You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" Cisco CCNP CCIE Enterprise ENCOR 350-401 Practice Test 2 "
0 of 65 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score
Your score
Cisco CCNP CCIE Enterprise ENCOR 350-401
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
You can review your answers by clicking on “View Answers” option. Important Note : Open Reference Documentation Links in New Tab (Right Click and Open in New Tab).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
Answered
Review
Question 1 of 65
1. Question
What SD-Access device is responsible for de-encapsulating LISP traffic for transport to non-LISP sites?
Correct
The Proxy Egress Tunnel Router would be responsible for LISP de-encapsulation and transport to a non-LISP site. REFERENCE: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_lisp/configuration/xe-3s/irl-xe-3s-book/irl-cfg-lisp.html
Incorrect
The Proxy Egress Tunnel Router would be responsible for LISP de-encapsulation and transport to a non-LISP site. REFERENCE: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_lisp/configuration/xe-3s/irl-xe-3s-book/irl-cfg-lisp.html
Unattempted
The Proxy Egress Tunnel Router would be responsible for LISP de-encapsulation and transport to a non-LISP site. REFERENCE: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_lisp/configuration/xe-3s/irl-xe-3s-book/irl-cfg-lisp.html
Question 2 of 65
2. Question
What is the multicast address used by HSRPv2?
Correct
To match the HSRP group number to the VLAN ID of a subinterface, HSRPv2 can use a group number from 0 to 4095 and a MAC address from 0000.0C9F.F000 to 0000.0C9F.FFFF. HSRPv2 uses the multicast address 224.0.0.102 to send hello packets. HSRPv2 and CGMP leave processing are no longer mutually exclusive, and both can be enabled at the same time. HSRPv2 has a different packet format than HRSPv1. REFERENCE: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_52_se/configuration/guide/3560scg/swhsrp.html
Incorrect
To match the HSRP group number to the VLAN ID of a subinterface, HSRPv2 can use a group number from 0 to 4095 and a MAC address from 0000.0C9F.F000 to 0000.0C9F.FFFF. HSRPv2 uses the multicast address 224.0.0.102 to send hello packets. HSRPv2 and CGMP leave processing are no longer mutually exclusive, and both can be enabled at the same time. HSRPv2 has a different packet format than HRSPv1. REFERENCE: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_52_se/configuration/guide/3560scg/swhsrp.html
Unattempted
To match the HSRP group number to the VLAN ID of a subinterface, HSRPv2 can use a group number from 0 to 4095 and a MAC address from 0000.0C9F.F000 to 0000.0C9F.FFFF. HSRPv2 uses the multicast address 224.0.0.102 to send hello packets. HSRPv2 and CGMP leave processing are no longer mutually exclusive, and both can be enabled at the same time. HSRPv2 has a different packet format than HRSPv1. REFERENCE: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_52_se/configuration/guide/3560scg/swhsrp.html
Question 3 of 65
3. Question
In which component of Flexible NetFlow would you find the specification of the Flow Record?
Correct
The main Flexible NetFlow components are the Flow Monitor, the Flow Exporter, the Flow Sampler, and the Flow Record. The Flow Record is referenced in the Flow Monitor. The Flow Monitor is the component that is applied to an interface and be considered the component that is actually doing the network monitoring. Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fnetflow/configuration/xe-16/fnf-xe-16-book.html
Incorrect
The main Flexible NetFlow components are the Flow Monitor, the Flow Exporter, the Flow Sampler, and the Flow Record. The Flow Record is referenced in the Flow Monitor. The Flow Monitor is the component that is applied to an interface and be considered the component that is actually doing the network monitoring. Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fnetflow/configuration/xe-16/fnf-xe-16-book.html
Unattempted
The main Flexible NetFlow components are the Flow Monitor, the Flow Exporter, the Flow Sampler, and the Flow Record. The Flow Record is referenced in the Flow Monitor. The Flow Monitor is the component that is applied to an interface and be considered the component that is actually doing the network monitoring. Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fnetflow/configuration/xe-16/fnf-xe-16-book.html
Question 4 of 65
4. Question
What Cisco security product uses Encrypted Traffic Analytics (ETA) telemetry in order to help with advanced security analytics regarding traffic in your enterprise?
Correct
Cisco Stealthwatch provides enterprise-wide network visibility and applies advanced security analytics to detect and respond to threats in real-time. Stealthwatch uses a combination of behavioral modeling, machine learning, and global threat intelligence. It also can analyze encrypted data using ETA. Reference: https://www.cisco.com/c/en/us/products/collateral/security/stealthwatch/datasheet-c78-739398.html
Incorrect
Cisco Stealthwatch provides enterprise-wide network visibility and applies advanced security analytics to detect and respond to threats in real-time. Stealthwatch uses a combination of behavioral modeling, machine learning, and global threat intelligence. It also can analyze encrypted data using ETA. Reference: https://www.cisco.com/c/en/us/products/collateral/security/stealthwatch/datasheet-c78-739398.html
Unattempted
Cisco Stealthwatch provides enterprise-wide network visibility and applies advanced security analytics to detect and respond to threats in real-time. Stealthwatch uses a combination of behavioral modeling, machine learning, and global threat intelligence. It also can analyze encrypted data using ETA. Reference: https://www.cisco.com/c/en/us/products/collateral/security/stealthwatch/datasheet-c78-739398.html
Question 5 of 65
5. Question
You are having issues with the BGP routing in your Enterprise. What is the second component of the BGP Best Path Selection Algorithm?
Correct
The first attribute analyzed is WEIGHT. Larger is better. The second step is the largest LOCAL_PREF. REFERENCE: https://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/13753-25.html
Incorrect
The first attribute analyzed is WEIGHT. Larger is better. The second step is the largest LOCAL_PREF. REFERENCE: https://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/13753-25.html
Unattempted
The first attribute analyzed is WEIGHT. Larger is better. The second step is the largest LOCAL_PREF. REFERENCE: https://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/13753-25.html
Question 6 of 65
6. Question
You want to use an interface on the Firepower NGFW for the exclusive use of syslog monitoring. You want to ensure this interface cannot be used for data traffic and does not support SSH connections. What interface should you use?
Correct
The diagnostic interface is used for this purpose. REFERENCE: https://www.cisco.com/c/en/us/td/docs/security/firepower/660/configuration/guide/fpmc-config-guide-v66/interface_overview_for_firepower_threat_defense.html#concept_9C4E970171294952B654154256F1A676
Incorrect
The diagnostic interface is used for this purpose. REFERENCE: https://www.cisco.com/c/en/us/td/docs/security/firepower/660/configuration/guide/fpmc-config-guide-v66/interface_overview_for_firepower_threat_defense.html#concept_9C4E970171294952B654154256F1A676
Unattempted
The diagnostic interface is used for this purpose. REFERENCE: https://www.cisco.com/c/en/us/td/docs/security/firepower/660/configuration/guide/fpmc-config-guide-v66/interface_overview_for_firepower_threat_defense.html#concept_9C4E970171294952B654154256F1A676
Question 7 of 65
7. Question
What command do you use to configure SSH version 2?
Correct
Using the command ip ssh version 2 forces the router to only accept SSH version 2 connections. Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_ssh/configuration/15-s/sec-usr-ssh-15-s-book/sec-secure-shell-v2.html
Incorrect
Using the command ip ssh version 2 forces the router to only accept SSH version 2 connections. Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_ssh/configuration/15-s/sec-usr-ssh-15-s-book/sec-secure-shell-v2.html
Unattempted
Using the command ip ssh version 2 forces the router to only accept SSH version 2 connections. Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_ssh/configuration/15-s/sec-usr-ssh-15-s-book/sec-secure-shell-v2.html
Question 8 of 65
8. Question
Which of the following are valid reasons your OSPF speakers are stuck in the Exstart/Exchange state? (Choose 3)
Correct
A stub flag mismatch or an authentication failure would not result in a stuck state. REFERENCE: https://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/13684-12.html#neighbors
Incorrect
A stub flag mismatch or an authentication failure would not result in a stuck state. REFERENCE: https://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/13684-12.html#neighbors
Unattempted
A stub flag mismatch or an authentication failure would not result in a stuck state. REFERENCE: https://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/13684-12.html#neighbors
Question 9 of 65
9. Question
What STP tuning mechanism allows you to control the alternate port selection and is configured upstream of where you want to make the change?
Correct
You can use the STP port priority value to influence the alternate port selection. With this command, a lower value is a preferred. The default value is 128. REFERENCE: https://www.ciscopress.com/articles/article.asp?p=2995351&seqNum=2
Incorrect
You can use the STP port priority value to influence the alternate port selection. With this command, a lower value is a preferred. The default value is 128. REFERENCE: https://www.ciscopress.com/articles/article.asp?p=2995351&seqNum=2
Unattempted
You can use the STP port priority value to influence the alternate port selection. With this command, a lower value is a preferred. The default value is 128. REFERENCE: https://www.ciscopress.com/articles/article.asp?p=2995351&seqNum=2
Question 10 of 65
10. Question
You are experiencing an issue with one of your devices in your Cisco wireless LAN. There is an AP that you have sent Option 43 information to using your DHCP server. You have just discovered that this AP is using a WLC that you did not specify with the Option 43 information. What is the most likely reason that this is happening?
Correct
Remember, the AP will use what it has been primed with first. It will then try Option 43 settings. If this does not work either, it will send broadcasts for its WLC. Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-5/config-guide/b_cg85/ap_connectivity_to_cisco_wlc.html
Incorrect
Remember, the AP will use what it has been primed with first. It will then try Option 43 settings. If this does not work either, it will send broadcasts for its WLC. Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-5/config-guide/b_cg85/ap_connectivity_to_cisco_wlc.html
Unattempted
Remember, the AP will use what it has been primed with first. It will then try Option 43 settings. If this does not work either, it will send broadcasts for its WLC. Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-5/config-guide/b_cg85/ap_connectivity_to_cisco_wlc.html
Question 11 of 65
11. Question
What does NETCONF use for the transport stack?
Correct
NETCONF uses SSH/TCP as the transport stack. SNMP uses UDP as transport. Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/cns/configuration/15-mt/cns-15-mt-book/netconf-sshv2.html
Incorrect
NETCONF uses SSH/TCP as the transport stack. SNMP uses UDP as transport. Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/cns/configuration/15-mt/cns-15-mt-book/netconf-sshv2.html
Unattempted
NETCONF uses SSH/TCP as the transport stack. SNMP uses UDP as transport. Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/cns/configuration/15-mt/cns-15-mt-book/netconf-sshv2.html
Question 12 of 65
12. Question
Which three statements about FlexConnect are true? (Choose 3)
Which of the following is the least likely to be a major source of interference with your Enterprise WiFi?
Correct
There are many potential sources of interference for WiFi. These include radar, microwave ovens, baby monitors, other networks, and rogue APs. REFERENCE: https://eyenetworks.no/en/10-things-that-disturb-and-block-wi-fi-signals/
Incorrect
There are many potential sources of interference for WiFi. These include radar, microwave ovens, baby monitors, other networks, and rogue APs. REFERENCE: https://eyenetworks.no/en/10-things-that-disturb-and-block-wi-fi-signals/
Unattempted
There are many potential sources of interference for WiFi. These include radar, microwave ovens, baby monitors, other networks, and rogue APs. REFERENCE: https://eyenetworks.no/en/10-things-that-disturb-and-block-wi-fi-signals/
Question 14 of 65
14. Question
What value is often used to measure the strength of the WiFi signal?
Correct
Want to measure the strength of the signal that your client is receiving? The received signal strength indication value seeks to permit this. The greater the number, the stronger the signal. REFERENCE: https://en.wikipedia.org/wiki/Received_signal_strength_indication
Incorrect
Want to measure the strength of the signal that your client is receiving? The received signal strength indication value seeks to permit this. The greater the number, the stronger the signal. REFERENCE: https://en.wikipedia.org/wiki/Received_signal_strength_indication
Unattempted
Want to measure the strength of the signal that your client is receiving? The received signal strength indication value seeks to permit this. The greater the number, the stronger the signal. REFERENCE: https://en.wikipedia.org/wiki/Received_signal_strength_indication
Question 15 of 65
15. Question
Which type of WiFi antenna is not directional?
Correct
The Yagi, Dish, and Patch antenna types are all considered directional. REFERENCE: https://www.cisco.com/c/en/us/products/collateral/wireless/aironet-antennas-accessories/prod_white_paper0900aecd806a1a3e.html
Incorrect
The Yagi, Dish, and Patch antenna types are all considered directional. REFERENCE: https://www.cisco.com/c/en/us/products/collateral/wireless/aironet-antennas-accessories/prod_white_paper0900aecd806a1a3e.html
Unattempted
The Yagi, Dish, and Patch antenna types are all considered directional. REFERENCE: https://www.cisco.com/c/en/us/products/collateral/wireless/aironet-antennas-accessories/prod_white_paper0900aecd806a1a3e.html
Question 16 of 65
16. Question
In the configuration of a ZBF in Cisco IOS, what is placed in the default zone?
