Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ONCCNP ENCOR 350-401 - part 8

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
CCNP ENCOR 350-401 - part 8

Description:
CCNP ENCOR 350-401 - part 8

Author:
AVATAR

Creation Date:
23/04/2024

Category:
Others

Number of questions: 49
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
Refer to the exhibit. Which code results in the working Python script displaying a list of network devices from the Cisco DNA Center? A. network_device_list(dnac[ג€hostג€], dnac[ג€usernameג€],dnac[ג€passwordג€]) login = dnac_login(dnac) print(dnac_devices) B. login = dnac_login(dnac[ג€hostג€], dnac[ג€usernameג€], dnac[ג€passwordג€]) network_device_list(dnac, login) print(dnac_devices) C. login = dnac_login(dnac[ג€hostג€], dnac[ג€usernameג€], dnac[ג€passwordג€]) network_device_list(dnac, login) for item in dnac_devices: print(dnac_devices.item) D. network_device_list(dnac[ג€hostג€], dnac[ג€usernameג€], dnac[ג€passwordג€]) login = dnac_login(dnac) for item in dnac_devices: print(dnac_devices.item) .
Refer to the exhibit. Which code results in the working Python script displaying a list of network devices from the Cisco DNA Center? A. network_device_list(dnac[ג€hostג€], dnac[ג€usernameג€],dnac[ג€passwordג€]) login = dnac_login(dnac) print(dnac_devices) B. login = dnac_login(dnac[ג€hostג€], dnac[ג€usernameג€], dnac[ג€passwordג€]) network_device_list(dnac, login) print(dnac_devices) Most Voted C. login = dnac_login(dnac[ג€hostג€], dnac[ג€usernameג€], dnac[ג€passwordג€]) network_device_list(dnac, login) for item in dnac_devices: print(dnac_devices.item) D. network_device_list(dnac[ג€hostג€], dnac[ג€usernameג€], dnac[ג€passwordג€]) login = dnac_login(dnac) for item in dnac_devices: print(dnac_devices.item) .
What does the Cisco DNA REST response indicate? A. Cisco DNA Center has the incorrect credentials for cat3850-1 B. Cisco DNA Center is unable to communicate with cat9000-1 C. Cisco DNA Center has the incorrect credentials for cat9000-1 D. Cisco DNA Center has the incorrect credentials for RouterASR-1 .
What is a characteristic of YANG? A. It is a Cisco proprietary language that models NETCONF data. B. It allows model developers to create custom data types. C. It structures data in an object-oriented fashion to promote model reuse. D. It provides loops and conditionals to control flow within models. .
Refer to the exhibit. The IP SLA is configured in a router. An engineer must configure an EEM applet to shut down the interface and bring it back up when there is a problem with the IP SLA. Which configuration should the engineer use? A. event manager applet EEM_IP_SLA event track 10 state down B. event manager applet EEM_IP_SLA event track 10 state unreachable C. event manager applet EEM_IP_SLA event sla 10 state unreachable D. event manager applet EEM_IP_SLA event sla 10 state down .
What is the value of the variable list after the code is run? A. [1, 2], [1, 2], [1, 2] B. [1, 2] * 3 C. [1, 2, 1, 2, 1, 2] D. [3, 6] .
Which result does the Python code achieve? A. The code encrypts a base64 decrypted password. B. The code converts time to the Epoch LINUX time format. C. The code converts time to the "year/month/day" time format. D. The code converts time to the yyyymmdd representation.
POSTMAN is showing an attempt to retrieve network device information from Cisco DNA Center API. What is the issue? A. The URI string is incorrect. B. The token has expired. C. Authentication has failed. D. The JSON payload contains the incorrect UUID.
Running the script causes the output in the exhibit. What should be the first line of the script? A. from ncclient import manager B. import manager C. from ncclient import * D. ncclient manager import .
An engineer must create a script that appends the output of the show process cpu sorted command to a file. Which action completes the configuration? A. action 4.0 syslog command "show process cpu sorted | append flash:high-cpu-file" B. action 4.0 cli command "show process cpu sorted | append flash:high-cpu-file" C. action 4.0 cns-event "show process cpu sorted | append flash:high-cpu-file" D. action 4.0 publish-event "show process cpu sorted | append flash:high-cpu-file" .
What is an advantage of utilizing data models in a multivendor environment? A. lowering CPU load incurred to managed devices B. improving communication security with binary encoded protocols C. facilitating a unified approach to configuration and management D. removing the distinction between configuration and runtime state data .
