ERASED TEST, YOU MAY BE INTERESTED ON CCNP ENCOR 350-401 - part 5
COMMENTS | STATISTICS | RECORDS |
---|
TAKE THE TEST
Title of test:
CCNP ENCOR 350-401 - part 5 Description: CCNP ENCOR 350-401 - part 5 Author:
Creation Date: 20/12/2024 Category: Others Number of questions: 50 |
Share the Test:
New Comment
No comments about this test.
Content:
DRAG DROP -
Drag and drop the characteristics from the left onto the protocols they apply to on the right.
Select and Place:
uses Djikstra's shortest Path First Algorithm uses Diffused Update Algorithm uses bandwidth, delay, reliability, and load for routing metric uses and election process. Refer to the exhibit. Which set of commands on router R1 allow deterministic translation of private hosts PC1, PC2, and PC3 to addresses in the public space? A. RouterR1(config)#int f0/0 RouterR1(config)#ip nat inside RouterR1(config)#exit RouterR1(config)#int f0/1 RouterR1(config)#ip nat outside RouterR1(config)#exit RouterR1(config)#access-list 1 10.10.10.0 0.0.0.255 RouterR1(config)#ip nat inside source list 1 interface f0/1 overload B. RouterR1(config)#int f0/0 RouterR1(config)#ip nat inside RouterR1(config)#exit RouterR1(config)#int f0/1 RouterR1(config)#ip nat outside RouterR1(config)#exit RouterR1(config)#access-list 1 10.10.10.0 0.0.0.255 RouterR1(config)#ip nat pool POOL 155.1.1.101 155.1.1.103 netmask 255.255.255.0 RouterR1(config)#ip nat inside source list 1 pool POOL C. RouterR1(config)#int f0/0 RouterR1(config)#ip nat inside RouterR1(config)#exit RouterR1(config)#int f0/1 RouterR1(config)#ip nat outside RouterR1(config)#exit RouterR1(config)#ip nat inside source static 10.10.10.101 155.1.1.101 RouterR1(config)#ip nat inside source static 10.10.10.102 155.1.1.102 RouterR1(config)#ip nat inside source static 10.10.10.103 155.1.1.103 D. RouterR1(config)#int f0/0 RouterR1(config)#ip nat outside RouterR1(config)#exit RouterR1(config)#int f0/1 RouterR1(config)#ip nat inside RouterR1(config)#exit RouterR1(config)#ip nat inside source static 10.10.10.101 155.1.1.101 RouterR1(config)#ip nat inside source static 10.10.10.102 155.1.1.102 RouterR1(config)#ip nat inside source static 10.10.10.103 155.1.1.103 . Refer to the exhibit. Communication between London and New York is down. Which command set must be applied to the NewYork switch to resolve the issue? A. NewYork(config)#no interface po1 NewYork(config)#interface range fa0/1-2 NewYork(config-if)#channel-group 1 mode negotiate NewYork(config-if)#end NewYork# B. NewYork(config)#no interface po1 NewYork(config)#interface range fa0/1-2 NewYork(config-if)#channel-group 1 mode on NewYork(config-if)#end NewYork# C. NewYork(config)#no interface po1 NewYork(config)#interface range fa0/1-2 NewYork(config-if)#channel-group 1 mode passive NewYork(config-if)#end NewYork# D. NewYork(config)#no interface po1 NewYork(config)#interface range fa0/1-2 NewYork(config-if)#channel-group 1 mode auto NewYork(config-if)#end NewYork# . Refer to the exhibit. An engineer is configuring an EtherChannel between Switch1 and Switch2 and notices the console message on Switch2. Based on the output, which action resolves this issue? A. Configure more member ports on Switch1. B. Configure less member ports on Switch2. C. Configure the same port channel interface number on both switches. D. Configure the same EtherChannel protocol on both switches. Refer to the exhibit. A network engineer configures NAT on R1 and enters the show command to verify the configuration. What does the output confirm? A. The first packet triggered NAT to add an entry to the NAT table. B. R1 is configured with NAT overload parameters. C. A Telnet session from 160.1.1.1 to 10.1.1.10 has been initiated. D. R1 is configured with PAT overload parameters. . Refer to the exhibit. What is the cause of the log messages? A. OSPF area change B. MTU mismatch C. IP address mismatch D. hello packet mismatch . A network engineer configures BGP between R1 and R2. Both routers use BGP peer group CORP and are set up to use MD5 authentication. This message is logged to the console of router R1: `May 5 39:85:55.469: %TCP-6-BADAUTH` Invalid MD5 digest from 10.10.10.1 (29832) to 10.120.10.1 (179) tebleid -0 Which two configurations allow a peering session to form between R1 and R2? (Choose two.) A. R1(config-router)#neighbor 10.10.10.1 peer-group CORP R1(config-router)#neighbor CORP password Cisco B. R2(config-router)#neighbor 10.120.10.1 peer-group CORP R2(config-router)#neighbor CORP password Cisco