands.
must have an Ansible Tower installed.
It must have an SSH server running.
Choose the feature of EIGRP that is not supported in OSPF
per packet load balancing over multiple paths
load balance over four equal costs paths
uses interface bandwidth to determine best paths
load balancing of unequal cost paths
Choose necessary steps that are required for a complete Cisco DNA Center upgrade (Choose two.)
system update
golden image selection
application update
automation backups

Choose correct element to use to provide controlled Layer 2 network connectivity between virtual machines running on the same hypervisor (Choose two.)

 
VXLAN fabric after installing VXLAN tunneling drivers on the virtual machines.
a single trunk link to an external Layer2 switch.
a single routed link to an external router on stick
a virtual switch running as a separate virtual machine. ​
a virtual switch provided by the hypervisor.

Choose the role of the RP in PIM sparse mode

 
 
 
It acts as a control-plane node and does not receive or forward multicast packets.
It maintains default aging timeouts for all multicast streams requested by the receivers.
It responds to the PIM join messages with the source of requested multicast group
It is the multicast that is the root of the PIM-SM shared multicast distribution tree.
Choose the unit that measures the power of a radio signal with reference to 1 milliwatt
dBw
dBm
mW
dBi

Choose the right reasons why broadcast radiation is caused in the virtual machine environment (Choose two.)

 
 
 
Virtual machines communicate primarily through broadcast mode.
Communication between vSwitch and network switch is multicast based.
vSwitch must interrupt the server CPU to process the broadcast packet.
Communication between vSwitch and network switch is broadcast based
The Layer 2 domain can be large in virtual machine environments.

Choose the role of the vsmart controller in a Cisco SD-WAN environment

 
 
It performs authentication and authorization
It is the centralized network management system.
It manages the data plane.
It manages the control plane.

Choose the meaning of the code if you get 404 response code on DNA Center while using REST API.

 

/dna/intent/api/v1 /template-programmer/project

 
 
The server has not implemented the functionality that is needed to fulfill the request.
The request accepted for processing, but the processing was not completed. ​
The client made a request a resource that does not exist.
The POST/PUT request was fulfilled and a new resource was created, Information about the resource is in the response body.
Choose the FHRP that should be used to meet a design requirements for more efficient default bandwidth usage across multiple devices
VRRP
LCAP
HSRP
GLBP

Choose the primary effect of the spanning-tree portfast command

 
 
It enables BPDU messages
It immediately enables the port in the listening state
It minimizes spanning-tree convergence time
It immediately puts the port into the forwarding state when the switch is reloaded
Choose the controller that is the single plane of management for Cisco SD-WAN
vBond
vEdge
vSmart
vManage
0
{"name":"Networkers Home CCNP Enterprise ENCOR Exam(350-401) Question test 4 (Sreenath V S)", "url":"https://www.quiz-maker.com/QJWTFUT7U","txt":"Choose correct statements about VRRP (Choose two), Choose the difference between the RIB and the FIB, Choose the benefit of deploying an on-premises infrastructure versus a cloud infrastructure deployment","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker