option
Cuestiones
ayuda
daypo
buscar.php

ENCORE 350-401

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del Test:
ENCORE 350-401

Descripción:
Miscellaneus2

Fecha de Creación: 2023/03/08

Categoría: Informática

Número Preguntas: 30

Valoración:(0)
COMPARTE EL TEST
Nuevo ComentarioNuevo Comentario
Comentarios
NO HAY REGISTROS
Temario:

Drag and drop the solutions that comprise Cisco Cyber Threat Defense from the left onto the objectives they accomplish on the right. + detects suspicious web activity: Web Security Appliance + analyzes network behavior and detects anomalies: StealthWatch + uses pxGrid to remediate security threats: Identity Services Engine. NOP.

What are two characteristics of Cisco SD-Access elements? (Choose two). Fabric endpoints are connected directly to the border node. The border node is required for communication between fabric and nonfabric devices. The control plane node has the full RLOC-to-EID mapping database. Traffic within the fabric always goes through the control plane node. The border node has the full RLOC-to-EID mapping database.

Refer to the exhibit. Current configuration: 142 bytes vrf definition STAFF ! ! interface GigabitEthernet1 vrf forwarding STAFF no ip address negotiation auto no mop enabled no mop sysid end An engineer must assign an IP address of 192.168.1.1/24 to the GigabitEthemet1 interface. Which two commands must be added to the existing configuration to accomplish this task? (Choose two). Router(config-vrf)#address-family ipv6. Router(config-if)#ip address 192.168.1.1 255.255.255.0. Router(config-vrf)#ip address 192.168.1.1 255.255.255.0. Router(config-if)#address-family ipv4. Router(config-vrf)#address-family ipv4.

What is the data policy in a Cisco SD-WAN deployment?. list of ordered statements that define node configurations and authentication used within the SD-WAN overlay. Set of statements that defines how data is forwarded based on IP packet information and specific VPNs. detailed database mapping several kinds of addresses with their corresponding location. group of services tested to guarantee devices and links liveliness within the SD-WAN overlay.

Refer to the exhibit. Which action resolves the EtherChannel issue between SW2 and SW3?. Configure switchport mode trunk on SW2. Configure switchport nonegotiate on SW3. Configure channel-group 1 mode desirable on both interfaces. Configure channel-group 5 mode active on both interfaces.

Refer to the exhibit. A network engineer configures OSPF and reviews the router configuration. Which interface or interfaces are able to establish OSPF adjacency?. GigabitEthemet0/1 and GigabitEthernet0/1.40. Gigabit Ethernet0/0 and GigabitEthemet0/1. only GigabitEthernet0/0. only GigabitEthernet0/1.

Refer to the exhibit. What step resolves the authentication issue?. restart the vsmart host. target 192.168.100.82 in the URI. change the port to 12446. use basic authentication.

Refer to the exhibit. A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Which two configuration changes accomplish this? (Choose two). Apply the crypto map to the tunnel interface and change the tunnel mode to tunnel mode ipsec ipv4. Remove all configuration related to crypto map from R1 and R2 and eliminate the ACL 100. Remove the crypto map and modify the ACL to allow traffic between 10.10.0.0/24 to 10.20.0.0/24. Create an IPsec profile, associate the transform-set, and apply the profile to the tunnel interface.

Which encryption hashing algorithm does NTP use for authentication?. SSL. AES256. AES128. MD5.

What is a VPN in a Cisco SD-WAN deployment?. virtual channel used to carry control plane information. attribute to identify a set of services offered in specific places in the SD-WAN fabric. common exchange point between two different services. virtualized environment that provides traffic isolation and segmentation in the SD-WAN fabric.

Drag and drop the characteristic from the left onto the orchestration tools that they describe on the right. Ansible: + uses playbooks + prodedural. Puppet: + uses a pull model + declarative. NOP.

Refer to the exhibit. Communication between London and New York is down. Which command set must be applied to resolve this issue?. NewYork(config)#int f0/1 NewYork(config)#switchport nonegotiate NewYork(config)#end NewYork#. NewYork(config)#int f0/1 NewYork(config)#switchport trunk encap dot1q NewYork(config)#end NewYork#. NewYork(config)#int f0/1 NewYork(config)#switchport mode dynamic desirable NewYork(config)#end NewYork#. NewYork(config)#int f0/1 NewYork(config)#switchport mode trunk NewYork(config)#end NewYork#.