Correct
The default zone is for all interfaces that are not assigned to a zone. Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_data_zbf/configuration/15-mt/sec-data-zbf-15-mt-book/sec-zone-pol-fw.html
Incorrect
The default zone is for all interfaces that are not assigned to a zone. Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_data_zbf/configuration/15-mt/sec-data-zbf-15-mt-book/sec-zone-pol-fw.html
Unattempted
The default zone is for all interfaces that are not assigned to a zone. Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_data_zbf/configuration/15-mt/sec-data-zbf-15-mt-book/sec-zone-pol-fw.html
Question 17 of 65
17. Question
Which of the following statements regarding Access Control Lists in Cisco networking are true? (Choose 3)
Correct
There are two incorrect statements here that you should not have chosen. The entry at the “end“ of an ACL is an implicit DENY ALL, not a PERMIT ALL. You do not typically place a standard ACL close to the source of traffic as your only criteria is source address. You are most likely going to prevent the node from communicating with a wide variety of services. Extended ACLs can go close to the source of traffic more easily as they can be very precise in what they are filtering. REFERENCE: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_data_acl/configuration/xe-3s/sec-data-acl-xe-3s-book/sec-create-ip-apply.html
Incorrect
There are two incorrect statements here that you should not have chosen. The entry at the “end“ of an ACL is an implicit DENY ALL, not a PERMIT ALL. You do not typically place a standard ACL close to the source of traffic as your only criteria is source address. You are most likely going to prevent the node from communicating with a wide variety of services. Extended ACLs can go close to the source of traffic more easily as they can be very precise in what they are filtering. REFERENCE: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_data_acl/configuration/xe-3s/sec-data-acl-xe-3s-book/sec-create-ip-apply.html
Unattempted
There are two incorrect statements here that you should not have chosen. The entry at the “end“ of an ACL is an implicit DENY ALL, not a PERMIT ALL. You do not typically place a standard ACL close to the source of traffic as your only criteria is source address. You are most likely going to prevent the node from communicating with a wide variety of services. Extended ACLs can go close to the source of traffic more easily as they can be very precise in what they are filtering. REFERENCE: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_data_acl/configuration/xe-3s/sec-data-acl-xe-3s-book/sec-create-ip-apply.html
Question 18 of 65
18. Question
Which element of the SD-WAN solution from Cisco Systems represents the controller responsible for the management of the solution?
Correct
The important word here is controller. The SD-WAN uses the vSmart controller for the management of the devices. The vManage tool provides the GUI. REFERENCE: https://www.cisco.com/c/en/us/td/docs/solutions/CVD/SDWAN/cisco-sdwan-design-guide.html
Incorrect
The important word here is controller. The SD-WAN uses the vSmart controller for the management of the devices. The vManage tool provides the GUI. REFERENCE: https://www.cisco.com/c/en/us/td/docs/solutions/CVD/SDWAN/cisco-sdwan-design-guide.html
Unattempted
The important word here is controller. The SD-WAN uses the vSmart controller for the management of the devices. The vManage tool provides the GUI. REFERENCE: https://www.cisco.com/c/en/us/td/docs/solutions/CVD/SDWAN/cisco-sdwan-design-guide.html
Question 19 of 65
19. Question
What is the size of the SGT field used in CTS?
Correct
The Cisco TrustSec solution uses security tags in its operation. These SGTs can be assigned in a variety of ways and can help you segment and secure traffic. This tag is 16 bits. REFERENCE: https://www.cisco.com/c/dam/en/us/solutions/collateral/borderless-networks/trustsec/C07-730151-00_overview_of_trustSec_og.pdf
Incorrect
The Cisco TrustSec solution uses security tags in its operation. These SGTs can be assigned in a variety of ways and can help you segment and secure traffic. This tag is 16 bits. REFERENCE: https://www.cisco.com/c/dam/en/us/solutions/collateral/borderless-networks/trustsec/C07-730151-00_overview_of_trustSec_og.pdf
Unattempted
The Cisco TrustSec solution uses security tags in its operation. These SGTs can be assigned in a variety of ways and can help you segment and secure traffic. This tag is 16 bits. REFERENCE: https://www.cisco.com/c/dam/en/us/solutions/collateral/borderless-networks/trustsec/C07-730151-00_overview_of_trustSec_og.pdf
Question 20 of 65
20. Question
In which OSPF router state does the DBD packet play a key role?
Correct
In the exchange state, OSPF routers exchange database descriptor (DBD) packets. The contents of the DBD received are compared to the information contained in the routers link-state database to check if new or more current link-state information is available with the neighbor. REFERENCE: https://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/13685-13.html
Incorrect
In the exchange state, OSPF routers exchange database descriptor (DBD) packets. The contents of the DBD received are compared to the information contained in the routers link-state database to check if new or more current link-state information is available with the neighbor. REFERENCE: https://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/13685-13.html
Unattempted
In the exchange state, OSPF routers exchange database descriptor (DBD) packets. The contents of the DBD received are compared to the information contained in the routers link-state database to check if new or more current link-state information is available with the neighbor. REFERENCE: https://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/13685-13.html
Question 21 of 65
21. Question
Which of the following Python commands are often used in exception handling? (Choose 2)
Correct
The try and except commands are used together in a clause in order to help with exception handling. The commands work as follows: if no exception occurs, the except clause is skipped and execution of the try statement is finished. REFERENCE: https://docs.python.org/3/tutorial/errors.html
Incorrect
The try and except commands are used together in a clause in order to help with exception handling. The commands work as follows: if no exception occurs, the except clause is skipped and execution of the try statement is finished. REFERENCE: https://docs.python.org/3/tutorial/errors.html
Unattempted
The try and except commands are used together in a clause in order to help with exception handling. The commands work as follows: if no exception occurs, the except clause is skipped and execution of the try statement is finished. REFERENCE: https://docs.python.org/3/tutorial/errors.html
Question 22 of 65
22. Question
Which of the following are the least likely reasons your enterprise might choose to increase virtualization in the data center? (Choose 2)
Correct
Virtualization, by itself, will not inherently improve the security of the enterprise. Also, you still require MAC addresses and IP addressing in the virtualized environment. REFERENCE: https://www.cisco.com/c/en/us/solutions/enterprise-networks/what-is-virtualization.html
Incorrect
Virtualization, by itself, will not inherently improve the security of the enterprise. Also, you still require MAC addresses and IP addressing in the virtualized environment. REFERENCE: https://www.cisco.com/c/en/us/solutions/enterprise-networks/what-is-virtualization.html
Unattempted
Virtualization, by itself, will not inherently improve the security of the enterprise. Also, you still require MAC addresses and IP addressing in the virtualized environment. REFERENCE: https://www.cisco.com/c/en/us/solutions/enterprise-networks/what-is-virtualization.html
Question 23 of 65
23. Question
Which of the following EtherChannel mode combinations will form an EtherChannel? (Choose 3)
Correct
The PAgP modes are auto and desirable. LACP are active and passive. Finally, the static mode is on. REFERENCE: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/12-2_55_se/configuration/guide/3750xscg/swethchl.html
Incorrect
The PAgP modes are auto and desirable. LACP are active and passive. Finally, the static mode is on. REFERENCE: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/12-2_55_se/configuration/guide/3750xscg/swethchl.html
Unattempted
The PAgP modes are auto and desirable. LACP are active and passive. Finally, the static mode is on. REFERENCE: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/12-2_55_se/configuration/guide/3750xscg/swethchl.html
Question 24 of 65
24. Question
Examine the configuration shown in the exhibit. What is the purpose of the 0 in this command?
Correct
0 indicates the password is being entered in plain text. Because it is an enable secret that is being configured, this clear text password you entered is encrypted using MD5. Note you can see this when you examine the running configuration – enable secret 5 $1$r4f4$Qipyqs2tGUoOWHo4f7HGn0.
Incorrect
0 indicates the password is being entered in plain text. Because it is an enable secret that is being configured, this clear text password you entered is encrypted using MD5. Note you can see this when you examine the running configuration – enable secret 5 $1$r4f4$Qipyqs2tGUoOWHo4f7HGn0.
Unattempted
0 indicates the password is being entered in plain text. Because it is an enable secret that is being configured, this clear text password you entered is encrypted using MD5. Note you can see this when you examine the running configuration – enable secret 5 $1$r4f4$Qipyqs2tGUoOWHo4f7HGn0.
Question 25 of 65
25. Question
Examine the configuration shown. What protocol is in use?
Correct
Cisco PAGP (Port Aggregation Protocol) utilizes two modes, namely “Auto“ and “Desirable,“ in its operation to establish EtherChannel links between switches.
In Auto mode, the port actively waits for a PAGP packet from the neighboring switch. If the neighboring switch is in Desirable mode and sends a PAGP packet indicating its desire to form an EtherChannel, the port will negotiate and form the EtherChannel. However, if the neighboring switch is in Auto mode or does not send a PAGP packet, the port will remain as a single, individual link.
In Desirable mode, the port actively sends PAGP packets indicating its desire to form an EtherChannel. It expects a response from the neighboring switch, which should also be in either Desirable or Auto mode. If the neighboring switch responds positively, the EtherChannel link is formed. If the neighboring switch is not in Desirable or Auto mode or does not respond, the port will remain as a single, individual link.
Incorrect
Cisco PAGP (Port Aggregation Protocol) utilizes two modes, namely “Auto“ and “Desirable,“ in its operation to establish EtherChannel links between switches.
In Auto mode, the port actively waits for a PAGP packet from the neighboring switch. If the neighboring switch is in Desirable mode and sends a PAGP packet indicating its desire to form an EtherChannel, the port will negotiate and form the EtherChannel. However, if the neighboring switch is in Auto mode or does not send a PAGP packet, the port will remain as a single, individual link.
In Desirable mode, the port actively sends PAGP packets indicating its desire to form an EtherChannel. It expects a response from the neighboring switch, which should also be in either Desirable or Auto mode. If the neighboring switch responds positively, the EtherChannel link is formed. If the neighboring switch is not in Desirable or Auto mode or does not respond, the port will remain as a single, individual link.
Unattempted
Cisco PAGP (Port Aggregation Protocol) utilizes two modes, namely “Auto“ and “Desirable,“ in its operation to establish EtherChannel links between switches.
In Auto mode, the port actively waits for a PAGP packet from the neighboring switch. If the neighboring switch is in Desirable mode and sends a PAGP packet indicating its desire to form an EtherChannel, the port will negotiate and form the EtherChannel. However, if the neighboring switch is in Auto mode or does not send a PAGP packet, the port will remain as a single, individual link.
In Desirable mode, the port actively sends PAGP packets indicating its desire to form an EtherChannel. It expects a response from the neighboring switch, which should also be in either Desirable or Auto mode. If the neighboring switch responds positively, the EtherChannel link is formed. If the neighboring switch is not in Desirable or Auto mode or does not respond, the port will remain as a single, individual link.
Question 26 of 65
26. Question
Examine the topology shown in the exhibit. If R5 learns of a destination prefix from EIGRP (internal), RIP, and OSPF, which will it believe if the routers are in their default configuration?
Correct
The decision of which route to “believe“ comes down to administrative distance. The lower the AD the better. Of these three protocols, EIGRP (internal) has the best AD at 90.
Connected interface: 0
Static route: 1
Exterior Border Gateway Protocol (eBGP): 20
Internal Enhanced Interior Gateway Routing Protocol (EIGRP): 90
Open Shortest Path First (OSPF): 110
Intermediate System to Intermediate System (IS-IS): 115
Routing Information Protocol (RIP): 120
External Enhanced Interior Gateway Routing Protocol (EIGRP): 170
Internal Border Gateway Protocol (iBGP): 200
Incorrect
The decision of which route to “believe“ comes down to administrative distance. The lower the AD the better. Of these three protocols, EIGRP (internal) has the best AD at 90.
Connected interface: 0
Static route: 1
Exterior Border Gateway Protocol (eBGP): 20
Internal Enhanced Interior Gateway Routing Protocol (EIGRP): 90
Open Shortest Path First (OSPF): 110
Intermediate System to Intermediate System (IS-IS): 115
Routing Information Protocol (RIP): 120
External Enhanced Interior Gateway Routing Protocol (EIGRP): 170
Internal Border Gateway Protocol (iBGP): 200
Unattempted
The decision of which route to “believe“ comes down to administrative distance. The lower the AD the better. Of these three protocols, EIGRP (internal) has the best AD at 90.
Connected interface: 0
Static route: 1
Exterior Border Gateway Protocol (eBGP): 20
Internal Enhanced Interior Gateway Routing Protocol (EIGRP): 90
Open Shortest Path First (OSPF): 110
Intermediate System to Intermediate System (IS-IS): 115
Routing Information Protocol (RIP): 120
External Enhanced Interior Gateway Routing Protocol (EIGRP): 170
Internal Border Gateway Protocol (iBGP): 200
Question 27 of 65
27. Question
Examine the output shown in the exhibit. What credentials will a remote user connecting to VTY 1 need to provide?
Correct
Note the configuration for VTY 1. The method list of MYTELNET is not assigned here. The default login method is used and the single method there is set to NONE. The incoming user will not be required to authentication against the system and will be granted telnet access with no challenge.
