Final Exam ENCOR Specialist 350-401 Please enter your email: 1. What is the meaning of below condition in Python scripting? A!=B A is not equal to B A is smaller than B A is greater than B A is equal to B 2. Which type of ACL is this? #access-list 100 permit tcp 192.168.10.0 0.0.0.255 any eq 80 #access-list 100 permit tcp 192.168.11.0 0.0.0.255 any eq 443 #access-list 100 deny tcp 10.0.11.0 0.0.0.255 any eq 443 Extended Numbered ACL Extended Named ACL Standard Named ACL Standard Numbered ACL 3. Which type of OSPF Router is this? IR (Internal Router) ER (External Router) ASBR (AS Border Router) ABR (Area Border Router) 4. Which type of Networking model is this? Old Networking Model SDN Model MPLS Model Traditional Networking Model 5. EIGRP supports Equal and Unequal Cost Load Balancing: TRUE FALSE 6. Which OSPF Packet Type is missing here? DBD ASBR HELLO REPLY REPLY 7. Which code will result in below output? B C A D 8. OSPF supports which authentication types for security? (Choose two) MD6 Authentication MD5 Authentication MD4 Authentication Simple Password Authentication 9. If an AP tries every available method to discover a controller but fails to do so, what happens next? It uses IP redirect on the local router It tries to contact the default controller at 10.0.0.1 It broadcasts on every possible subnet It reboots or starts discovering again 10. Which of the following FHRP does not support interface tracking? HSRP GLBP VRRP All of them 11. Is there any EtherChannel in this topology or not? YES NO 12. What is the Multicast address used by EIGRP to send the updates? 224.0.0.10 224.0.0.9 225.255.255.255 225.0.0.10 13. Which code is correct for the If statement below? Both B & C are correct Only A is correct Only B is correct All codes are incorrect< 14. What is the range of 2-Byte AS Numbers? 1-4.2Billion 1-100 1-65535 1-99 15. Which of these best describes PQ in QoS? Queues are serviced in sequence one after the other, and each queue processes one packet only It involves a single queue where the first packet to be placed on the output interface queue is the first packet to leave the interface A set of four queues (high, medium, normal, and low) are served in strict-priority order It automatically divides the interface BW by the number of flows to allocate bandwidth fairly among all flows 16. Which EtherChannel mode has been used in this configuration? Un-defined ON LACP PAgP 17. In networking, PAT stands for None of the them Packet address translation Port address translation Peer address translation 18. What is the OSPF Priority range? 0-100 10-255 0-255 0-200 19. Which type of topology is used by PIM? It uses Broadcast information It uses Layer2 information It uses routing information supplied by other routing protocols It uses its own topology discovery mechanism 20. What are the two basic types of multicast distribution trees? Shared trees Source trees Apple trees 🙂 Distributed trees 21. Which of the following FHRP is not a CISCO proprietary protocol? VRRP All of them GLBP HSRP 22. In Token Bucket, the tokens are added into the bucket at a fixed rate which is called: CIR PIR Bc PQ 23. EIGRP is a routing Protocol which was designed by Cisco but a limited RFC has been released in 2016 which now allows it to run on Juniper Routers as well? TRUE FALSE 24. Which route has been selected as best valid by BGP out of these two? R2#show ip bgp .. Network Next Hop Metric LocPrf Weight Path * 7.7.7.7/32 24.24.24.4 0 400 700 i *> 23.23.23.3 0 300 700 i BGP Path via AS 400 BGP Path via AS 1 BGP Path via AS 23 BGP Path via AS 300 25. A Router at Networkwalks company has learnt these three routes for same destination. Which path will be preferred from these three? 10.0.3.0/26 10.0.3.0/30 10.0.3.0/24 10.0.3.0/28 26. Which of the following antennas would probably have a greater gain than the other? Yagi Dipole 27. Which of the following UDP ports is the UDP port officially assigned by the IANA for VXLAN? 8947 8472 4987 4789 28. Which type of Security architecture (security system) is this? AAA Telnet Security ABC C.I.A. 29. Which Wireshark filter is used to filter traffic based on Source IP Address? !