Final Exam ENCOR Specialist 350-401 Please enter your email: 1. Which code will result in below output? B A D C 2. Which type of attribute may or may not be recognized by the BGP implementations? TRANSITIVE OPTIONAL UNKNOWN WELL KNOWN 3. What is the OSPF Priority range? 10-255 0-100 0-255 0-200 4. Which type of Networking model is this? Old Networking Model MPLS Model SDN Model Traditional Networking Model 5. Which type of topology is used by PIM? It uses Layer2 information It uses routing information supplied by other routing protocols It uses Broadcast information It uses its own topology discovery mechanism 6. Which of the following FHRP does not support interface tracking? GLBP All of them VRRP HSRP 7. Which OSPF Packet Type is missing here? HELLO REPLY ASBR DBD REPLY 8. When WPA2 enterprise mode is used on a WLAN, where is the supplicant role located? On the WLC On the RADIUS server On the wireless client On the AP 9. Which of these best describes PQ in QoS? A set of four queues (high, medium, normal, and low) are served in strict-priority order It involves a single queue where the first packet to be placed on the output interface queue is the first packet to leave the interface It automatically divides the interface BW by the number of flows to allocate bandwidth fairly among all flows Queues are serviced in sequence one after the other, and each queue processes one packet only 10. What are the two basic types of multicast distribution trees? Distributed trees Apple trees 🙂 Source trees Shared trees 11. In Token Bucket, the tokens are added into the bucket at a fixed rate which is called: CIR PIR Bc PQ 12. Is there any EtherChannel in this topology or not? YES NO 13. Which statement is correct? PTP can give accuracy in micro-sec NTP can give accuracy in micro-sec PTP can give accuracy in mili-sec NTP can give accuracy in mili-sec 14. Which type of Security architecture (security system) is this? Telnet Security C.I.A. AAA ABC 15. What will be printed as a result of below Python code? print("Bytesit Academy") #print("www.bytesitacademy.com") BytesIT Academy www.bytesitacademy.com BytesIT Academy www.bytesitacademy.com Nothing (it will result in error) 16. Which of the following UDP ports is the UDP port officially assigned by the IANA for VXLAN? 8947 8472 4789 4987 17. What will be the final result of this ACL: #access-list 1 deny host 172.0.0.1 #access-list 1 permit host 172.0.0.1 It will finally result in Permit of traffic from 172.0.0.0 It will finally result in Deny of traffic from 172.0.0.1 It will finally result in Permit of traffic from 172.0.0.1 It will finally result in Deny of traffic from 172.0.0.0 18. Which of the following antennas would probably have a greater gain than the other? Yagi Dipole 19. Suppose an enterprise offers a wireless network that guests can use but only after they read and accept an acceptable use policy document. Which one of the following methods can inherently handle this process? WPA2 enterprise WebAuth Open Authentication WPA3 personal 20. Which two network utilities/tools are used for Wireshark traffic monitoring if the monitoring terminal is not in the path of traffic? TRACEROUTE (for Switches) RITE (for Routers) SPAN (for Switches) TRACEROUTE (for Routers) PING (for Switches) ICMP (for Routers) SPAN (for Switches) RITE (for Routers) 21. Which code is correct for the If statement below? Only A is correct Both B & C are correct Only B is correct All codes are incorrect< 22. Which of the following are modes of packet transport supported by IPsec? (Choose two.) Tunnel mode Transparent mode Crypto mode Transport mode 23. In TOP-DOWN Troubleshooting APPROACH, from which layer you should start troubleshooting? Physical Layer Network Layer Data Link Layer Application Layer 24. What is the metric of IS-IS Routing Protocol? Multiple factors like Weight, Local Preference,… Cost (always 10) Hop Count BW, Delay, Reliability, Load, MTU 25. What is the use of IGMP Snooping? IGMP Snooping suppresses the unnecessary forwarding of multicast data in Layer 4 networks IGMP Snooping suppresses the unnecessary forwarding of multicast data in Layer 2 networks IGMP Snooping suppresses the necessary forwarding of multicast data in Layer 2 networks IGMP Snooping stops all traffic 26. EIGRP supports Equal and Unequal Cost Load Balancing: FALSE TRUE 27. Phishing falls under which type of Security attacks? General attacks Data Loss attacks Virus attacks Social Engineering attacks 28. EIGRP sends Hello Message after every ___________ seconds 5 seconds (LAN/Fast), 60 seconds (WAN/Slow) 15 seconds 180 seconds 5 seconds (LAN/Fast), 5 seconds (WAN/Slow) 29. What is the range of 2-Byte AS Numbers? 