How is a data modeling language used? A. To enable data to be easily structured, grouped, validated, and replicated. B. To represent finite and well-defined network elements that cannot be changed. C. To model the flows of unstructured data within the infrastructure. D. To provide human readability to scripting languages. .
A network engineer is configuring OSPF on a router. The engineer wants to prevent having a route to 172.16.0.0/16 learned via OSPF in the routing table and configures a prefix list using the command ip prefix-list OFFICE seq 5 deny 172.16.0.0/16. Which two additional configuration commands must be applied to accomplish the goal? (Choose two.) A. ip prefix-list OFFICE seq 10 permit 0.0.0.0/0 le 32 B. distribute-list prefix OFFICE in under the OSPF process C. distribute-list OFFICE in under the OSPF process D. distribute-list OFFICE out under the OSPF process E. ip prefix-list OFFICE seq 10 permit 0.0.0.0/0 ge 32 .
DRAG DROP - Drag and drop the characteristics from the left onto the technology types on the right. Select and Place: This type of technology provides automation across multiple technologies and domains This type of technology enables consistent configuration of infrastructure resources Puppet is used for this type of technology Ansible is used for this type of technology.
Refer to the exhibit. Which command set must be applied on R1 to establish a BGP neighborship with R2 and to allow communication from R1 to reach the networks? A. router bgp 1200 network 209.165.200.224 mask 255.255.255.224 neighbor 209.165.202.130 remote-as 1200 B. router bgp 1201 network 209.165.200.224 mask 255.255.255.224 neighbor 209.165.202.130 remote-as 1201 C. router bgp 1200 network 209.165.200.224 mask 255.255.255.224 neighbor 209.165.202.130 remote-as 1201 D. router bgp 1200 network 209.165.200.224 mask 255.255.255.224 neighbor 209.165.201.2 remote-as 1200.
Refer to the exhibit. Which command must be configured for RESTCONF to operate on port 8888? A. restconf port 8888 B. ip http restconf port 8888 C. ip http port 8888 D. restconf http port 8888 .
Why would a log file contain a * next to the date? A. The network device was receiving NTP time when the log messages were recorded. B. The network device was unable to reach the NTP server when the log messages were recorded. C. The network device is not configured to use NTP. D. The network device is not configured to use NTP time stamps for logging. .
What is one difference between EIGRP and OSPF? A. EIGRP uses the DUAL distance vector algorithm, and OSPF uses the Dijkstra link-state algorithm. B. OSPF uses the DUAL distance vector algorithm, and EIGRP uses the Dijkstra link-state algorithm. C. EIGRP uses the variance command for unequal cost load balancing, and OSPF supports unequal cost balancing by default. D. OSPF is a Cisco proprietary protocol, and EIGRP is an IETF open standard protocol. .
DRAG DROP - Drag and drop the characteristics from the left onto the routing protocols they describe on the right. Select and Place: sends hello packets every 5 seconds on high-bandwidth links uses virtual links to link an area that does not have a connection to the backbone cost is based on interface bandwidth.
A network engineer must configure a router to send logging messages to a syslog server based on these requirements: * uses syslog IP address: 10.10.10.1 * uses a reliable protocol * must not use any well-known TCP/UDP ports Which configuration must be used? A. logging host 10.10.10.1 transport tcp port 1024 B. logging host 10.10.10.1 transport udp port 1024 C. logging host 10.10.10.1 transport udp port 1023 D. logging origin-id 10.10.10.1 .
Capacity easily scales up or down Infrastructure requires large and regular investments It enables users to access resources from anywhere It requires capacity planning for power and cooling.
Refer to the exhibit. A network engineer must log in to the router via the console, but the RADIUS servers are not reachable. Which credentials allow console access? A. no username and only the password ג€test123ג€ B. no username and only the password ג€cisco123ג€ C. the username ג€ciscoג€ and the password ג€ciscoג€ D. the username ג€ciscoג€ and the password ג€cisco123ג€ .
DRAG DROP - Drag and drop the characteristics from the left onto the orchestration tools that they describe on the right. Select and Place: declarative communicates using knife tool communicates through SSH procedural.
Which configuration allows administrators to configure the device through the console port and use a network authentication server? A. aaa new-model aaa authentication login default local aaa authorization console aaa authorization config-commands username netadmin secret 9 $9$vFpMf8elb4RVV8$seZ/bDAx1uV B. aaa new-model aaa authentication login default local aaa authorization console aaa authorization config-commands C. aaa new-model aaa authentication login default line D. aaa new-model aaa authentication login default group radius aaa authorization console aaa authorization config-commands.
What is the process for moving a virtual machine from one host machine to another with no downtime? A. high availability B. disaster recovery C. live migration D. multisite replication .
