option
Questions
ayuda
daypo
search.php

ERASED TEST, YOU MAY BE INTERESTED ON CCNP ENCOR 350-401 - part 16

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
CCNP ENCOR 350-401 - part 16

Description:
CCNP ENCOR 350-401 - part 16

Author:
AVATAR
ccnp
Other tests from this author

Creation Date: 27/11/2024

Category: Others

Number of questions: 46
Share the Test:
New CommentNuevo Comentario
No comments about this test.
Content:
What does the applet accomplish? A. It generates a syslog message every 600 seconds on the status of the specified MAC address. B. It compares syslog output to the MAC address table every 600 seconds and generates an event when no match is found. C. It compares syslog output to the MAC address table every 600 seconds and generates an event when there is a match. D. It checks the MAC address table every 600 seconds to see if the specified address has been learned.
What does the applet accomplish? A. It generates a syslog message every 600 seconds on the status of the specified MAC address. Most Voted B. It compares syslog output to the MAC address table every 600 seconds and generates an event when no match is found. C. It compares syslog output to the MAC address table every 600 seconds and generates an event when there is a match. D. It checks the MAC address table every 600 seconds to see if the specified address has been learned. Most Voted .
Which authorization framework gives third-party applications limited access to HTTP services? A. IPsec B. GRE C. Basic Auth D. OAuth 2.0.
How does Cisco Express Forwarding switching differ from process switching on Cisco devices? A. Cisco Express Forwarding switching saves memory by storing adjacency tables in dedicated memory on the line cards, and process switching stores all tables in the main memory. B. Cisco Express Forwarding switching uses adjacency tables built by the CDP protocol, and process switching uses the routing table. C. Cisco Express Forwarding switching uses dedicated hardware processors, and process switching uses the main processor. D. Cisco Express Forwarding switching uses a proprietary protocol based on IS-IS for MAC address lookup, and process switching uses the MAC address table. .
Refer to the exhibit. What is the result of running this code? A. A list of lists is created. B. A list of new VLANs is created. C. An error is displayed. D. A dictionary is created. .
Refer to the exhibit. The administrator configures an ERSPAN session, but no packets are received on the destination host. Which action is required to complete the configuration? A. Ensure that the ERSPAN destination addresses are not reachable through the Mgmt-vrf VRF. B. Ensure that the ERSPAN destination is reachable from the switch. C. Configure the ERSPAN destination VLAN as an RSPAN VLAN. D. Enable the ERSPAN session.
Refer to the exhibit. Which command is required on router R1 to start receiving RESTCONF requests? A. R1(config)# ip http accounting commands 12 default B. R1(config)# ip http server C. R1(config)# restconf D. R1(config)# ip http access-class 12 .
What is a command-line tool for consuming REST APIs? A. Python requests B. Postman C. cURL D. Firefox .
An engineer receives a report that an application exhibits poor performance. On the switch where the server is connected, this syslog message is visible: SW_MATM-4-MACFLAP_NOTIF: Host 0054.3962.7651 in vlan 14 is flapping between port Gi1/0/1 and port Gi1/0/2. What is causing the problem? A. undesirable load-balancing configuration on the switch B. invalid port channel configuration on the switch C. wrong SFP+ and cable connected between the server and the switch D. failed NIC on the server .
Drag and drop the snippets onto the blanks within the code to construct a script that brings up the failover Ethernet port if the primary port goes down and also shuts down the failover port when the primary returns to service. Not all options are used. Shutdown Up GigabitEthernet3/0/10 No shutdown Down GigabitEthernet4/0/9.
Refer to the exhibit. Why does the OSPF neighborship fail between the two interfaces? A. The MTU is not the same. B. The OSPF timers are different. C. There is a mismatch in the OSPF interface network type. D. The IP subnet mask is not the same.
Which technology enables a redundant supervisor engine to take over when the primary supervisor engine fails? A. SSO B. FHRP C. graceful restart D. NSF .
A customer requires their wireless data traffic to egress at the switch port of the access point. Which access point mode supports this? A. FlexConnect B. Sniffer C. Bridge D. Monitor .
What is a capability of the Cisco DNA Center southbound API? A. It adds support for managing non-Cisco devices from Cisco DNA Center. B. It connects to ITSM services such as ServiceNow. C. It sends webhooks from Cisco DNA Center when alerts are triggered. D. It allows administrators to make API calls to Cisco DNA Center. .
Refer to the exhibit. Which command set enables router R2 to be configured via NETCONF? A. R1(config)# netconf - R1(config)# ip http secure-server B. R1(config) # username Netconf privilege 15 password example_password R1(config)# netconf-yang - R1(config)# netconf-yang feature candidate-datastore C. R1(config)# snmp-server manager - R1(config)# snmp-server community ENCOR rw D. R1(config)# snmp-server manager - R1(config)# snmp-server community ENCOR ro .
