Cisco ENCOR Exam: Network Fundamentals
93 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which method should an engineer use to deal with a long-standing contention issue between any two VMs on the same host?

  • Live migrate the VM to another host
  • Adjust the resource reservation limits (correct)
  • Reset the VM
  • Reset the host
  • What action completes the configuration to achieve a dynamic continuous mapped NAT for all users?

    Increase the NAT pool size to support 254 usable addresses

    An engineer configures HSRP group 37. The configuration modifies the default virtual MAC address.

    False

    SwitchC connects HR and Sales to the Core switch. However, business needs require that no traffic from the Finance VLAN traverse this switch. The command that meets this requirement is to ______.

    <p>correctly apply VLAN filtering</p> Signup and view all the answers

    How are map-register messages sent in a LISP deployment?

    <p>Egress tunnel routers to map servers to determine the appropriate egress tunnel router</p> Signup and view all the answers

    Match the following commands with their correct effects:

    <p>PC-1 must access the web server on port 8080 = permit host 192.168.0.5 eq 8080 host 172.16.0.2 Routing debug interfere with typing commands = Configure the logging synchronous global configuration command Routing configuration change with logging output interrupting command typing = Configure the logging synchronous command under the vty</p> Signup and view all the answers

    What action resolves the issue of guest users being able to access other guest user devices on the customer guest WLAN?

    <p>Implement P2P blocking</p> Signup and view all the answers

    What distinguishes Ansible from Chef?

    <p>Ansible uses Ruby to manage configurations.</p> Signup and view all the answers

    In an SD-Access solution, what is the role of a fabric edge node?

    <p>to connect wired endpoint to the SD-Access fabric</p> Signup and view all the answers

    What is a benefit of a virtual machine when compared with a physical server?

    <p>Multiple virtual servers can be deployed on the same physical server without having to buy additional hardware.</p> Signup and view all the answers

    When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?

    <p>logging host 10.2.3.4 vrf mgmt transport tcp port 6514</p> Signup and view all the answers

    At which Layer does Cisco DNA Center support REST controls?

    <p>Northbound APIs</p> Signup and view all the answers

    Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?

    <p>MACsec</p> Signup and view all the answers

    Which DHCP option helps lightweight APs find the IP address of a wireless LAN controller?

    <p>Option 43</p> Signup and view all the answers

    Which AP mode allows an engineer to scan configured channels for rogue access points?

    <p>monitor</p> Signup and view all the answers

    Cloud deployments have lower upfront costs than on-premises deployments.

    <p>True</p> Signup and view all the answers

    What action must an engineer perform to implement a route map in BGP to support redistribution and permit all unmatched routes?

    <p>Include a permit statement as the last entry</p> Signup and view all the answers

    Which HTTP status code is the correct response for a request with an incorrect password applied to a REST API session?

    <p>HTTP Status Code 401</p> Signup and view all the answers

    What does the LAP send when multiple WLCs respond to the CISCO_CAPWAPCONTROLLER.localdomain hostname during the CAPWAP discovery and join process?

    <p>Unicast discovery request to the first WLC that resolves the domain name</p> Signup and view all the answers

    Which GLBP load balancing method supports members of the group with different throughput capabilities?

    <p>Weighted</p> Signup and view all the answers

    In a Cisco SD-WAN solution, what functions are performed by OMP? (Choose two)

    <p>Configuration of control and data policies</p> Signup and view all the answers

    What is a benefit of Type 1 hypervisors?

    <p>Network engineers are able to create virtual networks to interconnect virtual machines in Layer 2 topologies.</p> Signup and view all the answers

    What is the wireless received signal strength indicator?

    <p>The value of how strong a tireless signal is received, measured in dBm.</p> Signup and view all the answers

    Which technology is used as the basis for the Cisco SD-Access data plane?

    <p>VXLAN</p> Signup and view all the answers

    What is YANG used for?

    <p>Describing data models.</p> Signup and view all the answers

    Which method does Cisco DNA Center use to allow management of non-Cisco devices through southbound protocols?

    <p>It creates device packs through the use of an SDK.</p> Signup and view all the answers

    How many flow exporters are needed per network device in the flexible NetFlow configuration?