DRAG DROP - Drag and drop the characteristics from the left onto the infrastructure deployment models they describe on the right. Select and Place: easy to scale the capacity up and down infrastructure requires large and regular investments highly agile highly customizable.
DRAG DROP - Drag and drop the characteristics from the left onto the routing protocols they describe on the right. Select and Place: cost-based metric Dual Diffusing Update algorithm metrics are bandwidth, delay, reliability, load, and MTU Djikstra algorithm.
DRAG DROP - Drag and drop the tools from the left onto the agent types on the right. Select and Place: Puppet Ansible SaltStack.
Refer to the exhibit. An engineer must create a configuration that prevents R3 from receiving the LSA about 172.16.1.4/32. Which configuration set achieves this goal? A. On R3 ip access-list standard R4_L0 deny host 172.16.1.4 permit any router ospf 200 distribute-list R4_L0 in B. On R1 ip prefix-list INTO-AREA1 seq 5 deny 172.16.1.4/32 ip prefix-list INTO-AREA1 seq 10 permit 0.0.0.0/0 le 32 router ospf 200 area 1 filter-list prefix INTO-AREA1 out C. On R1 ip prefix-list INTO-AREA1 seq 5 deny 172.16.1.4/32 ip prefix-list INTO-AREA1 seq 10 permit 0.0.0.0/0 le 32 router ospf 200 area 1 filter-list prefix INTO-AREA1 in D. On R3 ip prefix-list INTO-AREA1 seq 5 deny 172.16.1.4/32 ip prefix-list INTO-AREA1 seq 10 permit 0.0.0.0/0 le 32 router ospf 200 area 1 filter-list prefix INTO-AREA1 in .
Refer to the exhibit. An engineer is reaching network 172.16.10.0/24 via the R1-R2-R4 path. Which configuration forces the traffic to take a path of R1-R3-R4? A. R1(config)#route-map RM_LOCAL_PREF permit 10 R1(config-route-map)#set local-preference 101 R1(config-route-map)#exit R1(config)#router bgp 100 R1(config-router)#neighbor 13.13.13.3 route-map RM_LOCAL_PREF in R1(config-router)#end R1#clear ip bgp 13.13.13.3 soft in B. R1(config)#route-map RM_AS_PATH_PREPEND R1(config-route-map)#set as-path prepend 200 200 R1(config-route-map)#exit R1(config)#router bgp 100 R1(config-router)#neighbor 12.12.12.2 route-map RM_AS_PATH_PREPEND in R1(config-router)#end R1#clear ip bgp 12.12.12.2 soft in C. R1(config)#router bgp 100 R1(config-router)#neighbor 13.13.13.3 weight 1 R1(config-router)#end D. R2(config)#route-map RM_MED permit 10 R2(config-route-map)#set metric 1 R2(config-route-map)#exit R2(config)#router bgp 200 R2(config-router)#neighbor 12.12.12.1 route-map RM_MED out R2(config-router)#end R2#clear ip bgp 12.12.12.1 soft out .
In a Cisco SD-Access solution, which protocol is used by an extended node to connect to a single edge node? A. VXLAN B. IS-IS C. 802.1Q D. CTS .
Refer to the exhibit. How does the router handle traffic after the CoPP policy is configured on the router? A. Traffic generated by R1 that matches access list SNMP is policed. B. Traffic coming to R1 that matches access list SNMP is policed. C. Traffic passing through R1 that matches access list SNMP is policed. D. Traffic coming to R1 that does not match access list SNMP is dropped. .
What is a characteristic of Cisco StackWise technology? A. It is supported on the Cisco 4500 series. B. It supports devices that are geographically separated C. It combines exactly two devices. D. It uses proprietary cabling.
What is one primary REST security design principle? A. fail-safe defaults B. password hash C. adding a timestamp in requests D. OAuth .
Refer to the exhibit. After the code is run on a Cisco IOS-XE router, the response code is 204. What is the result of the script? A. The configuration fails because interface GigabitEthernet2 is missing on the target device. B. Interface GigabitEthemet2 is configured with IP address 10.10.10.1/24. C. The configuration fails because another interface is already configured with IP address 10.10.10.1/24. D. The configuration is successfully sent to the device in cleartext. .
Which time protocol offers security features and utilizes site-local IPv6 multicast addresses? A. NTPv3 B. PTP IEEE 1588v1 C. NTPv4 D. PTP IEEE 1588v2 .
Refer to the exhibit. Which command must be applied to Router1 to bring the GRE tunnel to an up/up state? A. Router1(config-if)#tunnel source Loopback0 B. Router1(config-if)#tunnel mode gre multipoint C. Router1(config-if)#tunnel source GigabitEthernet0/1 D. Router1(config)#interface tunnel0 .
