ENCOR Final Preparation Exam 350-401 Please enter your email: Refer to the exhibit. Link1 is a copper connection and Link2 is a fiber connection. The fiber port must be the primary port for all forwarding. The output of the show spanning-tree command on SW2 shows that the fiber port is blocked by spanning tree. An engineer enters the spanning- tree port-priority 32 command on GO/1 on SW2, but the port remains blocked. Which command should be entered on the ports that are connected to Link2 to resolve the issue? Enter spanning-tree port-priority 4 on SW2. Enter spanning-tree port-priority 32 on SW1. Enter spanning-tree port-priority 224 on SW1. Enter spanning-tree port-priority 64 on SW2. How does SSO work with HSRP to minimize network disruptions? It enables HSRP to failover to the standby RP on the same device. It ensures fast failover in the case of link failure. It enables HSRP to elect another switch in the group as the active HSRP switch. It enables data forwarding along known routes following a switchover, while the routing protocol reconverges. Refer to the exhibit. Communication between London and New York is down. Which command set must be applied to resolve this issue? NewYork(config)#int f0/1 NewYork(config)#switchport trunk encap dot1q NewYork(config)#end NewYork# NewYork(config)#int f0/1 NewYork(config)#switchport nonegotiate NewYork(config)#end NewYork# NewYork(config)#int f0/1 NewYork(config)#switchport mode trunk NewYork(config)#end NewYork# NewYork(config)#int f0/1 NewYork(config)#switchport mode dynamic desirable NewYork(config)#end NewYork# Which method does the enable secret password option use to encrypt device passwords? MD5 AES PAP CHAP Which OSPF network types are compatible and allow communication through the two peering devices? point-to-multipoint to broadcast broadcast to point-to-point broadcast to nonbroadcast point-to-multipoint to nonbroadcast Which statement about a fabric access point is true? It is in local mode an must connected directly to the fabric edge switch. It is in FlexConnect mode and must be connected directly to the fabric edge switch. It is in local mode an must be connected directly to the fabric border node. It is in FlexConnect mode and must be connected directly to the fabric border node. Which requirement for an Ansible-managed node is true? It must be a Linux server or a Cisco device. It must support ad hoc commands. It must have an SSH server running. It must have an Ansible Tower installed. A network is being migrated from IPv4 to IPv6 using a dual-stack approach. Network management is already 100% IPv6 enabled. In a dual-stack network with two dual-stack NetFlow collectors, how many flow exporters are needed per network device in the flexible NetFlow configuration? 8 2 1 4 Refer to the exhibit. An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as the exit point. Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplishes this task? R3(config-router)bgp default local-preference 200 R4(config-router)neighbor 10.2.2.2 weight 200 R3(config-router)neighbor 10.1.1.1 weight 200 R4(config-router)bgp default local-preference 200 Which statement describes the IP and MAC allocation requirements for virtual machines on types 1 hypervisors? Each virtual machines requires a unique IP address but shares the MAC address with the address of the physical server. Each virtual machine requires a unique IP and MAC addresses to be able to reach to other nodes. Each virtual machine requires a unique IP address but shares the MAC address with the physical server Each virtual machine requires a unique MAC address but shares the IP address with the physical server. Which First Hop Redundancy Protocol should be used to meet a design requirement for more efficient default gateway bandwidth usage across multiple devices? VRRP LACP GLBP HSRP Which statement about TLS is accurate when using RESTCONF to write configurations on network devices? It is used for HTTP and HTTPS requests. It is not supported on Cisco devices. It is provided using NGINX acting as a proxy web server. It requires certificates for authentication. Which HHTP status code is the correct response for a request with an incorrect password applied to a REST API session? HTTP Status Code 302 HTTP Status Code 401 HTTP Status Code: 504 HTTP Status Code 200 Refer to the exhibit. The traceroute fails from R1 to R3. What is the cause of the failure? An ACL applied inbound on fa0/1 of R3 is dropping the traffic. Redistribution of connected routes into OSPF is not configured. The loopback on R3 is in a shutdown state. An ACL applied inbound on loopback0 of R2 is dropping the traffic. Which DHCP option provides the CAPWAP APs with the address of the wireless controller(s)? 