ENCOR Final Preparation Exam 350-401 Please enter your email: Refer to the exhibit. SwitchC connects HR and Sales to the Core switch. However, business needs require that no traffic from the Finance VLAN traverse this switch. Which command meets this requirement? SwitchC(config)#interface port-channel 1 SwitchC(config-if)#switchport trunk allowed vlan add 210,310 SwitchC(config)#vtp pruning vlan 110 SwitchC(config)#interface port-channel 1 SwitchC(config-if)#switchport trunk allowed vlan remove 110 SwitchC(config)#vtp pruning Refer to the exhibit. Which command must be applied to R2 for an OSPF neighborship to form? network 20.1.1.2 0.0.0.0 area 0 network 20.1.1.2 255.255.255.255 area 0 network 20.1.1.2 255.255.0.0 area 0 network 20.1.1.2 0.0.255.255 area 0 Which DHCP option helps lightweight APs find the IP address of a wireless LAN controller? Option 43 Option 60 Option 150 Option 67 Which HHTP status code is the correct response for a request with an incorrect password applied to a REST API session? HTTP Status Code 302 HTTP Status Code 401 HTTP Status Code: 504 HTTP Status Code 200 Refer to the exhibit. An engineer must establish eBGP peering between router R3 and router R4. Both routers should use their loopback interfaces as the BGP router ID. Which configuration set accomplishes this task? R3(config)#router bgp 200 R3(config-router)#neighbor 10.24.24.4 remote-as 100 R3(config-router)#bgp router-id 10.3.3.3 R4(config)#router bgp 100 R4(config-router)#neighbor 10.24.24.3 remote-as 200 R4(config-router)#bgp router-id 10.4.4.4 R3(config)#router bgp 200 R3(config-router)#neighbor 10.24.24.4 remote-as 100 R3(config-router)#neighbor 10.24.24.4 update-source Loopback0 R4(config)#router bgp 100 R4(config-router)#neighbor 10.24.24.3 remote-as 200 R4(config-router)#neighbor 10.24.24.3 update-source Loopback0 R3(config)#router bgp 200 R3(config-router)#neighbor 10.4.4.4 remote-as 100 R3(config-router)# neighbor 10.4.4.4 update-source Loopback0 R4(config)#router bgp 100 R4(config-router)#neighbor 10.3.3.3 remote-as 200 R4(config-router)#network 10.3.3.3 update-source Loopback0 R3(config)#router bgp 200 R3(config-router)#neighbor 10.4.4.4 remote-as 100 R3(config-router)#bgp router-id 10.3.3.3 R4(config)#router bgp 100 R4(config-router)#neighbor 10.3.3.3 remote-as 200 R4(config-router)#bgp router-id 10.4.4.4 A client device roams between access points located on different floors in an atrium. The access points are joined to the same controller and configured in local mode. The access points are in different AP groups and have different IP addresses, but the client VLAN in the groups is the same. Which type of roam occurs? intra-controller inter-controller inter-subnet intra-VLAN When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port? logging host 10.2.3.4 vrf mgmt transport udp port 6514 logging host 10.2.3.4 vrf mgmt transport tcp port 6514 logging host 10.2.3.4 vrf mgmt transport udp port 514 logging host 10.2.3.4 vrf mgmt transport tcp port 514 A client device fails to see the enterprise SSID, but other client devices are connected to it. What is the cause of this issue? The broadcast SSID was not manually configured on the client. The client has incorrect credentials stored for the configured hidden SSID. The hidden SSID was not manually configured on the client. The client has incorrect credentials stored for the configured broadcast SSID. When configuring WPA2 Enterprise on a WLAN, which additional security component configuration is required? PKI server RADIUS server TACACS server NTP server Which First Hop Redundancy Protocol should be used to meet a design requirement for more efficient default gateway bandwidth usage across multiple devices? GLBP HSRP LACP VRRP Which statement describes the IP and MAC allocation requirements for virtual machines on types 1 hypervisors? Each virtual machine requires a unique IP and MAC addresses to be able to reach to other nodes. Each virtual machine requires a unique MAC address but shares the IP address with the physical server. Each virtual machine requires a unique IP address but shares the MAC address with the physical server Each virtual machines requires a unique IP address but shares the MAC address with the address of the physical server. What mechanism does PIM use to forward multicast traffic? PIM sparse mode uses a flood and prune model to deliver multicast traffic. PIM sparse mode uses a pull model to deliver multicast traffic. PIM dense mode uses a pull model to deliver multicast traffic. PIM sparse mode uses receivers to register with the RP. What is the role of the RP in PIM sparse m Qode? The RP is the multicast router that is the root of the PIM-SM shared multicast distribution tree. The RP responds to the PIM join messages with the source of a requested multicast group. The RP maintains default aging timeouts for all multicast streams requested by the receivers. The RP acts as a control-plane node only and does not receive or forward multicast packets Which standard access control entry permits from odd-numbered hosts in the 10.0.0.0/24 subnet? Permit 10.0.0.0.255.255.255.254 Permit 10.0.0.1.0.0.0.0 Permit 10.0.0.0.0.0.0.1 Permit 