Final Exam ENCOR Specialist 350-401 Please enter your email: 1. Which type of Security architecture (security system) is this? Telnet Security C.I.A. ABC AAA 2. What is the Summary (aggregated) Route for these two routes? 10.0.0.0/22 10.0.0.0/21 10.0.0.0/23 10.0.0.0/20 3. Which statement is correct? PTP can give accuracy in mili-sec NTP can give accuracy in mili-sec PTP can give accuracy in micro-sec NTP can give accuracy in micro-sec 4. In Token Bucket, the tokens are added into the bucket at a fixed rate which is called: PQ Bc PIR CIR 5. Which of the following parameters is useful for computing a client device’s location with respect to an AP? GPS Channel RSS BSS 6. Which type of attribute may or may not be recognized by the BGP implementations? OPTIONAL TRANSITIVE UNKNOWN WELL KNOWN 7. What are the two basic types of multicast distribution trees? Apple trees 🙂 Source trees Distributed trees Shared trees 8. What is the meaning of below condition in Python scripting? A!=B A is equal to B A is not equal to B A is smaller than B A is greater than B 9. A transmitter is configured to use a power level of 17 mW. One day it is reconfigured to transmit at a new power level of 34 mW. How much has the power level increased in dB? 17 dB 3 dB 2 dB 0 dB None of these answers are correct; you need a calculator to figure this out 10. Which of the following statement is correct for outside global ip address? The public IP address assigned to a host on the outside network The IP address of an outside host as it appears to the inside network The actual private IP address assigned to a device on the inside network(s) The public IP address that represents one or more inside local IP addresses to the outside 11. Which of the following antennas would probably have a greater gain than the other? Dipole Yagi 12. Phishing falls under which type of Security attacks? Social Engineering attacks Data Loss attacks Virus attacks General attacks 13. Suppose an enterprise offers a wireless network that guests can use but only after they read and accept an acceptable use policy document. Which one of the following methods can inherently handle this process? WebAuth Open Authentication WPA3 personal WPA2 enterprise 14. What is the use of IGMP Snooping? IGMP Snooping suppresses the unnecessary forwarding of multicast data in Layer 4 networks IGMP Snooping stops all traffic IGMP Snooping suppresses the unnecessary forwarding of multicast data in Layer 2 networks IGMP Snooping suppresses the necessary forwarding of multicast data in Layer 2 networks 15. Which two network utilities/tools are used for Wireshark traffic monitoring if the monitoring terminal is not in the path of traffic? TRACEROUTE (for Switches) RITE (for Routers) PING (for Switches) ICMP (for Routers) SPAN (for Switches) TRACEROUTE (for Routers) SPAN (for Switches) RITE (for Routers) 16. Which path will be chosen by R1 for traffic of R2? (i.e. which route will have the highest preference in R1’s Routing Table?) OSPF Route with cost (metric) of 300 OSPF Route with cost (metric) of 100 OSPF Route with cost (metric) of 200 None 17. A Router at Networkwalks company has learnt these three routes for same destination. Which path will be preferred from these three? 10.0.3.0/28 10.0.3.0/24 10.0.3.0/30 10.0.3.0/26 18. Which Wireshark filter is used to filter traffic based on Source IP Address? ip.src == 10.0.0.1 ip.dst == 10.0.0.1 ip.addr == 10.0.0.1 !(ip.addr == 10.0.0.1) 19. Which one of these represents the first half of multicast MAC address? 01:00:5E 01:00:55 00:00:00 00:00:5F 20. EIGRP is a routing Protocol which was designed by Cisco but a limited RFC has been released in 2016 which now allows it to run on Juniper Routers as well? TRUE FALSE 21. Which Python code is used to capture username from a Cisco Router through a prompt in Python 3? tn.read_until(b"user:") tn.read_until(b"user: ") tn.read_until(b"Username: ") tn.read_until(b"Login:") 22. NTP is a unicast protocol and uses UDP port number 323 223 23 123 23. If an AP tries every available method to discover a controller but fails to do so, what happens next? It tries to contact the default controller at 10.0.0.1 It uses IP redirect on the local router It reboots or starts discovering again It broadcasts on every possible subnet 24. Which of the following FHRP does not support interface tracking? GLBP VRRP HSRP All of them 25. In networking, PAT stands for Packet address translation Port address translation None of the them Peer address translation 26. Which OSPF Packet Type is missing here? REPLY DBD HELLO REPLY ASBR 27. Which of the following FHRP is not a CISCO proprietary protocol? All of them VRRP GLBP HSRP 28. What is the Multicast address used by EIGRP to send the updates? 