Incorrect
Note the configuration for VTY 1. The method list of MYTELNET is not assigned here. The default login method is used and the single method there is set to NONE. The incoming user will not be required to authentication against the system and will be granted telnet access with no challenge.
Unattempted
Note the configuration for VTY 1. The method list of MYTELNET is not assigned here. The default login method is used and the single method there is set to NONE. The incoming user will not be required to authentication against the system and will be granted telnet access with no challenge.
Question 28 of 65
28. Question
What BGP neighbor state is missing from this list?
Correct
The available BGP (Border Gateway Protocol) neighbor states are as follows:
1. Idle: The initial state of a BGP neighbor. In this state, the router has not yet established a TCP connection with its BGP neighbor.
2. Connect: This state occurs when the router is attempting to establish a TCP connection with its BGP neighbor.
3. Active: If the Connect state fails, the neighbor transitions to the Active state. In this state, the router continuously tries to establish a TCP connection with the neighbor by sending TCP SYN packets.
4. OpenSent: After a successful TCP connection, the router transitions to the OpenSent state. In this state, the router sends an OPEN message to its neighbor to initiate the BGP session establishment process.
5. OpenConfirm: Upon receiving an OPEN message from the neighbor, the router transitions to the OpenConfirm state. It verifies the received parameters, such as BGP version and autonomous system number (ASN), and prepares to send a KEEPALIVE message.
6. Established: Once both routers have exchanged KEEPALIVE messages, they enter the Established state. In this state, the BGP peering session is fully established, and the routers exchange routing information.
These neighbor states represent the progression of a BGP session from its initial setup to a fully established and operational state. The states provide insight into the current status of the BGP neighbors and allow for effective troubleshooting and monitoring of BGP peering sessions.
Incorrect
The available BGP (Border Gateway Protocol) neighbor states are as follows:
1. Idle: The initial state of a BGP neighbor. In this state, the router has not yet established a TCP connection with its BGP neighbor.
2. Connect: This state occurs when the router is attempting to establish a TCP connection with its BGP neighbor.
3. Active: If the Connect state fails, the neighbor transitions to the Active state. In this state, the router continuously tries to establish a TCP connection with the neighbor by sending TCP SYN packets.
4. OpenSent: After a successful TCP connection, the router transitions to the OpenSent state. In this state, the router sends an OPEN message to its neighbor to initiate the BGP session establishment process.
5. OpenConfirm: Upon receiving an OPEN message from the neighbor, the router transitions to the OpenConfirm state. It verifies the received parameters, such as BGP version and autonomous system number (ASN), and prepares to send a KEEPALIVE message.
6. Established: Once both routers have exchanged KEEPALIVE messages, they enter the Established state. In this state, the BGP peering session is fully established, and the routers exchange routing information.
These neighbor states represent the progression of a BGP session from its initial setup to a fully established and operational state. The states provide insight into the current status of the BGP neighbors and allow for effective troubleshooting and monitoring of BGP peering sessions.
Unattempted
The available BGP (Border Gateway Protocol) neighbor states are as follows:
1. Idle: The initial state of a BGP neighbor. In this state, the router has not yet established a TCP connection with its BGP neighbor.
2. Connect: This state occurs when the router is attempting to establish a TCP connection with its BGP neighbor.
3. Active: If the Connect state fails, the neighbor transitions to the Active state. In this state, the router continuously tries to establish a TCP connection with the neighbor by sending TCP SYN packets.
4. OpenSent: After a successful TCP connection, the router transitions to the OpenSent state. In this state, the router sends an OPEN message to its neighbor to initiate the BGP session establishment process.
5. OpenConfirm: Upon receiving an OPEN message from the neighbor, the router transitions to the OpenConfirm state. It verifies the received parameters, such as BGP version and autonomous system number (ASN), and prepares to send a KEEPALIVE message.
6. Established: Once both routers have exchanged KEEPALIVE messages, they enter the Established state. In this state, the BGP peering session is fully established, and the routers exchange routing information.
These neighbor states represent the progression of a BGP session from its initial setup to a fully established and operational state. The states provide insight into the current status of the BGP neighbors and allow for effective troubleshooting and monitoring of BGP peering sessions.
Question 29 of 65
29. Question
What type of antenna is in use?
Correct
The Yagi antenna is a popular type of wireless antenna known for its directional characteristics and high gain. It is widely used in various applications, including wireless communication, television reception, and radio broadcasting. The Yagi antenna consists of a driven element, a reflector, and one or more directors. The driven element is the main radiating element connected to the feedline, while the reflector and directors are passive elements that enhance the antenna‘s performance. The reflector is positioned behind the driven element, while the directors are placed in front, progressively increasing in length. This design creates a unidirectional radiation pattern, focusing the antenna‘s energy in one direction and providing gain in that direction. Yagi antennas offer excellent signal reception and transmission capabilities, making them suitable for long-range communication and overcoming signal obstacles. Their directional nature allows for improved signal strength, reduced interference, and increased overall performance. Yagi antennas are widely used in outdoor and point-to-point wireless applications, where the ability to concentrate signal energy in a specific direction is essential.
Incorrect
The Yagi antenna is a popular type of wireless antenna known for its directional characteristics and high gain. It is widely used in various applications, including wireless communication, television reception, and radio broadcasting. The Yagi antenna consists of a driven element, a reflector, and one or more directors. The driven element is the main radiating element connected to the feedline, while the reflector and directors are passive elements that enhance the antenna‘s performance. The reflector is positioned behind the driven element, while the directors are placed in front, progressively increasing in length. This design creates a unidirectional radiation pattern, focusing the antenna‘s energy in one direction and providing gain in that direction. Yagi antennas offer excellent signal reception and transmission capabilities, making them suitable for long-range communication and overcoming signal obstacles. Their directional nature allows for improved signal strength, reduced interference, and increased overall performance. Yagi antennas are widely used in outdoor and point-to-point wireless applications, where the ability to concentrate signal energy in a specific direction is essential.
Unattempted
The Yagi antenna is a popular type of wireless antenna known for its directional characteristics and high gain. It is widely used in various applications, including wireless communication, television reception, and radio broadcasting. The Yagi antenna consists of a driven element, a reflector, and one or more directors. The driven element is the main radiating element connected to the feedline, while the reflector and directors are passive elements that enhance the antenna‘s performance. The reflector is positioned behind the driven element, while the directors are placed in front, progressively increasing in length. This design creates a unidirectional radiation pattern, focusing the antenna‘s energy in one direction and providing gain in that direction. Yagi antennas offer excellent signal reception and transmission capabilities, making them suitable for long-range communication and overcoming signal obstacles. Their directional nature allows for improved signal strength, reduced interference, and increased overall performance. Yagi antennas are widely used in outdoor and point-to-point wireless applications, where the ability to concentrate signal energy in a specific direction is essential.
Question 30 of 65
30. Question
Examine the output shown. Your supervisor has asked you to make sure that VLANs are dynamically trimmed off of trunks where those VLANs are not needed. He has asked you to make that configuration on the device shown. What should be your response?
Correct
Here your supervisor is asking you to take advantage of the VTP pruning feature. This feature cannot be set on a VTP client device. You need to make this change on a VTP Server in the environment. Note that if you have multiple VTP servers for redundancy, you only need to set the pruning feature on one of these server systems.
Incorrect
Here your supervisor is asking you to take advantage of the VTP pruning feature. This feature cannot be set on a VTP client device. You need to make this change on a VTP Server in the environment. Note that if you have multiple VTP servers for redundancy, you only need to set the pruning feature on one of these server systems.
Unattempted
Here your supervisor is asking you to take advantage of the VTP pruning feature. This feature cannot be set on a VTP client device. You need to make this change on a VTP Server in the environment. Note that if you have multiple VTP servers for redundancy, you only need to set the pruning feature on one of these server systems.
Question 31 of 65
31. Question
Examine the topology shown in the exhibit. Your TPA2 device is going to peer with the ATL device using its physical interface IP address. How many commands are required in order to configure this peering on TPA2 by default?
Correct
If there are no additional configurations in place (such as authentication), it will only take one command on TPA2. This will be the neighbor remote-as command.
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bgp/configuration/xe-16/irg-xe-16-book/connecting-to-a-service-provider-using-external-bgp.html
Incorrect
If there are no additional configurations in place (such as authentication), it will only take one command on TPA2. This will be the neighbor remote-as command.
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bgp/configuration/xe-16/irg-xe-16-book/connecting-to-a-service-provider-using-external-bgp.html
Unattempted
If there are no additional configurations in place (such as authentication), it will only take one command on TPA2. This will be the neighbor remote-as command.
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bgp/configuration/xe-16/irg-xe-16-book/connecting-to-a-service-provider-using-external-bgp.html
Question 32 of 65
32. Question
Examine the exhibit. What typer of technology is in use here?
Correct
This is an example of the layout of a policy that is calling upon Cisco TrustSec. Remember, you can have CTS as a result of the ISE in your SD-Access solution.
Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/identity-services-engine/at_a_glance_c45-726831.pdf
Incorrect
This is an example of the layout of a policy that is calling upon Cisco TrustSec. Remember, you can have CTS as a result of the ISE in your SD-Access solution.
Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/identity-services-engine/at_a_glance_c45-726831.pdf
Unattempted
This is an example of the layout of a policy that is calling upon Cisco TrustSec. Remember, you can have CTS as a result of the ISE in your SD-Access solution.
Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/identity-services-engine/at_a_glance_c45-726831.pdf
Question 33 of 65
33. Question
Examine the partial CoPP configuration shown in the exhibit. What traffic is being identified?
Correct
This ACL is identifying traceroute traffic. Note the use of ICMP and the specific messages critical for traceroute functionality.
Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-0SY/configuration/guide/15_0_sy_swcg/control_plane_policing_copp.pdf
Incorrect
This ACL is identifying traceroute traffic. Note the use of ICMP and the specific messages critical for traceroute functionality.
Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-0SY/configuration/guide/15_0_sy_swcg/control_plane_policing_copp.pdf
Unattempted
This ACL is identifying traceroute traffic. Note the use of ICMP and the specific messages critical for traceroute functionality.
Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-0SY/configuration/guide/15_0_sy_swcg/control_plane_policing_copp.pdf
Question 34 of 65
34. Question
What type of hypervisor is installed in an Operating System on the bare metal?
Correct
Type 1 and Type 2 hypervisors are two different approaches to virtualization. A Type 1 hypervisor, also known as a bare-metal hypervisor, runs directly on the host machine‘s hardware without the need for an underlying operating system. It manages the resources and creates virtual machines (VMs) that can run multiple operating systems independently. Type 1 hypervisors provide better performance, security, and resource allocation since they have direct control over the hardware. On the other hand, Type 2 hypervisors, also called hosted hypervisors, run on top of a host operating system. They rely on the underlying operating system for resource management and then create VMs within the host environment. Type 2 hypervisors are generally easier to set up and use but may have decreased performance due to the extra layer of the host operating system.
Incorrect
Type 1 and Type 2 hypervisors are two different approaches to virtualization. A Type 1 hypervisor, also known as a bare-metal hypervisor, runs directly on the host machine‘s hardware without the need for an underlying operating system. It manages the resources and creates virtual machines (VMs) that can run multiple operating systems independently. Type 1 hypervisors provide better performance, security, and resource allocation since they have direct control over the hardware. On the other hand, Type 2 hypervisors, also called hosted hypervisors, run on top of a host operating system. They rely on the underlying operating system for resource management and then create VMs within the host environment. Type 2 hypervisors are generally easier to set up and use but may have decreased performance due to the extra layer of the host operating system.
Unattempted
Type 1 and Type 2 hypervisors are two different approaches to virtualization. A Type 1 hypervisor, also known as a bare-metal hypervisor, runs directly on the host machine‘s hardware without the need for an underlying operating system. It manages the resources and creates virtual machines (VMs) that can run multiple operating systems independently. Type 1 hypervisors provide better performance, security, and resource allocation since they have direct control over the hardware. On the other hand, Type 2 hypervisors, also called hosted hypervisors, run on top of a host operating system. They rely on the underlying operating system for resource management and then create VMs within the host environment. Type 2 hypervisors are generally easier to set up and use but may have decreased performance due to the extra layer of the host operating system.
Question 35 of 65
35. Question
What do you use with an IP SLA to do sophisticated tests?
Correct
The RTR (Response Time Reporter) Responder functionality on a Cisco router enables it to respond to and participate in network response time measurements conducted by a remote RTR initiator. When RTR Responder is enabled, the router actively responds to probe packets sent by the RTR initiator, allowing the initiator to measure and monitor network response times between different locations. By providing accurate response time measurements, the RTR Responder helps in assessing network performance, identifying bottlenecks, and detecting any latency or connectivity issues. This functionality is particularly useful for network administrators and operators to gather real-time data on response times and ensure optimal network performance and quality of service.
Incorrect
The RTR (Response Time Reporter) Responder functionality on a Cisco router enables it to respond to and participate in network response time measurements conducted by a remote RTR initiator. When RTR Responder is enabled, the router actively responds to probe packets sent by the RTR initiator, allowing the initiator to measure and monitor network response times between different locations. By providing accurate response time measurements, the RTR Responder helps in assessing network performance, identifying bottlenecks, and detecting any latency or connectivity issues. This functionality is particularly useful for network administrators and operators to gather real-time data on response times and ensure optimal network performance and quality of service.