150 69 43 66 Which DHCP option helps lightweight APs find the IP address of a wireless LAN controller? Option 60 Option 67 Option 43 Option 150 Refer to the exhibit. The WLC administrator sees that the controller to which a roaming client associates has Mobility Role Anchor configured under Clients > Detail. Which type of roaming is supported? Layer 3 intercontroller Indirect Layer 2 intercontroller Intracontroller Refer to the exhibit. Which type of antenna do the radiation patterns present? Dipole Patch Yagi Omnidirectional Refer to the exhibit. Which command when applied to the Atlanta router reduces type 3 LSA flooding into the backbone area and summarizes the inter-area routes on the Dallas router? Atlanta(config-router)#area 1 range 192.168.0.0 255.255.248.0 Atlanta(config-router)#area 0 range 192.168.0.0 255.255.252.0 Atlanta(config-router)#area 1 range 192.168.0.0 255.255.252.0 Atlanta(config-router)#area 0 range 192.168.0.0 255.255.248.0 What mechanism does PIM use to forward multicast traffic? PIM sparse mode uses a flood and prune model to deliver multicast traffic. PIM sparse mode uses receivers to register with the RP. PIM dense mode uses a pull model to deliver multicast traffic. PIM sparse mode uses a pull model to deliver multicast traffic. What is a benefit of data modeling languages like YANG? They create more secure and efficient SNMP OIDs. They make the CLI simpler and more efficient. They provide a standardized data structure, which results in configuration scalability and consistency. They enable programmers to change or write their own application within the device operating system. Which feature must be configured to allow packet capture over Layer 3 infrastructure? VSPAN ERSPAN IPSPAN RSPAN When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required? TACACS server PKI server RADIUS server NTP server The login method is configured on the VTY lines of a router with these parameters. 1. The first method for authentication is TACACS 2. If TACACS is unavailable, login is allowed without any provided credentials Which configuration accomplishes this task? Option A Option B Option C Option D A response code of 404 is received while using the REST API on Cisco UNA Center to POST to this URI. /dna/intent/api/v1 /template-programmer/project What does the code mean? The server has not implemented the functionality that is needed to fulfill the request. The client made a request a resource that does not exist. The POST/PUT request was fulfilled, and a new resource was created, Information about the resource is in the response body. The request accepted for processing, but the processing was not completed. Refer to the exhibit. An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24. The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router However, the router can still ping hosts on the 209.165.200.0/24 subnet. Not Mastered Mastered What is a benefit of deploying an on-premises infrastructure versus a cloud infrastructure deployment? lower latency between systems that are physically located near each other ability to quickly increase compute power without the need to install additional hardware faster deployment times because additional infrastructure does not need to be purchased less power and cooling resources needed to run infrastructure on-premises When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port? logging host 10.2.3.4 vrf mgmt transport udp port 514 logging host 10.2.3.4 vrf mgmt transport udp port 6514 logging host 10.2.3.4 vrf mgmt transport tcp port 514 logging host 10.2.3.4 vrf mgmt transport tcp port 6514 Which reason could cause an OSPF neighborship to be in the EXSTART/EXCHANGE state? mismatched OSPF link costs mismatched areas mismatched MTU size mismatched OSPF network type IS OSPF, which LAS type is responsible for pointing to the ASBR router? type 3 type 1 type 4 type 2 Refer to the exhibit. Based on the configuration in this WLAN security setting, which method can a client use to authenticate to the network? username and password certificate RADIUS token text string Refer to the exhibit. Which IP address becomes the active next hop for 192.168.102 0/24 when 192.168.101.2 fails? A.