10.0.0.1.0.0.0.254 Which exhibit displays a valid JSON file? Option C Option B Option D Option A Refer to the exhibit. An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24. The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router However, the router can still ping hosts on the 209.165.200.0/24 subnet. Not Mastered Mastered Which method does the enable secret password option use to encrypt device passwords? MD5 AES PAP CHAP Which NTP Stratum level is a server that is connected directly to an authoritative time source? Stratum 1 Stratum 15 Stratum 14 Stratum 0 Refer to the exhibit. Link1 is a copper connection and Link2 is a fiber connection. The fiber port must be the primary port for all forwarding. The output of the show spanning-tree command on SW2 shows that the fiber port is blocked by spanning tree. An engineer enters the spanning- tree port-priority 32 command on GO/1 on SW2, but the port remains blocked. Which command should be entered on the ports that are connected to Link2 to resolve the issue? Enter spanning-tree port-priority 224 on SW1. Enter spanning-tree port-priority 4 on SW2. Enter spanning-tree port-priority 32 on SW1. Enter spanning-tree port-priority 64 on SW2. Refer to the exhibit. Based on the configuration in this WLAN security setting, which method can a client use to authenticate to the network? RADIUS token username and password text string certificate An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy. Which device presents the web authentication for the WLAN? anchor WLC ISE server RADIUS server local WLC Refer to the exhibit. Which type of antenna do the radiation patterns present? Patch Yagi Dipole Omnidirectional Which DHCP option provides the CAPWAP APs with the address of the wireless controller(s)? 69 150 66 43 Which statement about an RSPAN session configuration is true? Only incoming traffic can be monitored. A filter must be configured for RSPAN sessions. Only one session can be configured at a time. A special VLAN type must be used as the RSPAN destination. What is a benefit of deploying an on-premises infrastructure versus a cloud infrastructure deployment? less power and cooling resources needed to run infrastructure on-premises faster deployment times because additional infrastructure does not need to be purchased lower latency between systems that are physically located near each other ability to quickly increase compute power without the need to install additional hardware Which access point mode allows a supported AP to function like a WLAN client would, associating and identifying client connectivity issues? SE-connect mode sensor mode sniffer mode client mode A customer has several small branches and wants to deploy a WI-FI solution with local management using CAPWAP. Which deployment model meets this requirement? SD-Access wireless Autonomous Mobility Express Local mode Which IP SLA operation requires the IP SLA responder to be configured on the remote end? TCP ICMP jitter UDP jitter ICMP echo Refer to exhibit. VLANs 50 and 60 exist on the trunk links between all switches All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server Which command ensures that SW3 receives frames only from VLAN 50? SW1 (config)#vtp pruning SW2(config)=vtp pruning SW1 (config >»vtp mode transparent SW3(config)#vtp mode transparent The login method is configured on the VTY lines of a router with these parameters. 1. The first method for authentication is TACACS 2. If TACACS is unavailable, login is allowed without any provided credentials Which configuration accomplishes this task? Option D Option A Option B Option C Refer to the exhibit. Which IP address becomes the active next hop for 192.168.102 0/24 when 192.168.101.2 fails? 192.168.101.10 192.168.101.14 A.-192.168.101.18 192.168.101.6 Refer to the exhibit. The WLC administrator sees that the controller to which a roaming client associates has Mobility Role Anchor configured under Clients > Detail. Which type of roaming is supported? Indirect Intracontroller Layer 2 intercontroller Layer 3 intercontroller Which reason could cause an OSPF neighborship to be in the EXSTART/EXCHANGE state? mismatched MTU size mismatched areas mismatched OSPF link costs mismatched OSPF network type Which statement about a fabric access point is true? It is in local mode an must connected directly to the fabric edge switch. It is in FlexConnect mode and must be connected directly to the fabric border node. It is in local mode an must be connected directly to the fabric border node. It is in FlexConnect mode and must be connected directly to the fabric edge switch. Refer to the exhibit. A port channel is configured between SW2 and SW3. SW2 is not running a Cisco operating system. When all physical connections are mode, the port channel does not establish. Based on the configuration excerpt of SW3, what is the cause of the problem? The port-channel should be set to auto The port channel on SW2 is using an incompatible protocol The port-channel interface lead balance should be set to src-mac The port-channel trunk is not allowing the native VLAN Which OSPF network types are compatible and allow communication through the