ENCOR Final Preparation Exam 350-401 Please enter your email: Which statement describes the IP and MAC allocation requirements for virtual machines on types 1 hypervisors? Each virtual machine requires a unique IP address but shares the MAC address with the physical server Each virtual machine requires a unique IP and MAC addresses to be able to reach to other nodes. Each virtual machines requires a unique IP address but shares the MAC address with the address of the physical server. Each virtual machine requires a unique MAC address but shares the IP address with the physical server. Refer to the exhibit. Which command must be applied to R2 for an OSPF neighborship to form? network 20.1.1.2 0.0.0.0 area 0 network 20.1.1.2 255.255.255.255 area 0 network 20.1.1.2 0.0.255.255 area 0 network 20.1.1.2 255.255.0.0 area 0 Refer to the exhibit. The WLC administrator sees that the controller to which a roaming client associates has Mobility Role Anchor configured under Clients > Detail. Which type of roaming is supported? Layer 2 intercontroller Indirect Intracontroller Layer 3 intercontroller Which OSPF network types are compatible and allow communication through the two peering devices? broadcast to point-to-point point-to-multipoint to nonbroadcast broadcast to nonbroadcast point-to-multipoint to broadcast Refer to the exhibit. Link1 is a copper connection and Link2 is a fiber connection. The fiber port must be the primary port for all forwarding. The output of the show spanning-tree command on SW2 shows that the fiber port is blocked by spanning tree. An engineer enters the spanning- tree port-priority 32 command on GO/1 on SW2, but the port remains blocked. Which command should be entered on the ports that are connected to Link2 to resolve the issue? Enter spanning-tree port-priority 224 on SW1. Enter spanning-tree port-priority 32 on SW1. Enter spanning-tree port-priority 64 on SW2. Enter spanning-tree port-priority 4 on SW2. Which NTP Stratum level is a server that is connected directly to an authoritative time source? Stratum 0 Stratum 1 Stratum 14 Stratum 15 Which access point mode allows a supported AP to function like a WLAN client would, associating and identifying client connectivity issues? SE-connect mode sensor mode client mode sniffer mode A network is being migrated from IPv4 to IPv6 using a dual-stack approach. Network management is already 100% IPv6 enabled. In a dual-stack network with two dual-stack NetFlow collectors, how many flow exporters are needed per network device in the flexible NetFlow configuration? 8 4 2 1 Refer to the exhibit. Which command allows hosts that are connected to FastEthernet0/2 to access the Internet? ip nat outside source list 10 interface FastEthernet0/2 overload ip nat inside source list 10 interface FastEthernet0/2 overload ip nat inside source list 10 interface FastEthernet0/1 overload ip nat outside source static 209.165.200.225 10.10.10.0 overload Refer to the exhibit. Which type of antenna do the radiation patterns present? Patch Yagi Omnidirectional Dipole Which encryption hashing algorithm does NTP use for authentication? SSL AES128 MD5 AES256 Which statement about TLS is accurate when using RESTCONF to write configurations on network devices? It is used for HTTP and HTTPS requests. It requires certificates for authentication. It is provided using NGINX acting as a proxy web server. It is not supported on Cisco devices. Which DHCP option provides the CAPWAP APs with the address of the wireless controller(s)? 69 150 66 43 An engineer is concerned with the deployment of a new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements? Router(config)# ip sla responder tcp-echo 172.29.139.134 5000 Router(config)# ip sla responder udp-connect 172.29.139.134 5000 Router(config)# ip sla responder tcp-connect 172.29.139.134 5000 Router(config)# ip sla responder udp-echo 172.29.139.134 5000 An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy. Which device presents the web authentication for the WLAN? RADIUS server ISE server anchor WLC local WLC When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required? PKI server NTP server RADIUS server TACACS server Which reason could cause an OSPF neighborship to be in the EXSTART/EXCHANGE state? mismatched OSPF link costs mismatched areas mismatched OSPF network type mismatched MTU size Refer to exhibit. VLANs 50 and 60 exist on the trunk links between all switches All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server Which command ensures that SW3 receives frames only from VLAN 50? SW1 (config >»vtp mode transparent SW3(config)#vtp mode transparent SW1 (config)#vtp pruning SW2(config)=vtp pruning Which method does the enable secret password option use to encrypt device passwords? PAP AES CHAP MD5 Which First Hop Redundancy Protocol should be used to meet a design requirement for more efficient default gateway bandwidth usage across multiple devices? LACP GLBP HSRP VRRP What mechanism does PIM use to forward multicast traffic? PIM sparse mode uses a flood and prune model to deliver multicast traffic. PIM sparse mode uses a pull model to deliver multicast traffic. PIM dense mode uses