Final Exam ENCOR Specialist 350-401

Please enter your email:

1.  

Which of the following are modes of packet transport supported by IPsec? (Choose two.)

 
 
 
 

2.  

Which type of attribute may or may not be recognized by the BGP implementations?

 
 
 
 

3.  

NTP is a unicast protocol and uses UDP port number

 
 
 
 

4.  

Which of the following unique features is true in embedded wireless network architecture?

 
 
 
 

5.  

Peering with CE (Customer Edge) Routers is done on which type of MPLS ISP Routers?

 
 
 
 

6.  

Which code will result in below output?

 
 
 
 

7.  

Which EtherChannel mode has been used in this configuration?

 
 
 
 

8.  

What is the range of 2-Byte AS Numbers?

 
 
 
 

9.  

What will be printed as a result of below Python code?

print("Bytesit Academy")

#print("www.bytesitacademy.com")

 
 
 
 

10.  

In Token Bucket, the tokens are added into the bucket at a fixed rate which is called:

 
 
 
 

11.  

Which of the following is the message exchange mode used to establish an IKEv1 IPsec SA?

 
 
 
 

12.  

What are the two basic types of multicast distribution trees?

 
 
 
 

13.
 

Which Python code is used to capture username from a Cisco Router through a prompt in Python 3?

 
 
 
 

14.  

Which one of these represents the first half of multicast MAC address?

 
 
 
 

15.
Will the iBGP neighborship be formed between R1 and R2 in this kind of network?

 
 

16.  

A transmitter is configured to use a power level of 17 mW. One day it is reconfigured to transmit at a new power level of 34 mW. How much has the power level increased in dB?

 
 
 
 
 

17.  

What is the Multicast address used by EIGRP to send the updates?

 
 
 
 

18.  

Which statement is correct?

 
 
 
 

19.  

OSPF supports which authentication types for security? (Choose two)

 
 
 
 

20.  

Which path will be chosen by R1 for traffic of R2? (i.e. which route will have the highest preference in R1’s Routing Table?)

 
 
 
 

21.  

What is the metric of IS-IS Routing Protocol?

 
 
 
 

22.  

Phishing falls under which type of Security attacks?

 
 
 
 

23.  

Which type of ACL is this?

#access-list 1 deny   host 10.0.0.1
#access-list 1 permit 10.0.0.0 0.0.0.255
#access-list 1 permit 192.168.0.0 0.0.255.255

 
 
 
 

24.  

Which one is correct description of Queuing (Buffering) in QoS?

 
 
 
 

25.  

Which of the following FHRP does not support interface tracking?

 
 
 
 

26.  

There are two Routers R1 and R2 in enterprise network of a company named as NETWORK WALKS, that use EIGRP. How does R1 know whether R2 is still alive or not (so that R2 could react if router B fails)?

 
 
 
 

27.  

EIGRP is a routing Protocol which was designed by Cisco but a limited RFC has been released in 2016 which now allows it to run on Juniper Routers as well?

 
 

28.  

What is the use of IGMP Snooping?

 
 
 
 

29.  

Does LISP separate IP addresses into which of the following? (Choose two.)

 
 
 
 

30.  

Which type of ACL is this?

#access-list 100 permit tcp 192.168.10.0 0.0.0.255 any eq 80
#access-list 100 permit tcp 192.168.11.0 0.0.0.255 any eq 443
#access-list 100 deny tcp 10.0.11.0 0.0.0.255 any eq 443

 
 
 
 

31.  

Which type of OSPF Router is this?

 
 
 
 

32.  

Suppose an enterprise offers a wireless network that guests can use but only after they read and accept an acceptable use policy document. Which one of the following methods can inherently handle this process?

 
 
 
 

33.  

Which Wireshark filter is used to filter Packets that have 10.0.0.1 either as source or destination IP?

 
 
 
 

34.  

Which type of topology is used by PIM?

 
 
 
 

35.  

Is there any EtherChannel in this topology or not?

 
 

36.  

Which code is correct for the If statement below?

 
 
 
 

37.
Which route has been selected as best valid by BGP out of these two?

R2#show ip bgp
..
Network Next Hop Metric LocPrf Weight Path
* 7.7.7.7/32 24.24.24.4 0 400 700 i
*>           23.23.23.3 0 300 700 i

 
 
 
 

38.
Which type of Security architecture (security system) is this?

 
 
 
 

39.  

EIGRP Routing Protocol falls under which type of Routing Protocols?

 
 
 
 

40.  

Which of the following statement is correct for outside global ip address?

 
 
 
 

41.  

When WPA2 enterprise mode is used on a WLAN, where is the supplicant role located?

 
 
 
 

42.  

Ten lightweights APs are joined to a wireless LAN controller. If a client roams from one of the APs to another, which one of the following correctly describes the roam?

 
 
 
 

43.  

Which of the following parameters is useful for computing a client device’s location with respect to an AP?

 
 
 
 

44.  

Which Wireshark filter is used to filter traffic based on Source IP Address?

 
 
 
 

45.  

Which of the following antennas would probably have a greater gain than the other?

 
 

46.  

In TOP-DOWN Troubleshooting APPROACH, from which layer you should start troubleshooting?

 
 
 
 

47.  

Which of these best describes PQ in QoS?

 
 
 
 

48.  

What is the Summary (aggregated) Route for these two routes?

 
 
 
 

49.  

What is the OSPF Priority range?

 
 
 
 

50.  

If an AP tries every available method to discover a controller but fails to do so, what happens next?

 
 
 
 

Question 1 of 50

Written by 

Leave a Reply

Your email address will not be published. Required fields are marked *