Unattempted
The RTR (Response Time Reporter) Responder functionality on a Cisco router enables it to respond to and participate in network response time measurements conducted by a remote RTR initiator. When RTR Responder is enabled, the router actively responds to probe packets sent by the RTR initiator, allowing the initiator to measure and monitor network response times between different locations. By providing accurate response time measurements, the RTR Responder helps in assessing network performance, identifying bottlenecks, and detecting any latency or connectivity issues. This functionality is particularly useful for network administrators and operators to gather real-time data on response times and ensure optimal network performance and quality of service.
Question 36 of 65
36. Question
What is a key difference between OSPF and EIGRP?
Correct
EIGRP (Enhanced Interior Gateway Routing Protocol) possesses the capability to load balance across unequal cost paths, a feature that OSPF (Open Shortest Path First) lacks. EIGRP achieves this through its sophisticated metric calculation known as composite metric, which takes into account multiple factors such as bandwidth, delay, reliability, and load. By considering these factors, EIGRP can accurately calculate the best path to a destination, even if the available paths have different costs. This allows EIGRP to distribute traffic across multiple paths, providing load balancing and efficient utilization of available network resources. In contrast, OSPF uses a simple metric based solely on the cost of the path, which is typically calculated based on the link bandwidth. As a result, OSPF does not support load balancing across unequal cost paths, as it selects the path with the lowest cost as the best path and does not consider other factors.
Incorrect
EIGRP (Enhanced Interior Gateway Routing Protocol) possesses the capability to load balance across unequal cost paths, a feature that OSPF (Open Shortest Path First) lacks. EIGRP achieves this through its sophisticated metric calculation known as composite metric, which takes into account multiple factors such as bandwidth, delay, reliability, and load. By considering these factors, EIGRP can accurately calculate the best path to a destination, even if the available paths have different costs. This allows EIGRP to distribute traffic across multiple paths, providing load balancing and efficient utilization of available network resources. In contrast, OSPF uses a simple metric based solely on the cost of the path, which is typically calculated based on the link bandwidth. As a result, OSPF does not support load balancing across unequal cost paths, as it selects the path with the lowest cost as the best path and does not consider other factors.
Unattempted
EIGRP (Enhanced Interior Gateway Routing Protocol) possesses the capability to load balance across unequal cost paths, a feature that OSPF (Open Shortest Path First) lacks. EIGRP achieves this through its sophisticated metric calculation known as composite metric, which takes into account multiple factors such as bandwidth, delay, reliability, and load. By considering these factors, EIGRP can accurately calculate the best path to a destination, even if the available paths have different costs. This allows EIGRP to distribute traffic across multiple paths, providing load balancing and efficient utilization of available network resources. In contrast, OSPF uses a simple metric based solely on the cost of the path, which is typically calculated based on the link bandwidth. As a result, OSPF does not support load balancing across unequal cost paths, as it selects the path with the lowest cost as the best path and does not consider other factors.
Question 37 of 65
37. Question
Examine the partial configuration shown. What technology is in use? configure terminal ! interface ethernet 0/0 ip flow egress
Correct
The “ip flow egress“ command is used in Cisco IOS networking to enable the collection of flow data on egress interfaces. Flow data refers to information about network traffic, such as source and destination IP addresses, transport protocol, port numbers, and packet and byte counts. By enabling flow data collection on egress interfaces, the router captures information about the outgoing traffic passing through those interfaces. The “ip flow egress“ command is typically used in conjunction with the NetFlow feature, which allows network administrators to analyze and monitor network traffic patterns, troubleshoot performance issues, and gain visibility into network utilization. Enabling flow data collection on egress interfaces provides insights into the behavior and characteristics of outbound traffic. It allows administrators to understand the sources, destinations, and volume of data leaving the network through specific interfaces. This information can be valuable for capacity planning, identifying potential security threats, and optimizing network performance. It‘s important to note that the “ip flow egress“ command must be configured on the specific interface where egress flow data collection is desired. Additionally, other NetFlow-related commands, such as defining the flow record, exporter, and monitor, may need to be configured to complete the NetFlow setup and utilization of the flow data collected on egress interfaces.
Incorrect
The “ip flow egress“ command is used in Cisco IOS networking to enable the collection of flow data on egress interfaces. Flow data refers to information about network traffic, such as source and destination IP addresses, transport protocol, port numbers, and packet and byte counts. By enabling flow data collection on egress interfaces, the router captures information about the outgoing traffic passing through those interfaces. The “ip flow egress“ command is typically used in conjunction with the NetFlow feature, which allows network administrators to analyze and monitor network traffic patterns, troubleshoot performance issues, and gain visibility into network utilization. Enabling flow data collection on egress interfaces provides insights into the behavior and characteristics of outbound traffic. It allows administrators to understand the sources, destinations, and volume of data leaving the network through specific interfaces. This information can be valuable for capacity planning, identifying potential security threats, and optimizing network performance. It‘s important to note that the “ip flow egress“ command must be configured on the specific interface where egress flow data collection is desired. Additionally, other NetFlow-related commands, such as defining the flow record, exporter, and monitor, may need to be configured to complete the NetFlow setup and utilization of the flow data collected on egress interfaces.
Unattempted
The “ip flow egress“ command is used in Cisco IOS networking to enable the collection of flow data on egress interfaces. Flow data refers to information about network traffic, such as source and destination IP addresses, transport protocol, port numbers, and packet and byte counts. By enabling flow data collection on egress interfaces, the router captures information about the outgoing traffic passing through those interfaces. The “ip flow egress“ command is typically used in conjunction with the NetFlow feature, which allows network administrators to analyze and monitor network traffic patterns, troubleshoot performance issues, and gain visibility into network utilization. Enabling flow data collection on egress interfaces provides insights into the behavior and characteristics of outbound traffic. It allows administrators to understand the sources, destinations, and volume of data leaving the network through specific interfaces. This information can be valuable for capacity planning, identifying potential security threats, and optimizing network performance. It‘s important to note that the “ip flow egress“ command must be configured on the specific interface where egress flow data collection is desired. Additionally, other NetFlow-related commands, such as defining the flow record, exporter, and monitor, may need to be configured to complete the NetFlow setup and utilization of the flow data collected on egress interfaces.
Question 38 of 65
38. Question
Which statement below regarding VTP is false?
Correct
A Cisco switch operating in VTP (VLAN Trunking Protocol) transparent mode exhibits several distinct characteristics. Firstly, in transparent mode, the switch neither participates in VTP advertisements nor forwards them to other switches in the network. It maintains its own VLAN database locally, allowing administrators to configure VLANs manually on that switch. Secondly, a VTP transparent mode switch does not synchronize VLAN information received from other switches and does not update its local VLAN database based on VTP updates from the network. This mode is useful in scenarios where VLAN configuration needs to be controlled independently on a per-switch basis, preventing unwanted changes propagated by VTP advertisements. Additionally, transparent mode switches do not send or process VTP messages, allowing them to operate autonomously from other switches in the network. This mode is commonly utilized when introducing new VLANs or making VLAN changes in a controlled manner without affecting the entire VTP domain.
Incorrect
A Cisco switch operating in VTP (VLAN Trunking Protocol) transparent mode exhibits several distinct characteristics. Firstly, in transparent mode, the switch neither participates in VTP advertisements nor forwards them to other switches in the network. It maintains its own VLAN database locally, allowing administrators to configure VLANs manually on that switch. Secondly, a VTP transparent mode switch does not synchronize VLAN information received from other switches and does not update its local VLAN database based on VTP updates from the network. This mode is useful in scenarios where VLAN configuration needs to be controlled independently on a per-switch basis, preventing unwanted changes propagated by VTP advertisements. Additionally, transparent mode switches do not send or process VTP messages, allowing them to operate autonomously from other switches in the network. This mode is commonly utilized when introducing new VLANs or making VLAN changes in a controlled manner without affecting the entire VTP domain.
Unattempted
A Cisco switch operating in VTP (VLAN Trunking Protocol) transparent mode exhibits several distinct characteristics. Firstly, in transparent mode, the switch neither participates in VTP advertisements nor forwards them to other switches in the network. It maintains its own VLAN database locally, allowing administrators to configure VLANs manually on that switch. Secondly, a VTP transparent mode switch does not synchronize VLAN information received from other switches and does not update its local VLAN database based on VTP updates from the network. This mode is useful in scenarios where VLAN configuration needs to be controlled independently on a per-switch basis, preventing unwanted changes propagated by VTP advertisements. Additionally, transparent mode switches do not send or process VTP messages, allowing them to operate autonomously from other switches in the network. This mode is commonly utilized when introducing new VLANs or making VLAN changes in a controlled manner without affecting the entire VTP domain.
Question 39 of 65
39. Question
What RSTP security feature helps protect the Lauer 2 infrastructure from the unauthorized reconfiguration of the topology?
Correct
BPDUGuard is a feature in Cisco‘s Rapid Spanning Tree Protocol (RSTP) implementation that helps protect against the unintended connection of switches or bridge devices to ports designated for end devices. BPDUGuard enables the switch port to immediately transition into an error-disabled state if it receives any Bridge Protocol Data Units (BPDUs), which are control messages exchanged between switches in a spanning tree network. When BPDUGuard is enabled on a port, it monitors for BPDUs. If a BPDU is detected on the port, it signifies the presence of another switch or bridge device, indicating a potential loop in the network. In such cases, BPDUGuard shuts down the port to prevent the creation of loops and ensures the stability and integrity of the spanning tree. BPDUGuard acts as a safety mechanism, protecting the network from misconfigurations and preventing the propagation of unwanted BPDU messages that can disrupt the spanning tree topology.
Incorrect
BPDUGuard is a feature in Cisco‘s Rapid Spanning Tree Protocol (RSTP) implementation that helps protect against the unintended connection of switches or bridge devices to ports designated for end devices. BPDUGuard enables the switch port to immediately transition into an error-disabled state if it receives any Bridge Protocol Data Units (BPDUs), which are control messages exchanged between switches in a spanning tree network. When BPDUGuard is enabled on a port, it monitors for BPDUs. If a BPDU is detected on the port, it signifies the presence of another switch or bridge device, indicating a potential loop in the network. In such cases, BPDUGuard shuts down the port to prevent the creation of loops and ensures the stability and integrity of the spanning tree. BPDUGuard acts as a safety mechanism, protecting the network from misconfigurations and preventing the propagation of unwanted BPDU messages that can disrupt the spanning tree topology.
Unattempted
BPDUGuard is a feature in Cisco‘s Rapid Spanning Tree Protocol (RSTP) implementation that helps protect against the unintended connection of switches or bridge devices to ports designated for end devices. BPDUGuard enables the switch port to immediately transition into an error-disabled state if it receives any Bridge Protocol Data Units (BPDUs), which are control messages exchanged between switches in a spanning tree network. When BPDUGuard is enabled on a port, it monitors for BPDUs. If a BPDU is detected on the port, it signifies the presence of another switch or bridge device, indicating a potential loop in the network. In such cases, BPDUGuard shuts down the port to prevent the creation of loops and ensures the stability and integrity of the spanning tree. BPDUGuard acts as a safety mechanism, protecting the network from misconfigurations and preventing the propagation of unwanted BPDU messages that can disrupt the spanning tree topology.
Question 40 of 65
40. Question
Which of the following are the fastest and the slowest switching methods for a Cisco Layer 3 switch respectfully? (Choose 2)
Correct
The slowest to fastest switching mechanisms are process switching, fast switching, CEF switching, and distributed CEF.
Incorrect
The slowest to fastest switching mechanisms are process switching, fast switching, CEF switching, and distributed CEF.
Unattempted
The slowest to fastest switching mechanisms are process switching, fast switching, CEF switching, and distributed CEF.
Question 41 of 65
41. Question
What is an example of an underlay technology found in Cisco SD-WAN?
Correct
MPLS (Multiprotocol Label Switching) can serve as the underlay in a Cisco SD-WAN (Software-Defined Wide Area Network) topology, providing a reliable and efficient transport network. In this scenario, MPLS acts as the foundational infrastructure that connects different locations within the SD-WAN deployment. The MPLS network establishes labeled paths or “label-switched paths“ (LSPs) between the sites, enabling fast and deterministic forwarding of traffic. Cisco SD-WAN technology overlays on top of the MPLS underlay, offering enhanced control, management, and optimization capabilities. SD-WAN controllers dynamically steer traffic based on application requirements, leveraging features like path selection, traffic prioritization, and QoS policies. MPLS in the underlay provides a secure and reliable transport, while SD-WAN enhances agility and flexibility by utilizing multiple transport options, including broadband, LTE, or Internet VPNs. This combination of MPLS as the underlay and SD-WAN as the overlay creates a robust and scalable architecture, allowing organizations to optimize their network connectivity, improve application performance, and simplify network management across their wide area networks.