224.0.0.9 225.255.255.255 224.0.0.10 225.0.0.10 29. Which of the following unique features is true in embedded wireless network architecture? All WLCs are converged into one device An access layer switch can also function as a WLC An access layer switch can also function as an AP Large groups of APs connect to a single access layer switch 30. Which code is correct for the If statement below? All codes are incorrect< Both B & C are correct Only A is correct Only B is correct 31. Which route has been selected as best valid by BGP out of these two? R2#show ip bgp .. Network Next Hop Metric LocPrf Weight Path * 7.7.7.7/32 24.24.24.4 0 400 700 i *> 23.23.23.3 0 300 700 i BGP Path via AS 400 BGP Path via AS 300 BGP Path via AS 23 BGP Path via AS 1 32. Is there any EtherChannel in this topology or not? NO YES 33. What is the metric of IS-IS Routing Protocol? Hop Count Multiple factors like Weight, Local Preference,… BW, Delay, Reliability, Load, MTU Cost (always 10) 34. Which of the following is the message exchange mode used to establish an IKEv1 IPsec SA? CREATE_CHILD_SA Main mode Aggressive mode Quick mode 35. What will be the final result of this ACL: #access-list 1 deny host 172.0.0.1 #access-list 1 permit host 172.0.0.1 It will finally result in Deny of traffic from 172.0.0.0 It will finally result in Deny of traffic from 172.0.0.1 It will finally result in Permit of traffic from 172.0.0.1 It will finally result in Permit of traffic from 172.0.0.0 36. What is the range of 2-Byte AS Numbers? 1-99 1-4.2Billion 1-100 1-65535 37. Peering with CE (Customer Edge) Routers is done on which type of MPLS ISP Routers? IP (Provider Router) Special Router LSR (Label Switch Router) PE (Provider Edge Router) 38. Which of the following UDP ports is the UDP port officially assigned by the IANA for VXLAN? 4789 8947 8472 4987 39. Which type of Networking model is this? Traditional Networking Model Old Networking Model SDN Model MPLS Model 40. Which type of ACL is this? #access-list 1 deny host 10.0.0.1 #access-list 1 permit 10.0.0.0 0.0.0.255 #access-list 1 permit 192.168.0.0 0.0.255.255 Standard Named ACL Standard Numbered ACL Extended Numbered ACL Extended Named ACL 41. Which one is correct description of Queuing (Buffering) in QoS? Buffer and delay egress traffic rates that momentarily peak Storage + Scheduling Drop or re-mark incoming or outgoing traffic that goes beyond the desired traffic rate The temporary storage of excess packets 42. Which type of solution provides lower cost & shorter time to deploy benefits? DWDM Optical Networks MPLS SD-WAN Traditional Networks 43. Which of the following are modes of packet transport supported by IPsec? (Choose two.) Crypto mode Transport mode Transparent mode Tunnel mode 44. Which EtherChannel mode has been used in this configuration? ON LACP Un-defined PAgP 45. Ten lightweights APs are joined to a wireless LAN controller. If a client roams from one of the APs to another, which one of the following correctly describes the roam? Indirect roaming Intercontroller roaming Autonomous roaming Intracontroller roaming 46. There are two Routers R1 and R2 in enterprise network of a company named as NETWORK WALKS, that use EIGRP. How does R1 know whether R2 is still alive or not (so that R2 could react if router B fails)? None of the other answers are correct By using EIGRP Hello messages, with R1 needing to receive periodic Hello messages to believe R2 is still working By using EIGRP update messages, with R1 needing to receive periodic update messages to believe R2 is still working Using a periodic ping of R2’s IP address based on the EIGRP neighbor timer 47. When WPA2 enterprise mode is used on a WLAN, where is the supplicant role located? On the wireless client On the RADIUS server On the AP On the WLC 48. Which code will result in below output? D B C A 49. EIGRP sends Hello Message after every ___________ seconds 5 seconds (LAN/Fast), 60 seconds (WAN/Slow) 15 seconds 180 seconds 5 seconds (LAN/Fast), 5 seconds (WAN/Slow) 50. Which of these best describes PQ in QoS? It involves a single queue where the first packet to be placed on the output interface queue is the first packet to leave the interface It automatically divides the interface BW by the number of flows to allocate bandwidth fairly among all flows Queues are serviced in sequence one after the other, and each queue processes one packet only A set of four queues (high, medium, normal, and low) are served in strict-priority order Loading … Question 1 of 50 Written by