    <p>2</p> Signup and view all the answers

    What are two considerations when using SSO as a network redundancy feature?

    <p>Requires synchronization between supervisors in order to guarantee continuous connectivity.</p> Signup and view all the answers

    Which command is required to verify NETCONF capability reply messages?

    <p>show netconf schema | section rpc-reply</p> Signup and view all the answers

    Refer to the exhibit. Which type of antenna does the radiation pattern represent?

    <p>Yagi</p> Signup and view all the answers

    Which new enhancement was implemented in Wi-Fi 6?

    <p>Uplink and Downlink Orthogonal Frequency Division Multiple Access</p> Signup and view all the answers

    Which Cisco DNA Center application is responsible for group-based access control permissions?

    <p>Policy</p> Signup and view all the answers

    An engineer must enable a login authentication method that allows a user to log in by using local authentication if all other defined authentication methods fail. Which configuration should be applied?

    <p>aaa authentication login CONSOLE group tacacs+ local enable</p> Signup and view all the answers

    Which Python code snippet prints the descriptions of disabled interfaces only?

    <p>D</p> Signup and view all the answers

    When firewall capabilities are considered, which feature is found only in Cisco next-generation firewalls?

    <p>malware protection</p> Signup and view all the answers

    What does a northbound API accomplish?

    <p>programmatic control of abstracted network resources through a centralized controller</p> Signup and view all the answers

    How does CEF switching differ from process switching on Cisco devices?

    <p>CEF switching uses adjacency tables built by the CDP protocol, and process switching uses the routing table</p> Signup and view all the answers

    When configuring WPA2 Enterprise on a WLAN, which additional security component configuration is required?

    <p>RADIUS server</p> Signup and view all the answers

    What is the difference between TCAM and the MAC address table?

    <p>The MAC address table is contained in CAM ACL and QoS information is stored in TCAM.</p> Signup and view all the answers

    Which exhibit displays a valid JSON file?

    <p>Option D</p> Signup and view all the answers

    A server running Linux is providing support for virtual machines along with DNS and DHCP services for a small business. Which technology does this represent?

    <p>Type 2 hypervisor</p> Signup and view all the answers

    How does Cisco Trustsec enable more flexible access controls for dynamic networking environments and data centers?

    <p>Classifies traffic based on the contextual identity of the endpoint rather than its IP address</p> Signup and view all the answers

    A client device roams between wireless LAN controllers that are mobility peers. Both controllers have dynamic interfaces on the same client VLAN. Which type of roam is described?

    <p>Inter-controller</p> Signup and view all the answers

    What is the responsibility of a secondary WLC?

    <p>It registers the LAPs if the primary controller fails</p> Signup and view all the answers

    Which two characteristics define the Intent API provided by Cisco DNA Center?

    <p>Northbound API</p> Signup and view all the answers

    Which DHCP option provides the CAPWAP APs with the address of the wireless controller(s)?

    <p>43</p> Signup and view all the answers

    Refer to the exhibit. Which configuration change will force BR2 to reach 209.165.201.0/27 via BR1?

    <p>Set the MED to 1 on PE2 toward BR2 outbound</p> Signup and view all the answers

    Which two methods are used to reduce the AP coverage area?

    <p>Increase minimum mandatory data rate</p> Signup and view all the answers

    Which configuration achieves the goal of terminating all idle-exec sessions in 600 seconds?

    <p>line vty 0 15 exec-timeout 600</p> Signup and view all the answers

    Which two threats does AMP4E have the ability to block?

    <p>Ransomware</p> Signup and view all the answers

    What does the Cisco REST response indicate?

    <p>Cisco DNA Center has the incorrect credentials for CAT9000-1</p> Signup and view all the answers

    An engineer configures NAT on R1. What does the output confirm?

    <p>The first packet triggered NAT to add an entry to the NAT table</p> Signup and view all the answers

    An engineer is troubleshooting the AP join process using DNS. Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?

    <p>cisco-capwap-controller.domain.com</p> Signup and view all the answers

    Which change to the first line of the script resolves the error?

    <p>from ncclient import*</p> Signup and view all the answers

    An engineer must configure HSRP group 300 on a Cisco IOS router. When the router is functional, it must be the active HSRP router.