(ip.addr == 10.0.0.1) ip.addr == 10.0.0.1 ip.dst == 10.0.0.1 ip.src == 10.0.0.1 30. There are two Routers R1 and R2 in enterprise network of a company named as NETWORK WALKS, that use EIGRP. How does R1 know whether R2 is still alive or not (so that R2 could react if router B fails)? By using EIGRP update messages, with R1 needing to receive periodic update messages to believe R2 is still working None of the other answers are correct By using EIGRP Hello messages, with R1 needing to receive periodic Hello messages to believe R2 is still working Using a periodic ping of R2’s IP address based on the EIGRP neighbor timer 31. What will be the final result of this ACL: #access-list 1 deny host 172.0.0.1 #access-list 1 permit host 172.0.0.1 It will finally result in Deny of traffic from 172.0.0.0 It will finally result in Deny of traffic from 172.0.0.1 It will finally result in Permit of traffic from 172.0.0.0 It will finally result in Permit of traffic from 172.0.0.1 32. Which of the following statement is correct for outside global ip address? The IP address of an outside host as it appears to the inside network The actual private IP address assigned to a device on the inside network(s) The public IP address that represents one or more inside local IP addresses to the outside The public IP address assigned to a host on the outside network 33. What will be printed as a result of below Python code? print("Bytesit Academy") #print("www.bytesitacademy.com") BytesIT Academy www.bytesitacademy.com Nothing (it will result in error) www.bytesitacademy.com BytesIT Academy 34. Which type of solution provides lower cost & shorter time to deploy benefits? DWDM Optical Networks Traditional Networks SD-WAN MPLS 35. Which Python code is used to capture username from a Cisco Router through a prompt in Python 3? tn.read_until(b"user: ") tn.read_until(b"Login:") tn.read_until(b"Username: ") tn.read_until(b"user:") 36. Which Wireshark filter is used to filter Packets that have 10.0.0.1 either as source or destination IP? !(ip.addr == 10.0.0.1) ip.src == 10.0.0.1 ip.addr == 10.0.0.1 ip.dst == 10.0.0.1 37. Which one is correct description of Queuing (Buffering) in QoS? The temporary storage of excess packets Storage + Scheduling Buffer and delay egress traffic rates that momentarily peak Drop or re-mark incoming or outgoing traffic that goes beyond the desired traffic rate 38. Which two network utilities/tools are used for Wireshark traffic monitoring if the monitoring terminal is not in the path of traffic? TRACEROUTE (for Switches) RITE (for Routers) PING (for Switches) ICMP (for Routers) SPAN (for Switches) RITE (for Routers) SPAN (for Switches) TRACEROUTE (for Routers) 39. Phishing falls under which type of Security attacks? Data Loss attacks Virus attacks Social Engineering attacks General attacks 40. Peering with CE (Customer Edge) Routers is done on which type of MPLS ISP Routers? Special Router PE (Provider Edge Router) IP (Provider Router) LSR (Label Switch Router) 41. Does LISP separate IP addresses into which of the following? (Choose two.) EIDs LISP entities Subnets and hosts RLOCs 42. EIGRP Routing Protocol falls under which type of Routing Protocols? Hybrid Routing Protocols Path Vector Routing Protocols Link State Routing Protocols Distance Vector Routing Protocols 43. Suppose an enterprise offers a wireless network that guests can use but only after they read and accept an acceptable use policy document. Which one of the following methods can inherently handle this process? WPA2 enterprise WebAuth WPA3 personal Open Authentication 44. Which type of attribute may or may not be recognized by the BGP implementations? UNKNOWN TRANSITIVE OPTIONAL WELL KNOWN 45. A transmitter is configured to use a power level of 17 mW. One day it is reconfigured to transmit at a new power level of 34 mW. How much has the power level increased in dB? 2 dB 17 dB 3 dB None of these answers are correct; you need a calculator to figure this out 0 dB 46. What is the use of IGMP Snooping? IGMP Snooping suppresses the unnecessary forwarding of multicast data in Layer 4 networks IGMP Snooping suppresses the necessary forwarding of multicast data in Layer 2 networks IGMP Snooping stops all traffic IGMP Snooping suppresses the unnecessary forwarding of multicast data in Layer 2 networks 47. NTP is a unicast protocol and uses UDP port number 323 123 23 223 48. When WPA2 enterprise mode is used on a WLAN, where is the supplicant role located? On the AP On the RADIUS server On the wireless client On the WLC 49. Which of the following is the message exchange mode used to establish an IKEv1 IPsec SA? CREATE_CHILD_SA Quick mode Aggressive mode Main mode 50. Which of the following unique features is true in embedded wireless network architecture? All WLCs are converged into one device Large groups of APs connect to a single access layer switch An access layer switch can also function as a WLC An access layer switch can also function as an AP Loading … Question 1 of 50 Written by