Final Exam ENCOR Specialist 350-401 Please enter your email: 1. What is the OSPF Priority range? 10-255 0-255 0-100 0-200 2. Which of the following statement is correct for outside global ip address? The public IP address assigned to a host on the outside network The actual private IP address assigned to a device on the inside network(s) The IP address of an outside host as it appears to the inside network The public IP address that represents one or more inside local IP addresses to the outside 3. EIGRP sends Hello Message after every ___________ seconds 180 seconds 5 seconds (LAN/Fast), 5 seconds (WAN/Slow) 5 seconds (LAN/Fast), 60 seconds (WAN/Slow) 15 seconds 4. What is the use of IGMP Snooping? IGMP Snooping suppresses the unnecessary forwarding of multicast data in Layer 2 networks IGMP Snooping suppresses the unnecessary forwarding of multicast data in Layer 4 networks IGMP Snooping suppresses the necessary forwarding of multicast data in Layer 2 networks IGMP Snooping stops all traffic 5. Which type of ACL is this? #access-list 1 deny host 10.0.0.1 #access-list 1 permit 10.0.0.0 0.0.0.255 #access-list 1 permit 192.168.0.0 0.0.255.255 Extended Numbered ACL Standard Named ACL Extended Named ACL Standard Numbered ACL 6. Which code will result in below output? B D A C 7. Which one of these represents the first half of multicast MAC address? 00:00:5F 01:00:5E 01:00:55 00:00:00 8. Which of the following FHRP is not a CISCO proprietary protocol? All of them VRRP GLBP HSRP 9. Which EtherChannel mode has been used in this configuration? Un-defined PAgP LACP ON 10. Which type of attribute may or may not be recognized by the BGP implementations? TRANSITIVE WELL KNOWN UNKNOWN OPTIONAL 11. EIGRP is a routing Protocol which was designed by Cisco but a limited RFC has been released in 2016 which now allows it to run on Juniper Routers as well? TRUE FALSE 12. Which Python code is used to capture username from a Cisco Router through a prompt in Python 3? tn.read_until(b"Username: ") tn.read_until(b"Login:") tn.read_until(b"user: ") tn.read_until(b"user:") 13. Which type of ACL is this? #access-list 100 permit tcp 192.168.10.0 0.0.0.255 any eq 80 #access-list 100 permit tcp 192.168.11.0 0.0.0.255 any eq 443 #access-list 100 deny tcp 10.0.11.0 0.0.0.255 any eq 443 Extended Numbered ACL Extended Named ACL Standard Numbered ACL Standard Named ACL 14. Will the iBGP neighborship be formed between R1 and R2 in this kind of network? YES NO 15. Which of the following antennas would probably have a greater gain than the other? Yagi Dipole 16. Peering with CE (Customer Edge) Routers is done on which type of MPLS ISP Routers? Special Router PE (Provider Edge Router) IP (Provider Router) LSR (Label Switch Router) 17. Which statement is correct? NTP can give accuracy in micro-sec NTP can give accuracy in mili-sec PTP can give accuracy in micro-sec PTP can give accuracy in mili-sec 18. What are the two basic types of multicast distribution trees? Source trees Apple trees 🙂 Distributed trees Shared trees 19. EIGRP supports Equal and Unequal Cost Load Balancing: TRUE FALSE 20. If an AP tries every available method to discover a controller but fails to do so, what happens next? It broadcasts on every possible subnet It tries to contact the default controller at 10.0.0.1 It reboots or starts discovering again It uses IP redirect on the local router 21. Which of the following UDP ports is the UDP port officially assigned by the IANA for VXLAN? 8472 4789 4987 8947 22. Which of the following are modes of packet transport supported by IPsec? (Choose two.) Tunnel mode Transport mode Crypto mode Transparent mode 23. Which OSPF Packet Type is missing here? ASBR DBD REPLY HELLO REPLY 24. Which of the following parameters is useful for computing a client device’s location with respect to an AP? Channel BSS RSS GPS 25. What is the Summary (aggregated) Route for these two routes? 10.0.0.0/21 10.0.0.0/23 10.0.0.0/20 10.0.0.0/22 26. Which path will be chosen by R1 for traffic of R2? (i.e. which route will have the highest preference in R1’s Routing Table?) OSPF Route with cost (metric) of 300 OSPF Route with cost (metric) of 200 None OSPF Route with cost (metric) of 100 27. Which type of Security architecture (security system) is this? Telnet Security ABC C.I.A. AAA 28. In TOP-DOWN Troubleshooting APPROACH, from which layer you should start troubleshooting? Data Link Layer Application Layer Network Layer Physical Layer 29. Which type of OSPF Router is this? IR (Internal Router) ER (External Router) ABR (Area Border Router) ASBR (AS Border Router) 30. What is the Multicast address used by EIGRP to send the updates? 