C. R2(config-router)#neighbor 10.10.10.1 peer-group CORP R2(config-router)#neighbor PEER password Cisco D. R1(config-router)#neighbor 10.120.10.1 peer-group CORP R1(config-router)#neighbor CORP password Cisco E. R2(config-router)#neighbor 10.10.10.1 peer-group CORP R2(config-router)#neighbor CORP password Cisco . Refer to the exhibit. An engineer implemented several configuration changes and receives the logging message on Switch1. Which action should the engineer take to resolve this issue? A. Change Switch2 to switch port mode dynamic auto. B. Change the VTP domain to match on both switches. C. Change Switch1 to switch port mode dynamic auto. D. Change Switch1 to switch port mode dynamic desirable. . DRAG DROP - Drag and drop the characteristics of PIM Dense Mode from the left to the right. Not all options are used. Select and Place: builds source-based distribution trees uses a push model to distribute multicast traffic uses a pull model to distribute multicast traffic uses prune mechanisms to stop unwanted multicast traffic builds shared distribution trees requires a rendezvous point to deliver multicast traffic. DRAG DROP - Drag and drop the wireless elements on the left to their definitions on the right. Select and Place: beamwidth polarization radiation patterns gain. How are the different versions of IGMP compatible? A. IGMPv2 is compatible only with IGMPv2. B. IGMPv3 is compatible only with IGMPv3. C. IGMPv2 is compatible only with IGMPv1. D. IGMPv3 is compatible only with IGMPv1 . Which measurement is used from a post wireless survey to depict the cell edge of the access points? A. SNR B. Noise C. RSSI D. CCI . If a client's radio device receives a signal strength of -67 dBm and the noise floor is -85 dBm, what is the SNR value? A. 15 dB B. 16 dB C. 18 dB D. 20 dB . Which AP mode allows an engineer to scan configured channels for rogue access points? A. monitor B. bridge C. local D. sniffer . Refer to the exhibit. While troubleshooting a routing issue, an engineer issues a ping from S1 to S2. Which two actions result from the initial value of the TTL? (Choose two.) A. The packet reaches R2, and the TTL expires. B. R1 replies with a TTL exceeded message. C. The packet reaches R3, and the TTL expires. D. R2 replies with a TTL exceeded message. E. R3 replies with a TTL exceeded message. F. The packet reaches R1, and the TTL expires. . What is the wireless Received Signal Strength Indicator? A. the value given to the strength of the wireless signal received compared to the noise level B. the value of how strong the wireless signal is leaving the antenna using transmit power, cable loss, and antenna gain C. the value of how much wireless signal is lost over a defined amount of distance D. the value of how strong a wireless signal is received, measured in dBm . Which two operational modes enable an AP to scan one or more wireless channels for rogue access points and at the same time provide wireless services to clients? (Choose two.) A. monitor B. rogue detector C. FlexConnect D. sniffer E. local. Refer to the exhibit. An engineer attempts to configure a trunk between switch SW1 and switch SW2 using DTP, but the trunk does not form. Which command should the engineer apply to switch SW2 to resolve this issue? A. switchport nonegotiate B. no switchport C. switchport mode dynamic desirable D. switchport mode access . An engineer is troubleshooting the AP join process using DNS. Which FQDN must be resolvable on the network for the access points to successfully register to the WLC? A. wlchostname.domain.com B. cisco-capwap-controller.domain.com C. ap-manager.domain.com D. primary-wlc.domain.com . Which new enhancement was implemented in Wi-Fi 6? A. Uplink and Downlink Orthogonal Frequency Division Multiple Access B. Channel bonding C. Wi-Fi Protected Access 3 D. 4096 Quadrature Amplitude Modulation Mode . Which device makes the decision for a wireless client to roam? A. wireless client B. wireless LAN controller C. access point D. WCS location server . An engineer configures GigabitEthernet 0/1 for VRRP group 115. The router must assume the primary role when it has the highest priority in the group. Which command set is required to complete this task? interface GigabitEthernet0/1 ip address 10.10.10.2 255.255.255.0 vrrp 115 ip 10.10.10.1 vrrp 115 authentication 407441579 A. Router(config if)# vrrp 115 track 1 decrement 100 Router(config-if)# vrrp 115 preempt B. Router(config-if)# vrrp 115 priority 100 