Final Exam ENCOR Specialist 350-401 Please enter your email: 1. What is the meaning of below condition in Python scripting? A!=B A is not equal to B A is greater than B A is equal to B A is smaller than B 2. A Router at Networkwalks company has learnt these three routes for same destination. Which path will be preferred from these three? 10.0.3.0/28 10.0.3.0/26 10.0.3.0/24 10.0.3.0/30 3. What is the OSPF Priority range? 10-255 0-100 0-255 0-200 4. Which type of Networking model is this? MPLS Model Traditional Networking Model SDN Model Old Networking Model 5. Which of the following is the message exchange mode used to establish an IKEv1 IPsec SA? CREATE_CHILD_SA Aggressive mode Quick mode Main mode 6. Which path will be chosen by R1 for traffic of R2? (i.e. which route will have the highest preference in R1’s Routing Table?) None OSPF Route with cost (metric) of 100 OSPF Route with cost (metric) of 300 OSPF Route with cost (metric) of 200 7. Which OSPF Packet Type is missing here? ASBR REPLY HELLO REPLY DBD 8. What is the Summary (aggregated) Route for these two routes? 10.0.0.0/23 10.0.0.0/20 10.0.0.0/21 10.0.0.0/22 9. EIGRP supports Equal and Unequal Cost Load Balancing: TRUE FALSE 10. Which Python code is used to capture username from a Cisco Router through a prompt in Python 3? tn.read_until(b"Username: ") tn.read_until(b"user:") tn.read_until(b"Login:") tn.read_until(b"user: ") 11. Which statement is correct? PTP can give accuracy in mili-sec PTP can give accuracy in micro-sec NTP can give accuracy in mili-sec NTP can give accuracy in micro-sec 12. In networking, PAT stands for Port address translation Peer address translation None of the them Packet address translation 13. Will the iBGP neighborship be formed between R1 and R2 in this kind of network? YES NO 14. Which two network utilities/tools are used for Wireshark traffic monitoring if the monitoring terminal is not in the path of traffic? SPAN (for Switches) TRACEROUTE (for Routers) PING (for Switches) ICMP (for Routers) TRACEROUTE (for Switches) RITE (for Routers) SPAN (for Switches) RITE (for Routers) 15. Peering with CE (Customer Edge) Routers is done on which type of MPLS ISP Routers? PE (Provider Edge Router) IP (Provider Router) Special Router LSR (Label Switch Router) 16. What is the Multicast address used by EIGRP to send the updates? 225.0.0.10 224.0.0.10 224.0.0.9 225.255.255.255 17. What is the metric of IS-IS Routing Protocol? Hop Count Multiple factors like Weight, Local Preference,… Cost (always 10) BW, Delay, Reliability, Load, MTU 18. Does LISP separate IP addresses into which of the following? (Choose two.) EIDs RLOCs LISP entities Subnets and hosts 19. EIGRP Routing Protocol falls under which type of Routing Protocols? Distance Vector Routing Protocols Hybrid Routing Protocols Link State Routing Protocols Path Vector Routing Protocols 20. What is the range of 2-Byte AS Numbers? 1-4.2Billion 1-65535 1-100 1-99 21. Which of the following FHRP is not a CISCO proprietary protocol? HSRP VRRP GLBP All of them 22. Is there any EtherChannel in this topology or not? NO YES 23. Which type of solution provides lower cost & shorter time to deploy benefits? MPLS DWDM Optical Networks Traditional Networks SD-WAN 24. Which code is correct for the If statement below? All codes are incorrect< Both B & C are correct Only B is correct Only A is correct 25. Which of the following statement is correct for outside global ip address? The actual private IP address assigned to a device on the inside network(s) The IP address of an outside host as it appears to the inside network The public IP address assigned to a host on the outside network The public IP address that represents one or more inside local IP addresses to the outside 26. Which of the following are modes of packet transport supported by IPsec? (Choose two.) Tunnel mode Transport mode Transparent mode Crypto mode 27. What is the use of IGMP Snooping? IGMP Snooping suppresses the necessary forwarding of multicast data in Layer 2 networks IGMP Snooping stops all traffic IGMP Snooping suppresses the unnecessary forwarding of multicast data in Layer 4 networks IGMP Snooping suppresses the unnecessary forwarding of multicast data in Layer 2 networks 28. EIGRP sends Hello Message after every ___________ seconds 5 seconds (LAN/Fast), 5 seconds (WAN/Slow) 180 seconds 15 seconds 5 seconds (LAN/Fast), 60 seconds (WAN/Slow) 29. Which one of these represents the first half of multicast MAC address? 