1-99 1-65535 1-100 1-4.2Billion 30. Which type of solution provides lower cost & shorter time to deploy benefits? SD-WAN MPLS Traditional Networks DWDM Optical Networks 31. Which Python code is used to capture username from a Cisco Router through a prompt in Python 3? tn.read_until(b"user: ") tn.read_until(b"user:") tn.read_until(b"Login:") tn.read_until(b"Username: ") 32. Which EtherChannel mode has been used in this configuration? Un-defined LACP ON PAgP 33. Which Wireshark filter is used to filter traffic based on Source IP Address? !(ip.addr == 10.0.0.1) ip.addr == 10.0.0.1 ip.dst == 10.0.0.1 ip.src == 10.0.0.1 34. Which type of ACL is this? #access-list 1 deny host 10.0.0.1 #access-list 1 permit 10.0.0.0 0.0.0.255 #access-list 1 permit 192.168.0.0 0.0.255.255 Standard Numbered ACL Extended Named ACL Standard Named ACL Extended Numbered ACL 35. Peering with CE (Customer Edge) Routers is done on which type of MPLS ISP Routers? Special Router PE (Provider Edge Router) IP (Provider Router) LSR (Label Switch Router) 36. Which of the following FHRP is not a CISCO proprietary protocol? All of them HSRP VRRP GLBP 37. What is the meaning of below condition in Python scripting? A!=B A is smaller than B A is equal to B A is greater than B A is not equal to B 38. Which one is correct description of Queuing (Buffering) in QoS? Drop or re-mark incoming or outgoing traffic that goes beyond the desired traffic rate The temporary storage of excess packets Storage + Scheduling Buffer and delay egress traffic rates that momentarily peak 39. In networking, PAT stands for Packet address translation Port address translation Peer address translation None of the them 40. EIGRP is a routing Protocol which was designed by Cisco but a limited RFC has been released in 2016 which now allows it to run on Juniper Routers as well? FALSE TRUE 41. Which Wireshark filter is used to filter Packets that have 10.0.0.1 either as source or destination IP? ip.addr == 10.0.0.1 ip.src == 10.0.0.1 !(ip.addr == 10.0.0.1) ip.dst == 10.0.0.1 42. NTP is a unicast protocol and uses UDP port number 223 323 123 23 43. There are two Routers R1 and R2 in enterprise network of a company named as NETWORK WALKS, that use EIGRP. How does R1 know whether R2 is still alive or not (so that R2 could react if router B fails)? By using EIGRP update messages, with R1 needing to receive periodic update messages to believe R2 is still working None of the other answers are correct By using EIGRP Hello messages, with R1 needing to receive periodic Hello messages to believe R2 is still working Using a periodic ping of R2’s IP address based on the EIGRP neighbor timer 44. Which of the following statement is correct for outside global ip address? The public IP address assigned to a host on the outside network The actual private IP address assigned to a device on the inside network(s) The IP address of an outside host as it appears to the inside network The public IP address that represents one or more inside local IP addresses to the outside 45. A transmitter is configured to use a power level of 17 mW. One day it is reconfigured to transmit at a new power level of 34 mW. How much has the power level increased in dB? 3 dB 2 dB 0 dB None of these answers are correct; you need a calculator to figure this out 17 dB 46. Which one of these represents the first half of multicast MAC address? 01:00:55 00:00:00 01:00:5E 00:00:5F 47. OSPF supports which authentication types for security? (Choose two) Simple Password Authentication MD6 Authentication MD5 Authentication MD4 Authentication 48. What is the Summary (aggregated) Route for these two routes? 10.0.0.0/20 10.0.0.0/23 10.0.0.0/21 10.0.0.0/22 49. Which path will be chosen by R1 for traffic of R2? (i.e. which route will have the highest preference in R1’s Routing Table?) OSPF Route with cost (metric) of 200 OSPF Route with cost (metric) of 300 OSPF Route with cost (metric) of 100 None 50. Which of the following is the message exchange mode used to establish an IKEv1 IPsec SA? CREATE_CHILD_SA Main mode Aggressive mode Quick mode Loading … Question 1 of 50 Written by