two peering devices? broadcast to point-to-point point-to-multipoint to nonbroadcast broadcast to nonbroadcast point-to-multipoint to broadcast Which statement about Cisco Express Forwarding is true? maintains two tables in the data plane the FIB and adjacency table. It uses a fast cache that is maintained in a router data plane. The CPU of a router becomes directly involved with packet-switching decisions. It makes forwarding decisions by a process that is scheduled through the IOS scheduler. Which feature must be configured to allow packet capture over Layer 3 infrastructure? IPSPAN VSPAN ERSPAN RSPAN A response code of 404 is received while using the REST API on Cisco UNA Center to POST to this URI. /dna/intent/api/v1 /template-programmer/project What does the code mean? The POST/PUT request was fulfilled, and a new resource was created, Information about the resource is in the response body. The client made a request a resource that does not exist. The server has not implemented the functionality that is needed to fulfill the request. The request accepted for processing, but the processing was not completed. An engineer is concerned with the deployment of a new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements? Router(config)# ip sla responder tcp-echo 172.29.139.134 5000 Router(config)# ip sla responder udp-connect 172.29.139.134 5000 Router(config)# ip sla responder udp-echo 172.29.139.134 5000 Router(config)# ip sla responder tcp-connect 172.29.139.134 5000 Which requirement for an Ansible-managed node is true? It must have an SSH server running. It must have an Ansible Tower installed. It must be a Linux server or a Cisco device. It must support ad hoc commands. Which statement explains why Type 1 hypervisor is considered more efficient than Type 2 hypervisor? Type 1 hypervisor enables other operating systems to run on it. Type 1 hypervisor relics on the existing OS of the host machine to access CPU, memory, storage, and network resources. Type 1 hypervisor runs directly on the physical hardware of the host machine without relying on the underlying OS. Type 1 hypervisor is the only type of hypervisor that supports hardware acceleration techniques. When reason could cause an OSPF neighborship to be in the EXSTART/EXCHANGE state? Mismatched MTU size Mismatched OSPF link costs Mismatched OSPF network type Mismatched areas When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required? RADIUS server NTP server TACACS server PKI server A network is being migrated from IPv4 to IPv6 using a dual-stack approach. Network management is already 100% IPv6 enabled. In a dual-stack network with two dual-stack NetFlow collectors, how many flow exporters are needed per network device in the flexible NetFlow configuration? 1 2 4 8 Which First Hop Redundancy Protocol maximizes uplink utilization and minimizes the amount of configuration that is necessary? HSRP v1 VRRP GLBP HSRP v2 How does the EIGRP metric differ from the OSPF metric? The EIGRP metric is calculated based on bandwidth only. The OSPF metric is calculated on delay only. The EIGRP metric is calculated based on bandwidth and delay. The OSPF metric is calculated on bandwidth only The EIGRP metric is calculated based on hop count and bandwidth. The OSPF metric is calculated on bandwidth and delay. The EIGRP metric is calculated based on delay only. The OSPF metric is calculated on bandwidth and delay. What is a benefit of data modeling languages like YANG? They provide a standardized data structure, which results in configuration scalability and consistency. They create more secure and efficient SNMP OIDs. They make the CLI simpler and more efficient. They enable programmers to change or write their own application within the device operating system. Refer to the exhibit. An engineer must ensure that all traffic entering AS 200 from AS 100 chooses Link 2 as an entry point. Assume that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers. Which configuration accomplishes this task? R3(config)#route-map PREPEND permit 10 R3(config-route-map)#set as-path prepend 100 100 100 R3(config)#router bgp 200 R3(config-router)#neighbor 10.1.1.1 route-map PREPEND in R4(config)#route-map PREPEND permit 10 R4(config-route-map)#set as-path prepend 100 100 100 R4(config)#router bgp 200 R4(config-router)#neighbor 10.2.2.2 route-map PREPEND in R3(config)#route-map PREPEND permit 10 R3(config-route-map)#set as-path prepend 200 200 200 R3(config)#router bgp 200 R3#(config-router)#neighbor 10.1.1.1 route-map PREPEND out R4(config)#route-map PREPEND permit 10 R4(config-route-map)#set as-path prepend 200 200 200 R4(config)#router bgp 200 R4(config-router)#neighbor 10.2.2.2 route-map PREPEND out Refer to the exhibit. Which command when applied to the Atlanta router reduces type 3 LSA flooding into the backbone area and summarizes the inter-area routes on the Dallas router? Atlanta(config-router)#area 1 range 192.168.0.0 255.255.248.0 Atlanta(config-router)#area 1 range 192.168.0.0 255.255.252.0 Atlanta(config-router)#area 0 range 192.168.0.0 255.255.248.0 Atlanta(config-router)#area 0 range 192.168.0.0 255.255.252.0 Loading … Question 1 of 50 Written by