    <p>Configure HSRP priority to ensure the router becomes the active router for group 300.</p> Signup and view all the answers

    What is the function of a fabric border node in a Cisco SD-Access environment?

    <p>To connect the Cisco SD-Access fabric to another fabric or external Layer 3 networks</p> Signup and view all the answers

    A network engineer configures BGP between R1 and R2. Both routers use BGP peer group CORP and are set up to use MD5 authentication. Which configuration allows the peering session to form between R1 and R2?

    <p>R2(config-router)#neighbor 10.120.10.1 peer-group CORP R2(config-router)#neighbor CORP password Cisco</p> Signup and view all the answers

    Which two operational models enable an AP to scan one or more wireless channels for rogue access points and at the same time provide wireless services to clients?

    <p>Monitor</p> Signup and view all the answers

    What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared?

    <p>The packet arrives on router C fragmented.</p> Signup and view all the answers

    What is one benefit of implementing a VSS architecture?

    <p>It provides multiple points of management for redundancy and improved support.</p> Signup and view all the answers

    What does Call Admission Control require the client to send in order to reserve the bandwidth?

    <p>Traffic specification</p> Signup and view all the answers

    Where is radio resource management performed in a Cisco SD-Access wireless solution?

    <p>Wireless controller</p> Signup and view all the answers

    How does EIGRP differ from OSPF?

    <p>EIGRP supports equal or unequal path cost, and OSPF only supports equal path cost.</p> Signup and view all the answers

    Which HTTP JSON response does the Python code output give?

    <p>7.0(3)I7(4)</p> Signup and view all the answers

    The connecting between SW1 and SW2 is not operational. Which two actions resolve the issue?

    <p>Configure switchport mode trunk on SW2</p> Signup and view all the answers

    An engineer is troubleshooting a connectivity issue and executes a traceoute. What does the result confirm?

    <p>The probe timed out</p> Signup and view all the answers

    Which device makes the decision for a wireless client to roam?

    <p>Wireless client</p> Signup and view all the answers

    How is MSDP used to interconnect multiple PIM-SM domains?

    <p>MSDP depends on BGP or multiprotocol BGP for interdomain operation</p> Signup and view all the answers

    A network engineer must configure a password expiry mechanism on the gateway router for all local passwords to expire after 60 days. What is required to complete this task?

    <p>Add the username admin privilege 15 common-criteria*policy Administrators password 0 Cisco13579!command.</p> Signup and view all the answers

    Which action is the vSmart controller responsible for in an SD-WAN deployment?

    <p>Distribute policies that govern data forwarding performed within the SD-WAN fabric</p> Signup and view all the answers

    If the noise floor is -90 dBm and a wireless client is receiving a signal of -75 dBm, what is the SNR?

    <p>15</p> Signup and view all the answers

    An engineer must create a script that appends the output of the show process cpu sorted command to a file. Which action accomplishes this?

    <p>CLI command &quot;show process cpu sorted | append flash:high-cpu-file&quot;</p> Signup and view all the answers

    Which two mechanisms are available to secure NTP?

    <p>Encrypted authentication</p> Signup and view all the answers

    What is the difference between CEF and process switching?

    <p>CEF uses the FIB and the adjacency table to make forwarding decisions, whereas process switching punts each packet.</p> Signup and view all the answers

    Which AP mode allows an engineer to scan configured channels for rogue access points?

    <p>Monitor</p> Signup and view all the answers

    What is a characteristic of MACsec?

    <p>802.1AE provides encryption and authentication services</p> Signup and view all the answers

    An engineer has noticed that the OSPF domain is receiving only the 172.17.1.0/24 route and the default route 0.0.0.0/0 is still missing. Which configuration must the engineer apply to resolve the problem?

    <p>Option D</p> Signup and view all the answers

    A network engineer must configure a router to send logging messages to a syslog server. Which configuration must be used?

    <p>logging host 10.10.10.1 transport tcp port 1024</p> Signup and view all the answers

    After configuring NETCONF, an engineer gets output from 'show line' but not from 'show running-config'. Which command completes the configuration?

