ENCORE 350-401
![]() |
![]() |
![]() |
Título del Test:![]() ENCORE 350-401 Descripción: Miscellaneous Questions |




Comentarios |
---|
NO HAY REGISTROS |
A network administrator is implementing a routing configuration change and enables routing debugs to track routing behavior during the change. The logging output on the terminal is interrupting the command typing process. Which two actions can the network administrator take to minimize the possibility of typing commands incorrectly? (Choose two). Configure the logging synchronous global configuration command. Configure the logging delimiter feature. Configure the logging synchronous command under the vty. Press the TAB key to reprint the command in a new line. Increase the number of lines on the screen using the terminal length command. Which action is performed by Link Management Protocol in a Cisco stackwise virtual domain?. It discovers the stackwise domain and brings up SVL interfaces. It rejects any unidirectional link traffic forwarding. It determines if the hardware is compatible to form the stackwise virtual domain. It determines which switch becomes active or standby. An engineer reviews a router’s logs and discovers the following entry. What is the event’s logging severity level? Router# *Feb 03 11:13:44 334: %LINK-3-UPDOWN: Interface GigabitEthernet0/1, changed state to up. error. notification. informational. warning. What does Call Admission Control require the client to send in order to reserve the bandwidth?. SIP flow information. Wi-Fi multimedia. traffic specification. VoIP media session awareness. What are two considerations when using SSO as a network redundancy feature? (Choose two). must be combined with NSF to support uninterrupted Layer 2 operations. must be combined with NSF to support uninterrupted Layer 3 operations. both supervisors must be configured separately. the multicast state is preserved during switchover. requires synchronization between supervisors in order to guarantee continuous connectivity. After a redundant route processor failure occurs on a Layer 3 device, which mechanism allows for packets to be forwarded from a neighboring router based on the most recent tables?. RPVST+. RP failover. BFD. NSF. What is the differences between TCAM and the MAC address table?. Router prefix lookups happens in CAM. MAC address table lookups happen in TCAM. The MAC address table supports partial matches. TCAM requires an exact match. The MAC address table is contained in CAM. ACL and QoS information is stored in TCAM. TCAM is used to make Layer 2 forwarding decisions. CAM is used to build routing tables. Which two southbound interfaces originate from Cisco DNA Center and terminate at fabric underlay switches? (Choose two). UDP 67: DHCP. ICMP: Discovery. TCP 23: Telnet. UDP 162: SNMP. UDP 6007: NetFlow. What is the function of a control-plane node in a Cisco SD-Access solution?. to connect APs and wireless endpoints to the SD-Access fabric. to connect external Layer 3 networks to the SD Access fabric. to implement policies and communicate with networks outside the fabric. to run a mapping system that manages endpoint to network device relationships. Refer to the exhibit. What is the result when a switch that is running PVST+ is added to this network?. Spanning tree is disabled automatically on the network. DSW2 operates in Rapid PVST+ and the new switch operates in PVST+. Both switches operate in the PVST+ mode. Both switches operate in the Rapid PVST+ mode. What is a characteristic of a next-generation firewall?. required in each layer of the network. filters traffic using Layer 3 and Layer 4 information only. only required at the network perimeter. provides intrusion prevention. Which measure is used by an NTP server to indicate its closeness to the authoritative time source?. stratum. hop count. time zone. latency. Which two results occur if Cisco DNA Center loses connectivity to devices in the SD-Access fabric? (Choose two). All devices reload after detecting loss of connection to Cisco DNA Center. Already connected users are unaffected, but new users cannot connect. Users lose connectivity. Cisco DNA Center is unable to collect monitoring data in Assurance. User connectivity is unaffected. Which two components are supported by LISP? (Choose two). proxy ETR. HMAC algorithm. route reflector. egress tunnel router. spoke. Drag and drop the virtual component from the left onto their descriptions on the right. nop. +configuration file containing settings for a virtual machine such as guest OS: VMX + component of a virtual machine responsible for sending packets to the hypervisor: vNIC + zip file containing a virtual machine configuration file and a virtual disk: OVA + file containing a virtual machine disk drive: VMDK. How does EIGRP differ from OSPF?. EIGRP is more prone to routing loops than OSPF. EIGRP supports equal or unequal path cost, and OSPF supports only equal path cost. EIGRP has a full map of the topology, and OSPF only knows directly connected neighbors. EIGRP uses more CPU and memory than OSPF. Refer to the exhibit. What does the output confirm about the switch’s spanning tree configuration?. The spanning-tree mode stp ieee command was entered on this switch. The spanning-tree operation mode for this switch is PVST. The spanning-tree operation mode for this switch is IEEE. The spanning-tree operation mode for this switch is PVST+. A customer has recently implemented a new wireless infrastructure using WLC-5520S at a site directly next to a large commercial airport Users report that they intermittently lose Wi-Fi connectivity, and troubleshooting reveals it is due to frequent channel changes. Which two actions fix this issue? (Choose two). Remove UNII-2 and Extended UNII-2 channels from the 5 GHz channel list. Restore the DCA default settings because this automatically avoids channel interference. Disable DFS channels to prevent interference with Doppler radar. Enable DFS channels because they are immune to radar interference. Configure channels on the UNII-2 and the Extended UNII-2 sub-bands of the 5 GHz band only. What is a characteristic of para-virtualization?. Para-virtualization guest servers are unaware of one another. Para-virtualization allows direct access between the guest OS and the hypervisor. Para-virtualization lacks support for containers. Para-virtualization allows the host hardware to be directly accessed. Drag and drop the characteristics from the left onto the QoS components they describe on the right. nop. + marking: applied on traffic to convey information to a downstream device + shaping: process used to buffer traffic that exceeds a predefined rate + classification: distinguishes traffic types + trust: permits traffic to pass through the device while retaining DSCP/COS value. A customer requests a network design that supports these requirements: * FHRP redundancy * multivendor router environment * IPv4 and IPv6 hosts Which protocol does the design include?. GLBP. VRRP version 2. VRRP version 3. HSRP version 2. Refer to the exhibit. vlan 222 remote-span ! vlan 223 remote-span ! monitor session 1 source interface FastEthernet0/1 tx monitor session 1 source interface FastEthernet0/2 rx monitor session 1 source interface port-channel 5 monitor session 1 destination remote vlan 222 What happens to access interfaces where VLAN 222 is assigned?. They are placed into an inactive state. A description “RSPAN” is added. STP BPDU guard is enabled. They cannot provide PoE. Which solution do IaaS service providers use to extend a Layer 2 segment across a Layer 3 network?. VXLAN. VTEP. VLAN. VRF. What is a characteristic of MACsec?. 802.1AE provides encryption and authentication services. 802.1AE is built between the host and switch using the MKA protocol, which negotiates encryption keys based on the master session key from a successful 802.1X session. 802.1AE is built between the host and switch using the MKA protocol using keys generated via the Diffie-Hellman algorithm (anonymous encryption mode). 802.1AE is negotiated using Cisco AnyConnect NAM and the SAP protocol. Which unit measures the power of a radio signal with reference to 1 milliwatt?. dBw. dBi. mW. dBm. |