What is an emulated machine that has dedicated compute, memory, and storage resources and a fully installed operating system?. host. virtual machine. container. mainframe.

Which two methods are used to reduce the AP coverage area? (Choose two). Reduce AP transmit power. Increase minimum mandatory data rate. Reduce channel width from 40 MHz to 20 MHz. Enable Fastlane. Disable 2.4 GHz and use only 5 GHz.

Which data is properly formatted with JSON?. D. Nop.

Drag and drop the descriptions of the VSS technology from the left to the right. Not all options are used. VSS: + supported on the Cisco 4500 and 6500 series + combines exactly two devices + supports devices that are geographically separated. Nop.

Refer to the exhibit. All switches are configured with the default port priority value. Which two commands ensure that traffic from PC1 is forwarded over Gi1/3 trunk port between DWS1 and DSW2? (Choose two). DWS1(config-if)#spanning-tree port-priority 0. DSW2(config-if)#spanning-tree port-priority 16. DSW1(config-if)#interface gi1/3. DSW2(config-if)#interface gi1/3. DSW2(config-if)#spanning-tree port-priority 128.

In a three-tier hierarchical campus network design, which action is a design best-practice for the core layer?. provide QoS prioritization services such as marking, queueing, and classification for critical network traffic. provide advanced network security features such as 802. IX, DHCP snooping, VACLs, and port security. provide redundant Layer 3 point-to-point links between the core devices for more predictable and faster convergence. provide redundant aggregation for access layer devices and first-hop redundancy protocols such as VRRP.

Which two network problems indicate a need to implement QoS in a campus network? (Choose two). port flapping. misrouted network packets. excess jitter. bandwidth-related packet loss. duplicate IP addresses.

In a Cisco SD-Access solution, what is the role of the Identity Services Engine?. It provides GUI management and abstraction via apps that share context. It is leveraged for dynamic endpoint to group mapping and policy definition. It is used to analyze endpoint to app flows and monitor fabric status. It manages the LISP EID database.

A customer has completed the installation of a Wi-Fi 6 greenfield deployment at their new campus. They want to leverage Wi-Fi 6 enhanced speeds on the trusted employee WLAN. To configure the employee WLAN, which two Layer 2 security policies should be used? (Choose two). WPA (AES). WPA2 (AES) + WEP. 802.1X. OPEN.

Which outcome is achieved with this Python code? client.connect (ip, port=22,username=usr,password=pswd) stdin,stdout,stderr = client.exec_command('show ip bgp 192.168.10100 bestpath\n') print(stdout). displays the output of the show command in a formatted way. connects to a Cisco device using SSH and exports the routing table information. connects to a Cisco device using Telnet and exports the routing table information. connects to a Cisco device using SSH and exports the BGP table for the prefix.

What is YANG used for?. scraping data via CLI. providing a transport for network configuration data between client and server. processing SNMP read-only polls. describing data models.

Refer to the exhibit. R1 standby 1 preempt R2 standby 1 priority 90. R1 standby 1 preempt R2 standby 1 priority 100. R2 standby 1 priority 100 standby 1 preempt. R2 standby 1 priority 110 standby 1 preempt.

Refer to the exhibit. Person#1: First Name is Johnny Last Name is Table Hobbies are: • Running • Video games Person#2 First Name is Billy Last Name is Smith Hobbies are: • Napping • Reading Which JSON syntax is derived from this data?. {‘Person’: [{‘First Name’: ‘Johnny’, ‘Last Name’: ‘Table’, ‘Hobbies’: [‘Running’, ‘Video games’]}, {‘First Name’: ‘Billy’, ‘Last Name’: ‘Smith’, ‘Hobbies’: [‘Napping’, ‘Reading’]}]}. {[{‘First Name’: ‘Johnny’, ‘Last Name’: ‘Table’, ‘Hobbies’: ‘Running’,’Hobbies’: ‘Video games’}, {‘First Name’: ‘Billy’, ‘Last Name’: ‘Smith’, ‘Hobbies’: ‘Napping’, ‘Hobbies’: Reading’}]}. {‘Person’: [{‘First Name’:’Johnny’, ‘Last Name’: ‘Table’, ‘Hobbies’: ‘Running’, ‘Video games’}, {‘First Name’: ‘Billy’, ‘Last Name’: ‘Smith’, ‘Hobbies’: ‘Napping’, ‘Reading’}]}. {[{‘First Name’: ‘Johnny’, ‘Last Name’: ‘Table’, ‘Hobbies’: [‘Running’, ‘Video games’]}, {‘First Name’: ‘Billy’, ‘Last Name’: ‘Smith’, ‘Hobbies’: [‘Napping’,’Reading’]}]}.

