Final Exam ENCOR Specialist 350-401 Please enter your email: 1. Is there any EtherChannel in this topology or not? YES NO 2. Which one of these represents the first half of multicast MAC address? 00:00:5F 00:00:00 01:00:5E 01:00:55 3. Which of the following are modes of packet transport supported by IPsec? (Choose two.) Crypto mode Transparent mode Transport mode Tunnel mode 4. Which EtherChannel mode has been used in this configuration? ON Un-defined LACP PAgP 5. In networking, PAT stands for Peer address translation Port address translation None of the them Packet address translation 6. Which of the following FHRP does not support interface tracking? VRRP HSRP All of them GLBP 7. Which Wireshark filter is used to filter Packets that have 10.0.0.1 either as source or destination IP? ip.dst == 10.0.0.1 !(ip.addr == 10.0.0.1) ip.src == 10.0.0.1 ip.addr == 10.0.0.1 8. When WPA2 enterprise mode is used on a WLAN, where is the supplicant role located? On the RADIUS server On the wireless client On the WLC On the AP 9. In Token Bucket, the tokens are added into the bucket at a fixed rate which is called: PIR PQ Bc CIR 10. Which of the following UDP ports is the UDP port officially assigned by the IANA for VXLAN? 4789 8472 8947 4987 11. Which of the following FHRP is not a CISCO proprietary protocol? All of them GLBP VRRP HSRP 12. If an AP tries every available method to discover a controller but fails to do so, what happens next? It reboots or starts discovering again It uses IP redirect on the local router It broadcasts on every possible subnet It tries to contact the default controller at 10.0.0.1 13. What is the use of IGMP Snooping? IGMP Snooping stops all traffic IGMP Snooping suppresses the unnecessary forwarding of multicast data in Layer 4 networks IGMP Snooping suppresses the necessary forwarding of multicast data in Layer 2 networks IGMP Snooping suppresses the unnecessary forwarding of multicast data in Layer 2 networks 14. Which one is correct description of Queuing (Buffering) in QoS? The temporary storage of excess packets Drop or re-mark incoming or outgoing traffic that goes beyond the desired traffic rate Storage + Scheduling Buffer and delay egress traffic rates that momentarily peak 15. Which statement is correct? PTP can give accuracy in micro-sec PTP can give accuracy in mili-sec NTP can give accuracy in mili-sec NTP can give accuracy in micro-sec 16. Which type of ACL is this? #access-list 1 deny host 10.0.0.1 #access-list 1 permit 10.0.0.0 0.0.0.255 #access-list 1 permit 192.168.0.0 0.0.255.255 Extended Named ACL Standard Named ACL Standard Numbered ACL Extended Numbered ACL 17. Which two network utilities/tools are used for Wireshark traffic monitoring if the monitoring terminal is not in the path of traffic? SPAN (for Switches) TRACEROUTE (for Routers) PING (for Switches) ICMP (for Routers) SPAN (for Switches) RITE (for Routers) TRACEROUTE (for Switches) RITE (for Routers) 18. Will the iBGP neighborship be formed between R1 and R2 in this kind of network? YES NO 19. Which type of solution provides lower cost & shorter time to deploy benefits? SD-WAN MPLS Traditional Networks DWDM Optical Networks 20. What is the Summary (aggregated) Route for these two routes? 10.0.0.0/22 10.0.0.0/20 10.0.0.0/23 10.0.0.0/21 21. EIGRP is a routing Protocol which was designed by Cisco but a limited RFC has been released in 2016 which now allows it to run on Juniper Routers as well? TRUE FALSE 22. What is the OSPF Priority range? 0-200 0-100 10-255 0-255 23. Which of the following unique features is true in embedded wireless network architecture? All WLCs are converged into one device An access layer switch can also function as an AP An access layer switch can also function as a WLC Large groups of APs connect to a single access layer switch 24. Which of these best describes PQ in QoS? Queues are serviced in sequence one after the other, and each queue processes one packet only It involves a single queue where the first packet to be placed on the output interface queue is the first packet to leave the interface A set of four queues (high, medium, normal, and low) are served in strict-priority order It automatically divides the interface BW by the number of flows to allocate bandwidth fairly among all flows 25. A Router at Networkwalks company has learnt these three routes for same destination. Which path will be preferred from these three? 10.0.3.0/26 10.0.3.0/24 10.0.3.0/28 10.0.3.0/30 26. What is the meaning of below condition in Python scripting? A!