Incorrect
MPLS (Multiprotocol Label Switching) can serve as the underlay in a Cisco SD-WAN (Software-Defined Wide Area Network) topology, providing a reliable and efficient transport network. In this scenario, MPLS acts as the foundational infrastructure that connects different locations within the SD-WAN deployment. The MPLS network establishes labeled paths or “label-switched paths“ (LSPs) between the sites, enabling fast and deterministic forwarding of traffic. Cisco SD-WAN technology overlays on top of the MPLS underlay, offering enhanced control, management, and optimization capabilities. SD-WAN controllers dynamically steer traffic based on application requirements, leveraging features like path selection, traffic prioritization, and QoS policies. MPLS in the underlay provides a secure and reliable transport, while SD-WAN enhances agility and flexibility by utilizing multiple transport options, including broadband, LTE, or Internet VPNs. This combination of MPLS as the underlay and SD-WAN as the overlay creates a robust and scalable architecture, allowing organizations to optimize their network connectivity, improve application performance, and simplify network management across their wide area networks.
Unattempted
MPLS (Multiprotocol Label Switching) can serve as the underlay in a Cisco SD-WAN (Software-Defined Wide Area Network) topology, providing a reliable and efficient transport network. In this scenario, MPLS acts as the foundational infrastructure that connects different locations within the SD-WAN deployment. The MPLS network establishes labeled paths or “label-switched paths“ (LSPs) between the sites, enabling fast and deterministic forwarding of traffic. Cisco SD-WAN technology overlays on top of the MPLS underlay, offering enhanced control, management, and optimization capabilities. SD-WAN controllers dynamically steer traffic based on application requirements, leveraging features like path selection, traffic prioritization, and QoS policies. MPLS in the underlay provides a secure and reliable transport, while SD-WAN enhances agility and flexibility by utilizing multiple transport options, including broadband, LTE, or Internet VPNs. This combination of MPLS as the underlay and SD-WAN as the overlay creates a robust and scalable architecture, allowing organizations to optimize their network connectivity, improve application performance, and simplify network management across their wide area networks.
Question 42 of 65
42. Question
You need to register some non-script automation with EEM. What command do you use?
Correct
The “event manager applet“ command on a Cisco router is used to create and configure event-driven scripts or applets that can be triggered by specific events or conditions. These applets allow network administrators to automate tasks, perform actions, or generate notifications based on predefined events. The “event manager applet“ command is typically followed by a series of configuration lines that define the behavior and actions of the applet. Here are some key components and uses of the command: 1. Event Trigger: The command allows you to specify the event or condition that triggers the execution of the applet. This can include events such as interface state changes, syslog messages, SNMP traps, timer expiration, and more. For example, an applet can be triggered when a specific syslog message is generated or when an interface goes up or down. 2. Action Configuration: Once the trigger event occurs, the applet defines the actions to be performed. These actions can include running commands, making configuration changes, sending emails or SNMP notifications, logging events, executing scripts, or even triggering other applets. The actions are defined using appropriate configuration commands within the applet. 3. Conditional Logic: The applet configuration can include conditional statements using “if“ or “else“ constructs, allowing for more complex behavior based on specific conditions. This enables the applet to make decisions or perform different actions based on certain criteria. 4. Error Handling: The applet configuration can include error handling mechanisms such as retries, timeouts, or error messages to handle unexpected or erroneous situations.
Incorrect
The “event manager applet“ command on a Cisco router is used to create and configure event-driven scripts or applets that can be triggered by specific events or conditions. These applets allow network administrators to automate tasks, perform actions, or generate notifications based on predefined events. The “event manager applet“ command is typically followed by a series of configuration lines that define the behavior and actions of the applet. Here are some key components and uses of the command: 1. Event Trigger: The command allows you to specify the event or condition that triggers the execution of the applet. This can include events such as interface state changes, syslog messages, SNMP traps, timer expiration, and more. For example, an applet can be triggered when a specific syslog message is generated or when an interface goes up or down. 2. Action Configuration: Once the trigger event occurs, the applet defines the actions to be performed. These actions can include running commands, making configuration changes, sending emails or SNMP notifications, logging events, executing scripts, or even triggering other applets. The actions are defined using appropriate configuration commands within the applet. 3. Conditional Logic: The applet configuration can include conditional statements using “if“ or “else“ constructs, allowing for more complex behavior based on specific conditions. This enables the applet to make decisions or perform different actions based on certain criteria. 4. Error Handling: The applet configuration can include error handling mechanisms such as retries, timeouts, or error messages to handle unexpected or erroneous situations.
Unattempted
The “event manager applet“ command on a Cisco router is used to create and configure event-driven scripts or applets that can be triggered by specific events or conditions. These applets allow network administrators to automate tasks, perform actions, or generate notifications based on predefined events. The “event manager applet“ command is typically followed by a series of configuration lines that define the behavior and actions of the applet. Here are some key components and uses of the command: 1. Event Trigger: The command allows you to specify the event or condition that triggers the execution of the applet. This can include events such as interface state changes, syslog messages, SNMP traps, timer expiration, and more. For example, an applet can be triggered when a specific syslog message is generated or when an interface goes up or down. 2. Action Configuration: Once the trigger event occurs, the applet defines the actions to be performed. These actions can include running commands, making configuration changes, sending emails or SNMP notifications, logging events, executing scripts, or even triggering other applets. The actions are defined using appropriate configuration commands within the applet. 3. Conditional Logic: The applet configuration can include conditional statements using “if“ or “else“ constructs, allowing for more complex behavior based on specific conditions. This enables the applet to make decisions or perform different actions based on certain criteria. 4. Error Handling: The applet configuration can include error handling mechanisms such as retries, timeouts, or error messages to handle unexpected or erroneous situations.
Question 43 of 65
43. Question
Which of the following FHRP approaches is an open standard?
Correct
Virtual Router Redundancy Protocol (VRRP) is an open standard protocol that provides first hop redundancy in a local area network (LAN) environment. It allows multiple routers to work together in a group to provide redundancy and ensure uninterrupted connectivity for hosts in the LAN.
Incorrect
Virtual Router Redundancy Protocol (VRRP) is an open standard protocol that provides first hop redundancy in a local area network (LAN) environment. It allows multiple routers to work together in a group to provide redundancy and ensure uninterrupted connectivity for hosts in the LAN.
Unattempted
Virtual Router Redundancy Protocol (VRRP) is an open standard protocol that provides first hop redundancy in a local area network (LAN) environment. It allows multiple routers to work together in a group to provide redundancy and ensure uninterrupted connectivity for hosts in the LAN.
Question 44 of 65
44. Question
What is a key difference between EIGRP and OSPF?
Correct
EIGRP and OSPF can both load balance over multiple equal-cost paths. EIGRP is unique in this regard, however, because it can also load balance over unequal cost paths if you configure it to do so. You use a variance command to control how the functionality works. EIGRP also uses a feasible successor approach which is a next best path alternative. The concept of Feasible Successor is a key component for achieving fast convergence and ensuring loop-free paths. A Feasible Successor is an alternate path to a destination network that meets the feasibility condition, making it a backup route for EIGRP. To qualify as a Feasible Successor, the advertised metric of the alternate path must be lower than the current successor‘s (best path) reported distance. EIGRP routers store information about Feasible Successors in their topology table. If the current successor becomes unavailable, the router can quickly transition to the Feasible Successor without waiting for the slow convergence process. This mechanism allows EIGRP to provide sub-second convergence by using pre-calculated backup routes, ensuring uninterrupted connectivity and improving network reliability.
Incorrect
EIGRP and OSPF can both load balance over multiple equal-cost paths. EIGRP is unique in this regard, however, because it can also load balance over unequal cost paths if you configure it to do so. You use a variance command to control how the functionality works. EIGRP also uses a feasible successor approach which is a next best path alternative. The concept of Feasible Successor is a key component for achieving fast convergence and ensuring loop-free paths. A Feasible Successor is an alternate path to a destination network that meets the feasibility condition, making it a backup route for EIGRP. To qualify as a Feasible Successor, the advertised metric of the alternate path must be lower than the current successor‘s (best path) reported distance. EIGRP routers store information about Feasible Successors in their topology table. If the current successor becomes unavailable, the router can quickly transition to the Feasible Successor without waiting for the slow convergence process. This mechanism allows EIGRP to provide sub-second convergence by using pre-calculated backup routes, ensuring uninterrupted connectivity and improving network reliability.
Unattempted
EIGRP and OSPF can both load balance over multiple equal-cost paths. EIGRP is unique in this regard, however, because it can also load balance over unequal cost paths if you configure it to do so. You use a variance command to control how the functionality works. EIGRP also uses a feasible successor approach which is a next best path alternative. The concept of Feasible Successor is a key component for achieving fast convergence and ensuring loop-free paths. A Feasible Successor is an alternate path to a destination network that meets the feasibility condition, making it a backup route for EIGRP. To qualify as a Feasible Successor, the advertised metric of the alternate path must be lower than the current successor‘s (best path) reported distance. EIGRP routers store information about Feasible Successors in their topology table. If the current successor becomes unavailable, the router can quickly transition to the Feasible Successor without waiting for the slow convergence process. This mechanism allows EIGRP to provide sub-second convergence by using pre-calculated backup routes, ensuring uninterrupted connectivity and improving network reliability.
Question 45 of 65
45. Question
What is not an option for RESTful API security?
Correct
The main methods of securing authentication with RESTful APIs include: 1. Basic Authentication: This method involves sending the client‘s username and password in the request headers encoded in Base64 format. While simple to implement, it has security limitations as credentials are sent in every request and are susceptible to interception. 2. Token-Based Authentication: Token-based authentication involves generating and exchanging tokens between the client and the server. The client first sends credentials to the server, which validates them and issues a token. The client then includes this token in subsequent requests, and the server verifies it to grant access. Tokens can be short-lived, reducing the risk of interception. 3. OAuth 2.0: OAuth 2.0 is an industry-standard authorization framework. It enables third-party applications to access user resources on behalf of the user, without exposing their credentials. OAuth 2.0 involves obtaining an access token from the server, which is used to authenticate subsequent API requests.
Incorrect
The main methods of securing authentication with RESTful APIs include: 1. Basic Authentication: This method involves sending the client‘s username and password in the request headers encoded in Base64 format. While simple to implement, it has security limitations as credentials are sent in every request and are susceptible to interception. 2. Token-Based Authentication: Token-based authentication involves generating and exchanging tokens between the client and the server. The client first sends credentials to the server, which validates them and issues a token. The client then includes this token in subsequent requests, and the server verifies it to grant access. Tokens can be short-lived, reducing the risk of interception. 3. OAuth 2.0: OAuth 2.0 is an industry-standard authorization framework. It enables third-party applications to access user resources on behalf of the user, without exposing their credentials. OAuth 2.0 involves obtaining an access token from the server, which is used to authenticate subsequent API requests.
Unattempted
The main methods of securing authentication with RESTful APIs include: 1. Basic Authentication: This method involves sending the client‘s username and password in the request headers encoded in Base64 format. While simple to implement, it has security limitations as credentials are sent in every request and are susceptible to interception. 2. Token-Based Authentication: Token-based authentication involves generating and exchanging tokens between the client and the server. The client first sends credentials to the server, which validates them and issues a token. The client then includes this token in subsequent requests, and the server verifies it to grant access. Tokens can be short-lived, reducing the risk of interception. 3. OAuth 2.0: OAuth 2.0 is an industry-standard authorization framework. It enables third-party applications to access user resources on behalf of the user, without exposing their credentials. OAuth 2.0 involves obtaining an access token from the server, which is used to authenticate subsequent API requests.
Question 46 of 65
46. Question
How do you see a table of BGP neighbors?
Correct
The “show ip bgp summary“ command is used in Cisco networking to display a summary of the Border Gateway Protocol (BGP) information. When executed on a Cisco router, this command provides a concise overview of BGP-related statistics and status for all BGP neighbors configured on the router. The output includes information such as the BGP neighbor‘s IP address, AS number, state, and the number of received prefixes. The output of the “show ip bgp summary“ command typically consists of multiple rows, with each row representing a BGP neighbor. The columns in the output display relevant information about the BGP peers, including their IP address, AS number, state (established, active, or idle), and the number of prefixes received from each neighbor.
Incorrect
The “show ip bgp summary“ command is used in Cisco networking to display a summary of the Border Gateway Protocol (BGP) information. When executed on a Cisco router, this command provides a concise overview of BGP-related statistics and status for all BGP neighbors configured on the router. The output includes information such as the BGP neighbor‘s IP address, AS number, state, and the number of received prefixes. The output of the “show ip bgp summary“ command typically consists of multiple rows, with each row representing a BGP neighbor. The columns in the output display relevant information about the BGP peers, including their IP address, AS number, state (established, active, or idle), and the number of prefixes received from each neighbor.
Unattempted
The “show ip bgp summary“ command is used in Cisco networking to display a summary of the Border Gateway Protocol (BGP) information. When executed on a Cisco router, this command provides a concise overview of BGP-related statistics and status for all BGP neighbors configured on the router. The output includes information such as the BGP neighbor‘s IP address, AS number, state, and the number of received prefixes. The output of the “show ip bgp summary“ command typically consists of multiple rows, with each row representing a BGP neighbor. The columns in the output display relevant information about the BGP peers, including their IP address, AS number, state (established, active, or idle), and the number of prefixes received from each neighbor.