225.255.255.255 224.0.0.10 225.0.0.10 224.0.0.9 31. Which type of Networking model is this? Old Networking Model SDN Model MPLS Model Traditional Networking Model 32. OSPF supports which authentication types for security? (Choose two) Simple Password Authentication MD5 Authentication MD4 Authentication MD6 Authentication 33. Is there any EtherChannel in this topology or not? YES NO 34. In networking, PAT stands for None of the them Peer address translation Port address translation Packet address translation 35. What will be printed as a result of below Python code? print("Bytesit Academy") #print("www.bytesitacademy.com") BytesIT Academy www.bytesitacademy.com BytesIT Academy Nothing (it will result in error) www.bytesitacademy.com 36. In Token Bucket, the tokens are added into the bucket at a fixed rate which is called: Bc PQ PIR CIR 37. Suppose an enterprise offers a wireless network that guests can use but only after they read and accept an acceptable use policy document. Which one of the following methods can inherently handle this process? Open Authentication WPA3 personal WPA2 enterprise WebAuth 38. Which of the following unique features is true in embedded wireless network architecture? An access layer switch can also function as an AP Large groups of APs connect to a single access layer switch All WLCs are converged into one device An access layer switch can also function as a WLC 39. What will be the final result of this ACL: #access-list 1 deny host 172.0.0.1 #access-list 1 permit host 172.0.0.1 It will finally result in Permit of traffic from 172.0.0.1 It will finally result in Deny of traffic from 172.0.0.1 It will finally result in Permit of traffic from 172.0.0.0 It will finally result in Deny of traffic from 172.0.0.0 40. Which Wireshark filter is used to filter traffic based on Source IP Address? ip.addr == 10.0.0.1 ip.src == 10.0.0.1 ip.dst == 10.0.0.1 !(ip.addr == 10.0.0.1) 41. Which code is correct for the If statement below? Only A is correct Both B & C are correct All codes are incorrect< Only B is correct 42. What is the meaning of below condition in Python scripting? A!=B A is greater than B A is smaller than B A is equal to B A is not equal to B 43. There are two Routers R1 and R2 in enterprise network of a company named as NETWORK WALKS, that use EIGRP. How does R1 know whether R2 is still alive or not (so that R2 could react if router B fails)? None of the other answers are correct Using a periodic ping of R2’s IP address based on the EIGRP neighbor timer By using EIGRP update messages, with R1 needing to receive periodic update messages to believe R2 is still working By using EIGRP Hello messages, with R1 needing to receive periodic Hello messages to believe R2 is still working 44. Which type of solution provides lower cost & shorter time to deploy benefits? DWDM Optical Networks MPLS Traditional Networks SD-WAN 45. EIGRP Routing Protocol falls under which type of Routing Protocols? Hybrid Routing Protocols Link State Routing Protocols Path Vector Routing Protocols Distance Vector Routing Protocols 46. Does LISP separate IP addresses into which of the following? (Choose two.) LISP entities EIDs Subnets and hosts RLOCs 47. A transmitter is configured to use a power level of 17 mW. One day it is reconfigured to transmit at a new power level of 34 mW. How much has the power level increased in dB? 2 dB 0 dB 3 dB 17 dB None of these answers are correct; you need a calculator to figure this out 48. Which of the following is the message exchange mode used to establish an IKEv1 IPsec SA? Quick mode Aggressive mode CREATE_CHILD_SA Main mode 49. Which of the following FHRP does not support interface tracking? HSRP All of them VRRP GLBP 50. Ten lightweights APs are joined to a wireless LAN controller. If a client roams from one of the APs to another, which one of the following correctly describes the roam? Indirect roaming Intracontroller roaming Autonomous roaming Intercontroller roaming Loading … Question 1 of 50 Written by