Final Exam ENCOR Specialist 350-401 Please enter your email: 1. Which route has been selected as best valid by BGP out of these two? R2#show ip bgp .. Network Next Hop Metric LocPrf Weight Path * 7.7.7.7/32 24.24.24.4 0 400 700 i *> 23.23.23.3 0 300 700 i BGP Path via AS 300 BGP Path via AS 400 BGP Path via AS 1 BGP Path via AS 23 2. EIGRP supports Equal and Unequal Cost Load Balancing: TRUE FALSE 3. What are the two basic types of multicast distribution trees? Apple trees 🙂 Shared trees Source trees Distributed trees 4. Ten lightweights APs are joined to a wireless LAN controller. If a client roams from one of the APs to another, which one of the following correctly describes the roam? Intercontroller roaming Intracontroller roaming Autonomous roaming Indirect roaming 5. Which code is correct for the If statement below? All codes are incorrect< Only B is correct Only A is correct Both B & C are correct 6. Which type of ACL is this? #access-list 1 deny host 10.0.0.1 #access-list 1 permit 10.0.0.0 0.0.0.255 #access-list 1 permit 192.168.0.0 0.0.255.255 Standard Numbered ACL Standard Named ACL Extended Numbered ACL Extended Named ACL 7. Which type of OSPF Router is this? ER (External Router) ASBR (AS Border Router) ABR (Area Border Router) IR (Internal Router) 8. Phishing falls under which type of Security attacks? Social Engineering attacks Virus attacks General attacks Data Loss attacks 9. Which of the following unique features is true in embedded wireless network architecture? An access layer switch can also function as a WLC Large groups of APs connect to a single access layer switch All WLCs are converged into one device An access layer switch can also function as an AP 10. What is the range of 2-Byte AS Numbers? 1-65535 1-100 1-4.2Billion 1-99 11. Which OSPF Packet Type is missing here? DBD HELLO REPLY REPLY ASBR 12. If an AP tries every available method to discover a controller but fails to do so, what happens next? It reboots or starts discovering again It broadcasts on every possible subnet It tries to contact the default controller at 10.0.0.1 It uses IP redirect on the local router 13. In Token Bucket, the tokens are added into the bucket at a fixed rate which is called: PQ CIR PIR Bc 14. NTP is a unicast protocol and uses UDP port number 323 223 23 123 15. Suppose an enterprise offers a wireless network that guests can use but only after they read and accept an acceptable use policy document. Which one of the following methods can inherently handle this process? WPA3 personal Open Authentication WebAuth WPA2 enterprise 16. What will be printed as a result of below Python code? print("Bytesit Academy") #print("www.bytesitacademy.com") BytesIT Academy Nothing (it will result in error) BytesIT Academy www.bytesitacademy.com www.bytesitacademy.com 17. What will be the final result of this ACL: #access-list 1 deny host 172.0.0.1 #access-list 1 permit host 172.0.0.1 It will finally result in Deny of traffic from 172.0.0.1 It will finally result in Deny of traffic from 172.0.0.0 It will finally result in Permit of traffic from 172.0.0.1 It will finally result in Permit of traffic from 172.0.0.0 18. There are two Routers R1 and R2 in enterprise network of a company named as NETWORK WALKS, that use EIGRP. How does R1 know whether R2 is still alive or not (so that R2 could react if router B fails)? Using a periodic ping of R2’s IP address based on the EIGRP neighbor timer By using EIGRP Hello messages, with R1 needing to receive periodic Hello messages to believe R2 is still working None of the other answers are correct By using EIGRP update messages, with R1 needing to receive periodic update messages to believe R2 is still working 19. Which of the following antennas would probably have a greater gain than the other? Dipole Yagi 20. Which Wireshark filter is used to filter traffic based on Source IP Address? !