Question 47 of 65
47. Question
How does VXLAN move Layer 2 traffic across routed boundaries while making the layer 2 traffic seem adjacent?
Correct
VXLAN (Virtual Extensible LAN) is a network virtualization technology that enables the extension of Layer 2 networks over Layer 3 networks using IP encapsulation. When encapsulating Layer 2 traffic in an IP packet using VXLAN, the original Layer 2 Ethernet frame is encapsulated within a new VXLAN header. The VXLAN header contains essential information for routing and identifying the encapsulated traffic. It includes fields such as a 24-bit VXLAN Network Identifier (VNI) that helps distinguish between different virtual networks, a 24-bit Tenant Network Identifier (TNI) for tenant segmentation, and a flag indicating whether the packet is a multicast or unicast packet.
Incorrect
VXLAN (Virtual Extensible LAN) is a network virtualization technology that enables the extension of Layer 2 networks over Layer 3 networks using IP encapsulation. When encapsulating Layer 2 traffic in an IP packet using VXLAN, the original Layer 2 Ethernet frame is encapsulated within a new VXLAN header. The VXLAN header contains essential information for routing and identifying the encapsulated traffic. It includes fields such as a 24-bit VXLAN Network Identifier (VNI) that helps distinguish between different virtual networks, a 24-bit Tenant Network Identifier (TNI) for tenant segmentation, and a flag indicating whether the packet is a multicast or unicast packet.
Unattempted
VXLAN (Virtual Extensible LAN) is a network virtualization technology that enables the extension of Layer 2 networks over Layer 3 networks using IP encapsulation. When encapsulating Layer 2 traffic in an IP packet using VXLAN, the original Layer 2 Ethernet frame is encapsulated within a new VXLAN header. The VXLAN header contains essential information for routing and identifying the encapsulated traffic. It includes fields such as a 24-bit VXLAN Network Identifier (VNI) that helps distinguish between different virtual networks, a 24-bit Tenant Network Identifier (TNI) for tenant segmentation, and a flag indicating whether the packet is a multicast or unicast packet.
Question 48 of 65
48. Question
What is the SNMP v3 mode that can use AES and SHA for security?
Correct
There are three versions of SNMP that are typically seen in deployed environments: Version 1, 2c and 3. Version 3 is the latest and offers the most security over all of the available versions. The authpriv mode of SNMPv3 offers authentication and encryption.
Incorrect
There are three versions of SNMP that are typically seen in deployed environments: Version 1, 2c and 3. Version 3 is the latest and offers the most security over all of the available versions. The authpriv mode of SNMPv3 offers authentication and encryption.
Unattempted
There are three versions of SNMP that are typically seen in deployed environments: Version 1, 2c and 3. Version 3 is the latest and offers the most security over all of the available versions. The authpriv mode of SNMPv3 offers authentication and encryption.
Question 49 of 65
49. Question
What is the metric used by EIGRP?
Correct
In EIGRP (Enhanced Interior Gateway Routing Protocol), bandwidth and delay are the two default components used to calculate the metric for path selection. The EIGRP metric is a value assigned to each route and determines the “cost“ or desirability of a particular route. 1. Bandwidth: Bandwidth refers to the capacity of a link or interface and represents the amount of data that can be transmitted per unit of time. In EIGRP, the bandwidth component of the metric is based on the minimum bandwidth value along the path. The higher the bandwidth value, the more desirable the route, as it indicates a higher capacity for data transmission. 2. Delay: Delay represents the time taken for a packet to traverse a link or interface. It includes both physical and logical delays. In EIGRP, the delay component of the metric is based on the cumulative delay of all the network segments along the path. The lower the delay value, the more desirable the route, as it indicates shorter transmission times. By default, EIGRP uses a composite metric formula that incorporates both bandwidth and delay. The specific formula for the metric calculation can vary depending on the EIGRP version and configuration, but it generally involves combining the bandwidth and delay values in a mathematical equation. By considering both bandwidth and delay, EIGRP aims to select paths that offer high capacity (bandwidth) and low latency (delay). This helps ensure efficient utilization of network resources and optimal path selection for routing packets. It‘s important to note that other factors, such as reliability and load, can also be included in the EIGRP metric calculation by configuring additional components. However, bandwidth and delay are the two default components that are always present in the EIGRP metric calculation.
Incorrect
In EIGRP (Enhanced Interior Gateway Routing Protocol), bandwidth and delay are the two default components used to calculate the metric for path selection. The EIGRP metric is a value assigned to each route and determines the “cost“ or desirability of a particular route. 1. Bandwidth: Bandwidth refers to the capacity of a link or interface and represents the amount of data that can be transmitted per unit of time. In EIGRP, the bandwidth component of the metric is based on the minimum bandwidth value along the path. The higher the bandwidth value, the more desirable the route, as it indicates a higher capacity for data transmission. 2. Delay: Delay represents the time taken for a packet to traverse a link or interface. It includes both physical and logical delays. In EIGRP, the delay component of the metric is based on the cumulative delay of all the network segments along the path. The lower the delay value, the more desirable the route, as it indicates shorter transmission times. By default, EIGRP uses a composite metric formula that incorporates both bandwidth and delay. The specific formula for the metric calculation can vary depending on the EIGRP version and configuration, but it generally involves combining the bandwidth and delay values in a mathematical equation. By considering both bandwidth and delay, EIGRP aims to select paths that offer high capacity (bandwidth) and low latency (delay). This helps ensure efficient utilization of network resources and optimal path selection for routing packets. It‘s important to note that other factors, such as reliability and load, can also be included in the EIGRP metric calculation by configuring additional components. However, bandwidth and delay are the two default components that are always present in the EIGRP metric calculation.
Unattempted
In EIGRP (Enhanced Interior Gateway Routing Protocol), bandwidth and delay are the two default components used to calculate the metric for path selection. The EIGRP metric is a value assigned to each route and determines the “cost“ or desirability of a particular route. 1. Bandwidth: Bandwidth refers to the capacity of a link or interface and represents the amount of data that can be transmitted per unit of time. In EIGRP, the bandwidth component of the metric is based on the minimum bandwidth value along the path. The higher the bandwidth value, the more desirable the route, as it indicates a higher capacity for data transmission. 2. Delay: Delay represents the time taken for a packet to traverse a link or interface. It includes both physical and logical delays. In EIGRP, the delay component of the metric is based on the cumulative delay of all the network segments along the path. The lower the delay value, the more desirable the route, as it indicates shorter transmission times. By default, EIGRP uses a composite metric formula that incorporates both bandwidth and delay. The specific formula for the metric calculation can vary depending on the EIGRP version and configuration, but it generally involves combining the bandwidth and delay values in a mathematical equation. By considering both bandwidth and delay, EIGRP aims to select paths that offer high capacity (bandwidth) and low latency (delay). This helps ensure efficient utilization of network resources and optimal path selection for routing packets. It‘s important to note that other factors, such as reliability and load, can also be included in the EIGRP metric calculation by configuring additional components. However, bandwidth and delay are the two default components that are always present in the EIGRP metric calculation.
Question 50 of 65
50. Question
How many bits of the ToS byte are used by DSCP?
Correct
In IP addressing, the Differentiated Services Code Point (DSCP) is a field within the Type of Service (ToS) byte of an IP packet header. The ToS byte is 8 bits in length, and the DSCP field occupies the first 6 bits of the ToS byte. These 6 bits are used to specify the DSCP value, which is a mechanism for classifying and prioritizing network traffic. The remaining 2 bits in the ToS byte are used for Explicit Congestion Notification (ECN), which provides feedback about network congestion. The ECN field allows endpoints to indicate their willingness to handle congestion and provides a congestion notification mechanism.
Incorrect
In IP addressing, the Differentiated Services Code Point (DSCP) is a field within the Type of Service (ToS) byte of an IP packet header. The ToS byte is 8 bits in length, and the DSCP field occupies the first 6 bits of the ToS byte. These 6 bits are used to specify the DSCP value, which is a mechanism for classifying and prioritizing network traffic. The remaining 2 bits in the ToS byte are used for Explicit Congestion Notification (ECN), which provides feedback about network congestion. The ECN field allows endpoints to indicate their willingness to handle congestion and provides a congestion notification mechanism.
Unattempted
In IP addressing, the Differentiated Services Code Point (DSCP) is a field within the Type of Service (ToS) byte of an IP packet header. The ToS byte is 8 bits in length, and the DSCP field occupies the first 6 bits of the ToS byte. These 6 bits are used to specify the DSCP value, which is a mechanism for classifying and prioritizing network traffic. The remaining 2 bits in the ToS byte are used for Explicit Congestion Notification (ECN), which provides feedback about network congestion. The ECN field allows endpoints to indicate their willingness to handle congestion and provides a congestion notification mechanism.
Question 51 of 65
51. Question
FlexConnect technology is useful in what scenario?
Correct
FlexConnect is a feature in Cisco wireless networks that can help address slow WAN connections and improve the performance of wireless clients in remote locations. It provides a way to locally switch traffic at the access point (AP) rather than sending all traffic back to the central controller over the WAN.
Incorrect
FlexConnect is a feature in Cisco wireless networks that can help address slow WAN connections and improve the performance of wireless clients in remote locations. It provides a way to locally switch traffic at the access point (AP) rather than sending all traffic back to the central controller over the WAN.
Unattempted
FlexConnect is a feature in Cisco wireless networks that can help address slow WAN connections and improve the performance of wireless clients in remote locations. It provides a way to locally switch traffic at the access point (AP) rather than sending all traffic back to the central controller over the WAN.
Question 52 of 65
52. Question
What RESTCONF option do you use for update functionality?
Correct
In the context of RESTCONF, a PATCH method is utilized to enable update functionality. PATCH is an HTTP method that allows clients to send a partial update to a specific resource identified by a Uniform Resource Identifier (URI). When using PATCH with RESTCONF, clients can send a request to modify or update a specific resource, such as a configuration element or a data object, without needing to send the entire representation of the resource. Instead, the PATCH request includes only the changes or modifications that need to be applied to the resource. The server receiving the PATCH request interprets the changes and applies them to the resource, effectively updating it while preserving the existing data that was not explicitly modified. This approach is particularly useful in RESTCONF, as it minimizes the amount of data transferred between the client and the server, optimizing network bandwidth and reducing the overhead associated with sending and processing full resource representations. By utilizing PATCH in RESTCONF, clients can efficiently perform targeted updates to resources, maintaining a flexible and efficient update functionality within the RESTful API architecture.
Incorrect
In the context of RESTCONF, a PATCH method is utilized to enable update functionality. PATCH is an HTTP method that allows clients to send a partial update to a specific resource identified by a Uniform Resource Identifier (URI). When using PATCH with RESTCONF, clients can send a request to modify or update a specific resource, such as a configuration element or a data object, without needing to send the entire representation of the resource. Instead, the PATCH request includes only the changes or modifications that need to be applied to the resource. The server receiving the PATCH request interprets the changes and applies them to the resource, effectively updating it while preserving the existing data that was not explicitly modified. This approach is particularly useful in RESTCONF, as it minimizes the amount of data transferred between the client and the server, optimizing network bandwidth and reducing the overhead associated with sending and processing full resource representations. By utilizing PATCH in RESTCONF, clients can efficiently perform targeted updates to resources, maintaining a flexible and efficient update functionality within the RESTful API architecture.
Unattempted
In the context of RESTCONF, a PATCH method is utilized to enable update functionality. PATCH is an HTTP method that allows clients to send a partial update to a specific resource identified by a Uniform Resource Identifier (URI). When using PATCH with RESTCONF, clients can send a request to modify or update a specific resource, such as a configuration element or a data object, without needing to send the entire representation of the resource. Instead, the PATCH request includes only the changes or modifications that need to be applied to the resource. The server receiving the PATCH request interprets the changes and applies them to the resource, effectively updating it while preserving the existing data that was not explicitly modified. This approach is particularly useful in RESTCONF, as it minimizes the amount of data transferred between the client and the server, optimizing network bandwidth and reducing the overhead associated with sending and processing full resource representations. By utilizing PATCH in RESTCONF, clients can efficiently perform targeted updates to resources, maintaining a flexible and efficient update functionality within the RESTful API architecture.
Question 53 of 65
53. Question
What is the root of the shared multicast distribution tree in PIM-SM?
Correct
In Cisco PIM-SM (Protocol Independent Multicast – Sparse Mode), the RP (Rendezvous Point) assumes the crucial role of acting as the root of the shared distribution tree. The shared distribution tree is responsible for delivering multicast traffic from the source to multiple receivers across the network. When a multicast source sends data, it initially reaches the RP, which serves as the centralized point for receiving and distributing the multicast stream. The RP maintains information about the active multicast groups and their associated sources. It is responsible for managing the join and prune messages exchanged between routers and for forwarding the multicast traffic downstream to the interested receivers. By acting as the root of the shared distribution tree, the RP facilitates efficient and scalable multicast distribution by providing a centralized point for group membership and ensuring that multicast traffic flows along the optimal paths to reach all interested receivers.