In the Cisco DNA Center Image Repository, what is a golden image? A. The latest software image that is available for a specific device type. B. The Cisco recommended software image for a specific device type. C. A software image that is compatible with multiple device types. D. A software image that meets the compliance requirements of the organization.
What are two benefits of implementing a traditional WAN instead of an SD-WAN solution? (Choose two.) A. lower control plane abstraction B. faster fault detection C. simplified troubleshooting D. comprehensive configuration standardization E. lower data plane overhead.
Which technology uses network traffic telemetry, contextual information, and file reputation to provide insight into cyber threats? A. security services B. security intelligence C. segmentation D. threat defense.
Which IEEE standard provides the capability to permit or deny network connectivity based on the user or device identity? A. 802.1d B. 802.1w C. 802.1q D. 802.1x .
The CPE router acts as a DHCP server for the locally attached LAN. After DHCP snooping is enabled on the switch where the DHCP clients are connected, clients are unable to obtain their configuration from the DHCP server. What is the cause of this issue? A. The IP address of the DHCP server is in the excluded DHCP range. B. The configuration of Gi0/1 is missing the ip helper-address 192.168.255.1 command. C. The DHCP server drops DHCP packets carrying Option 82 and an empty relay agent IP address. D. The excluded DHCP range contains the subnet address of the entire LAN network. .
Which solution simplifies management of secure access to network resources? A. RFC 3580-based solution to enable authenticated access leveraging RADIUS and AV pairs B. 802.1AE to secure communication in the network domain C. ISE to automate network access control leveraging RADIUS AV pairs D. TrustSec to logically group internal user environments and assign policies.
What is a characteristic of a Type 2 hypervisor? A. It is completely independent of the operating system. B. It is installed on an operating system and supports other operating systems. C. It eliminates the need for an underlying operating system. D. Its main task is to manage hardware resources between different operating systems. .
What is the recommended minimum SNR for data applications on wireless networks? A. 20 B. 25 C. 15 D. 10 .
What does the Cisco DNA Center Authentication API provide? A. list of VLAN names B. client health status C. access token to make calls to Cisco DNA Center D. list of global issues that are logged in Cisco DNA Center .
What does the destination MAC on the outer MAC header identify in a VXLAN packet? A. the leaf switch B. the next hop C. the remote switch D. the remote spine .
What does the statement print(format(0.8, '.0%')) display? A. 8.8% B. .08% C. 8% D. 80%.
An engineer must implement a configuration to allow a network administrator to connect to the console port of a router and authenticate over the network. Which command set should the engineer use? A. aaa new-model aaa authentication login console local B. aaa new-model aaa authentication login console group radius C. aaa new-model aaa authentication login default enable D. aaa new-model aaa authentication enable default .
When a DNS host record is configured for a new Cisco AireOS WLC, which hostname must be added to allow APs to successfully discover the WLC? A. CONTROLLER-CAPWAP-CISCO B. CISCO-CONTROLLER-CAPWAP C. CAPWAP-CISCO-CONTROLLER D. CISCO-CAPWAP-CONTROLLER.
Refer to the exhibit. An engineer tries to log in to router R1. Which configuration enables a successful login? A. R1#username admin privilege 15 - aaa authorization exec default local B. R1#username admin privilege 15 - aaa authorization exec default local netconf-yang C. R1#netconf-yang - username admin privilege 15 secret cisco123 aaa new-model aaa authorization exec default local D. R1#aaa new-model - aaa authorization exec default local enable aaa admin privilege 15 .
Which statement must be used to export the contents of the devices object in JSON format? A. json.repr(Devices) B. json.loads(Devices) C. json.print(Devices) D. json.dumps(Devices).
Why does the vBond orchestrator have a public IP? A. to allow for global reachability from all WAN Edges in the Cisco SD-WAN and to facilitate NAT traversal B. to provide access to Cisco Smart Licensing servers for license enablement C. to enable vBond to learn the public IP of WAN Edge devices that are behind NAT gateways or in private address space D. to facilitate downloading and distribution of operational and security patches.
Why would a small or mid-size business choose a cloud solution over an on-premises solution? A. Cloud provides greater ability for customization than on-premises. B. Cloud provides more control over the implementation process than on-premises. C. Cloud provides lower upfront cost than on-premises. D. Cloud provides higher data security than on-premises. .