DRAG DROP - Drag and drop the characteristics from the left onto the infrastructure deployment models on the right. Select and Place: Costs for this model are considered CapEx This model improves elasticity of resources This model enables complete control of the servers This model reduces management overhead by leveraging provider-managed resources.
Refer to the exhibit. VPN-A sends point-to-point traffic to VPN-B and receives traffic only from VPN-C. VPN-B sends point-to-point traffic to VPN-C and receives traffic only from VPN-A. Which configuration is applied? A. PE-2 vrf VPN-B address-family ipv4 unicast import route-target 100:1 export route-target 100:2 B. PE-3 vrf VPN-B address-family ipv4 unicast import route-target 100:2 export route-target 100:2 C. PE-2 vrf VPN-B address-family ipv4 unicast import route-target 100:2 export route-target 100:2 D. PE-3 vrf VPN-B address-family ipv4 unicast import route-target 100:1 export route-target 100:2.
A customer wants to use a single SSID to authenticate IoT devices using different passwords. Which Layer 2 security type must be configured in conjunction with Cisco ISE to achieve this requirement? A. Central Web Authentication B. Cisco Centralized Key Management C. Identity PSK D. Fast Transition .
In which two ways does TCAM differ from CAM? (Choose two.) A. CAM is used to make Layer 2 forwarding decisions, and TCAM is used for Layer 3 address lookups. B. CAM is used by routers for IP address lookups, and TCAM is used to make Layer 2 forwarding decisions. C. CAM is used for software switching mechanisms, and TCAM is used for hardware switching mechanisms. D. The MAC address table is contained in TCAM, and ACL and QoS information is stored in CAM. E. The MAC address table is contained in CAM, and ACL and QoS information is stored in TCAM. .
When firewall capabilities are considered, which feature is found only in Cisco next-generation firewalls? A. malware protection B. stateful inspection C. traffic filtering D. active/standby high availability .
A network engineer is enabling HTTPS access to the core switch, which requires a certificate to be installed on the switch signed by the corporate certificate authority. Which configuration commands are required to issue a certificate signing request from the core switch? A. Core-Switch(config)#crypto pki enroll Core-Switch Core-Switch(config)#ip http secure-trustpoint Core-Switch B. Core-Switch(config)#ip http secure-trustpoint Core-Switch Core-Switch(config)#crypto pki enroll Core-Switch C. Core-Switch(config)#crypto pki trustpoint Core-Switch Core-Switch(ca-trustpoint)#enrollment terminal Core-Switch(config)#crypto pki enroll Core-Switch D. Core-Switch(config)#crypto pki trustpoint Core-Switch Core-Switch(ca-trustpoint)#enrollment terminal Core-Switch(config)#ip http secure-trustpoint Core-Switch .
An engineer must create a new SSID on a Cisco 9800 wireless LAN controller. The client has asked to use a pre-shared key for authentication. Which profile must the engineer edit to achieve this requirement? A. Policy B. RF C. Flex D. WLAN.
An engineer is configuring a new SSID to present users with a splash page for authentication. Which WLAN Layer 3 setting must be configured to provide this functionality? A. Local Policy B. WPA2 Policy C. CCKM D. Web Policy .
A customer requests a design that includes GLBP as the FHRP. The network architect discovers that the members of the GLBP group have different throughput capabilities. Which GLBP load balancing method supports this environment? A. round robin B. host dependent C. weighted D. least connection .
Refer to the exhibit. Which command set changes the neighbor state from Idle (Admin) to Active? A. R1(config)#router bgp 65001 R1(config-router)#neighbor 192.168.50.2 remote-as 65001 B. R1(config)#router bgp 65001 R1(config-router)#neighbor 192.168.50.2 activate C. R1(config)#router bgp 65001 R1(config-router)#no neighbor 192.168.50.2 shutdown D. R1(config)#router bgp 65002 R1(config-router)#neighbor 192.168.50.2 activate .
A network engineer configures a WLAN controller with increased security for web access. There is IP connectivity with the WLAN controller, but the engineer cannot start a management session from a web browser. Which action resolves the issue? A. Disable Adobe Flash Player. B. Use a private or incognito session. C. Use a browser that supports 128-bit or larger ciphers. D. Disable JavaScript on the web browser. .
What does a northbound API accomplish? A. programmatic control of abstracted network resources through a centralized controller B. access to controlled network resources from a centralized node C. communication between SDN controllers and physical switches D. controlled access to switches from automated security applications .
Report abuse Consent Terms of use