    <p>Option C</p> Signup and view all the answers

    Which WLAN Layer 3 setting must be configured to provide users with a splash page for authentication?

    <p>Web Policy</p> Signup and view all the answers

    Which antenna type should be used for a site-to-site wireless connection?

    <p>Yagi</p> Signup and view all the answers

    An engineer is troubleshooting an application running on Apple phones receiving incorrect QoS markings. What change on the WLC optimizes QoS for these devices?

    <p>Change the QoS level to Platinum</p> Signup and view all the answers

    What is the function of the LISP map resolver?

    <p>To decapsulate map-request messages from ITRs and forward the messages to the MS</p> Signup and view all the answers

    A network administrator applies the following configuration to an IOS device. What is the process of password checks when a login attempt is made to the device?

    <p>All of the above checks are performed sequentially for each login attempt.</p> Signup and view all the answers

    What is the purpose of the LISP routing and addressing architecture?

    <p>It creates two entries for each network node, one for its identity and another for its location on the network.</p> Signup and view all the answers

    How does Cisco Trustsec enable more access controls for dynamic networking environments and data centers?

    <p>Classifies traffic based on the contextual identity of the endpoint rather than its IP address</p> Signup and view all the answers

    A network engineer configures a GRE tunnel and enters the 'show interface tunnel' command. What does the output confirm about the configuration?

    <p>The tunnel mode is set to the default.</p> Signup and view all the answers

    When 'HTTP/1.1 204 content' is returned after issuing the 'curl -X DELETE' command, what does this signify?

    <p>The command succeeded in deleting the object.</p> Signup and view all the answers

    A company plans to implement intent-based networking in its campus infrastructure. Which design facilitates a migration from a traditional campus design to a programmable fabric design?

    <p>Two-tier</p> Signup and view all the answers

    When a wireless client roams between two different wireless controllers, causing network connectivity outage, which configuration issue would likely cause this problem?

    <p>Not all of the controllers within the mobility group are using the same virtual interface IP address.</p> Signup and view all the answers

    The IP SLA is configured in a router. An engineer wants to configure an EEM applet to manage the interface based on the IP SLA operation. Which configuration should the engineer use?

    <p>event track 10 state down</p> Signup and view all the answers

    Which of the following JSON syntaxes is valid?

    <p>Option C</p> Signup and view all the answers

    An engineer needs to deny Telnet traffic from the loopback interface of router R3 to the loopback interface of router R2 during the weekend hours. All other traffic between the loopback interfaces must be allowed at all times. Which command accomplishes this task?

    <p>Option A</p> Signup and view all the answers

    Study Notes

    Implementing Cisco Enterprise Network Core Technologies (ENCOR)

    • The exam consists of 35 questions and lasts 120 minutes.
    • The exam code is 350-401.

    Type 1 Hypervisors

    • Benefit: allows creation of virtual networks to interconnect virtual machines in Layer 2 topologies.

    Wireless Received Signal Strength Indicator (RSSI)

    • Measures how well a device can hear a signal from an access point or router.
    • Measured in decibels (dBm) from 0 to -120.
    • Closer to 0, the stronger the signal is, which is better for wireless connections.

    Cisco SD-Access Data Plane

    • Uses Virtual Network Identifier (VNI) to identify a specific virtual network.
    • Based on VXLAN technology.

    YANG (Yet Another Next Generation) Data Model

    • Used to describe data models.

    Cisco DNA Center

    • Allows management of non-Cisco devices through the use of a Software Development Kit (SDK) that creates Device Packages for third-party devices.
    • Application responsible for group-based access control permissions is Policy.

    Flexible NetFlow

    • Two flow exporters are needed per network device in the flexible NetFlow configuration.

    SSO (Stateful Switchover) and NSF (Nonstop Forwarding)

    • Ensure redundancy and uninterrupted Layer 3 traffic.
    • Must be combined with NSF to support uninterrupted Layer 2 and Layer 3 operations.

    HSRP (Hot Standby Router Protocol)

    • Ensures that traffic is not disrupted in the event of a hardware failure.
    • Uses a virtual MAC address.

    Control Plane Policing

    • Implemented for SSH and Telnet using specific configuration sets.