a pull model to deliver multicast traffic. PIM sparse mode uses receivers to register with the RP. Refer to the exhibit. Communication between London and New York is down. Which command set must be applied to resolve this issue? NewYork(config)#int f0/1 NewYork(config)#switchport mode dynamic desirable NewYork(config)#end NewYork# NewYork(config)#int f0/1 NewYork(config)#switchport trunk encap dot1q NewYork(config)#end NewYork# NewYork(config)#int f0/1 NewYork(config)#switchport mode trunk NewYork(config)#end NewYork# NewYork(config)#int f0/1 NewYork(config)#switchport nonegotiate NewYork(config)#end NewYork# Refer to the exhibit. An engineer reconfigures the port-channel between SW1 and SW2 from an access port to a trunk and immediately notices this error in SW1’s log: *Mar 1 09:47:22.245: %PM-4-ERR_DISABLE: bpduguard error detected on Gi0/0, putting Gi0/0 in err-disable state Which command set resolves this error? C. SW1(config-if)#interface Gi0/0 SW1(config-if)#spanning-tree bpduguard enable SW1(config-if)#shut SW1(config-if)#no shut B. SW1(config-if)#interface Gi0/0 SW1(config-if)#no spanning-tree bpduguard enable SW1(config-if)#shut SW1(config-if)#no shut A. SW1(config-if)#interface Gi0/0 SW1(config-if)#no spanning-tree bpdufilter SW1(config-if)#shut SW1(config-if)#no shut D. SW1(config-if)#interface Gi0/1 SW1(config-if)#spanning-tree bpduguard enable SW1(config-if)#shut SW1(config-if)#no shut Refer to the exhibit. A port channel is configured between SW2 and SW3. SW2 is not running a Cisco operating system. When all physical connections are mode, the port channel does not establish. Based on the configuration excerpt of SW3, what is the cause of the problem? The port-channel interface lead balance should be set to src-mac The port channel on SW2 is using an incompatible protocol The port-channel trunk is not allowing the native VLAN The port-channel should be set to auto Which statement explains why Type 1 hypervisor is considered more efficient than Type 2 hypervisor? Type 1 hypervisor is the only type of hypervisor that supports hardware acceleration techniques. Type 1 hypervisor runs directly on the physical hardware of the host machine without relying on the underlying OS. Type 1 hypervisor enables other operating systems to run on it. Type 1 hypervisor relics on the existing OS of the host machine to access CPU, memory, storage, and network resources. Refer to the exhibit. An engineer must establish eBGP peering between router R3 and router R4. Both routers should use their loopback interfaces as the BGP router ID. Which configuration set accomplishes this task? R3(config)#router bgp 200 R3(config-router)#neighbor 10.4.4.4 remote-as 100 R3(config-router)# neighbor 10.4.4.4 update-source Loopback0 R4(config)#router bgp 100 R4(config-router)#neighbor 10.3.3.3 remote-as 200 R4(config-router)#network 10.3.3.3 update-source Loopback0 R3(config)#router bgp 200 R3(config-router)#neighbor 10.24.24.4 remote-as 100 R3(config-router)#bgp router-id 10.3.3.3 R4(config)#router bgp 100 R4(config-router)#neighbor 10.24.24.3 remote-as 200 R4(config-router)#bgp router-id 10.4.4.4 R3(config)#router bgp 200 R3(config-router)#neighbor 10.24.24.4 remote-as 100 R3(config-router)#neighbor 10.24.24.4 update-source Loopback0 R4(config)#router bgp 100 R4(config-router)#neighbor 10.24.24.3 remote-as 200 R4(config-router)#neighbor 10.24.24.3 update-source Loopback0 R3(config)#router bgp 200 R3(config-router)#neighbor 10.4.4.4 remote-as 100 R3(config-router)#bgp router-id 10.3.3.3 R4(config)#router bgp 100 R4(config-router)#neighbor 10.3.3.3 remote-as 200 R4(config-router)#bgp router-id 10.4.4.4 Which First Hop Redundancy Protocol maximizes uplink utilization and minimizes the amount of configuration that is necessary? HSRP v1 VRRP HSRP v2 GLBP Which statement about Cisco Express Forwarding is true? maintains two tables in the data plane the FIB and adjacency table. It uses a fast cache that is maintained in a router data plane. The CPU of a router becomes directly involved with packet-switching decisions. It makes forwarding decisions by a process that is scheduled through the IOS scheduler. How does the EIGRP metric differ from the OSPF metric? The EIGRP metric is calculated based on bandwidth only. The OSPF metric is calculated on delay only. The EIGRP metric is calculated based on delay only. The OSPF metric is calculated on bandwidth and delay. The EIGRP metric is calculated based on hop count and bandwidth. The OSPF metric is calculated on bandwidth and delay. The EIGRP metric is calculated based on bandwidth and delay. The OSPF metric is calculated on bandwidth only Which IP SLA operation requires the IP SLA responder to be configured on the remote end? ICMP jitter TCP ICMP echo UDP jitter Which feature must be configured to allow packet capture over Layer 3 infrastructure? RSPAN ERSPAN VSPAN IPSPAN What is the role of the RP in PIM sparse m Qode? The RP is the multicast router that is the root of the PIM-SM shared multicast distribution tree. The RP responds to the PIM join messages with the source of a requested multicast group. The RP acts as a control-plane node only and does not receive or forward multicast packets The RP maintains default aging timeouts for all multicast streams requested by the receivers. Refer to the exhibit. Which IP address becomes the active next hop for 192.168.102 0/24 when 192.168.101.2 fails? 