An engineer creates the configuration below. Drag and drop the authentication methods from the left into the order of priority on the right. Not all options are used. R1#sh run | i aaa aaa new-model aaa authentication login default group ACE group AAA_RADIUS local-case aaa session-id common R1#. Step 1: AAA servers of ACE group Step 2: AAA servers of AAA_RADIUS group Step 3: local configured username in case-sensitive format Step 4: If no method works, then deny login. Nop.

Refer to the exhibit. Which two facts does the device output confirm? (Choose two). The device is using the default HSRP hello timer. The standby device is configured with the default HSRP priority. The device’s HSRP group uses the virtual IP address 10.0.3.242. The device is configured with the default HSRP priority. The device sends unicast messages to its peers.

Based on the output below, which Python code shows the value of the “upTime” key? { “response”: [{ “family”: “Routers”, “type”: “Cisco ASR 1001-X Router”, “errorCode”: null, “location”: null, “macAddress”: “00:c8:8b:80:bb:00”, “hostname”: “asr1001-x.abc.inc”, “role”: “BORDER ROUTER”, “lastUpdateTime”: 1577391299537, “serialNumber”: “FXS1932Q1SE”, “softwareVersion”: “16.3.2”, “locationName”: null, “upTime”: “49 days, 13:43:44:13”, “lastUpdated”: “2019-12-22 16:35:21” }] }. json_data = response.json() print(json_data[response][0][upTime]). json_data = response_json() print(json_data[‘response’][‘family’][‘upTime’]). json_data = response.json() print(json_data[‘response’][0][‘upTime’]). json_data = json.loads(response.text) print(json_data[‘response’][‘family’][‘upTime’]).

Which two actions, when applied in the LAN network segment, will facilitate Layer 3 CAPWAP discovery for lightweight AP? (Choose two). Utilize DHCP option 17. Utilize DHCP option 43. Configure WLC IP address on LAN switch. Enable port security on the switch port. Configure an ip helper-address on the router interface.

Refer to the exhibit. R2: vrf definition hotel address-family ipv4 exit-address-family vrf definition bank address-family ipv4 exit-address-family interface Ethernet0/0 vrf forwarding bank ip address 172.16.0.4 255.255.0.0 interface Ethernet0/1 vrf forwarding hotel ip address 172.1.0.5 255.255.0.0 router ospf 42 vrf bank router-id 1.1.1.1 network 172.16.0.0 0.0.255.255 area 0 router ospf 43 vrf hotel router-id 3.3.3.3 network 172.16.0.0 0.0.255.255 area 0 R1: vrf definition bank ! address-family ipv4 exit-address-family Which configuration must be applied to R1 to enable R1 to reach the server at 172.16.0.1?. interface Ethernet0/0 ip address 172.16.0.7 255.255.0.0 ! router ospf 44 vrf hotel network 172.16.0.0 0.0.255.255. interface Ethernet0/0 vrf forwarding bank ip address 172.16.0.7 255.255.0.0 ! router ospf 44 vrf bank network 172.16.0.0 0.0.255.255 area 0. interface Ethernet0/0 vrf forwarding hotel ip address 172.16.0.7 255.255.0.0 ! router ospf 44 vrf hotel network 172.16.0.0 0.0.255.255 area 0. interface Ethernet0/0 ip address 172.16.0.7 255.255.0.0 ! router ospf 44 vrf bank network 172.16.0.0 255.255.0.0.

Denunciar Test