Incorrect
In Cisco PIM-SM (Protocol Independent Multicast – Sparse Mode), the RP (Rendezvous Point) assumes the crucial role of acting as the root of the shared distribution tree. The shared distribution tree is responsible for delivering multicast traffic from the source to multiple receivers across the network. When a multicast source sends data, it initially reaches the RP, which serves as the centralized point for receiving and distributing the multicast stream. The RP maintains information about the active multicast groups and their associated sources. It is responsible for managing the join and prune messages exchanged between routers and for forwarding the multicast traffic downstream to the interested receivers. By acting as the root of the shared distribution tree, the RP facilitates efficient and scalable multicast distribution by providing a centralized point for group membership and ensuring that multicast traffic flows along the optimal paths to reach all interested receivers.
Unattempted
In Cisco PIM-SM (Protocol Independent Multicast – Sparse Mode), the RP (Rendezvous Point) assumes the crucial role of acting as the root of the shared distribution tree. The shared distribution tree is responsible for delivering multicast traffic from the source to multiple receivers across the network. When a multicast source sends data, it initially reaches the RP, which serves as the centralized point for receiving and distributing the multicast stream. The RP maintains information about the active multicast groups and their associated sources. It is responsible for managing the join and prune messages exchanged between routers and for forwarding the multicast traffic downstream to the interested receivers. By acting as the root of the shared distribution tree, the RP facilitates efficient and scalable multicast distribution by providing a centralized point for group membership and ensuring that multicast traffic flows along the optimal paths to reach all interested receivers.
Question 54 of 65
54. Question
Which statement about eBGP neighbors is false?
Correct
Loopback interfaces on Cisco routers can be utilized effectively for establishing BGP (Border Gateway Protocol) peerings, offering numerous benefits in network design and stability. By configuring a loopback interface with a unique IP address on each router participating in BGP, regardless of physical interfaces or their status, a stable and reliable point of connectivity is established. Loopback interfaces provide a consistent and permanent reference point for BGP peering sessions, as the loopback IP address remains constant even if physical interfaces go down or change. This approach enhances the flexibility and resiliency of BGP connections, simplifying the management of peering relationships and allowing for seamless failover and load balancing scenarios. Furthermore, loopback interfaces can aid in achieving optimal routing symmetry and simplifying the implementation of policies, filters, and access control. Overall, leveraging loopback interfaces for BGP peerings enhances the stability, scalability, and flexibility of the network infrastructure. When using loopback interfaces for peering – do not forget the need for the mulithop command.
Incorrect
Loopback interfaces on Cisco routers can be utilized effectively for establishing BGP (Border Gateway Protocol) peerings, offering numerous benefits in network design and stability. By configuring a loopback interface with a unique IP address on each router participating in BGP, regardless of physical interfaces or their status, a stable and reliable point of connectivity is established. Loopback interfaces provide a consistent and permanent reference point for BGP peering sessions, as the loopback IP address remains constant even if physical interfaces go down or change. This approach enhances the flexibility and resiliency of BGP connections, simplifying the management of peering relationships and allowing for seamless failover and load balancing scenarios. Furthermore, loopback interfaces can aid in achieving optimal routing symmetry and simplifying the implementation of policies, filters, and access control. Overall, leveraging loopback interfaces for BGP peerings enhances the stability, scalability, and flexibility of the network infrastructure. When using loopback interfaces for peering – do not forget the need for the mulithop command.
Unattempted
Loopback interfaces on Cisco routers can be utilized effectively for establishing BGP (Border Gateway Protocol) peerings, offering numerous benefits in network design and stability. By configuring a loopback interface with a unique IP address on each router participating in BGP, regardless of physical interfaces or their status, a stable and reliable point of connectivity is established. Loopback interfaces provide a consistent and permanent reference point for BGP peering sessions, as the loopback IP address remains constant even if physical interfaces go down or change. This approach enhances the flexibility and resiliency of BGP connections, simplifying the management of peering relationships and allowing for seamless failover and load balancing scenarios. Furthermore, loopback interfaces can aid in achieving optimal routing symmetry and simplifying the implementation of policies, filters, and access control. Overall, leveraging loopback interfaces for BGP peerings enhances the stability, scalability, and flexibility of the network infrastructure. When using loopback interfaces for peering – do not forget the need for the mulithop command.
Question 55 of 65
55. Question
Using the precious metal class system of Cisco WLAN QoS, video traffic typically placed in which class?
Correct
These “precious metal“ classes are created by default on many Cisco WLAN devices and technologies. The intent of the classes is as follows: Platinum—Used for VoIP clients Gold—Used for video clients Silver— Used for traffic that can be considered best-effort Bronze—Used for NRT traffic
Incorrect
These “precious metal“ classes are created by default on many Cisco WLAN devices and technologies. The intent of the classes is as follows: Platinum—Used for VoIP clients Gold—Used for video clients Silver— Used for traffic that can be considered best-effort Bronze—Used for NRT traffic
Unattempted
These “precious metal“ classes are created by default on many Cisco WLAN devices and technologies. The intent of the classes is as follows: Platinum—Used for VoIP clients Gold—Used for video clients Silver— Used for traffic that can be considered best-effort Bronze—Used for NRT traffic
Question 56 of 65
56. Question
A key to LISP in the SD-Access solution is its ability to map and respond to queries very efficiently for two different namespaces in your infrastructure. What are these two namespaces? (Choose 2)
Correct
In LISP (Locator/ID Separation Protocol), two key namespaces are used: the EID (Endpoint Identifier) namespace and the RLOC (Routing Locator) namespace. The EID namespace refers to the identifiers assigned to endpoints in a LISP network. An EID can represent various types of identifiers, such as IP addresses or MAC addresses, that uniquely identify endpoints within the LISP domain. The purpose of the EID is to provide a stable and consistent identity for the endpoints, independent of their current location or network attachment point. EIDs are used to establish communication between endpoints in a LISP network, and they remain constant even if the endpoints move or change their network attachment. On the other hand, the RLOC namespace represents the locators or routing locators used in the LISP network. RLOCs are the addresses associated with the devices (routers) that participate in the LISP infrastructure. These addresses are used to route traffic within the LISP network and provide the necessary information for encapsulating and forwarding packets between different locations. RLOCs can be IP addresses assigned to the edge routers or other routing-related identifiers. The separation of the EID and RLOC namespaces is a fundamental aspect of LISP‘s architecture. It allows for the decoupling of endpoint identities from their current location or network attachment, enabling mobility and scalability within the network. This separation facilitates the efficient routing and forwarding of packets in LISP networks by using the EID-to-RLOC mapping system to associate the EIDs of the endpoints with their corresponding RLOCs.
Incorrect
In LISP (Locator/ID Separation Protocol), two key namespaces are used: the EID (Endpoint Identifier) namespace and the RLOC (Routing Locator) namespace. The EID namespace refers to the identifiers assigned to endpoints in a LISP network. An EID can represent various types of identifiers, such as IP addresses or MAC addresses, that uniquely identify endpoints within the LISP domain. The purpose of the EID is to provide a stable and consistent identity for the endpoints, independent of their current location or network attachment point. EIDs are used to establish communication between endpoints in a LISP network, and they remain constant even if the endpoints move or change their network attachment. On the other hand, the RLOC namespace represents the locators or routing locators used in the LISP network. RLOCs are the addresses associated with the devices (routers) that participate in the LISP infrastructure. These addresses are used to route traffic within the LISP network and provide the necessary information for encapsulating and forwarding packets between different locations. RLOCs can be IP addresses assigned to the edge routers or other routing-related identifiers. The separation of the EID and RLOC namespaces is a fundamental aspect of LISP‘s architecture. It allows for the decoupling of endpoint identities from their current location or network attachment, enabling mobility and scalability within the network. This separation facilitates the efficient routing and forwarding of packets in LISP networks by using the EID-to-RLOC mapping system to associate the EIDs of the endpoints with their corresponding RLOCs.
Unattempted
In LISP (Locator/ID Separation Protocol), two key namespaces are used: the EID (Endpoint Identifier) namespace and the RLOC (Routing Locator) namespace. The EID namespace refers to the identifiers assigned to endpoints in a LISP network. An EID can represent various types of identifiers, such as IP addresses or MAC addresses, that uniquely identify endpoints within the LISP domain. The purpose of the EID is to provide a stable and consistent identity for the endpoints, independent of their current location or network attachment point. EIDs are used to establish communication between endpoints in a LISP network, and they remain constant even if the endpoints move or change their network attachment. On the other hand, the RLOC namespace represents the locators or routing locators used in the LISP network. RLOCs are the addresses associated with the devices (routers) that participate in the LISP infrastructure. These addresses are used to route traffic within the LISP network and provide the necessary information for encapsulating and forwarding packets between different locations. RLOCs can be IP addresses assigned to the edge routers or other routing-related identifiers. The separation of the EID and RLOC namespaces is a fundamental aspect of LISP‘s architecture. It allows for the decoupling of endpoint identities from their current location or network attachment, enabling mobility and scalability within the network. This separation facilitates the efficient routing and forwarding of packets in LISP networks by using the EID-to-RLOC mapping system to associate the EIDs of the endpoints with their corresponding RLOCs.
Question 57 of 65
57. Question
Why is a stratum of 0 not configured on a Cisco router?
Correct
In Cisco networking, the term “zero stratum“ refers to the Stratum 0 level in the Network Time Protocol (NTP) hierarchy. Stratum 0 is the highest stratum level and represents the most accurate time source, typically provided by atomic clocks or satellite-based systems. However, it is important to note that Stratum 0 is not typically assigned to routers or network devices in practice. This is because Stratum 0 devices are the primary reference sources and are typically not directly accessible or available for synchronization by routers or other network equipment.
Incorrect
In Cisco networking, the term “zero stratum“ refers to the Stratum 0 level in the Network Time Protocol (NTP) hierarchy. Stratum 0 is the highest stratum level and represents the most accurate time source, typically provided by atomic clocks or satellite-based systems. However, it is important to note that Stratum 0 is not typically assigned to routers or network devices in practice. This is because Stratum 0 devices are the primary reference sources and are typically not directly accessible or available for synchronization by routers or other network equipment.
Unattempted
In Cisco networking, the term “zero stratum“ refers to the Stratum 0 level in the Network Time Protocol (NTP) hierarchy. Stratum 0 is the highest stratum level and represents the most accurate time source, typically provided by atomic clocks or satellite-based systems. However, it is important to note that Stratum 0 is not typically assigned to routers or network devices in practice. This is because Stratum 0 devices are the primary reference sources and are typically not directly accessible or available for synchronization by routers or other network equipment.
Question 58 of 65
58. Question
What TCP-based protocol is used in Cisco CD-WAN and is similar to BGP? This protocol provides the routing for the overlay network.
Correct
The Overlay Management Protocol (OMP) is a key component of the Cisco Software-Defined Wide Area Network (SD-WAN) solution. OMP serves as the control plane protocol that enables dynamic discovery, configuration, and exchange of routing information across the SD-WAN fabric. It provides a scalable and efficient means of distributing routing updates and propagating network reachability information among the SD-WAN devices, including edge routers, controllers, and vSmart controllers. OMP utilizes a hierarchical routing model, where the vSmart controllers act as the central orchestrators, distributing routing policies and updates to the edge routers. OMP allows for seamless integration of multiple transport types, such as MPLS, broadband, or cellular connections, and facilitates intelligent traffic steering based on policy-driven routing decisions. With its robust features and ability to adapt to changing network conditions, OMP plays a vital role in the Cisco SD-WAN solution, enabling optimized routing, enhanced performance, and simplified management of the SD-WAN fabric.
Incorrect
The Overlay Management Protocol (OMP) is a key component of the Cisco Software-Defined Wide Area Network (SD-WAN) solution. OMP serves as the control plane protocol that enables dynamic discovery, configuration, and exchange of routing information across the SD-WAN fabric. It provides a scalable and efficient means of distributing routing updates and propagating network reachability information among the SD-WAN devices, including edge routers, controllers, and vSmart controllers. OMP utilizes a hierarchical routing model, where the vSmart controllers act as the central orchestrators, distributing routing policies and updates to the edge routers. OMP allows for seamless integration of multiple transport types, such as MPLS, broadband, or cellular connections, and facilitates intelligent traffic steering based on policy-driven routing decisions. With its robust features and ability to adapt to changing network conditions, OMP plays a vital role in the Cisco SD-WAN solution, enabling optimized routing, enhanced performance, and simplified management of the SD-WAN fabric.
Unattempted
The Overlay Management Protocol (OMP) is a key component of the Cisco Software-Defined Wide Area Network (SD-WAN) solution. OMP serves as the control plane protocol that enables dynamic discovery, configuration, and exchange of routing information across the SD-WAN fabric. It provides a scalable and efficient means of distributing routing updates and propagating network reachability information among the SD-WAN devices, including edge routers, controllers, and vSmart controllers. OMP utilizes a hierarchical routing model, where the vSmart controllers act as the central orchestrators, distributing routing policies and updates to the edge routers. OMP allows for seamless integration of multiple transport types, such as MPLS, broadband, or cellular connections, and facilitates intelligent traffic steering based on policy-driven routing decisions. With its robust features and ability to adapt to changing network conditions, OMP plays a vital role in the Cisco SD-WAN solution, enabling optimized routing, enhanced performance, and simplified management of the SD-WAN fabric.