192.168.101.10 A.-192.168.101.18 192.168.101.6 192.168.101.14 A response code of 404 is received while using the REST API on Cisco UNA Center to POST to this URI. /dna/intent/api/v1 /template-programmer/project What does the code mean? The POST/PUT request was fulfilled, and a new resource was created, Information about the resource is in the response body. The client made a request a resource that does not exist. The server has not implemented the functionality that is needed to fulfill the request. The request accepted for processing, but the processing was not completed. When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port? logging host 10.2.3.4 vrf mgmt transport tcp port 514 logging host 10.2.3.4 vrf mgmt transport udp port 6514 logging host 10.2.3.4 vrf mgmt transport tcp port 6514 logging host 10.2.3.4 vrf mgmt transport udp port 514 What is a benefit of data modeling languages like YANG? They make the CLI simpler and more efficient. They enable programmers to change or write their own application within the device operating system. They create more secure and efficient SNMP OIDs. They provide a standardized data structure, which results in configuration scalability and consistency. Refer to the exhibit. Based on the configuration in this WLAN security setting, which method can a client use to authenticate to the network? certificate text string username and password RADIUS token A client device fails to see the enterprise SSID, but other client devices are connected to it. What is the cause of this issue? The client has incorrect credentials stored for the configured broadcast SSID. The hidden SSID was not manually configured on the client. The client has incorrect credentials stored for the configured hidden SSID. The broadcast SSID was not manually configured on the client. Refer to the exhibit. An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as the exit point. Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplishes this task? R4(config-router)neighbor 10.2.2.2 weight 200 R3(config-router)bgp default local-preference 200 R3(config-router)neighbor 10.1.1.1 weight 200 R4(config-router)bgp default local-preference 200 Which standard access control entry permits from odd-numbered hosts in the 10.0.0.0/24 subnet? Permit 10.0.0.1.0.0.0.254 Permit 10.0.0.0.0.0.0.1 Permit 10.0.0.0.255.255.255.254 Permit 10.0.0.1.0.0.0.0 Which statement about a fabric access point is true? It is in local mode an must be connected directly to the fabric border node. It is in local mode an must connected directly to the fabric edge switch. It is in FlexConnect mode and must be connected directly to the fabric edge switch. It is in FlexConnect mode and must be connected directly to the fabric border node. Which exhibit displays a valid JSON file? Option B Option A Option D Option C Refer to the exhibit. An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24. The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router However, the router can still ping hosts on the 209.165.200.0/24 subnet. Mastered Not Mastered Refer to the exhibit. SwitchC connects HR and Sales to the Core switch. However, business needs require that no traffic from the Finance VLAN traverse this switch. Which command meets this requirement? SwitchC(config)#vtp pruning vlan 110 SwitchC(config)#interface port-channel 1 SwitchC(config-if)#switchport trunk allowed vlan add 210,310 SwitchC(config)#interface port-channel 1 SwitchC(config-if)#switchport trunk allowed vlan remove 110 SwitchC(config)#vtp pruning When configuring WPA2 Enterprise on a WLAN, which additional security component configuration is required? TACACS server NTP server PKI server RADIUS server When reason could cause an OSPF neighborship to be in the EXSTART/EXCHANGE state? Mismatched OSPF network type Mismatched OSPF link costs Mismatched areas Mismatched MTU size The login method is configured on the VTY lines of a router with these parameters. 1. The first method for authentication is TACACS 2. If TACACS is unavailable, login is allowed without any provided credentials Which configuration accomplishes this task? Option C Option D Option A Option B Which DHCP option helps lightweight APs find the IP address of a wireless LAN controller? Option 60 Option 67 Option 150 Option 43 A customer has several small branches and wants to deploy a WI-FI solution with local management using CAPWAP. Which deployment model meets this requirement? Mobility Express SD-Access wireless Local mode Autonomous A client device fails to see the enterprise SSID, but other devices are connected to it. What is the cause of this issue? The broadcast SSID was not manually configured on the client. The hidden SSID was not manually configured on the client. The client has incorrect credentials stored for the configured broadcast SSID. The client has incorrect credentials stored for the configured hidden SSID. Loading … Question 1 of 50 Written by