    QoS (Quality of Service)

    • Classification, marking, and policing of traffic are components of QoS.

    EEM (Embedded Event Manager)

    • Enables OSPF debugging in the event of an OSPF neighborship going down.

    Syslog

    • Used to send logging messages to a syslog server.
    • Requires a specific configuration using a reliable protocol and a specific IP address.

    NETCONF

    • Used to configure a router.
    • Requires a specific configuration to complete the configuration.

    Wireless Network Configuration

    • A specific configuration is required to provide a splash page for authentication.

    EtherChannel

    • A channel-misconfig error can be resolved by configuring the same protocol on the EtherChannel on both switches.

    LISP (Locator/ID Separation Protocol)

    • Map resolver (MR) receives MAP requests, de-encapsulates them, and forwards them to the Mapping Server (MS).
    • Used to separate location and identity of network nodes.

    Cisco Trustsec

    • Enables more access controls for dynamic networking environments and data centers.
    • Classifies traffic based on the contextual identity of the endpoint rather than its IP address.

    GRE Tunnel

    • The output of the show interface tunnel command confirms the configuration of the GRE tunnel.

    HTTP/1.1 204 Content

    • Returned when the curl -I -X delete command is issued, indicating that the object was successfully deleted.

    Intent-Based Networking

    • A company can migrate from a traditional campus design to a programmer fabric designer using Cisco DNA Center.### Wireless Networking
    • When a wireless client roams between two different wireless controllers, a network connectivity outage is experienced for a period of time. This is caused by a configuration issue where not all controllers in the mobility group are using the same virtual interface IP address.

    IP SLA and EEM Applet

    • IP SLA can be configured to ping an IP address every 3 seconds to ensure the connection is still up.
    • An EEM applet can be configured to shut down an interface and bring it back up when there is a problem with the IP SLA.

    JSON Syntax

    • A valid JSON syntax example: {'switch': {'name': 'dist1', 'interfaces': ['gig1', 'gig2', 'gig3']}}

    Access Control

    • To deny Telnet traffic from the loopback interface of one router to the loopback interface of another router, a time-range and access-list can be configured.

    TCAM and CAM

    • TCAM (Ternary Content Addressable Memory) is used for faster address lookups, enabling fast routing in routers.
    • CAM (Content Addressable Memory) is used for building and looking up the MAC address table, enabling L2 forwarding decisions in switches.

    Virtualization

    • A Type 2 hypervisor runs on top of an operating system and not on the physical hardware directly.
    • Examples of Type 2 hypervisors include VMware Workstation and Microsoft Virtual PC.

    Cisco Trustsec

    • Cisco Trustsec enables more flexible access controls for dynamic networking environments and data centers by classifying traffic based on the contextual identity of the endpoint rather than its IP address.

    Mobility

    • When a client device roams between wireless LAN controllers that are mobility peers, both controllers have a dynamic interface on the same client VLAN, which is an example of inter-controller roam.

    Secondary WLC

    • The responsibility of a secondary WLC is to register the LAPs if the primary controller fails.

    Intent API

    • The Intent API is a Northbound REST API that exposes specific capabilities of the Cisco DNA Center platform.
    • It provides policy-based abstraction of business intent, allowing focus on an outcome rather than struggling with individual mechanisms steps.

    DHCP Option

    • DHCP option 43 provides the CAPWAP APs with the address of the wireless controller(s).
    • DHCP option 150 provides the CAPWAP APs with the address of the wireless controller(s).

    MED Attribute

    • The MED (Multi-Exit Discriminator) attribute is used to influence the route selection process in BGP.
    • It is a non-transitive attribute that is sent through ASes to external BGP neighbors.
    • A lower MED value is preferred.

    AP Coverage Area

    • To reduce the AP coverage area, the AP transmit power can be reduced or the minimum mandatory data rate can be increased.

    Security Policy

    • To terminate all idle-exec sessions in 600 seconds, the absolute-timeout command can be used in the line vty configuration.

    AMP4E

    • AMP4E (Advanced Malware Protection for Endpoints) has the ability to block ransomware and Microsoft Word macro attacks.

