Final Exam ENCOR Specialist 350-401 Please enter your email: 1. EIGRP sends Hello Message after every ___________ seconds 5 seconds (LAN/Fast), 5 seconds (WAN/Slow) 5 seconds (LAN/Fast), 60 seconds (WAN/Slow) 180 seconds 15 seconds 2. When WPA2 enterprise mode is used on a WLAN, where is the supplicant role located? On the AP On the RADIUS server On the wireless client On the WLC 3. Which type of OSPF Router is this? ER (External Router) ABR (Area Border Router) IR (Internal Router) ASBR (AS Border Router) 4. What is the Multicast address used by EIGRP to send the updates? 224.0.0.10 224.0.0.9 225.255.255.255 225.0.0.10 5. What is the meaning of below condition in Python scripting? A!=B A is smaller than B A is not equal to B A is greater than B A is equal to B 6. What is the metric of IS-IS Routing Protocol? Multiple factors like Weight, Local Preference,… BW, Delay, Reliability, Load, MTU Cost (always 10) Hop Count 7. Which of the following statement is correct for outside global ip address? The public IP address that represents one or more inside local IP addresses to the outside The actual private IP address assigned to a device on the inside network(s) The IP address of an outside host as it appears to the inside network The public IP address assigned to a host on the outside network 8. Which two network utilities/tools are used for Wireshark traffic monitoring if the monitoring terminal is not in the path of traffic? PING (for Switches) ICMP (for Routers) TRACEROUTE (for Switches) RITE (for Routers) SPAN (for Switches) TRACEROUTE (for Routers) SPAN (for Switches) RITE (for Routers) 9. What will be printed as a result of below Python code? print("Bytesit Academy") #print("www.bytesitacademy.com") Nothing (it will result in error) BytesIT Academy www.bytesitacademy.com BytesIT Academy www.bytesitacademy.com 10. In networking, PAT stands for None of the them Peer address translation Packet address translation Port address translation 11. Which OSPF Packet Type is missing here? DBD REPLY ASBR HELLO REPLY 12. There are two Routers R1 and R2 in enterprise network of a company named as NETWORK WALKS, that use EIGRP. How does R1 know whether R2 is still alive or not (so that R2 could react if router B fails)? None of the other answers are correct By using EIGRP Hello messages, with R1 needing to receive periodic Hello messages to believe R2 is still working By using EIGRP update messages, with R1 needing to receive periodic update messages to believe R2 is still working Using a periodic ping of R2’s IP address based on the EIGRP neighbor timer 13. Is there any EtherChannel in this topology or not? YES NO 14. Which of the following is the message exchange mode used to establish an IKEv1 IPsec SA? Quick mode Main mode CREATE_CHILD_SA Aggressive mode 15. NTP is a unicast protocol and uses UDP port number 123 223 323 23 16. Which of the following UDP ports is the UDP port officially assigned by the IANA for VXLAN? 8472 8947 4987 4789 17. EIGRP supports Equal and Unequal Cost Load Balancing: TRUE FALSE 18. Ten lightweights APs are joined to a wireless LAN controller. If a client roams from one of the APs to another, which one of the following correctly describes the roam? Indirect roaming Autonomous roaming Intercontroller roaming Intracontroller roaming 19. A transmitter is configured to use a power level of 17 mW. One day it is reconfigured to transmit at a new power level of 34 mW. How much has the power level increased in dB? 2 dB 3 dB 17 dB None of these answers are correct; you need a calculator to figure this out 0 dB 20. Which route has been selected as best valid by BGP out of these two? R2#show ip bgp .. Network Next Hop Metric LocPrf Weight Path * 7.7.7.7/32 24.24.24.4 0 400 700 i *> 23.23.23.3 0 300 700 i BGP Path via AS 300 BGP Path via AS 23 BGP Path via AS 400 BGP Path via AS 1 21. Does LISP separate IP addresses into which of the following? (Choose two.) Subnets and hosts LISP entities EIDs RLOCs 22. Which type of solution provides lower cost & shorter time to deploy benefits? DWDM Optical Networks MPLS Traditional Networks SD-WAN 23. Which of the following antennas would probably have a greater gain than the other? Yagi Dipole 24. Phishing falls under which type of Security attacks? Virus attacks Social Engineering attacks Data Loss attacks General attacks 25. Which one is correct description of Queuing (Buffering) in QoS? Storage + Scheduling Drop or re-mark incoming or outgoing traffic that goes beyond the desired traffic rate Buffer and delay egress traffic rates that momentarily peak The temporary storage of excess packets 26. What is the Summary (aggregated) Route for these two routes? 