(ip.addr == 10.0.0.1) ip.src == 10.0.0.1 ip.addr == 10.0.0.1 ip.dst == 10.0.0.1 21. Which Python code is used to capture username from a Cisco Router through a prompt in Python 3? tn.read_until(b"Username: ") tn.read_until(b"Login:") tn.read_until(b"user:") tn.read_until(b"user: ") 22. Which two network utilities/tools are used for Wireshark traffic monitoring if the monitoring terminal is not in the path of traffic? SPAN (for Switches) TRACEROUTE (for Routers) PING (for Switches) ICMP (for Routers) SPAN (for Switches) RITE (for Routers) TRACEROUTE (for Switches) RITE (for Routers) 23. What is the metric of IS-IS Routing Protocol? BW, Delay, Reliability, Load, MTU Multiple factors like Weight, Local Preference,… Cost (always 10) Hop Count 24. Which of the following are modes of packet transport supported by IPsec? (Choose two.) Transparent mode Crypto mode Tunnel mode Transport mode 25. Which type of Networking model is this? SDN Model MPLS Model Old Networking Model Traditional Networking Model 26. Which of the following FHRP does not support interface tracking? HSRP GLBP All of them VRRP 27. Which of the following FHRP is not a CISCO proprietary protocol? GLBP All of them VRRP HSRP 28. Which of the following UDP ports is the UDP port officially assigned by the IANA for VXLAN? 4789 4987 8472 8947 29. Is there any EtherChannel in this topology or not? NO YES 30. Which Wireshark filter is used to filter Packets that have 10.0.0.1 either as source or destination IP? ip.src == 10.0.0.1 ip.addr == 10.0.0.1 !(ip.addr == 10.0.0.1) ip.dst == 10.0.0.1 31. Which type of Security architecture (security system) is this? AAA C.I.A. ABC Telnet Security 32. Which type of solution provides lower cost & shorter time to deploy benefits? DWDM Optical Networks SD-WAN MPLS Traditional Networks 33. Does LISP separate IP addresses into which of the following? (Choose two.) RLOCs EIDs Subnets and hosts LISP entities 34. Which type of attribute may or may not be recognized by the BGP implementations? TRANSITIVE WELL KNOWN UNKNOWN OPTIONAL 35. What is the Summary (aggregated) Route for these two routes? 10.0.0.0/23 10.0.0.0/20 10.0.0.0/21 10.0.0.0/22 36. What is the meaning of below condition in Python scripting? A!=B A is not equal to B A is equal to B A is greater than B A is smaller than B 37. Which code will result in below output? B A D C 38. What is the Multicast address used by EIGRP to send the updates? 224.0.0.10 224.0.0.9 225.255.255.255 225.0.0.10 39. When WPA2 enterprise mode is used on a WLAN, where is the supplicant role located? On the AP On the RADIUS server On the WLC On the wireless client 40. Which of these best describes PQ in QoS? It involves a single queue where the first packet to be placed on the output interface queue is the first packet to leave the interface A set of four queues (high, medium, normal, and low) are served in strict-priority order It automatically divides the interface BW by the number of flows to allocate bandwidth fairly among all flows Queues are serviced in sequence one after the other, and each queue processes one packet only 41. EIGRP Routing Protocol falls under which type of Routing Protocols? Hybrid Routing Protocols Link State Routing Protocols Distance Vector Routing Protocols Path Vector Routing Protocols 42. What is the use of IGMP Snooping? IGMP Snooping suppresses the unnecessary forwarding of multicast data in Layer 2 networks IGMP Snooping stops all traffic IGMP Snooping suppresses the necessary forwarding of multicast data in Layer 2 networks IGMP Snooping suppresses the unnecessary forwarding of multicast data in Layer 4 networks 43. Which EtherChannel mode has been used in this configuration? Un-defined LACP PAgP ON 44. Which of the following is the message exchange mode used to establish an IKEv1 IPsec SA? Aggressive mode Quick mode CREATE_CHILD_SA Main mode 45. Which type of ACL is this? #access-list 100 permit tcp 192.168.10.0 0.0.0.255 any eq 80 #access-list 100 permit tcp 192.168.11.0 0.0.0.255 any eq 443 #access-list 100 deny tcp 10.0.11.0 0.0.0.255 any eq 443 Standard Named ACL Extended Named ACL Standard Numbered ACL Extended Numbered ACL 46. EIGRP sends Hello Message after every ___________ seconds 5 seconds (LAN/Fast), 60 seconds (WAN/Slow) 5 seconds (LAN/Fast), 5 seconds (WAN/Slow) 15 seconds 180 seconds 47. In TOP-DOWN Troubleshooting APPROACH, from which layer you should start troubleshooting? Application Layer Network Layer Data Link Layer Physical Layer 48. Which one is correct description of Queuing (Buffering) in QoS? Buffer and delay egress traffic rates that momentarily peak Storage + Scheduling The temporary storage of excess packets Drop or re-mark incoming or outgoing traffic that goes beyond the desired traffic rate 49. Which of the following parameters is useful for computing a client device’s location with respect to an AP? BSS Channel RSS GPS 50. Which type of topology is used by PIM? It uses Layer2 information It uses its own topology discovery mechanism It uses Broadcast information It uses routing information supplied by other routing protocols Loading … Question 1 of 50 Written by