Final Exam ENCOR Specialist 350-401 Please enter your email: 1. Which of the following UDP ports is the UDP port officially assigned by the IANA for VXLAN? 4789 4987 8472 8947 2. Which of the following parameters is useful for computing a client device’s location with respect to an AP? GPS BSS RSS Channel 3. Which Python code is used to capture username from a Cisco Router through a prompt in Python 3? tn.read_until(b"Login:") tn.read_until(b"Username: ") tn.read_until(b"user:") tn.read_until(b"user: ") 4. Which of the following is the message exchange mode used to establish an IKEv1 IPsec SA? Aggressive mode Main mode CREATE_CHILD_SA Quick mode 5. Which one of these represents the first half of multicast MAC address? 01:00:55 01:00:5E 00:00:00 00:00:5F 6. Which route has been selected as best valid by BGP out of these two? R2#show ip bgp .. Network Next Hop Metric LocPrf Weight Path * 7.7.7.7/32 24.24.24.4 0 400 700 i *> 23.23.23.3 0 300 700 i BGP Path via AS 300 BGP Path via AS 1 BGP Path via AS 400 BGP Path via AS 23 7. In Token Bucket, the tokens are added into the bucket at a fixed rate which is called: CIR Bc PQ PIR 8. There are two Routers R1 and R2 in enterprise network of a company named as NETWORK WALKS, that use EIGRP. How does R1 know whether R2 is still alive or not (so that R2 could react if router B fails)? By using EIGRP Hello messages, with R1 needing to receive periodic Hello messages to believe R2 is still working By using EIGRP update messages, with R1 needing to receive periodic update messages to believe R2 is still working None of the other answers are correct Using a periodic ping of R2’s IP address based on the EIGRP neighbor timer 9. Does LISP separate IP addresses into which of the following? (Choose two.) RLOCs Subnets and hosts LISP entities EIDs 10. EIGRP supports Equal and Unequal Cost Load Balancing: TRUE FALSE 11. Which EtherChannel mode has been used in this configuration? PAgP Un-defined LACP ON 12. In networking, PAT stands for Packet address translation None of the them Peer address translation Port address translation 13. Suppose an enterprise offers a wireless network that guests can use but only after they read and accept an acceptable use policy document. Which one of the following methods can inherently handle this process? WebAuth Open Authentication WPA2 enterprise WPA3 personal 14. Which path will be chosen by R1 for traffic of R2? (i.e. which route will have the highest preference in R1’s Routing Table?) OSPF Route with cost (metric) of 200 None OSPF Route with cost (metric) of 100 OSPF Route with cost (metric) of 300 15. If an AP tries every available method to discover a controller but fails to do so, what happens next? It broadcasts on every possible subnet It uses IP redirect on the local router It tries to contact the default controller at 10.0.0.1 It reboots or starts discovering again 16. OSPF supports which authentication types for security? (Choose two) Simple Password Authentication MD4 Authentication MD5 Authentication MD6 Authentication 17. What is the meaning of below condition in Python scripting? A!=B A is smaller than B A is greater than B A is equal to B A is not equal to B 18. What are the two basic types of multicast distribution trees? Source trees Shared trees Apple trees 🙂 Distributed trees 19. Which Wireshark filter is used to filter Packets that have 10.0.0.1 either as source or destination IP? ip.addr == 10.0.0.1 !(ip.addr == 10.0.0.1) ip.src == 10.0.0.1 ip.dst == 10.0.0.1 20. Which type of ACL is this? #access-list 1 deny host 10.0.0.1 #access-list 1 permit 10.0.0.0 0.0.0.255 #access-list 1 permit 192.168.0.0 0.0.255.255 Standard Numbered ACL Extended Named ACL Extended Numbered ACL Standard Named ACL 21. NTP is a unicast protocol and uses UDP port number 323 123 23 223 22. Which OSPF Packet Type is missing here? HELLO REPLY ASBR REPLY DBD 23. In TOP-DOWN Troubleshooting APPROACH, from which layer you should start troubleshooting? Network Layer Physical Layer Data Link Layer Application Layer 24. What will be printed as a result of below Python code? print("Bytesit Academy") #print("www.bytesitacademy.com") Nothing (it will result in error) BytesIT Academy www.bytesitacademy.com www.bytesitacademy.com BytesIT Academy 25. A Router at Networkwalks company has learnt these three routes for same destination. Which path will be preferred from these three? 