Which two new security capabilities are introduced by using a next-generation firewall at the Internet edge? (Choose two.) A. stateful packet inspection B. integrated intrusion prevention C. NAT D. VPN E. application-level inspection.
Refer to the exhibit. An engineer builds an EEM script to apply an access list. Which statement must be added to complete the script? A. action 6.0 cli command "ip access-list extended 101" B. action 3.1 cli command "ip access-list extended 101" C. event none D. action 2.1 cli command "ip access-list extended 101" .
Drag and drop the solutions that comprise Cisco Cyber Threat Defense from the left onto the objectives they accomplish on the right. StealthWatch Identity Services Engine Web Security Appliance.
Refer to the exhibit. An engineer is troubleshooting an issue with client devices triggering excessive power changes on APs in the 2.4 GHz band. Which action resolves this issue? A. Disable Aironet IE. B. Set the 802.11b/g/n DTIM interval to 0. C. Enable MFP Client Protection. D. Disable Coverage Hole Detection. .
Refer to the exhibit. What is the effect of these commands on the BR and HQ tunnel interfaces? A. The keepalives are sent every 3 seconds and 5 retries. B. The tunnel line protocol goes down when the keepalive counter reaches 5. C. The keepalives are sent every 5 seconds and 3 retries. D. The tunnel line protocol goes down when the keepalive counter reaches 6. .
Which protocol is used to encrypt control plane traffic between SD-WAN controllers and SD-WAN endpoints? A. DTLS B. IPsec C. PGP D. HTTPS .
What is one difference between SaltStack and Ansible? A. SaltStack uses the Ansible agent on the box, whereas Ansible uses a Telnet server on the box. B. SaltStack uses an API proxy agent to program Cisco boxes in agent mode, whereas Ansible uses a Telnet connection. C. SaltStack uses SSH to interact with Cisco devices, whereas Ansible uses an event bus. D. SaltStack is constructed with minion, whereas Ansible is constructed with YAML. .
A customer has a pair of Cisco 5520 WLCs set up in an SSO cluster to manage all APs. Guest traffic is anchored to a Cisco 3504 WLC located in a DMZ. Which action is needed to ensure that the EoIP tunnel remains in an UP state in the event of failover on the SSO cluster? A. Use the same mobility domain on all WLCs. B. Enable default gateway reachability check. C. Configure back-to-back connectivity on the RP ports. D. Use the mobility MAC when the mobility peer is configured. .
Which configuration filters out DOT1X messages in the format shown below from being sent toward Syslog server 10.15.20.33? Nov 20 13:47:32/553 %DOT1X-5-FAIL:Authentication failed for client (e04f.438e.de4f) on interface Gi1/0/1 AudtiSessionID 0A0B50A5000004543910739E A. logging discriminator DOT1X facility drops DOT1X logging host 10.15.20.33 discriminator DOT1X B. logging discriminator DOT1X msg-body drops DOTX logging host 10.15.20.33 discriminator DOTX C. logging discriminator DOT1X mnemonics includes DOTX logging host 10.15.20.33 discriminator DOT1X D. logging discriminator DOT1X mnemonics includes DOT1X logging host 10.15.20.33 discriminator DOTX .
Refer to the exhibit. A network engineer is troubleshooting an issue with the file server based on reports of slow file transmissions. Which two commands or command sets are required to switch SW1 to analyze the traffic from the file server with a packet analyzer? (Choose two.) A. SW1#show monitor B. SW1(config)#monitor session 1 source interface gigabitethernet0/3 SW1(config)#monitor session 1 destination interface gigabitethernet0/1 encapsulation replicate C. SW1#show ip route D. SW1#show vlan E. SW1(config)#monitor session 1 source interface gigabitethernet0/1 SW1(config)#monitor session 1 destination interface gigabitethernet0/3 encapsulation replicate .
What are two benefits of implementing a Cisco SD-WAN architecture? (Choose two.) A. It enforces a single, scalable, hub-and-spoke topology. B. It simplifies endpoint provisioning through standalone router management. C. It allows configuration of application-aware policies with real time enforcement. D. It improves endpoint protection by integrating embedded and cloud security features. E. It provides resilient and effective traffic flow using MPLS. .
Which two functions is an edge node responsible for? (Choose two.) A. authenticates endpoints B. provides the default entry point for fabric traffic C. provides multiple entry and exit points for fabric traffic D. provides the default exit point for fabric traffic E. provides a host database that maps endpoint IDs to a current location .
Refer to the exhibit. Which two configurations enable R1 and R2 to advertise routes into OSPF? (Choose two.) A. R2 - router ospf 0 network 172.16.1.0 0.0.0.255 area 0 network 172.16.2.0 0.0.0.255 area 0 B. R1 - router ospf 0 network 192.168.1.0 255.255.255.0 area 0 network 192.168.2.0 255.255.255.0 area 0 C. R2 - router ospf 0 network 172.16.1.0 255.255.255.0 area 0 network 172.16.2.0 255.255.255.0 area 0 D. R1 - router ospf 0 network 192.168.1.0 0.0.0.255 area 0 network 192.168.2.0 0.0.0.255 area 0 E. R2 - router ospf 0 network 172.16.1.0 0.0.0.255 area 0 network 172.16.2.0 255.255.255.0 area 0 .
Which Python library is used to work with YANG data models via NETCONF? A. ncclient B. requests C. cURL D. Postman .
Report abuse