C. Router(config-if)# vrrp 115 track 1 decrement 10 Router(config-if)# vrrp 115 preempt D. Router(config-if)# standby 115 priority 100 Router(config-if)# standby 115 preempt . How is MSDP used to interconnect multiple PIM-SM domains? A. MSDP allows a rendezvous point to dynamically discover active sources outside of its domain. B. MSDP SA request messages are used to request a list of active sources for a specific group. C. MSDP depends on BGP or multiprotocol BGP for interdomain operation. D. MSDP messages are used to advertise active sources in a domain. . If the noise floor is -90 dBm and the wireless client is receiving a signal of גˆ’75 dBm, what is the SNR? A. 15 B. 1.2 C. גˆ’165 D. .83 . The EtherChannel between SW2 and SW3 is not operational. Which action resolves this issue? A. Configure the channel-group mode on SW3 Gi0/0 and Gi0/1 to active. B. Configure the mode on SW2 Gi0/0 to trunk. C. Configure the channel-group mode on SW2 Gi0/0 and Gi0/1 to on. D. Configure the mode on SW2 Gi0/1 to access. . Which action completes the configuration to achieve a dynamic continuous mapped NAT for all users? A. Reconfigure the pool to use the 192.168.1.0 address range. B. Configure a match-host type NAT pool. C. Increase the NAT pool size to support 254 usable addresses. D. Configure a one-to-one type NAT pool. . How does EIGRP differ from OSPF? A. EIGRP is more prone to routing loops than OSPF. B. EIGRP uses more CPU and memory than OSPF. C. EIGRP has a full map of the topology, and OSPF only knows directly connected neighbors. D. EIGRP supports equal or unequal path cost, and OSPF supports only equal path cost. . Which AP mode allows a supported AP to function like a WLAN client would, associating and identifying client connectivity issues? A. client mode B. SE-connect mode C. sensor mode D. sniffer mode . A client device roams between wireless LAN controllers that are mobility peers. Both controllers have dynamic interfaces on the same client VLAN. Which type of roam is described? A. intra-VLAN B. inter-controller C. intra-controller D. inter-subnet . Which component does Cisco Threat Defense use to measure bandwidth, application performance, and utilization? A. TrustSec B. Advanced Malware Protection for Endpoints C. NetFlow D. Cisco Umbrella . Which IP SLA operation requires the IP SLA responder to be configured on the remote end? A. UDP jitter B. ICMP jitter C. TCP connect D. ICMP echo . Refer to the exhibit. What does the error message relay to the administrator who is trying to configure a Cisco IOS device? A. The device received a valid NETCONF request and serviced it without error. B. The NETCONF running datastore is currently locked. C. A NETCONF request was made for a data model that does not exist. D. A NETCONF message with valid content based on the YANG data models was made, but the request failed. . Which three methods does Cisco DNA Center use to discover devices? (Choose three.) A. CDP B. SNMP C. LLDP D. ping E. NETCONF F. a specified range of IP addresses . Which statement about TLS is accurate when using RESTCONF to write configurations on network devices? A. It is used for HTTP and HTTPS requests. B. It requires certificates for authentication. C. It is provided using NGINX acting as a proxy web server. D. It is not supported on Cisco devices. . What do Cisco DNA southbound APIs provide? A. interface between the controller and the consumer B. RESTful API interface for orchestrator communication C. interface between the controller and the network devices D. NETCONF API interface for orchestrator communication . Which statement about an RSPAN session configuration is true? A. Only one session can be configured at a time. B. A special VLAN type must be used as the RSPAN destination. C. A filter must be configured for RSPAN sessions. D. Only incoming traffic can be monitored. . Which feature must be configured to allow packet capture over Layer 3 infrastructure? A. RSPAN B. ERSPAN C. VSPAN D. IPSPAN . What is the result when a technician adds the monitor session 1 destination remote vlan 223 command? A. The RSPAN VLAN is replaced by VLAN 223. B. RSPAN traffic is sent to VLANs 222 and 223. C. An error is flagged for configuring two destinations. D. RSPAN traffic is split between VLANs 222 and 223. . Refer to the exhibit. An engineer configures monitoring on SW1 and enters the show command to verify operation. What does the output confirm? A. RSPAN session 1 is incompletely configured for