    Cisco DNA Center

    • The Intent API is a Northbound REST API that exposes specific capabilities of the Cisco DNA Center platform.
    • Cisco DNA Center is a solution that provides a single, unified way to manage network devices.

    SPAN and RSPAN

    • SPAN (Switched Port Analyzer) is a feature that allows monitoring of traffic on a specific VLAN or port.
    • RSPAN (Remote SPAN) is a feature that allows monitoring of traffic on a remote VLAN or port.

    NAT and PAT

    • NAT (Network Address Translation) is a technique that allows multiple devices to share a single public IP address.
    • PAT (Port Address Translation) is a technique that allows multiple devices to share a single public IP address and port.

    DNS and DHCP

    • DNS (Domain Name System) is a system that translates hostnames to IP addresses.
    • DHCP (Dynamic Host Configuration Protocol) is a protocol that assigns IP addresses to devices on a network.

    Access Point Join Process

    • The AP join process can be configured using DNS.
    • The AP can obtain the IP address of the WLC using DNS.

    Ansible and Chef

    • Ansible and Chef are both automation tools used for configuration management.
    • Ansible uses YAML to manage configurations and pushes the configuration to the client.
    • Chef uses Ruby to manage configurations and the client pulls the configuration from the server.

    SD-Access Solution

    • In an SD-Access solution, the fabric edge node connects wired endpoints to the SD-Access fabric.

    Virtual Machine

    • A virtual machine can run multiple virtual servers on the same physical server without having to buy additional hardware.

    TLS for Syslog

    • TLS (Transport Layer Security) can be used to securely transport syslog messages.
    • The default port for syslog over TLS is 6514.

    Cisco DNA Center

    • Cisco DNA Center supports REST controls at the Northbound API layer.
    • YAML output from responses to API calls can be used to configure devices.Here are the study notes:

    TTL Exceeded Message

    • When the TTL (Time To Live) of a packet expires, the router discards the packet and sends an ICMP Time Exceeded message.
    • Routers check the TTL first before processing a packet further.
    • If the TTL is zero, the router discards the packet and sends an ICMP Time Exceeded message.

    MACsec Technology

    • MACsec (IEEE 802.1AE) provides MAC-layer encryption over wired networks.
    • It uses out-of-band methods for encryption keying.
    • The MACsec Key Agreement (MKA) Protocol provides the required session keys and manages the required encryption keys.

    VXLAN Environment

    • In a VXLAN environment, the VNID (VXLAN Network Identifier) is used to identify Layer 2 segments.
    • The VNID is a 24-bit field that is used to maintain Layer 2 isolation between segments.

    OSPF Neighborship

    • For an OSPF neighborship to form, the correct network command must be applied to the router.
    • The network command specifies the network address and area ID.

    RESTCONF Operations

    • RESTCONF is a protocol for managing network devices.
    • Valid RESTCONF operations include OPTIONS, HEAD, GET, POST, PATCH, and DELETE.

    Fabric Border Node

    • In a Cisco SD-Access environment, a fabric border node connects the SD-Access fabric to another fabric or external Layer 3 networks.
    • It is responsible for routed access and provides connectivity to external networks.

    EIGRP vs OSPF

    • EIGRP and OSPF are both routing protocols, but they have different characteristics.
    • EIGRP supports equal or unequal path cost, while OSPF only supports equal path cost.

    SD-WAN Deployment

    • In an SD-WAN deployment, the vSmart controller is responsible for distributing policies that govern data forwarding.
    • The vSmart controller is a critical component of the SD-WAN architecture.

    NTP Security

    • Two mechanisms are available to secure NTP: IP access list-based and encrypted authentication.
    • NTP security is critical to prevent NTP attacks.

    CEF and Process Switching

    • CEF (Cisco Express Forwarding) and process switching are two different packet forwarding mechanisms.
    • CEF uses the FIB (Forwarding Information Base) and adjacency table to make forwarding decisions, whereas process switching punts each packet to the CPU for processing.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge of Cisco Enterprise Network Core Technologies (ENCOR) with this quiz. Covers network fundamentals, including Type 1 Hypervisors and Wireless Received Signal Strength Indicator (RSSI).

    More Like This

    Use Quizgecko on...
    Browser
    Browser