=B A is not equal to B A is greater than B A is equal to B A is smaller than B 27. Which type of Networking model is this? SDN Model MPLS Model Traditional Networking Model Old Networking Model 28. Which route has been selected as best valid by BGP out of these two? R2#show ip bgp .. Network Next Hop Metric LocPrf Weight Path * 7.7.7.7/32 24.24.24.4 0 400 700 i *> 23.23.23.3 0 300 700 i BGP Path via AS 23 BGP Path via AS 1 BGP Path via AS 400 BGP Path via AS 300 29. EIGRP Routing Protocol falls under which type of Routing Protocols? Hybrid Routing Protocols Path Vector Routing Protocols Distance Vector Routing Protocols Link State Routing Protocols 30. What is the metric of IS-IS Routing Protocol? Cost (always 10) Hop Count BW, Delay, Reliability, Load, MTU Multiple factors like Weight, Local Preference,… 31. OSPF supports which authentication types for security? (Choose two) MD5 Authentication Simple Password Authentication MD4 Authentication MD6 Authentication 32. Ten lightweights APs are joined to a wireless LAN controller. If a client roams from one of the APs to another, which one of the following correctly describes the roam? Indirect roaming Intracontroller roaming Intercontroller roaming Autonomous roaming 33. EIGRP sends Hello Message after every ___________ seconds 15 seconds 5 seconds (LAN/Fast), 5 seconds (WAN/Slow) 180 seconds 5 seconds (LAN/Fast), 60 seconds (WAN/Slow) 34. A transmitter is configured to use a power level of 17 mW. One day it is reconfigured to transmit at a new power level of 34 mW. How much has the power level increased in dB? 3 dB 2 dB 17 dB None of these answers are correct; you need a calculator to figure this out 0 dB 35. In TOP-DOWN Troubleshooting APPROACH, from which layer you should start troubleshooting? Physical Layer Application Layer Data Link Layer Network Layer 36. What are the two basic types of multicast distribution trees? Apple trees 🙂 Source trees Shared trees Distributed trees 37. Which Wireshark filter is used to filter traffic based on Source IP Address? ip.src == 10.0.0.1 !(ip.addr == 10.0.0.1) ip.addr == 10.0.0.1 ip.dst == 10.0.0.1 38. NTP is a unicast protocol and uses UDP port number 223 323 23 123 39. What will be printed as a result of below Python code? print("Bytesit Academy") #print("www.bytesitacademy.com") BytesIT Academy www.bytesitacademy.com BytesIT Academy Nothing (it will result in error) www.bytesitacademy.com 40. Which type of ACL is this? #access-list 100 permit tcp 192.168.10.0 0.0.0.255 any eq 80 #access-list 100 permit tcp 192.168.11.0 0.0.0.255 any eq 443 #access-list 100 deny tcp 10.0.11.0 0.0.0.255 any eq 443 Extended Named ACL Extended Numbered ACL Standard Numbered ACL Standard Named ACL 41. There are two Routers R1 and R2 in enterprise network of a company named as NETWORK WALKS, that use EIGRP. How does R1 know whether R2 is still alive or not (so that R2 could react if router B fails)? None of the other answers are correct Using a periodic ping of R2’s IP address based on the EIGRP neighbor timer By using EIGRP Hello messages, with R1 needing to receive periodic Hello messages to believe R2 is still working By using EIGRP update messages, with R1 needing to receive periodic update messages to believe R2 is still working 42. Which path will be chosen by R1 for traffic of R2? (i.e. which route will have the highest preference in R1’s Routing Table?) OSPF Route with cost (metric) of 200 OSPF Route with cost (metric) of 100 OSPF Route with cost (metric) of 300 None 43. Which OSPF Packet Type is missing here? ASBR HELLO REPLY DBD REPLY 44. Which of the following is the message exchange mode used to establish an IKEv1 IPsec SA? Aggressive mode CREATE_CHILD_SA Quick mode Main mode 45. Which type of OSPF Router is this? ABR (Area Border Router) ASBR (AS Border Router) IR (Internal Router) ER (External Router) 46. Which Python code is used to capture username from a Cisco Router through a prompt in Python 3? tn.read_until(b"Username: ") tn.read_until(b"user:") tn.read_until(b"Login:") tn.read_until(b"user: ") 47. Phishing falls under which type of Security attacks? Social Engineering attacks Virus attacks Data Loss attacks General attacks 48. Which of the following statement is correct for outside global ip address? The actual private IP address assigned to a device on the inside network(s) The public IP address that represents one or more inside local IP addresses to the outside The public IP address assigned to a host on the outside network The IP address of an outside host as it appears to the inside network 49. Which of the following parameters is useful for computing a client device’s location with respect to an AP? GPS BSS RSS Channel 50. Which type of Security architecture (security system) is this? C.I.A. ABC Telnet Security AAA Loading … Question 1 of 50 Written by