10.0.0.0/21 10.0.0.0/23 10.0.0.0/22 10.0.0.0/20 27. Which of the following unique features is true in embedded wireless network architecture? An access layer switch can also function as a WLC All WLCs are converged into one device An access layer switch can also function as an AP Large groups of APs connect to a single access layer switch 28. Which type of topology is used by PIM? It uses Broadcast information It uses routing information supplied by other routing protocols It uses its own topology discovery mechanism It uses Layer2 information 29. Which type of attribute may or may not be recognized by the BGP implementations? UNKNOWN OPTIONAL WELL KNOWN TRANSITIVE 30. Which of the following are modes of packet transport supported by IPsec? (Choose two.) Transparent mode Crypto mode Tunnel mode Transport mode 31. In Token Bucket, the tokens are added into the bucket at a fixed rate which is called: PIR CIR Bc PQ 32. EIGRP Routing Protocol falls under which type of Routing Protocols? Hybrid Routing Protocols Path Vector Routing Protocols Link State Routing Protocols Distance Vector Routing Protocols 33. Which one of these represents the first half of multicast MAC address? 01:00:55 00:00:5F 01:00:5E 00:00:00 34. What is the OSPF Priority range? 10-255 0-255 0-200 0-100 35. Which of these best describes PQ in QoS? A set of four queues (high, medium, normal, and low) are served in strict-priority order Queues are serviced in sequence one after the other, and each queue processes one packet only It automatically divides the interface BW by the number of flows to allocate bandwidth fairly among all flows It involves a single queue where the first packet to be placed on the output interface queue is the first packet to leave the interface 36. What are the two basic types of multicast distribution trees? Shared trees Distributed trees Apple trees 🙂 Source trees 37. Which type of ACL is this? #access-list 100 permit tcp 192.168.10.0 0.0.0.255 any eq 80 #access-list 100 permit tcp 192.168.11.0 0.0.0.255 any eq 443 #access-list 100 deny tcp 10.0.11.0 0.0.0.255 any eq 443 Standard Named ACL Standard Numbered ACL Extended Numbered ACL Extended Named ACL 38. What is the use of IGMP Snooping? IGMP Snooping suppresses the unnecessary forwarding of multicast data in Layer 4 networks IGMP Snooping suppresses the necessary forwarding of multicast data in Layer 2 networks IGMP Snooping suppresses the unnecessary forwarding of multicast data in Layer 2 networks IGMP Snooping stops all traffic 39. Which Python code is used to capture username from a Cisco Router through a prompt in Python 3? tn.read_until(b"user: ") tn.read_until(b"user:") tn.read_until(b"Login:") tn.read_until(b"Username: ") 40. Which type of ACL is this? #access-list 1 deny host 10.0.0.1 #access-list 1 permit 10.0.0.0 0.0.0.255 #access-list 1 permit 192.168.0.0 0.0.255.255 Extended Named ACL Standard Named ACL Extended Numbered ACL Standard Numbered ACL 41. Which Wireshark filter is used to filter Packets that have 10.0.0.1 either as source or destination IP? ip.dst == 10.0.0.1 ip.src == 10.0.0.1 !(ip.addr == 10.0.0.1) ip.addr == 10.0.0.1 42. Which of the following parameters is useful for computing a client device’s location with respect to an AP? BSS GPS RSS Channel 43. What is the range of 2-Byte AS Numbers? 1-65535 1-100 1-4.2Billion 1-99 44. If an AP tries every available method to discover a controller but fails to do so, what happens next? It tries to contact the default controller at 10.0.0.1 It broadcasts on every possible subnet It uses IP redirect on the local router It reboots or starts discovering again 45. Which of the following FHRP does not support interface tracking? All of them GLBP HSRP VRRP 46. Suppose an enterprise offers a wireless network that guests can use but only after they read and accept an acceptable use policy document. Which one of the following methods can inherently handle this process? WPA3 personal Open Authentication WPA2 enterprise WebAuth 47. Which path will be chosen by R1 for traffic of R2? (i.e. which route will have the highest preference in R1’s Routing Table?) OSPF Route with cost (metric) of 100 None OSPF Route with cost (metric) of 200 OSPF Route with cost (metric) of 300 48. Which Wireshark filter is used to filter traffic based on Source IP Address? ip.src == 10.0.0.1 ip.dst == 10.0.0.1 ip.addr == 10.0.0.1 !(ip.addr == 10.0.0.1) 49. OSPF supports which authentication types for security? (Choose two) Simple Password Authentication MD4 Authentication MD5 Authentication MD6 Authentication 50. Peering with CE (Customer Edge) Routers is done on which type of MPLS ISP Routers? IP (Provider Router) PE (Provider Edge Router) Special Router LSR (Label Switch Router) Loading … Question 1 of 50 Written by