Question 59 of 65
59. Question
Which of the following DTP combinations will not produce a trunk link?
Correct
DTP has two main options: 1. Auto: In this mode, the switch actively tries to convert the link into a trunk if the neighboring switch also supports DTP. If the neighboring switch does not support DTP or is configured in a non-trunking mode, the port will become an access port. 2. Desirable: In this mode, the switch actively tries to convert the link into a trunk, even if the neighboring switch does not support DTP. It sends DTP frames to negotiate with the other end and establish a trunk link. If the neighboring switch also supports DTP and is set to auto or desirable mode, a trunk link will be formed. The Auto-Auto combination will not form a trunk as no side is sending the appropriate DTP frames to initiate a trunk formation. Each side is willing to trunk, but neither side is initiating the trunk.
Incorrect
DTP has two main options: 1. Auto: In this mode, the switch actively tries to convert the link into a trunk if the neighboring switch also supports DTP. If the neighboring switch does not support DTP or is configured in a non-trunking mode, the port will become an access port. 2. Desirable: In this mode, the switch actively tries to convert the link into a trunk, even if the neighboring switch does not support DTP. It sends DTP frames to negotiate with the other end and establish a trunk link. If the neighboring switch also supports DTP and is set to auto or desirable mode, a trunk link will be formed. The Auto-Auto combination will not form a trunk as no side is sending the appropriate DTP frames to initiate a trunk formation. Each side is willing to trunk, but neither side is initiating the trunk.
Unattempted
DTP has two main options: 1. Auto: In this mode, the switch actively tries to convert the link into a trunk if the neighboring switch also supports DTP. If the neighboring switch does not support DTP or is configured in a non-trunking mode, the port will become an access port. 2. Desirable: In this mode, the switch actively tries to convert the link into a trunk, even if the neighboring switch does not support DTP. It sends DTP frames to negotiate with the other end and establish a trunk link. If the neighboring switch also supports DTP and is set to auto or desirable mode, a trunk link will be formed. The Auto-Auto combination will not form a trunk as no side is sending the appropriate DTP frames to initiate a trunk formation. Each side is willing to trunk, but neither side is initiating the trunk.
Question 60 of 65
60. Question
Why is there an NGINX proxy used with RESTCONF for the configuration of network devices?
Correct
Notice the NGINX proxy: Device# show platform software yang-management process confd : Not Running nesd : Not Running syncfd : Not Running ncsshd : Not Running dmiauthd : Not Running nginx : Running ndbmand : Not Running pubd : Not Running This is critical for supporting TLS-based HTTPS connections when RESTCONF is in use.
Incorrect
Notice the NGINX proxy: Device# show platform software yang-management process confd : Not Running nesd : Not Running syncfd : Not Running ncsshd : Not Running dmiauthd : Not Running nginx : Running ndbmand : Not Running pubd : Not Running This is critical for supporting TLS-based HTTPS connections when RESTCONF is in use.
Unattempted
Notice the NGINX proxy: Device# show platform software yang-management process confd : Not Running nesd : Not Running syncfd : Not Running ncsshd : Not Running dmiauthd : Not Running nginx : Running ndbmand : Not Running pubd : Not Running This is critical for supporting TLS-based HTTPS connections when RESTCONF is in use.
Question 61 of 65
61. Question
What authenticates the vSmart and vEdge devices in Cisco SD-WAN and is considered part of the orchestration plane?
Correct
In Cisco SD-WAN, the authentication of vSmart and vEdge devices is handled by a component called the vBond orchestrator. The vBond orchestrator is responsible for authenticating and authorizing the vSmart and vEdge devices, as well as providing them with the necessary configuration information. The vBond orchestrator acts as a central controller in the SD-WAN architecture and serves as the control plane‘s orchestration plane component. It plays a crucial role in establishing secure connectivity between the SD-WAN devices and ensures that only authorized devices are allowed to join the SD-WAN fabric.
Incorrect
In Cisco SD-WAN, the authentication of vSmart and vEdge devices is handled by a component called the vBond orchestrator. The vBond orchestrator is responsible for authenticating and authorizing the vSmart and vEdge devices, as well as providing them with the necessary configuration information. The vBond orchestrator acts as a central controller in the SD-WAN architecture and serves as the control plane‘s orchestration plane component. It plays a crucial role in establishing secure connectivity between the SD-WAN devices and ensures that only authorized devices are allowed to join the SD-WAN fabric.
Unattempted
In Cisco SD-WAN, the authentication of vSmart and vEdge devices is handled by a component called the vBond orchestrator. The vBond orchestrator is responsible for authenticating and authorizing the vSmart and vEdge devices, as well as providing them with the necessary configuration information. The vBond orchestrator acts as a central controller in the SD-WAN architecture and serves as the control plane‘s orchestration plane component. It plays a crucial role in establishing secure connectivity between the SD-WAN devices and ensures that only authorized devices are allowed to join the SD-WAN fabric.
Question 62 of 65
62. Question
What are the LACP modes of operation? Choose two.
Correct
The Link Aggregation Control Protocol (LACP) provides a standardized method for dynamically bundling multiple physical links into a single logical link, increasing bandwidth and providing redundancy. LACP supports two modes of operation: 1. Active Mode: In Active mode, a switch actively initiates LACP negotiations by sending LACP packets to the neighbor device. If the neighbor device supports LACP and is also in Active mode or Passive mode, a link aggregation group (LAG) is formed. Active mode enables the switch to actively negotiate and control the creation and maintenance of the LAG. This mode is typically used when the switch wants to aggregate links and actively manage the LACP process. 2. Passive Mode: In Passive mode, the switch does not initiate LACP negotiations. It simply responds to LACP packets received from the neighbor device. If the neighbor device supports LACP and is in Active mode, a LAG is formed. Passive mode is typically used when the switch is intended to be a member of an LACP group but does not want to actively initiate or control the LACP process. It allows the switch to passively participate in LACP negotiations and form LAGs based on the requests received from the active end. Both Active and Passive modes of LACP provide a way for switches to negotiate and form link aggregation groups dynamically. The mode selection depends on the desired level of control and initiation required for link aggregation in a particular network configuration.
Incorrect
The Link Aggregation Control Protocol (LACP) provides a standardized method for dynamically bundling multiple physical links into a single logical link, increasing bandwidth and providing redundancy. LACP supports two modes of operation: 1. Active Mode: In Active mode, a switch actively initiates LACP negotiations by sending LACP packets to the neighbor device. If the neighbor device supports LACP and is also in Active mode or Passive mode, a link aggregation group (LAG) is formed. Active mode enables the switch to actively negotiate and control the creation and maintenance of the LAG. This mode is typically used when the switch wants to aggregate links and actively manage the LACP process. 2. Passive Mode: In Passive mode, the switch does not initiate LACP negotiations. It simply responds to LACP packets received from the neighbor device. If the neighbor device supports LACP and is in Active mode, a LAG is formed. Passive mode is typically used when the switch is intended to be a member of an LACP group but does not want to actively initiate or control the LACP process. It allows the switch to passively participate in LACP negotiations and form LAGs based on the requests received from the active end. Both Active and Passive modes of LACP provide a way for switches to negotiate and form link aggregation groups dynamically. The mode selection depends on the desired level of control and initiation required for link aggregation in a particular network configuration.
Unattempted
The Link Aggregation Control Protocol (LACP) provides a standardized method for dynamically bundling multiple physical links into a single logical link, increasing bandwidth and providing redundancy. LACP supports two modes of operation: 1. Active Mode: In Active mode, a switch actively initiates LACP negotiations by sending LACP packets to the neighbor device. If the neighbor device supports LACP and is also in Active mode or Passive mode, a link aggregation group (LAG) is formed. Active mode enables the switch to actively negotiate and control the creation and maintenance of the LAG. This mode is typically used when the switch wants to aggregate links and actively manage the LACP process. 2. Passive Mode: In Passive mode, the switch does not initiate LACP negotiations. It simply responds to LACP packets received from the neighbor device. If the neighbor device supports LACP and is in Active mode, a LAG is formed. Passive mode is typically used when the switch is intended to be a member of an LACP group but does not want to actively initiate or control the LACP process. It allows the switch to passively participate in LACP negotiations and form LAGs based on the requests received from the active end. Both Active and Passive modes of LACP provide a way for switches to negotiate and form link aggregation groups dynamically. The mode selection depends on the desired level of control and initiation required for link aggregation in a particular network configuration.
Question 63 of 65
63. Question
What Cisco wireless component allows you to enable multiple controllers in a network to dynamically share information and forward data traffic when inter-controller or inter-subnet roaming occurs?
Correct
In Cisco wireless networks, mobility groups play a crucial role in enabling seamless roaming and mobility between different access points (APs) within the network. A mobility group is a logical grouping of APs that share information and collaborate to ensure uninterrupted connectivity for wireless clients as they move throughout the coverage area. APs within the same mobility group exchange information about client associations, RF conditions, and network status, allowing them to make informed decisions when clients need to be handed off from one AP to another. By sharing this information, APs can coordinate client roaming, ensuring a smooth transition as clients move from one AP to another without experiencing service interruptions or disconnections. Mobility groups also facilitate load balancing by allowing APs to share client load information and distribute client connections across the available APs, optimizing network performance and capacity. In summary, mobility groups in Cisco wireless networks enhance roaming capabilities and enable efficient load balancing, providing a seamless and reliable wireless experience for connected clients.
Incorrect
In Cisco wireless networks, mobility groups play a crucial role in enabling seamless roaming and mobility between different access points (APs) within the network. A mobility group is a logical grouping of APs that share information and collaborate to ensure uninterrupted connectivity for wireless clients as they move throughout the coverage area. APs within the same mobility group exchange information about client associations, RF conditions, and network status, allowing them to make informed decisions when clients need to be handed off from one AP to another. By sharing this information, APs can coordinate client roaming, ensuring a smooth transition as clients move from one AP to another without experiencing service interruptions or disconnections. Mobility groups also facilitate load balancing by allowing APs to share client load information and distribute client connections across the available APs, optimizing network performance and capacity. In summary, mobility groups in Cisco wireless networks enhance roaming capabilities and enable efficient load balancing, providing a seamless and reliable wireless experience for connected clients.
Unattempted
In Cisco wireless networks, mobility groups play a crucial role in enabling seamless roaming and mobility between different access points (APs) within the network. A mobility group is a logical grouping of APs that share information and collaborate to ensure uninterrupted connectivity for wireless clients as they move throughout the coverage area. APs within the same mobility group exchange information about client associations, RF conditions, and network status, allowing them to make informed decisions when clients need to be handed off from one AP to another. By sharing this information, APs can coordinate client roaming, ensuring a smooth transition as clients move from one AP to another without experiencing service interruptions or disconnections. Mobility groups also facilitate load balancing by allowing APs to share client load information and distribute client connections across the available APs, optimizing network performance and capacity. In summary, mobility groups in Cisco wireless networks enhance roaming capabilities and enable efficient load balancing, providing a seamless and reliable wireless experience for connected clients.
Question 64 of 65
64. Question
You have configured a stub area in your OSPF network. What OSPF LSAs are dynamically filtered from appearing in the stub area? (Choose 2)
Correct
The stub area filters Type 4 and Type 5 LSAs. Remember, the Type 4 LSA defines the ASBR in the network, and the Type 5 LSAs are for the external prefixes. REFERENCE: https://www.ajsnetworking.com/ospf-lsa-types/
Incorrect
The stub area filters Type 4 and Type 5 LSAs. Remember, the Type 4 LSA defines the ASBR in the network, and the Type 5 LSAs are for the external prefixes. REFERENCE: https://www.ajsnetworking.com/ospf-lsa-types/
Unattempted
The stub area filters Type 4 and Type 5 LSAs. Remember, the Type 4 LSA defines the ASBR in the network, and the Type 5 LSAs are for the external prefixes. REFERENCE: https://www.ajsnetworking.com/ospf-lsa-types/
Question 65 of 65
65. Question
What QoS DiffServ component seeks to buffer traffic above a defined threshold?
Correct
Traffic shaping seeks to buffer traffic above the defined threshold. Traffic policing is similar, but the default action is to drop traffic above the threshold. REFERENCE: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/qos_dfsrv/configuration/15-mt/qos-dfsrv-15-mt-book/qos-dfsrv.html
Incorrect
Traffic shaping seeks to buffer traffic above the defined threshold. Traffic policing is similar, but the default action is to drop traffic above the threshold. REFERENCE: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/qos_dfsrv/configuration/15-mt/qos-dfsrv-15-mt-book/qos-dfsrv.html
Unattempted
Traffic shaping seeks to buffer traffic above the defined threshold. Traffic policing is similar, but the default action is to drop traffic above the threshold. REFERENCE: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/qos_dfsrv/configuration/15-mt/qos-dfsrv-15-mt-book/qos-dfsrv.html
Use Page numbers below to navigate to other practice tests