monitoring. B. RSPAN session 1 monitors activity on VLAN 50 of a remote switch. C. SPAN session 2 monitors all traffic entering and exiting port FastEthernet 0/15. D. SPAN session 2 only monitors egress traffic exiting port FastEthernet 0/14. . A network is being migrated from IPv4 to IPv6 using a dual-stack approach. Network management is already 100% IPv6 enabled. In a dual-stack network with two dual-stack NetFlow collectors, how many flow exporters are needed per network device in the flexible NetFlow configuration? A. 1 B. 2 C. 4 D. 8 . A network engineer is configuring Flexible NetFlow and enters these commands. sampler NetFlow1 mode random one-out-of 100 interface fastethernet 1/0 flow-sampler NetFlow1 What are two results of implementing this feature instead of traditional NetFlow? (Choose two.) A. Only the flows of top 100 talkers are exported. B. CPU and memory utilization are reduced. C. The number of packets to be analyzed are reduced. D. The data export flow is more secure. E. The accuracy of the data to be analyzed is improved. . Refer to the exhibit. An engineer must add the SNMP interface table to the NetFlow protocol flow records. Where should the SNMP table option be added? A. under the interface B. under the flow record C. under the flow monitor D. under the flow exporter. A network administrator is implementing a routing configuration change and enables routing debugs to track routing behavior during the change. The logging output on the terminal is interrupting the command typing process. Which two actions can the network administrator take to minimize the possibility of typing commands incorrectly? (Choose two.) A. Configure the logging synchronous global configuration command. B. Configure the logging synchronous command under the vty. C. Increase the number of lines on the screen using the terminal length command. D. Configure the logging delimiter feature. E. Press the TAB key to reprint the command in a new line. . When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port? A. logging host 10.2.3.4 vrf mgmt transport tcp port 514 B. logging host 10.2.3.4 vrf mgmt transport udp port 514 C. logging host 10.2.3.4 vrf mgmt transport tcp port 6514 D. logging host 10.2.3.4 vrf mgmt transport udp port 6514 . Refer to this output. R1# *Feb 14 37:09:53.129: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1, changed state to up What is the logging severity level? A. notification B. emergency C. critical D. alert . An engineer reviews a router's logs and discovers the following entry. What is the event's logging severity level? Router# *Jan 01 38:24:04.401: %LINK-3-UPDOWN: Interface GigabitEthernet0/1, changed state to up A. error B. warning C. informational D. notification . An engineer must configure a SPAN session. What is the effect of the configuration? A. Traffic received on VLANs 10, 11, and 12 is copied and sent to interface g0/1. B. Traffic sent on VLANs 10 and 12 only is copied and sent to interface g0/1. C. Traffic sent on VLANs 10, 11, and 12 is copied and sent to interface g0/1. D. Traffic received on VLANs 10 and 12 only is copied and sent to interface g0/1. . These commands have been added to the configuration of a switch. Which command flags an error if it is added to this configuration? A. monitor session 1 source interface port-channel 6 B. monitor session 1 source vlan 10 C. monitor session 1 source interface FastEthemet0/1 rx D. monitor session 1 source interface port-channel 7, port-channel 8 . Which method does Cisco DNA Center use to allow management of non-Cisco devices through southbound protocols? A. It creates device packs through the use of an SDK. B. It uses an API call to interrogate the devices and register the returned data. C. It obtains MIBs from each vendor that details the APIs available. D. It imports available APIs for the non-Cisco device in a CSV format. . Refer to the exhibit. Cisco DNA Center has obtained the username of the client and the multiple devices that the client is using on the network. How is Cisco DNA Center getting these context details? A. Those details are provided to Cisco DNA Center by the Identity Services Engine. B. The administrator had to assign the username to the IP address manually in the user database tool on Cisco DNA Center. C. Cisco DNA Center pulled those details directly from the edge node where the user connected. D. User entered those details in the Assurance app available on iOS and Android devices. . |
Report abuse