10.0.3.0/24 10.0.3.0/26 10.0.3.0/30 10.0.3.0/28 26. What is the metric of IS-IS Routing Protocol? BW, Delay, Reliability, Load, MTU Hop Count Cost (always 10) Multiple factors like Weight, Local Preference,… 27. EIGRP sends Hello Message after every ___________ seconds 180 seconds 15 seconds 5 seconds (LAN/Fast), 5 seconds (WAN/Slow) 5 seconds (LAN/Fast), 60 seconds (WAN/Slow) 28. A transmitter is configured to use a power level of 17 mW. One day it is reconfigured to transmit at a new power level of 34 mW. How much has the power level increased in dB? 17 dB 0 dB 2 dB None of these answers are correct; you need a calculator to figure this out 3 dB 29. Which type of attribute may or may not be recognized by the BGP implementations? TRANSITIVE WELL KNOWN OPTIONAL UNKNOWN 30. Peering with CE (Customer Edge) Routers is done on which type of MPLS ISP Routers? Special Router PE (Provider Edge Router) LSR (Label Switch Router) IP (Provider Router) 31. Which code is correct for the If statement below? Only B is correct Both B & C are correct Only A is correct All codes are incorrect< 32. Which of the following FHRP does not support interface tracking? HSRP All of them VRRP GLBP 33. What will be the final result of this ACL: #access-list 1 deny host 172.0.0.1 #access-list 1 permit host 172.0.0.1 It will finally result in Permit of traffic from 172.0.0.0 It will finally result in Permit of traffic from 172.0.0.1 It will finally result in Deny of traffic from 172.0.0.1 It will finally result in Deny of traffic from 172.0.0.0 34. Which one is correct description of Queuing (Buffering) in QoS? Buffer and delay egress traffic rates that momentarily peak Drop or re-mark incoming or outgoing traffic that goes beyond the desired traffic rate Storage + Scheduling The temporary storage of excess packets 35. Which type of ACL is this? #access-list 100 permit tcp 192.168.10.0 0.0.0.255 any eq 80 #access-list 100 permit tcp 192.168.11.0 0.0.0.255 any eq 443 #access-list 100 deny tcp 10.0.11.0 0.0.0.255 any eq 443 Extended Numbered ACL Extended Named ACL Standard Named ACL Standard Numbered ACL 36. Which of the following FHRP is not a CISCO proprietary protocol? VRRP HSRP GLBP All of them 37. Which two network utilities/tools are used for Wireshark traffic monitoring if the monitoring terminal is not in the path of traffic? PING (for Switches) ICMP (for Routers) SPAN (for Switches) RITE (for Routers) SPAN (for Switches) TRACEROUTE (for Routers) TRACEROUTE (for Switches) RITE (for Routers) 38. What is the Multicast address used by EIGRP to send the updates? 225.255.255.255 224.0.0.10 224.0.0.9 225.0.0.10 39. Which type of Security architecture (security system) is this? Telnet Security AAA C.I.A. ABC 40. Which of the following are modes of packet transport supported by IPsec? (Choose two.) Tunnel mode Transport mode Transparent mode Crypto mode 41. What is the use of IGMP Snooping? IGMP Snooping suppresses the unnecessary forwarding of multicast data in Layer 4 networks IGMP Snooping stops all traffic IGMP Snooping suppresses the necessary forwarding of multicast data in Layer 2 networks IGMP Snooping suppresses the unnecessary forwarding of multicast data in Layer 2 networks 42. Which type of Networking model is this? Traditional Networking Model Old Networking Model MPLS Model SDN Model 43. Which Wireshark filter is used to filter traffic based on Source IP Address? ip.src == 10.0.0.1 ip.dst == 10.0.0.1 ip.addr == 10.0.0.1 !(ip.addr == 10.0.0.1) 44. Which type of topology is used by PIM? It uses its own topology discovery mechanism It uses routing information supplied by other routing protocols It uses Layer2 information It uses Broadcast information 45. Which of the following antennas would probably have a greater gain than the other? Yagi Dipole 46. What is the Summary (aggregated) Route for these two routes? 10.0.0.0/22 10.0.0.0/23 10.0.0.0/21 10.0.0.0/20 47. Which type of OSPF Router is this? IR (Internal Router) ABR (Area Border Router) ASBR (AS Border Router) ER (External Router) 48. Which type of solution provides lower cost & shorter time to deploy benefits? MPLS Traditional Networks SD-WAN DWDM Optical Networks 49. Which of the following unique features is true in embedded wireless network architecture? An access layer switch can also function as a WLC An access layer switch can also function as an AP All WLCs are converged into one device Large groups of APs connect to a single access layer switch 50. Which statement is correct? PTP can give accuracy in micro-sec PTP can give accuracy in mili-sec NTP can give accuracy in mili-sec NTP can give accuracy in micro-sec Loading … Question 1 of 50 Written by