-192.168.101.18 192.168.101.14 192.168.101.6 192.168.101.10 Which NTP Stratum level is a server that is connected directly to an authoritative time source? Stratum 1 Stratum 0 Stratum 14 Stratum 15 Refer to the exhibit. Which command must be applied to R2 for an OSPF neighborship to form? network 20.1.1.2 255.255.255.255 area 0 network 20.1.1.2 0.0.255.255 area 0 network 20.1.1.2 255.255.0.0 area 0 network 20.1.1.2 0.0.0.0 area 0 An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy. Which device presents the web authentication for the WLAN? ISE server RADIUS server local WLC anchor WLC Which feature of EIGRP is not supported in OSPF? uses interface bandwidth to determine best path load balancing of unequal-cost paths load balance over four equal-cost paths per-packet load balancing over multiple paths A customer has several small branches and wants to deploy a WI-FI solution with local management using CAPWAP. Which deployment model meets this requirement? Mobility Express Autonomous SD-Access wireless Local mode Which statement about an RSPAN session configuration is true? Only incoming traffic can be monitored. Only one session can be configured at a time. A filter must be configured for RSPAN sessions. A special VLAN type must be used as the RSPAN destination. Refer to the exhibit. A port channel is configured between SW2 and SW3. SW2 is not running a Cisco operating system. When all physical connections are mode, the port channel does not establish. Based on the configuration excerpt of SW3, what is the cause of the problem? The port-channel should be set to auto The port-channel interface lead balance should be set to src-mac The port channel on SW2 is using an incompatible protocol The port-channel trunk is not allowing the native VLAN Which statement explains why Type 1 hypervisor is considered more efficient than Type 2 hypervisor? Type 1 hypervisor is the only type of hypervisor that supports hardware acceleration techniques. Type 1 hypervisor runs directly on the physical hardware of the host machine without relying on the underlying OS. Type 1 hypervisor enables other operating systems to run on it. Type 1 hypervisor relics on the existing OS of the host machine to access CPU, memory, storage, and network resources. Which First Hop Redundancy Protocol maximizes uplink utilization and minimizes the amount of configuration that is necessary? HSRP v2 VRRP HSRP v1 GLBP An engineer is concerned with the deployment of a new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements? Router(config)# ip sla responder udp-echo 172.29.139.134 5000 Router(config)# ip sla responder udp-connect 172.29.139.134 5000 Router(config)# ip sla responder tcp-echo 172.29.139.134 5000 Router(config)# ip sla responder tcp-connect 172.29.139.134 5000 A client device fails to see the enterprise SSID, but other client devices are connected to it. What is the cause of this issue? The hidden SSID was not manually configured on the client. The broadcast SSID was not manually configured on the client. The client has incorrect credentials stored for the configured broadcast SSID. The client has incorrect credentials stored for the configured hidden SSID. Which encryption hashing algorithm does NTP use for authentication? SSL MD5 AES256 AES128 When reason could cause an OSPF neighborship to be in the EXSTART/EXCHANGE state? Mismatched areas Mismatched OSPF link costs Mismatched MTU size Mismatched OSPF network type Refer to the exhibit. An engineer reconfigures the port-channel between SW1 and SW2 from an access port to a trunk and immediately notices this error in SW1’s log: *Mar 1 09:47:22.245: %PM-4-ERR_DISABLE: bpduguard error detected on Gi0/0, putting Gi0/0 in err-disable state Which command set resolves this error? A. SW1(config-if)#interface Gi0/0 SW1(config-if)#no spanning-tree bpdufilter SW1(config-if)#shut SW1(config-if)#no shut B. SW1(config-if)#interface Gi0/0 SW1(config-if)#no spanning-tree bpduguard enable SW1(config-if)#shut SW1(config-if)#no shut C. SW1(config-if)#interface Gi0/0 SW1(config-if)#spanning-tree bpduguard enable SW1(config-if)#shut SW1(config-if)#no shut D. SW1(config-if)#interface Gi0/1 SW1(config-if)#spanning-tree bpduguard enable SW1(config-if)#shut SW1(config-if)#no shut Which standard access control entry permits from odd-numbered hosts in the 10.0.0.0/24 subnet? Permit 10.0.0.0.255.255.255.254 Permit 10.0.0.1.0.0.0.254 Permit 10.0.0.0.0.0.0.1 Permit 10.0.0.1.0.0.0.0 Which statement about Cisco Express Forwarding is true? maintains two tables in the data plane the FIB and adjacency table. The CPU of a router becomes directly involved with packet-switching decisions. It uses a fast cache that is maintained in a router data plane. It makes forwarding decisions by a process that is scheduled through the IOS scheduler. Refer to the exhibit. Which command allows hosts that are connected to FastEthernet0/2 to access the Internet? ip nat outside source list 10 interface FastEthernet0/2 overload ip nat outside source static 209.165.200.225 10.10.10.0 overload ip nat inside source list 10 interface FastEthernet0/2 overload ip nat inside source list 10 interface FastEthernet0/1 overload When configuring WPA2 Enterprise on a WLAN, which additional security component configuration is required? NTP server RADIUS server PKI server TACACS server Loading … Question 1 of 50 Written by