Final Exam ENCOR Specialist 350-401

Please enter your email:

1.  

Which code will result in below output?

 
 
 
 

2.  

Which type of attribute may or may not be recognized by the BGP implementations?

 
 
 
 

3.  

What is the OSPF Priority range?

 
 
 
 

4.
Which type of Networking model is this?

 

 
 
 
 

5.  

Which type of topology is used by PIM?

 
 
 
 

6.  

Which of the following FHRP does not support interface tracking?

 
 
 
 

7.
Which OSPF Packet Type is missing here?

 
 
 
 

8.  

When WPA2 enterprise mode is used on a WLAN, where is the supplicant role located?

 
 
 
 

9.  

Which of these best describes PQ in QoS?

 
 
 
 

10.  

What are the two basic types of multicast distribution trees?

 
 
 
 

11.  

In Token Bucket, the tokens are added into the bucket at a fixed rate which is called:

 
 
 
 

12.  

Is there any EtherChannel in this topology or not?

 
 

13.  

Which statement is correct?

 
 
 
 

14.
Which type of Security architecture (security system) is this?

 
 
 
 

15.  

What will be printed as a result of below Python code?

print("Bytesit Academy")

#print("www.bytesitacademy.com")

 
 
 
 

16.  

Which of the following UDP ports is the UDP port officially assigned by the IANA for VXLAN?

 
 
 
 

17.  

What will be the final result of this ACL:

#access-list 1 deny host 172.0.0.1
#access-list 1 permit host 172.0.0.1

 
 
 
 

18.  

Which of the following antennas would probably have a greater gain than the other?

 
 

19.  

Suppose an enterprise offers a wireless network that guests can use but only after they read and accept an acceptable use policy document. Which one of the following methods can inherently handle this process?

 
 
 
 

20.  

Which two network utilities/tools are used for Wireshark traffic monitoring if the monitoring terminal is not in the path of traffic?

 
 
 
 

21.  

Which code is correct for the If statement below?

 
 
 
 

22.  

Which of the following are modes of packet transport supported by IPsec? (Choose two.)

 
 
 
 

23.  

In TOP-DOWN Troubleshooting APPROACH, from which layer you should start troubleshooting?

 
 
 
 

24.  

What is the metric of IS-IS Routing Protocol?

 
 
 
 

25.  

What is the use of IGMP Snooping?

 
 
 
 

26.  

EIGRP supports Equal and Unequal Cost Load Balancing:

 
 

27.  

Phishing falls under which type of Security attacks?

 
 
 
 

28.  

EIGRP sends Hello Message after every ___________ seconds

 
 
 
 

29.  

What is the range of 2-Byte AS Numbers?

 
 
 
 

30.
Which type of solution provides lower cost & shorter time to deploy benefits?

 
 
 
 

31.
 

Which Python code is used to capture username from a Cisco Router through a prompt in Python 3?

 
 
 
 

32.  

Which EtherChannel mode has been used in this configuration?

 
 
 
 

33.  

Which Wireshark filter is used to filter traffic based on Source IP Address?

 
 
 
 

34.  

Which type of ACL is this?

#access-list 1 deny   host 10.0.0.1
#access-list 1 permit 10.0.0.0 0.0.0.255
#access-list 1 permit 192.168.0.0 0.0.255.255

 
 
 
 

35.  

Peering with CE (Customer Edge) Routers is done on which type of MPLS ISP Routers?

 
 
 
 

36.  

Which of the following FHRP is not a CISCO proprietary protocol?

 
 
 
 

37.  

What is the meaning of below condition in Python scripting?

A!=B

 
 
 
 

38.  

Which one is correct description of Queuing (Buffering) in QoS?

 
 
 
 

39.  

In networking, PAT stands for

 
 
 
 

40.  

EIGRP is a routing Protocol which was designed by Cisco but a limited RFC has been released in 2016 which now allows it to run on Juniper Routers as well?

 
 

41.  

Which Wireshark filter is used to filter Packets that have 10.0.0.1 either as source or destination IP?

 
 
 
 

42.  

NTP is a unicast protocol and uses UDP port number

 
 
 
 

43.  

There are two Routers R1 and R2 in enterprise network of a company named as NETWORK WALKS, that use EIGRP. How does R1 know whether R2 is still alive or not (so that R2 could react if router B fails)?

 
 
 
 

44.  

Which of the following statement is correct for outside global ip address?

 
 
 
 

45.  

A transmitter is configured to use a power level of 17 mW. One day it is reconfigured to transmit at a new power level of 34 mW. How much has the power level increased in dB?

 
 
 
 
 

46.  

Which one of these represents the first half of multicast MAC address?

 
 
 
 

47.  

OSPF supports which authentication types for security? (Choose two)

 
 
 
 

48.  

What is the Summary (aggregated) Route for these two routes?

 
 
 
 

49.  

Which path will be chosen by R1 for traffic of R2? (i.e. which route will have the highest preference in R1’s Routing Table?)

 
 
 
 

50.  

Which of the following is the message exchange mode used to establish an IKEv1 IPsec SA?

 
 
 
 

Question 1 of 50

Written by 

Leave a Reply

Your email address will not be published. Required fields are marked *