01:00:55 00:00:00 00:00:5F 01:00:5E 30. Which EtherChannel mode has been used in this configuration? LACP PAgP ON Un-defined 31. There are two Routers R1 and R2 in enterprise network of a company named as NETWORK WALKS, that use EIGRP. How does R1 know whether R2 is still alive or not (so that R2 could react if router B fails)? By using EIGRP Hello messages, with R1 needing to receive periodic Hello messages to believe R2 is still working None of the other answers are correct By using EIGRP update messages, with R1 needing to receive periodic update messages to believe R2 is still working Using a periodic ping of R2’s IP address based on the EIGRP neighbor timer 32. Which of the following UDP ports is the UDP port officially assigned by the IANA for VXLAN? 4987 4789 8947 8472 33. Which of the following FHRP does not support interface tracking? VRRP All of them GLBP HSRP 34. Which Wireshark filter is used to filter Packets that have 10.0.0.1 either as source or destination IP? ip.dst == 10.0.0.1 ip.src == 10.0.0.1 !(ip.addr == 10.0.0.1) ip.addr == 10.0.0.1 35. Which type of Security architecture (security system) is this? ABC Telnet Security AAA C.I.A. 36. In TOP-DOWN Troubleshooting APPROACH, from which layer you should start troubleshooting? Physical Layer Data Link Layer Application Layer Network Layer 37. EIGRP is a routing Protocol which was designed by Cisco but a limited RFC has been released in 2016 which now allows it to run on Juniper Routers as well? FALSE TRUE 38. Which type of ACL is this? #access-list 1 deny host 10.0.0.1 #access-list 1 permit 10.0.0.0 0.0.0.255 #access-list 1 permit 192.168.0.0 0.0.255.255 Standard Named ACL Extended Numbered ACL Extended Named ACL Standard Numbered ACL 39. Ten lightweights APs are joined to a wireless LAN controller. If a client roams from one of the APs to another, which one of the following correctly describes the roam? Indirect roaming Autonomous roaming Intracontroller roaming Intercontroller roaming 40. Which type of topology is used by PIM? It uses Layer2 information It uses Broadcast information It uses its own topology discovery mechanism It uses routing information supplied by other routing protocols 41. Which Wireshark filter is used to filter traffic based on Source IP Address? ip.dst == 10.0.0.1 !(ip.addr == 10.0.0.1) ip.addr == 10.0.0.1 ip.src == 10.0.0.1 42. Which code will result in below output? D C B A 43. What will be the final result of this ACL: #access-list 1 deny host 172.0.0.1 #access-list 1 permit host 172.0.0.1 It will finally result in Permit of traffic from 172.0.0.0 It will finally result in Deny of traffic from 172.0.0.0 It will finally result in Permit of traffic from 172.0.0.1 It will finally result in Deny of traffic from 172.0.0.1 44. Which route has been selected as best valid by BGP out of these two? R2#show ip bgp .. Network Next Hop Metric LocPrf Weight Path * 7.7.7.7/32 24.24.24.4 0 400 700 i *> 23.23.23.3 0 300 700 i BGP Path via AS 400 BGP Path via AS 1 BGP Path via AS 23 BGP Path via AS 300 45. Which one is correct description of Queuing (Buffering) in QoS? Drop or re-mark incoming or outgoing traffic that goes beyond the desired traffic rate Buffer and delay egress traffic rates that momentarily peak The temporary storage of excess packets Storage + Scheduling 46. Which type of ACL is this? #access-list 100 permit tcp 192.168.10.0 0.0.0.255 any eq 80 #access-list 100 permit tcp 192.168.11.0 0.0.0.255 any eq 443 #access-list 100 deny tcp 10.0.11.0 0.0.0.255 any eq 443 Standard Named ACL Extended Named ACL Standard Numbered ACL Extended Numbered ACL 47. What will be printed as a result of below Python code? print("Bytesit Academy") #print("www.bytesitacademy.com") Nothing (it will result in error) www.bytesitacademy.com BytesIT Academy www.bytesitacademy.com BytesIT Academy 48. Which of the following unique features is true in embedded wireless network architecture? All WLCs are converged into one device An access layer switch can also function as an AP An access layer switch can also function as a WLC Large groups of APs connect to a single access layer switch 49. In Token Bucket, the tokens are added into the bucket at a fixed rate which is called: CIR Bc PIR PQ 50. Which of these best describes PQ in QoS? A set of four queues (high, medium, normal, and low) are served in strict-priority order It automatically divides the interface BW by the number of flows to allocate bandwidth fairly among all flows It involves a single queue where the first packet to be placed on the output interface queue is the first packet to leave the interface Queues are serviced in sequence one after the other, and each queue processes one packet only Loading … Question 1 of 50 Written by